Ivan1914 | 19.02.2009 15:53 | Hier die 3 Total-Virus ergebnisse. Da eine scheinbar
verseucht ist habe ich noch nicht ewido laufen lassen und
habe auch noch nicht neu gestartet seit combofix.
c:\windows\system32\wrfxkiyreqop Code:
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.0.0.93 2009.02.19 -
AhnLab-V3 2009.2.19.0 2009.02.19 -
AntiVir 7.9.0.83 2009.02.19 -
Authentium 5.1.0.4 2009.02.19 -
Avast 4.8.1335.0 2009.02.18 -
AVG 8.0.0.237 2009.02.19 -
BitDefender 7.2 2009.02.19 -
CAT-QuickHeal 10.00 2009.02.19 -
ClamAV 0.94.1 2009.02.19 -
Comodo 983 2009.02.19 -
DrWeb 4.44.0.09170 2009.02.19 -
eSafe 7.0.17.0 2009.02.18 -
eTrust-Vet 31.6.6365 2009.02.19 -
F-Prot 4.4.4.56 2009.02.19 -
F-Secure 8.0.14470.0 2009.02.19 -
Fortinet 3.117.0.0 2009.02.19 -
GData 19 2009.02.19 -
Ikarus T3.1.1.45.0 2009.02.19 -
K7AntiVirus 7.10.630 2009.02.18 -
Kaspersky 7.0.0.125 2009.02.19 -
McAfee 5529 2009.02.17 -
McAfee+Artemis 5529 2009.02.17 -
Microsoft 1.4306 2009.02.19 -
NOD32 3867 2009.02.19 -
Norman 6.00.06 2009.02.19 -
nProtect 2009.1.8.0 2009.02.19 -
Panda 10.0.0.10 2009.02.19 -
PCTools 4.4.2.0 2009.02.19 -
Prevx1 V2 2009.02.19 -
Rising 21.17.32.00 2009.02.19 -
SecureWeb-Gateway 6.7.6 2009.02.19 -
Sophos 4.38.0 2009.02.19 -
Sunbelt 3.2.1855.2 2009.02.17 -
Symantec 10 2009.02.19 -
TheHacker 6.3.2.2.259 2009.02.18 -
TrendMicro 8.700.0.1004 2009.02.19 -
VBA32 3.12.10.0 2009.02.18 -
ViRobot 2009.2.19.1615 2009.02.19 -
VirusBuster 4.5.11.0 2009.02.18 -
weitere Informationen
File size: 74603 bytes
MD5...: 2fae23383ab70d44bd6803de295929e9
SHA1..: 313f6fad82720dbd703730fce39396b114bf782f
SHA256: d8eec64a45a18029564e12d20c0b3852efc3575dd3782dee28a3a17a3cd559c3
SHA512: 5596aea4a9b3d14adb1ddd3df4ac37eb428feec0f725a769afb6358dcc08e46a
04a7b17d5e36db80e58ca177fb53b0ee1423796be4aca4a41a07017ca0390b84
ssdeep: 384:TPbjAF5bINz+IMy5B9ZyCoRAl+6w1r4pVUIqvnVTPLOmPJm68dYdd2OEs4lJ
t83:TPPwRAl+1LxX4lJt83
PEiD..: -
TrID..: File type identification
Unknown!
PEInfo: - c:\windows\system32\AnipUninst1.exe Code:
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.0.0.93 2009.02.19 -
AhnLab-V3 2009.2.19.0 2009.02.19 -
AntiVir 7.9.0.83 2009.02.19 -
Authentium 5.1.0.4 2009.02.19 -
Avast 4.8.1335.0 2009.02.18 -
AVG 8.0.0.237 2009.02.19 -
BitDefender 7.2 2009.02.19 -
CAT-QuickHeal 10.00 2009.02.19 -
ClamAV 0.94.1 2009.02.19 -
Comodo 983 2009.02.19 -
DrWeb 4.44.0.09170 2009.02.19 -
eSafe 7.0.17.0 2009.02.18 -
eTrust-Vet 31.6.6365 2009.02.19 -
F-Prot 4.4.4.56 2009.02.19 -
F-Secure 8.0.14470.0 2009.02.19 -
Fortinet 3.117.0.0 2009.02.19 -
GData 19 2009.02.19 -
Ikarus T3.1.1.45.0 2009.02.19 -
K7AntiVirus 7.10.630 2009.02.18 -
Kaspersky 7.0.0.125 2009.02.19 -
McAfee 5529 2009.02.17 -
McAfee+Artemis 5529 2009.02.17 -
Microsoft 1.4306 2009.02.19 -
NOD32 3867 2009.02.19 -
Norman 6.00.06 2009.02.19 -
nProtect 2009.1.8.0 2009.02.19 -
Panda 10.0.0.10 2009.02.19 -
PCTools 4.4.2.0 2009.02.19 -
Prevx1 V2 2009.02.19 -
Rising 21.17.32.00 2009.02.19 -
SecureWeb-Gateway 6.7.6 2009.02.19 -
Sophos 4.38.0 2009.02.19 -
Sunbelt 3.2.1855.2 2009.02.17 -
Symantec 10 2009.02.19 -
TheHacker 6.3.2.2.259 2009.02.18 -
TrendMicro 8.700.0.1004 2009.02.19 -
VBA32 3.12.10.0 2009.02.18 -
ViRobot 2009.2.19.1615 2009.02.19 -
VirusBuster 4.5.11.0 2009.02.18 -
weitere Informationen
File size: 1718272 bytes
MD5...: de95fd7c767d919b4acd4ee3fa80884e
SHA1..: 4ce074f981543640bbba44aa92b59967af9d0268
SHA256: a6ba4ea1e35be7a50a88bb28dece5f0290e2164c6c6fc26e68df0b305df132da
SHA512: 202591ecada955f9468d016a622a1d7aa8271999b589268fed021e43f79d8820
22a5be3293aeb25b841caeb3bd1d96256232ebcc8be9fa9a0be02797eb768a58
ssdeep: 24576:fCwiPdYMPr8A48lPSPND++wrZ8MqQv76YrV0Ufo1q8:k6MPrTI++PS+vn
PEiD..: -
TrID..: File type identification
Win32 Dynamic Link Library - Borland C/C++ (50.7%)
Windows OCX File (28.3%)
InstallShield setup (9.8%)
Win32 Executable Delphi generic (3.3%)
DOS Executable Borland C++ (2.9%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x401000
timedatestamp.....: 0x475c4aa6 (Sun Dec 09 20:05:58 2007)
machinetype.......: 0x14c (I386)
( 8 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x8c000 0x8bc00 6.53 cee03d3237d687e328e4b684749fafdd
.data 0x8d000 0x17000 0x12e00 5.73 60051f27ed005b24ad24d8046595ec60
.tls 0xa4000 0x1000 0x200 0.00 bf619eac0cdf3f68d496ea9344137e8b
.rdata 0xa5000 0x1000 0x200 0.21 a3021adbed19db194f6d62656048d347
.idata 0xa6000 0x3000 0x2a00 5.03 18c980af857346d4705f4a50b80439f6
.edata 0xa9000 0x2000 0x2000 5.58 29af27dc5afd9d0f9c53af6072427530
.rsrc 0xab000 0xf7000 0xf6c00 7.22 f928ee436e8a9fe73378ccfa4e97a142
.reloc 0x1a2000 0x9000 0x8e00 6.63 8aeeffe41413cfef0b0f4b81cf79f3f5
( 9 imports )
> ADVAPI32.DLL: RegCloseKey, RegCreateKeyA, RegCreateKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumKeyExA, RegFlushKey, RegOpenKeyA, RegOpenKeyExA, RegQueryInfoKeyA, RegQueryValueExA, RegSetValueExA
> KERNEL32.DLL: CloseHandle, CompareStringA, CopyFileA, CreateDirectoryA, CreateEventA, CreateFileA, CreateFileW, CreateMutexA, CreateThread, DebugBreak, DeleteCriticalSection, DeleteFileA, EnterCriticalSection, EnumCalendarInfoA, ExitProcess, ExitThread, FileTimeToDosDateTime, FileTimeToLocalFileTime, FindClose, FindFirstFileA, FindResourceA, FormatMessageA, FreeLibrary, FreeResource, GetACP, GetCPInfo, GetCommandLineA, GetCurrentProcessId, GetCurrentThreadId, GetDateFormatA, GetDiskFreeSpaceA, GetEnvironmentStrings, GetExitCodeThread, GetFileAttributesA, GetFileAttributesW, GetFileSize, GetFileType, GetLastError, GetLocalTime, GetLocaleInfoA, GetModuleFileNameA, GetModuleHandleA, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoA, GetStdHandle, GetStringTypeW, GetSystemDirectoryA, GetSystemInfo, GetSystemTime, GetThreadLocale, GetTickCount, GetVersion, GetVersionExA, GetWindowsDirectoryA, GlobalAddAtomA, GlobalAlloc, GlobalDeleteAtom, GlobalFree, GlobalHandle, GlobalLock, GlobalReAlloc, GlobalUnlock, HeapAlloc, HeapFree, InitializeCriticalSection, InterlockedDecrement, InterlockedExchange, InterlockedIncrement, LeaveCriticalSection, LoadLibraryA, LoadLibraryExA, LoadResource, LocalAlloc, LocalFree, LockResource, MulDiv, MultiByteToWideChar, RaiseException, ReadFile, RemoveDirectoryA, ResumeThread, RtlUnwind, SetConsoleCtrlHandler, SetEndOfFile, SetErrorMode, SetEvent, SetFilePointer, SetHandleCount, SetLastError, SetThreadLocale, SizeofResource, Sleep, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualAlloc, VirtualFree, VirtualQuery, WaitForSingleObject, WideCharToMultiByte, WriteFile, lstrcpyA, lstrcpynA, lstrlenA
> WSOCK32.DLL: -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -
> COMCTL32.DLL: ImageList_Add, ImageList_BeginDrag, ImageList_Create, ImageList_Destroy, ImageList_DragEnter, ImageList_DragLeave, ImageList_DragMove, ImageList_DragShowNolock, ImageList_Draw, ImageList_EndDrag, ImageList_GetBkColor, ImageList_GetDragImage, ImageList_GetIconSize, ImageList_GetImageCount, ImageList_Read, ImageList_Remove, ImageList_Replace, ImageList_ReplaceIcon, ImageList_SetBkColor, ImageList_SetDragCursorImage, ImageList_SetIconSize, ImageList_Write, ImageList_DrawEx
> GDI32.DLL: BitBlt, CopyEnhMetaFileA, CreateBitmap, CreateBrushIndirect, CreateCompatibleBitmap, CreateCompatibleDC, CreateDIBSection, CreateDIBitmap, CreateFontIndirectA, CreateHalftonePalette, CreatePalette, CreatePenIndirect, CreateSolidBrush, DeleteDC, DeleteEnhMetaFile, DeleteObject, ExcludeClipRect, GdiFlush, GetBitmapBits, GetBrushOrgEx, GetClipBox, GetCurrentPositionEx, GetDCOrgEx, GetDIBColorTable, GetDIBits, GetDeviceCaps, GetEnhMetaFileBits, GetEnhMetaFileHeader, GetEnhMetaFilePaletteEntries, GetObjectA, GetPaletteEntries, GetPixel, GetStockObject, GetSystemPaletteEntries, GetTextExtentPoint32A, GetTextMetricsA, GetWinMetaFileBits, GetWindowOrgEx, IntersectClipRect, LineTo, MaskBlt, MoveToEx, PatBlt, PlayEnhMetaFile, Polyline, RealizePalette, RectVisible, Rectangle, RestoreDC, SaveDC, SelectObject, SelectPalette, SetBkColor, SetBkMode, SetBrushOrgEx, SetDIBColorTable, SetEnhMetaFileBits, SetPixel, SetROP2, SetStretchBltMode, SetTextColor, SetViewportOrgEx, SetWinMetaFileBits, SetWindowOrgEx, StretchBlt, UnrealizeObject
> SHELL32.DLL: SHGetMalloc, SHGetSpecialFolderLocation, ShellExecuteA, SHGetPathFromIDListA
> USER32.DLL: ActivateKeyboardLayout, AdjustWindowRectEx, BeginPaint, BringWindowToTop, CallNextHookEx, CallWindowProcA, CharLowerA, CharLowerBuffA, CharNextA, CharUpperBuffA, CheckMenuItem, ClientToScreen, CreateIcon, CreateMenu, CreatePopupMenu, CreateWindowExA, DefFrameProcA, DefMDIChildProcA, DefWindowProcA, DeleteMenu, DestroyCursor, DestroyIcon, DestroyMenu, DestroyWindow, DispatchMessageA, DrawEdge, DrawFocusRect, DrawFrameControl, DrawIcon, DrawIconEx, DrawMenuBar, DrawTextA, EnableMenuItem, EnableScrollBar, EnableWindow, EndPaint, EnumThreadWindows, EnumWindows, EqualRect, FillRect, FindWindowA, FrameRect, GetActiveWindow, GetCapture, GetClassInfoA, GetClientRect, GetClipboardData, GetCursor, GetCursorPos, GetDC, GetDCEx, GetDesktopWindow, GetFocus, GetForegroundWindow, GetIconInfo, GetKeyNameTextA, GetKeyState, GetKeyboardLayout, GetKeyboardLayoutList, GetKeyboardState, GetKeyboardType, GetLastActivePopup, GetMenu, GetMenuItemCount, GetMenuItemID, GetMenuItemInfoA, GetMenuState, GetMenuStringA, GetParent, GetPropA, GetScrollInfo, GetScrollPos, GetScrollRange, GetSubMenu, GetSysColor, GetSystemMetrics, GetTopWindow, GetWindow, GetWindowDC, GetWindowLongA, GetWindowPlacement, GetWindowRect, GetWindowTextA, GetWindowThreadProcessId, InflateRect, InsertMenuA, InsertMenuItemA, IntersectRect, InvalidateRect, IsChild, IsDialogMessageA, IsIconic, IsRectEmpty, IsWindow, IsWindowEnabled, IsWindowVisible, IsZoomed, KillTimer, LoadBitmapA, LoadCursorA, LoadIconA, LoadKeyboardLayoutA, LoadStringA, MapVirtualKeyA, MapWindowPoints, MessageBoxA, MsgWaitForMultipleObjects, OemToCharA, OffsetRect, PeekMessageA, PostMessageA, PostQuitMessage, PtInRect, RegisterClassA, RegisterClipboardFormatA, RegisterWindowMessageA, ReleaseCapture, ReleaseDC, RemoveMenu, RemovePropA, ScreenToClient, ScrollWindow, SendMessageA, SetActiveWindow, SetCapture, SetClassLongA, SetCursor, SetFocus, SetForegroundWindow, SetMenu, SetMenuItemInfoA, SetPropA, SetRect, SetScrollInfo, SetScrollPos, SetScrollRange, SetTimer, SetWindowLongA, SetWindowPlacement, SetWindowPos, SetWindowTextA, SetWindowsHookExA, ShowCursor, ShowOwnedPopups, ShowScrollBar, ShowWindow, SystemParametersInfoA, TrackPopupMenu, TranslateMDISysAccel, TranslateMessage, UnhookWindowsHookEx, UnregisterClassA, UpdateWindow, WaitMessage, WinHelpA, WindowFromPoint, wsprintfA, GetSystemMenu
> OLE32.DLL: CLSIDFromProgID, CoCreateInstance, CoInitialize, CoUninitialize, IsEqualGUID
> OLEAUT32.DLL: GetErrorInfo, SafeArrayAccessData, SafeArrayGetElement, SafeArrayGetLBound, SafeArrayGetUBound, SafeArrayPtrOfIndex, SafeArrayUnaccessData, SysAllocStringLen, SysFreeString, SysReAllocStringLen, SysStringLen, VariantChangeTypeEx, VariantClear, VariantCopyInd, VariantInit
( 177 exports )
@$xp$10Psock@PINT, @$xp$12Nmurl@TNMURL, @$xp$12Psock@PPChar, @$xp$12Psock@TNMReg, @$xp$14Nmhttp@CmdType, @$xp$14Nmhttp@TNMHTTP, @$xp$14Psock@PLongint, @$xp$14Psock@PWSAData, @$xp$15Nmuue@UUMethods, @$xp$15Psock@PHostInfo, @$xp$15Psock@PPLongInt, @$xp$15Psock@THostInfo, @$xp$15Psock@TOnStatus, @$xp$16Psock@ESockError, @$xp$16Psock@PTimeValue, @$xp$16Psock@TPowersock, @$xp$16Psock@TTimeValue, @$xp$17Psock@EAbortError, @$xp$17Psock@PServerInfo, @$xp$17Psock@PSocketList, @$xp$17Psock@TServerInfo, @$xp$17Psock@TSocketList, @$xp$18Nmhttp@THeaderInfo, @$xp$18Psock@TThreadTimer, @$xp$19Nmhttp@TResultEvent, @$xp$19Nmurl@TOnErrorEvent, @$xp$19Nmuue@ExchangeTable, @$xp$19Psock@PProtocolInfo, @$xp$19Psock@THandlerEvent, @$xp$19Psock@TOnErrorEvent, @$xp$19Psock@TProtocolInfo, @$xp$20Nmhttp@HTTPException, @$xp$20Nmuue@TNMUUProcessor, @$xp$20Psock@PSocketAddress, @$xp$20Psock@TSocketAddress, @$xp$21Psock@TOnHostResolved, @$xp$22Nmextstr@TExStringList, @$xp$22Psock@TNMGeneralServer, @$xp$23Psock@PTNMGeneralServer, @$xp$28Psock@InstantiateServethread, @@Globals@Finalize, @@Globals@Initialize, @@Mainform@Finalize, @@Mainform@Initialize, @Nmextstr@Finalization$qqrv, @Nmextstr@TExStringList@, @Nmextstr@TExStringList@GetValue$qqrx17System@AnsiString, @Nmextstr@TExStringList@IndexOfName$qqrx17System@AnsiString, @Nmextstr@TExStringList@SetValue$qqrx17System@AnsiStringt1, @Nmextstr@initialization$qqrv, @Nmhttp@Finalization$qqrv, @Nmhttp@HTTPException@, @Nmhttp@THeaderInfo@, @Nmhttp@TNMHTTP@, @Nmhttp@TNMHTTP@$bctr$qqrp18Classes@TComponent, @Nmhttp@TNMHTTP@$bdtr$qqrv, @Nmhttp@TNMHTTP@Abort$qqrv, @Nmhttp@TNMHTTP@AssembleHTTPHeader$qqrv, @Nmhttp@TNMHTTP@Copy$qqr17System@AnsiStringt1, @Nmhttp@TNMHTTP@Delete$qqr17System@AnsiString, @Nmhttp@TNMHTTP@Get$qqr17System@AnsiString, @Nmhttp@TNMHTTP@HTTPConnect$qqrv, @Nmhttp@TNMHTTP@Head$qqr17System@AnsiString, @Nmhttp@TNMHTTP@Link$qqr17System@AnsiStringt1, @Nmhttp@TNMHTTP@Move$qqr17System@AnsiStringt1, @Nmhttp@TNMHTTP@Options$qqr17System@AnsiString, @Nmhttp@TNMHTTP@ParseURL$qqrv, @Nmhttp@TNMHTTP@Patch$qqr17System@AnsiStringt1, @Nmhttp@TNMHTTP@Post$qqr17System@AnsiStringt1, @Nmhttp@TNMHTTP@Put$qqr17System@AnsiStringt1, @Nmhttp@TNMHTTP@RemoveHeader$qqrv, @Nmhttp@TNMHTTP@SendHTTP$qqrv, @Nmhttp@TNMHTTP@Trace$qqr17System@AnsiStringt1, @Nmhttp@TNMHTTP@UnLink$qqr17System@AnsiStringt1, @Nmhttp@TNMHTTP@Wrapped$qqr17System@AnsiStringt1, @Nmhttp@initialization$qqrv, @Nmurl@Finalization$qqrv, @Nmurl@TNMURL@, @Nmurl@TNMURL@$bctr$qqrp18Classes@TComponent, @Nmurl@TNMURL@$bdtr$qqrv, @Nmurl@TNMURL@GetDecodeString$qqrv, @Nmurl@TNMURL@GetEncodeString$qqrv, @Nmurl@TNMURL@URLDecode$qqrx17System@AnsiString, @Nmurl@TNMURL@URLEncode$qqrx17System@AnsiString, @Nmurl@initialization$qqrv, @Nmuue@Finalization$qqrv, @Nmuue@MimeTable, @Nmuue@TNMUUProcessor@, @Nmuue@TNMUUProcessor@$bctr$qqrp18Classes@TComponent, @Nmuue@TNMUUProcessor@Base64Decode$qqrv, @Nmuue@TNMUUProcessor@Decode$qqrv, @Nmuue@TNMUUProcessor@Encode$qqrv, @Nmuue@TNMUUProcessor@ReadLnFromStream$qqrp15Classes@TStreamr17System@AnsiString, @Nmuue@TNMUUProcessor@SetEncodeTable$qqrv, @Nmuue@TNMUUProcessor@StdDecode$qqrv, @Nmuue@TNMUUProcessor@UuDEC$qqruc, @Nmuue@UUTABLE, @Nmuue@base64Table, @Nmuue@initialization$qqrv, @Psock@EAbortError@, @Psock@ESockError@, @Psock@Finalization$qqrv, @Psock@InstantiateServethread@, @Psock@InstantiateServethread@$bctr$qqrp18Classes@TComponentus, @Psock@InstantiateServethread@$bdtr$qqrv, @Psock@InstantiateServethread@Execute$qqrv, @Psock@NthPos$qqr17System@AnsiStringci, @Psock@NthWord$qqr17System@AnsiStringci, @Psock@PsockAllocateHWnd$qqrp14System@TObject, @Psock@StreamLn$qqrp15Classes@TStream17System@AnsiString, @Psock@TNMGeneralServer@, @Psock@TNMGeneralServer@$bctr$qqrp18Classes@TComponent, @Psock@TNMGeneralServer@$bdtr$qqrv, @Psock@TNMGeneralServer@Abort$qqrv, @Psock@TNMGeneralServer@Connect$qqrv, @Psock@TNMGeneralServer@Loaded$qqrv, @Psock@TNMGeneralServer@Serve$qqrv, @Psock@TNMGeneralServer@ServerAccept$qqrp14System@TObject, @Psock@TNMReg@, @Psock@TPowersock@, @Psock@TPowersock@$bctr$qqrp18Classes@TComponent, @Psock@TPowersock@$bdtr$qqrv, @Psock@TPowersock@Abort$qqrv, @Psock@TPowersock@Accept$qqrv, @Psock@TPowersock@AppendFile$qqr17System@AnsiString, @Psock@TPowersock@Cancel$qqrv, @Psock@TPowersock@CaptureFile$qqr17System@AnsiString, @Psock@TPowersock@CaptureStream$qqrp15Classes@TStreami, @Psock@TPowersock@CaptureString$qqrr17System@AnsiStringi, @Psock@TPowersock@CertifyConnect$qqrv, @Psock@TPowersock@ClearInput$qqrv, @Psock@TPowersock@Close$qqrui, @Psock@TPowersock@Connect$qqrv, @Psock@TPowersock@DataAvailable$qqrv, @Psock@TPowersock@Disconnect$qqrv, @Psock@TPowersock@ErrorManager$qqrus, @Psock@TPowersock@FilterHeader$qqrp19Classes@TFileStream, @Psock@TPowersock@GetLastErrorNo$qqrv, @Psock@TPowersock@GetLocalAddress$qqrv, @Psock@TPowersock@GetLocalIP$qqrv, @Psock@TPowersock@GetPortString$qqrv, @Psock@TPowersock@GetRemoteIP$qqrv, @Psock@TPowersock@InitWinsock$qqrv, @Psock@TPowersock@Listen$qqro, @Psock@TPowersock@Read$qqrus, @Psock@TPowersock@ReadLn$qqrv, @Psock@TPowersock@RequestCloseSocket$qqrv, @Psock@TPowersock@ResolveRemoteHost$qqrv, @Psock@TPowersock@SendBuffer$qqrpcus, @Psock@TPowersock@SendFile$qqr17System@AnsiString, @Psock@TPowersock@SendStream$qqrp15Classes@TStream, @Psock@TPowersock@SetLastErrorNo$qqri, @Psock@TPowersock@SetWSAError$qqrus17System@AnsiString, @Psock@TPowersock@SocketErrorStr$qqrus, @Psock@TPowersock@StatusMessage$qqruc17System@AnsiString, @Psock@TPowersock@TimerFired$qqrp14System@TObject, @Psock@TPowersock@TimerOff$qqrv, @Psock@TPowersock@TimerOn$qqrv, @Psock@TPowersock@Transaction$qqrx17System@AnsiString, @Psock@TPowersock@Wndproc$qqrr17Messages@TMessage, @Psock@TPowersock@Write$qqr17System@AnsiString, @Psock@TPowersock@Writeln$qqr17System@AnsiString, @Psock@TThreadTimer@, @Psock@TThreadTimer@$bctr$qqrp18Classes@TComponent, @Psock@TThreadTimer@$bdtr$qqrv, @Psock@TThreadTimer@SetEnabled$qqro, @Psock@TThreadTimer@SetInterval$qqrui, @Psock@TThreadTimer@SetOnTimer$qqrynpqqrp14System@TObject$v, @Psock@TThreadTimer@Timer$qqrv, @Psock@TThreadTimer@UpdateTimer$qqrv, @Psock@TThreadTimer@Wndproc$qqrr17Messages@TMessage, @Psock@TmrAllocateHWnd$qqrp14System@TObject, @Psock@WinsockMessage, @Psock@initialization$qqrv, __GetExceptDLLinfo, ___CPPdebugHook, _frmMain
ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=de95fd7c767d919b4acd4ee3fa80884e' target='_blank'>http://www.threatexpert.com/report.aspx?md5=de95fd7c767d919b4acd4ee3fa80884e</a> c:\windows\kiqpb8002.exe: Code:
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.0.0.93 2009.02.19 -
AhnLab-V3 2009.2.19.0 2009.02.19 -
AntiVir 7.9.0.83 2009.02.19 -
Authentium 5.1.0.4 2009.02.19 -
Avast 4.8.1335.0 2009.02.18 Win32:FakeAlert-AT
AVG 8.0.0.237 2009.02.19 Generic_r.AZ
BitDefender 7.2 2009.02.19 -
CAT-QuickHeal 10.00 2009.02.19 -
ClamAV 0.94.1 2009.02.19 Trojan.Dropper-18514
Comodo 983 2009.02.19 -
DrWeb 4.44.0.09170 2009.02.19 -
eSafe 7.0.17.0 2009.02.18 -
eTrust-Vet 31.6.6365 2009.02.19 -
F-Prot 4.4.4.56 2009.02.19 -
F-Secure 8.0.14470.0 2009.02.19 -
Fortinet 3.117.0.0 2009.02.19 -
GData 19 2009.02.19 Win32:FakeAlert-AT
Ikarus T3.1.1.45.0 2009.02.19 -
K7AntiVirus 7.10.630 2009.02.18 -
Kaspersky 7.0.0.125 2009.02.19 -
McAfee 5529 2009.02.17 -
McAfee+Artemis 5529 2009.02.17 -
Microsoft 1.4306 2009.02.19 -
NOD32 3867 2009.02.19 -
Norman 6.00.06 2009.02.19 -
nProtect 2009.1.8.0 2009.02.19 -
Panda 10.0.0.10 2009.02.19 -
PCTools 4.4.2.0 2009.02.19 -
Prevx1 V2 2009.02.19 -
Rising 21.17.32.00 2009.02.19 -
SecureWeb-Gateway 6.7.6 2009.02.19 -
Sophos 4.38.0 2009.02.19 -
Sunbelt 3.2.1855.2 2009.02.17 -
Symantec 10 2009.02.19 -
TheHacker 6.3.2.2.259 2009.02.18 Trojan/BHO.kqt
TrendMicro 8.700.0.1004 2009.02.19 -
VBA32 3.12.10.0 2009.02.18 -
ViRobot 2009.2.19.1615 2009.02.19 -
VirusBuster 4.5.11.0 2009.02.18 -
weitere Informationen
File size: 198317 bytes
MD5...: 7c20feed6e51ff6c440ef25117f7eb16
SHA1..: 1544b6d5a16adbf5f4893690dc0ce9d4faf04db8
SHA256: 13d1af1088f73d5d17537036000bf67debba1001c876ec1860b6546611c233c3
SHA512: c777ca9ad61d02d5d4670011abd41c6f00a391f01da2486d169c88cd0df349a4
9db86f2d02c27c6e6536d1d9d78a320c37bc053e361bf5703548e71ed608c160
ssdeep: 3072:HNyah0mJBIegeSCVyjLRaVQe3xiqs7XkbKdLi8z0790HFn0jQcfo7ceJ4Lh
nwUo:Hw1egeSEyRqBiL7XSEizDjWxuLa
PEiD..: -
TrID..: File type identification
Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x403225
timedatestamp.....: 0x48efcdc9 (Fri Oct 10 21:48:57 2008)
machinetype.......: 0x14c (I386)
( 5 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x5976 0x5a00 6.47 335c19bb25cd1d02eec2b0a4eacb979c
.rdata 0x7000 0x1190 0x1200 5.18 db16645055619c0cc73276ff5c3adb75
.data 0x9000 0x1af98 0x400 4.69 59710519e577598f785044e4d95261f4
.ndata 0x24000 0xd000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
.rsrc 0x31000 0x908 0xa00 3.96 ef48c617fe129a27f0ff6c0a2f0de521
( 8 imports )
> KERNEL32.dll: CompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
> USER32.dll: EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
> GDI32.dll: SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
> SHELL32.dll: SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
> ADVAPI32.dll: RegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
> COMCTL32.dll: ImageList_AddMasked, ImageList_Destroy, -, ImageList_Create
> ole32.dll: CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
> VERSION.dll: GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
( 0 exports ) |