Ich schaue mir mal den !mb4 1337 H4xXx an

Naja ma gucken melde mich gleich wieder.
*edit*
Datei V1_Deschner_V1.EXE empfangen 2010.04.17 01:06:26 (UTC)
Status: Beendet
Ergebnis: 2/40 (5%)
Filter
Drucken der Ergebnisse Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.5.0.50 2010.04.16 Trojan.Win32.Buzus!IK
AhnLab-V3 5.0.0.2 2010.04.16 -
AntiVir 7.10.6.115 2010.04.16 -
Antiy-AVL 2.0.3.7 2010.04.16 -
Authentium 5.2.0.5 2010.04.16 -
Avast 4.8.1351.0 2010.04.16 -
Avast5 5.0.332.0 2010.04.16 -
AVG 9.0.0.787 2010.04.16 -
BitDefender 7.2 2010.04.17 -
CAT-QuickHeal 10.00 2010.04.16 -
ClamAV 0.96.0.3-git 2010.04.17 -
Comodo 4620 2010.04.17 -
DrWeb 5.0.2.03300 2010.04.17 -
eSafe 7.0.17.0 2010.04.15 -
eTrust-Vet 35.2.7430 2010.04.16 -
F-Prot 4.5.1.85 2010.04.16 -
F-Secure 9.0.15370.0 2010.04.16 -
Fortinet 4.0.14.0 2010.04.16 -
GData 19 2010.04.17 -
Ikarus T3.1.1.80.0 2010.04.16 Trojan.Win32.Buzus
Jiangmin 13.0.900 2010.04.16 -
Kaspersky 7.0.0.125 2010.04.17 -
McAfee 5.400.0.1158 2010.04.17 -
McAfee-GW-Edition 6.8.5 2010.04.16 -
Microsoft 1.5605 2010.04.16 -
NOD32 5035 2010.04.16 -
Norman 6.04.11 2010.04.16 -
nProtect 2010-04-16.01 2010.04.16 -
Panda 10.0.2.7 2010.04.16 -
PCTools 7.0.3.5 2010.04.17 -
Prevx 3.0 2010.04.17 -
Rising 22.43.04.04 2010.04.16 -
Sophos 4.52.0 2010.04.17 -
Sunbelt 6185 2010.04.17 -
Symantec 20091.2.0.41 2010.04.17 -
TheHacker 6.5.2.0.263 2010.04.16 -
TrendMicro 9.120.0.1004 2010.04.15 -
VBA32 3.12.12.4 2010.04.15 -
ViRobot 2010.4.16.2280 2010.04.16 -
VirusBuster 5.0.27.0 2010.04.16 -
weitere Informationen
File size: 4562433 bytes
MD5...: 5fd433f3153be48f8323c4a5c04d18c2
SHA1..: e7649a66551eb551139af5f0d9039bb3497f95d3
SHA256: 93b5400776f603bcf378a6de6883cbdf85340efd7b805f4b82 acd0b7126bde18
ssdeep: 98304:aKwigYaJ3WDeH+7/Mn1f2nZEqZ3g8Hgn18:bwnYakDI+70n18fA18
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0xdaeb
timedatestamp.....: 0x4bc60d9e (Wed Apr 14 18:46:54 2010)
machinetype.......: 0x14c (I386)
( 5 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x12b64 0x12c00 6.13 be615afaccb478bdbde447c8ba03d097
.rdata 0x14000 0x1aa2 0x1c00 5.40 039cb9cd7104f96cfb9860f72afa8561
.data 0x16000 0x1a5c 0x1000 3.18 6d0922239cca67dc220d05b3b57d5e21
.rsrc 0x18000 0x443219 0x443400 8.00 d55a9d18f00b3c04ae62cefdf7ca66a1
.reloc 0x45c000 0xd8e 0xe00 4.51 86dbf61a82da964a4815c37493fc24e4
( 1 imports )
> KERNEL32.dll: GetCommandLineA, GetStartupInfoA, GetLastError, HeapFree, SetUnhandledExceptionFilter, GetModuleHandleW, Sleep, GetProcAddress, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, GetFileType, DeleteCriticalSection, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, LeaveCriticalSection, EnterCriticalSection, HeapAlloc, VirtualAlloc, HeapReAlloc, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, IsDebuggerPresent, LoadLibraryA, InitializeCriticalSectionAndSpinCount, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, RtlUnwind, HeapSize, GetLocaleInfoA, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW
( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win32 Executable MS Visual C++ (generic) (65.2%)
Win32 Executable Generic (14.7%)
Win32 Dynamic Link Library (generic) (13.1%)
Generic Win/DOS Executable (3.4%)
DOS Executable Generic (3.4%)
Symantec Reputation Network: Suspicious.Insight

sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
*edit2*
Joaa....
Also habs auf VMWare ausgeführt und das is ja toll wenn man Server Sniffen kann...^^