[Merged]Closed Threads due to Forum Rules Violation

01/10/2008 19:17 lady_slasher#24721
Quote:
Originally Posted by HUN_banya View Post
Hell, I don't know what did you download, but that's not mine ROFL ^^

LOL... DONT BE STUPID.........

heres the scan... you damn...

RESULT...


| Slovenščina | Dansk | Русский | Română | Türkçe | Nederlands | Ελληνικά | Français | Svenska | Português | Italiano | | | Magyar | Deutsch | Česky | Polski | Español
Virustotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines. More information...
File SROKiller_Client_1_1_.140.zip.rar received on 01.10.2008 19:08:24 (CET)
Current status: Loading ... queued waiting scanning finished NOT FOUND STOPPED


Result: 16/32 (50%)
Loading server information...
Your file is queued in position: 2.
Estimated start time is between 41 and 59 seconds.
Do not close the window until scan is complete.
The scanner that was processing your file is stopped at this moment, we are going to wait a few seconds to try to recover your result.
If you are waiting for more than five minutes you have to resend your file.
Your file is being scanned by VirusTotal in this moment,
results will be shown as they're generated.
Compact Print results
Your file has expired or does not exists.
Service is stopped in this moments, your file is waiting to be scanned (position: ) for an undefined time.

You can wait for web response (automatic reload) or type your email in the form below and click "request" so the system sends you a notification when the scan is finished.
Email:


Antivirus Version Last Update Result
AhnLab-V3 2008.1.11.10 2008.01.10 -
AntiVir 7.6.0.46 2008.01.10 -
Authentium 4.93.8 2008.01.09 -
Avast 4.7.1098.0 2008.01.09 Win32:Agent-LWO
AVG 7.5.0.516 2008.01.10 PSW.Generic5.KCM
BitDefender 7.2 2008.01.10 Trojan.Spy.Ardamax.U
CAT-QuickHeal 9.00 2008.01.10 TrojanSpy.Ardamax.t
ClamAV 0.91.2 2008.01.10 Trojan.Dropper-2457
DrWeb 4.44.0.09170 2008.01.10 -
eSafe 7.0.15.0 2008.01.09 -
eTrust-Vet 31.3.5446 2008.01.10 -
Ewido 4.0 2008.01.10 Logger.Ardamax.t
FileAdvisor 1 2008.01.10 -
Fortinet 3.14.0.0 2008.01.10 -
F-Prot 4.4.2.54 2008.01.09 -
F-Secure 6.70.13030.0 2008.01.10 Trojan-Spy.Win32.Ardamax.t
Ikarus T3.1.1.20 2008.01.10 Trojan-Dropper.Win32.Agent.bnk
Kaspersky 7.0.0.125 2008.01.10 Trojan-Spy.Win32.Ardamax.t
McAfee 5204 2008.01.10 -
Microsoft 1.3109 2008.01.10 TrojanSpy:Win32/Ardamax.D
NOD32v2 2780 2008.01.10 -
Norman 5.80.02 2008.01.10 -
Panda 9.0.0.4 2008.01.10 -
Prevx1 V2 2008.01.10 W32.Malware.gen
Rising 20.26.32.00 2008.01.10 Trojan.Spy.Win32.Ardamax.t
Sophos 4.24.0 2008.01.10 Ardamax Installer
Sunbelt 2.2.907.0 2008.01.10 -
Symantec 10 2008.01.10 -
TheHacker 6.2.9.185 2008.01.09 Trojan/Spy.Ardamax.t
VBA32 3.12.2.5 2008.01.10 Trojan-Spy.Win32.Ardamax.t
VirusBuster 4.3.26:9 2008.01.10 -
Webwasher-Gateway 6.0.1 2008.01.10 Riskware.Ardamax.K.Gen
Additional information
File size: 288631 bytes
MD5: 0a2a52fc9f30d5f97f0a75ecfbce5067
SHA1: af4923d0c542f7cc0a7762d5c61688d135aee199
PEiD: -
Prevx info: [Only registered and activated users can see links. Click Here To Register...]


ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no guarantees about the availability and continuity of this service. Although the detection rate afforded by the use of multiple antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Currently, there is not any solution that offers a 100% effectiveness rate for detecting viruses and malware.

VirusTotal © Hispasec Sistemas - Blog - Contact: [Only registered and activated users can see links. Click Here To Register...]
01/10/2008 19:37 lady_slasher#24722
SCAN ALL FILES BEFORE YOU OPEN THEM HERE:

[Only registered and activated users can see links. Click Here To Register...]

I know this is the wrong place to post it....
theres a lot of hackers now who abused to all botters, because all of us cant wait anylonger for TBOT,, thats why i post this simple reminders to all NOOBs..( Be Familiar with this TROJAN VIRUS)

Trojan Programs
Trojans can be classified according to the actions which they carry out on victim machines.

Backdoors
General Trojans
PSW Trojans
Trojan Clickers
Trojan Downloaders
Trojan Droppers
Trojan Proxies
Trojan Spies
Trojan Notifiers
ArcBombs
Rootkits

Backdoors
Today backdoors are the most dangerous type of Trojans and the most widespread. These Trojans are remote administration utilities that open infected machines to external control via a LAN or the Internet. They function in the same way as legal remote administration programs used by system administrators. This makes them difficult to detect.

The only difference between a legal administration tool and a backdoor is that backdoors are installed and launched without the knowledge or consent of the user of the victim machine. Once the backdoor is launched, it monitors the local system without the user's knowledge; often the backdoor will not be visible in the log of active programs.

Once a remote administration utilitiy has been successfully installed and launched, the victim machine is wide open. Backdoor functions can include:

Sending/ receiving files
Launching/ deleting files
Executing files
Displaying notification
Deleting data
Rebooting the machine
In other words, backdoors are used by virus writers to detect and download confidential information, execute malicious code, destroy data, include the machine in bot networks and so forth. In short, backdoors combine the functionality of most other types of Trojans in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms. The only difference is that worms are programmed to propagate constantly, whereas these 'mobile' backdoors spread only after a specific command from the 'master'.

General Trojans
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.

PSW Trojans
This family of Trojans steals passwords, normally system passwords from victim machines. They search for system files which contain confidential information such as passwords and Internet access telephone numbers and then send this information to an email address coded into the body of the Trojan. It will then be retrieved by the 'master' or user of the illegal program.

Some PSW Trojans steal other types of information such as:

System details (memory, disk space, operating system details)
Local email client
IP-address
Registration details
Passwords for on-line games
Trojan-AOL are PSW Trojans that steal passwords for aol (American Online) They are contained in a sub-groups because they are so numerous.

Trojan Clickers
This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored (e.g. the 'hosts' file in MS Windows).

Clickers are used:

To raise the hit-count of a specific site for advertising purposes
To organize a DoS attack on a specified server or site
To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans)
Trojan Downloaders
This family of Trojans downloads and installs new malware or adware on the victim machine. The downloader then either launches the new malware or registers it to enable autorun according to the local operating system requirements. All of this is done without the knowledge or consent of the user.

The names and locations of malware to be downloaded are either coded into the Trojan or downloaded from a specified website or other Internet location.

Trojan Droppers
These Trojans are used to install other malware on victim machines without the knowledge of the user. Droppers install their payload either without displaying any notification, or displaying a false message about an error in an archived file or in the operating system. The new malware is dropped to a specified location on a local disk and then launched.

Droppers are normally structured in the following way:

Main file
contains the dropper payload
File 1
first payload
File 2
second payload
...
as many files as the coder chooses to include

The dropper functionality contains code to install and execute all of the payload files.

In most cases, the payload contains other Trojans and at least one hoax: jokes, games, graphics and so forth. The hoax is meant to distract the user or to prove that the activity caused by the dropper is harmless, whereas it actually serves to mask the installation of the dangerous payload.

Hackers using such programs achieve two objectives:

Hidden or masked installation of other Trojans or viruses
Tricking antivirus solutions which are unable to analyse all components
Trojan Proxies
These Trojans function as a proxy server and provide anonymous access to the Internet from victim machines. Today these Trojans are very popular with spammers who always need additional machines for mass mailings. Virus coders will often include Trojan-proxies in Trojan packs and sell networks of infected machines to spammers.

Trojan Spies
This family includes a variety of spy programs and key loggers, all of which track and save user activity on the victim machine and then forward this information to the master. Trojan-spies collect a range of information including:

Keystrokes
Screenshots
Logs of active applications
Other user actions
These Trojans are most often used to steal banking and other financial information to support online fraud.

Trojan Notifiers
These Trojans inform the 'master' about an infected machine. Notifiers confirm that a machine has been successfully infected, and send information about IP-address, open port numbers, the email address etc. of the victim machine. This information may be sent by email, to the master's website, or by ICQ.

Notifiers are usually included in a Trojan 'pack' and used only to inform the master that a Trojan has been successfully installed on the victim machine.

Rootkits
A rootkit is a collection of programs used by a hacker to evade detection while trying to gain unauthorized access to a computer. This is done either by replacing system files or libraries, or by installing a kernel module. The hacker installs the rootkit after obtaining user-level access: typically this is done by cracking a password or by exploiting a vulnerability. This is then used to gather other user IDs until the hacker gains root, or administrator, access to the system.

The term originated in the Unix world, although it has since been applied to the techniques used by authors of Windows-based Trojans to conceal their actions. Rootkits have been used increasingly as a form of stealth to hide Trojan activity, something that is made easier because many Windows users log in with administrator rights.

ArcBombs
These Trojans are archived files coded to sabotage the de-compressor when it attempts to open the infected archived file. The victim machine will slow or crash when the Trojan bomb explodes, or the disk will be filled with nonsense data. ArcBombs are especially dangerous for servers, particularly when incoming data is initially processed automatically: in such cases, an ArcBomb can crash the server.

There are three types of ArcBombs: incorrect header in the archive, repeating data and a series of identical files in the archive.

An incorrect archive header or corrupted data can both cause the de-compressor to crash when opening and unpacking the infected archive.

A large file containing repeating data can be packed into a very small archive: 5 gigabytes will be 200 KB when packed using RAR and 480 KB in ZIP format.

Moreover, special technologies exist to pack an enormous number of identical files in one archive without significantly affecting the size of the archive itself: for instance, it is possible to pack 10100 identical files into a 30 KB RAR file or a 230 KB ZIP file.
01/10/2008 19:51 anales#24723
Lol i think nobody wants to read this :p
it is to long
but it is true what ur saying :)

grz
01/10/2008 19:55 tarantado#24724
WTF... IM NOT NOOB LADY!!!
BUT,, TNX A LOT FOR THIS POST...
now I know!! and your right .. too many abuser now in this forum who try to hack peoples account....
keep on posting usefull reminders...
TNX.. A LOT...
01/10/2008 20:03 BLinDaZ#24725
so xero one last time..where do i go exactly for the guide?? the guide you learnt how to set it up..cuz i cant be arsed..to browse tru all 30 pages of this post -_-..pls thx
01/10/2008 20:04 henkdemol#24726
change tittle, try to ask some mods to sticky this
01/10/2008 20:05 Grincas#24727
what's the point of this topic? :)
01/10/2008 20:08 didilicious#24728
nice^^
with one i think we'll stop 10 threads,cuz u explain it!!!
01/10/2008 20:13 BLinDaZ#24729
lawl....wow No0B class , topic: TROJANS lol.....scan first...after this if anyone psot bs on here ban them <.<
01/10/2008 20:15 xMedeia#24730
My sro closes when I selected char....
01/10/2008 20:26 BLinDaZ#24731
lol i was asking the same question grincas :P
01/10/2008 20:31 whitewotka#24732
this mmorpg is looks like silkroad or L2 mmrorpg and free to play just opened fue days ago [Only registered and activated users can see links. Click Here To Register...] try OPEN BETA for all 2x exp first week . try it you will rly like it :)
01/10/2008 20:31 whitewotka#24733
this mmorpg is looks like silkroad or L2 mmrorpg and free to play just opened fue days ago [Only registered and activated users can see links. Click Here To Register...] try OPEN BETA for all 2x exp first week . try it you will rly like it :)


LINK: [Only registered and activated users can see links. Click Here To Register...]
01/10/2008 20:33 blue3906#24734
he just put another one on that is not wat i scan last time
01/10/2008 20:36 rubenfreitas#24735
Dont click
Wast of time

Its just a stupid internet game. not a mmorpg like silkroad.


#ban