Metin2Mod Multilauncher

09/25/2010 20:34 daking327#16
Antivirus Version Last Update Result
AhnLab-V3 2010.09.25.00 2010.09.24 -
AntiVir 7.10.12.30 2010.09.24 -
Antiy-AVL 2.0.3.7 2010.09.25 Client-IRC/Win32.mIRC.gen
Authentium 5.2.0.5 2010.09.25 -
Avast 4.8.1351.0 2010.09.25 -
Avast5 5.0.594.0 2010.09.25 Win32:Mirc-Z
AVG 9.0.0.851 2010.09.25 -
BitDefender 7.2 2010.09.25 -
CAT-QuickHeal 11.00 2010.09.24 -
ClamAV 0.96.2.0-git 2010.09.25 PUA.IRC-Client.mIRC-34
Comodo 6196 2010.09.25 -
DrWeb 5.0.2.03300 2010.09.25 -
Emsisoft 5.0.0.37 2010.09.25 Riskware.Client-IRC.Win32.mIRC!IK
eSafe 7.0.17.0 2010.09.21 Client-IRC.Win32.mIR
eTrust-Vet 36.1.7875 2010.09.25 -
F-Prot 4.6.2.117 2010.09.25 File is damaged
F-Secure 9.0.15370.0 2010.09.25 -
Fortinet 4.1.143.0 2010.09.25 -
GData 21 2010.09.25 -
Ikarus T3.1.1.88.0 2010.09.25 not-a-virus:Client-IRC.Win32.mIRC
Jiangmin 13.0.900 2010.09.25 -
K7AntiVirus 9.63.2608 2010.09.25 -
Kaspersky 7.0.0.125 2010.09.25 not-a-virus:Client-IRC.Win32.mIRC.631
McAfee 5.400.0.1158 2010.09.25 Artemis!01E229755CF9
McAfee-GW-Edition 2010.1C 2010.09.25 Artemis!01E229755CF9
Microsoft 1.6201 2010.09.25 -
NOD32 5479 2010.09.25 -
Norman 6.06.06 2010.09.25 -
nProtect 2010-09-25.01 2010.09.25 -
Panda 10.0.2.7 2010.09.25 Suspicious file
PCTools 7.0.3.5 2010.09.25 -
Prevx 3.0 2010.09.25 -
Rising 22.66.04.00 2010.09.25 -
Sophos 4.58.0 2010.09.25 -
Sunbelt 6928 2010.09.25 -
SUPERAntiSpyware 4.40.0.1006 2010.09.25 -
Symantec 20101.1.1.7 2010.09.25 -
TheHacker 6.7.0.0.032 2010.09.25 -
TrendMicro 9.120.0.1004 2010.09.25 -
TrendMicro-HouseCall 9.120.0.1004 2010.09.25 -
VBA32 3.12.14.1 2010.09.24 -
ViRobot 2010.9.25.4060 2010.09.25 -
VirusBuster 12.65.25.0 2010.09.24 -
Additional information
Show all
MD5 : 01e229755cf99dd024871f3111341e5a
SHA1 : 43cd81b0b6252f99495847fb3793e8f5db1fd476
SHA256: ebcbf4242e4f7a90819ed7cf97e70ddd471dced68be3a1ba12 2ac2f532103fc2
ssdeep: 98304:Uun1+4SUTs+xYRvTXN31I0p3Ka8ETgKi7fxGhnnH1bEO M4qcLhoSjggUfb:pNS3bXw0p6
a85DSqcCOgZD
File size : 5465311 bytes
First seen: 2010-09-24 12:22:36
Last seen : 2010-09-25 18:15:21
TrID:
Win64 Executable Generic (59.6%)
Win32 Executable MS Visual C++ (generic) (26.2%)
Win32 Executable Generic (5.9%)
Win32 Dynamic Link Library (generic) (5.2%)
Generic Win/DOS Executable (1.3%)
sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
packers (F-Prot): RAR, SFX
PEInfo: PE structure information

[[ basic data ]]
entrypointaddress: 0xA7B1
timedatestamp....: 0x4B9DD366 (Mon Mar 15 06:27:50 2010)
machinetype......: 0x14c (I386)

[[ 5 section(s) ]]
name, viradd, virsiz, rawdsiz, ntropy, md5
.text, 0x1000, 0x1076E, 0x10800, 6.58, 8e6577c8c479f3e85e7fa573af92977e
.rdata, 0x12000, 0x1865, 0x1A00, 5.33, 4ec1c384a6c5f398ea7ca4031012f2d6
.data, 0x14000, 0xBFF4, 0x200, 3.55, 0ebca16960628061dcf3807fd384d9e9
.CRT, 0x20000, 0x10, 0x200, 0.21, a74a099866bd9750c2aa37309234732b
.rsrc, 0x21000, 0x340C, 0x3600, 5.25, bdd39b6f1b4cff36717ce3467020bae6

[[ 9 import(s) ]]
COMCTL32.dll: -
KERNEL32.dll: DeleteFileA, DeleteFileW, CreateDirectoryA, CreateDirectoryW, FindClose, FindNextFileA, FindFirstFileA, FindNextFileW, FindFirstFileW, GetTickCount, WideCharToMultiByte, MultiByteToWideChar, GetVersionExA, GlobalAlloc, lstrlenA, GetModuleFileNameA, FindResourceA, GetModuleHandleA, HeapAlloc, GetProcessHeap, HeapFree, HeapReAlloc, CompareStringA, ExitProcess, GetLocaleInfoA, GetNumberFormatA, lstrcmpiA, GetProcAddress, GetDateFormatA, GetTimeFormatA, FileTimeToSystemTime, FileTimeToLocalFileTime, ExpandEnvironmentStringsA, WaitForSingleObject, SetCurrentDirectoryA, Sleep, GetTempPathA, MoveFileExA, UnmapViewOfFile, GetCommandLineA, MapViewOfFile, CreateFileMappingA, GetModuleFileNameW, SetEnvironmentVariableA, OpenFileMappingA, LocalFileTimeToFileTime, SystemTimeToFileTime, GetSystemTime, IsDBCSLeadByte, GetCPInfo, FreeLibrary, LoadLibraryA, GetCurrentDirectoryA, GetFullPathNameA, SetFileAttributesW, SetFileAttributesA, GetFileAttributesW, GetFileAttributesA, WriteFile, SetLastError, GetStdHandle, ReadFile, CreateFileW, CreateFileA, GetFileType, SetEndOfFile, SetFilePointer, MoveFileA, SetFileTime, GetCurrentProcess, CloseHandle, GetLastError, DosDateTimeToFileTime
USER32.dll: ReleaseDC, GetDC, SendMessageA, wsprintfA, SetDlgItemTextA, EndDialog, DestroyIcon, SendDlgItemMessageA, GetDlgItemTextA, DialogBoxParamA, IsWindowVisible, WaitForInputIdle, GetSysColor, PostMessageA, SetMenu, SetFocus, LoadBitmapA, LoadIconA, CharToOemA, OemToCharA, GetClassNameA, CharUpperA, GetWindowRect, GetParent, MapWindowPoints, CreateWindowExA, UpdateWindow, SetWindowTextA, LoadCursorA, RegisterClassExA, SetWindowLongA, GetWindowLongA, DefWindowProcA, PeekMessageA, GetMessageA, TranslateMessage, DispatchMessageA, GetClientRect, CopyRect, IsWindow, MessageBoxA, ShowWindow, GetDlgItem, EnableWindow, FindWindowExA, wvsprintfA, CharToOemBuffA, LoadStringA, SetWindowPos, GetWindowTextA, GetWindow, GetSystemMetrics, OemToCharBuffA, DestroyWindow
GDI32.dll: GetDeviceCaps, GetObjectA, CreateCompatibleBitmap, SelectObject, StretchBlt, CreateCompatibleDC, DeleteObject, DeleteDC
COMDLG32.dll: GetSaveFileNameA, CommDlgExtendedError, GetOpenFileNameA
ADVAPI32.dll: LookupPrivilegeValueA, RegOpenKeyExA, RegQueryValueExA, RegCreateKeyExA, RegSetValueExA, RegCloseKey, SetFileSecurityW, SetFileSecurityA, OpenProcessToken, AdjustTokenPrivileges
SHELL32.dll: ShellExecuteExA, SHFileOperationA, SHGetFileInfoA, SHGetSpecialFolderLocation, SHGetMalloc, SHBrowseForFolderA, SHGetPathFromIDListA, SHChangeNotify
ole32.dll: CreateStreamOnHGlobal, OleInitialize, CoCreateInstance, OleUninitialize, CLSIDFromString
OLEAUT32.dll: -





Hhab einfach alles reinkopiert vom VirusTotal bericht
09/25/2010 20:35 thunderkid2#17
New Client
[Only registered and activated users can see links. Click Here To Register...]
09/25/2010 21:08 losi#18
hallo mal der hack funzt,aber nur auf den servern die in der serverinfo dort stehen ich würde gern fragen ob man auf blacknight einen ghost mode machen könnte
09/25/2010 23:16 Equality'#19
Neonblues clienten nehmen
Root Dateien von Blacknight aufmachen
Serverinfo.py rauskopieren
in den Neonblue clienten reinstecken
Fertig
09/26/2010 00:08 szczypce#20
new Pack

Fish boot
[Only registered and activated users can see links. Click Here To Register...]
blokowanie hshielda
[Only registered and activated users can see links. Click Here To Register...]
metin radar
[Only registered and activated users can see links. Click Here To Register...]
Skill hack
[Only registered and activated users can see links. Click Here To Register...]
09/26/2010 00:44 lubis1#21
öffnet alles. steht auch server alles. einloggen... wird verbunden... verbunden... KICK -.-
09/26/2010 10:27 #Mauritz.#22
[Only registered and activated users can see links. Click Here To Register...]

Keine Ahnung was das alles heißt :/
09/26/2010 10:35 mEtIn zOkker#23
geht der auch auf de??
09/26/2010 12:09 Equality'#24
P server nur
09/26/2010 12:23 metin2221#25
Work thx, I make video with tutorial to this and download link im description!
[Only registered and activated users can see links. Click Here To Register...]
Good Luck Mann!
09/26/2010 12:23 #Mauritz.#26
Exotic, übersetz mal den Text in richtiges deutsch bitte. Dann kannst du auch gleich den VT-Test hinzueditieren...

mfg
09/26/2010 12:36 mEtIn zOkker#27
der geht doch nur auf bestimmten p-servern oder?
09/26/2010 14:05 .Compaq#28
Nice Tut, geht auch bei Officielle?
09/26/2010 14:34 daking327#29
also ich hab den Hack mit dem neuen KasperskyInternetSecurity gescannt :

Die Datei enthält legales Programm, das von einem Angreifer benutzt werden kann,
um den Computer oder die Benutzerdaten zu beschädigen !!

Virusname : not-a-virus:Client-IRC.Win32.mIRC.631


Also fetter Virus ^^


- Ich habs nochmal gescannt es ist mit hoher Warscheinlichkeit ein Keylogger !
09/27/2010 18:14 Equality'#30
Ist kein KL ôo