Register for your free account! | Forgot your password?

Go Back   elitepvpers > Popular Games > Silkroad Online > SRO Hacks, Bots, Cheats & Exploits
You last visited: Today at 10:46

  • Please register to post and access all features, it's quick, easy and FREE!

Advertisement



[Merged]Closed Threads due to Forum Rules Violation

Discussion on [Merged]Closed Threads due to Forum Rules Violation within the SRO Hacks, Bots, Cheats & Exploits forum part of the Silkroad Online category.

Closed Thread
 
Old 01/10/2008, 19:17   #24721
 
lady_slasher's Avatar
 
elite*gold: 0
Join Date: Mar 2007
Posts: 173
Received Thanks: 278
Quote:
Originally Posted by HUN_banya View Post
Hell, I don't know what did you download, but that's not mine ROFL ^^

LOL... DONT BE STUPID.........

heres the scan... you damn...

RESULT...


| Slovenščina | Dansk | Русский | Română | Türkçe | Nederlands | Ελληνικά | Français | Svenska | Português | Italiano | | | Magyar | Deutsch | Česky | Polski | Español
Virustotal is a service that analyzes suspicious files and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines. More information...
File SROKiller_Client_1_1_.140.zip.rar received on 01.10.2008 19:08:24 (CET)
Current status: Loading ... queued waiting scanning finished NOT FOUND STOPPED


Result: 16/32 (50%)
Loading server information...
Your file is queued in position: 2.
Estimated start time is between 41 and 59 seconds.
Do not close the window until scan is complete.
The scanner that was processing your file is stopped at this moment, we are going to wait a few seconds to try to recover your result.
If you are waiting for more than five minutes you have to resend your file.
Your file is being scanned by VirusTotal in this moment,
results will be shown as they're generated.
Compact Print results
Your file has expired or does not exists.
Service is stopped in this moments, your file is waiting to be scanned (position: ) for an undefined time.

You can wait for web response (automatic reload) or type your email in the form below and click "request" so the system sends you a notification when the scan is finished.
Email:


Antivirus Version Last Update Result
AhnLab-V3 2008.1.11.10 2008.01.10 -
AntiVir 7.6.0.46 2008.01.10 -
Authentium 4.93.8 2008.01.09 -
Avast 4.7.1098.0 2008.01.09 Win32:Agent-LWO
AVG 7.5.0.516 2008.01.10 PSW.Generic5.KCM
BitDefender 7.2 2008.01.10 Trojan.Spy.Ardamax.U
CAT-QuickHeal 9.00 2008.01.10 TrojanSpy.Ardamax.t
ClamAV 0.91.2 2008.01.10 Trojan.Dropper-2457
DrWeb 4.44.0.09170 2008.01.10 -
eSafe 7.0.15.0 2008.01.09 -
eTrust-Vet 31.3.5446 2008.01.10 -
Ewido 4.0 2008.01.10 Logger.Ardamax.t
FileAdvisor 1 2008.01.10 -
Fortinet 3.14.0.0 2008.01.10 -
F-Prot 4.4.2.54 2008.01.09 -
F-Secure 6.70.13030.0 2008.01.10 Trojan-Spy.Win32.Ardamax.t
Ikarus T3.1.1.20 2008.01.10 Trojan-Dropper.Win32.Agent.bnk
Kaspersky 7.0.0.125 2008.01.10 Trojan-Spy.Win32.Ardamax.t
McAfee 5204 2008.01.10 -
Microsoft 1.3109 2008.01.10 TrojanSpy:Win32/Ardamax.D
NOD32v2 2780 2008.01.10 -
Norman 5.80.02 2008.01.10 -
Panda 9.0.0.4 2008.01.10 -
Prevx1 V2 2008.01.10 W32.Malware.gen
Rising 20.26.32.00 2008.01.10 Trojan.Spy.Win32.Ardamax.t
Sophos 4.24.0 2008.01.10 Ardamax Installer
Sunbelt 2.2.907.0 2008.01.10 -
Symantec 10 2008.01.10 -
TheHacker 6.2.9.185 2008.01.09 Trojan/Spy.Ardamax.t
VBA32 3.12.2.5 2008.01.10 Trojan-Spy.Win32.Ardamax.t
VirusBuster 4.3.26:9 2008.01.10 -
Webwasher-Gateway 6.0.1 2008.01.10 Riskware.Ardamax.K.Gen
Additional information
File size: 288631 bytes
MD5: 0a2a52fc9f30d5f97f0a75ecfbce5067
SHA1: af4923d0c542f7cc0a7762d5c61688d135aee199
PEiD: -
Prevx info:


ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no guarantees about the availability and continuity of this service. Although the detection rate afforded by the use of multiple antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Currently, there is not any solution that offers a 100% effectiveness rate for detecting viruses and malware.

VirusTotal © Hispasec Sistemas - Blog - Contact:
lady_slasher is offline  
Old 01/10/2008, 19:37   #24722
 
lady_slasher's Avatar
 
elite*gold: 0
Join Date: Mar 2007
Posts: 173
Received Thanks: 278
[ATTENTION]Trojan/Malware/Backdoor Info for newbies

SCAN ALL FILES BEFORE YOU OPEN THEM HERE:



I know this is the wrong place to post it....
theres a lot of hackers now who abused to all botters, because all of us cant wait anylonger for TBOT,, thats why i post this simple reminders to all NOOBs..( Be Familiar with this TROJAN VIRUS)

Trojan Programs
Trojans can be classified according to the actions which they carry out on victim machines.

Backdoors
General Trojans
PSW Trojans
Trojan Clickers
Trojan Downloaders
Trojan Droppers
Trojan Proxies
Trojan Spies
Trojan Notifiers
ArcBombs
Rootkits

Backdoors
Today backdoors are the most dangerous type of Trojans and the most widespread. These Trojans are remote administration utilities that open infected machines to external control via a LAN or the Internet. They function in the same way as legal remote administration programs used by system administrators. This makes them difficult to detect.

The only difference between a legal administration tool and a backdoor is that backdoors are installed and launched without the knowledge or consent of the user of the victim machine. Once the backdoor is launched, it monitors the local system without the user's knowledge; often the backdoor will not be visible in the log of active programs.

Once a remote administration utilitiy has been successfully installed and launched, the victim machine is wide open. Backdoor functions can include:

Sending/ receiving files
Launching/ deleting files
Executing files
Displaying notification
Deleting data
Rebooting the machine
In other words, backdoors are used by virus writers to detect and download confidential information, execute malicious code, destroy data, include the machine in bot networks and so forth. In short, backdoors combine the functionality of most other types of Trojans in one package.

Backdoors have one especially dangerous sub-class: variants that can propagate like worms. The only difference is that worms are programmed to propagate constantly, whereas these 'mobile' backdoors spread only after a specific command from the 'master'.

General Trojans
This loose category includes a variety of Trojans that damage victim machines or threaten data integrity, or impair the functioning of the victim machine.

Multi-purpose Trojans are also included in this group, as some virus writers create multi-functional Trojans rather than Trojan packs.

PSW Trojans
This family of Trojans steals passwords, normally system passwords from victim machines. They search for system files which contain confidential information such as passwords and Internet access telephone numbers and then send this information to an email address coded into the body of the Trojan. It will then be retrieved by the 'master' or user of the illegal program.

Some PSW Trojans steal other types of information such as:

System details (memory, disk space, operating system details)
Local email client
IP-address
Registration details
Passwords for on-line games
Trojan-AOL are PSW Trojans that steal passwords for aol (American Online) They are contained in a sub-groups because they are so numerous.

Trojan Clickers
This family of Trojans redirects victim machines to specified websites or other Internet resources. Clickers either send the necessary commands to the browser or replace system files where standard Internet urls are stored (e.g. the 'hosts' file in MS Windows).

Clickers are used:

To raise the hit-count of a specific site for advertising purposes
To organize a DoS attack on a specified server or site
To lead the victim to an infected resource where the machine will be attacked by other malware (viruses or Trojans)
Trojan Downloaders
This family of Trojans downloads and installs new malware or adware on the victim machine. The downloader then either launches the new malware or registers it to enable autorun according to the local operating system requirements. All of this is done without the knowledge or consent of the user.

The names and locations of malware to be downloaded are either coded into the Trojan or downloaded from a specified website or other Internet location.

Trojan Droppers
These Trojans are used to install other malware on victim machines without the knowledge of the user. Droppers install their payload either without displaying any notification, or displaying a false message about an error in an archived file or in the operating system. The new malware is dropped to a specified location on a local disk and then launched.

Droppers are normally structured in the following way:

Main file
contains the dropper payload
File 1
first payload
File 2
second payload
...
as many files as the coder chooses to include

The dropper functionality contains code to install and execute all of the payload files.

In most cases, the payload contains other Trojans and at least one hoax: jokes, games, graphics and so forth. The hoax is meant to distract the user or to prove that the activity caused by the dropper is harmless, whereas it actually serves to mask the installation of the dangerous payload.

Hackers using such programs achieve two objectives:

Hidden or masked installation of other Trojans or viruses
Tricking antivirus solutions which are unable to analyse all components
Trojan Proxies
These Trojans function as a proxy server and provide anonymous access to the Internet from victim machines. Today these Trojans are very popular with spammers who always need additional machines for mass mailings. Virus coders will often include Trojan-proxies in Trojan packs and sell networks of infected machines to spammers.

Trojan Spies
This family includes a variety of spy programs and key loggers, all of which track and save user activity on the victim machine and then forward this information to the master. Trojan-spies collect a range of information including:

Keystrokes
Screenshots
Logs of active applications
Other user actions
These Trojans are most often used to steal banking and other financial information to support online fraud.

Trojan Notifiers
These Trojans inform the 'master' about an infected machine. Notifiers confirm that a machine has been successfully infected, and send information about IP-address, open port numbers, the email address etc. of the victim machine. This information may be sent by email, to the master's website, or by ICQ.

Notifiers are usually included in a Trojan 'pack' and used only to inform the master that a Trojan has been successfully installed on the victim machine.

Rootkits
A rootkit is a collection of programs used by a hacker to evade detection while trying to gain unauthorized access to a computer. This is done either by replacing system files or libraries, or by installing a kernel module. The hacker installs the rootkit after obtaining user-level access: typically this is done by cracking a password or by exploiting a vulnerability. This is then used to gather other user IDs until the hacker gains root, or administrator, access to the system.

The term originated in the Unix world, although it has since been applied to the techniques used by authors of Windows-based Trojans to conceal their actions. Rootkits have been used increasingly as a form of stealth to hide Trojan activity, something that is made easier because many Windows users log in with administrator rights.

ArcBombs
These Trojans are archived files coded to sabotage the de-compressor when it attempts to open the infected archived file. The victim machine will slow or crash when the Trojan bomb explodes, or the disk will be filled with nonsense data. ArcBombs are especially dangerous for servers, particularly when incoming data is initially processed automatically: in such cases, an ArcBomb can crash the server.

There are three types of ArcBombs: incorrect header in the archive, repeating data and a series of identical files in the archive.

An incorrect archive header or corrupted data can both cause the de-compressor to crash when opening and unpacking the infected archive.

A large file containing repeating data can be packed into a very small archive: 5 gigabytes will be 200 KB when packed using RAR and 480 KB in ZIP format.

Moreover, special technologies exist to pack an enormous number of identical files in one archive without significantly affecting the size of the archive itself: for instance, it is possible to pack 10100 identical files into a 30 KB RAR file or a 230 KB ZIP file.
lady_slasher is offline  
Thanks
49 Users
Old 01/10/2008, 19:51   #24723
 
anales's Avatar
 
elite*gold: 0
Join Date: Apr 2007
Posts: 98
Received Thanks: 10
Lol i think nobody wants to read this
it is to long
but it is true what ur saying

grz
anales is offline  
Thanks
1 User
Old 01/10/2008, 19:55   #24724
 
elite*gold: 0
Join Date: Jan 2008
Posts: 37
Received Thanks: 4
WTF... IM NOT NOOB LADY!!!
BUT,, TNX A LOT FOR THIS POST...
now I know!! and your right .. too many abuser now in this forum who try to hack peoples account....
keep on posting usefull reminders...
TNX.. A LOT...
tarantado is offline  
Thanks
1 User
Old 01/10/2008, 20:03   #24725
 
BLinDaZ's Avatar
 
elite*gold: 0
Join Date: Jan 2008
Posts: 562
Received Thanks: 83
so xero one last time..where do i go exactly for the guide?? the guide you learnt how to set it up..cuz i cant be arsed..to browse tru all 30 pages of this post -_-..pls thx
BLinDaZ is offline  
Old 01/10/2008, 20:04   #24726
 
elite*gold: 0
Join Date: Mar 2007
Posts: 541
Received Thanks: 116
change tittle, try to ask some mods to sticky this
henkdemol is offline  
Thanks
1 User
Old 01/10/2008, 20:05   #24727
 
elite*gold: 0
Join Date: Jan 2008
Posts: 27
Received Thanks: 0
what's the point of this topic?
Grincas is offline  
Old 01/10/2008, 20:08   #24728
 
elite*gold: 0
Join Date: Aug 2007
Posts: 104
Received Thanks: 20
nice^^
with one i think we'll stop 10 threads,cuz u explain it!!!
didilicious is offline  
Thanks
1 User
Old 01/10/2008, 20:13   #24729
 
BLinDaZ's Avatar
 
elite*gold: 0
Join Date: Jan 2008
Posts: 562
Received Thanks: 83
lawl....wow No0B class , topic: TROJANS lol.....scan first...after this if anyone psot bs on here ban them <.<
BLinDaZ is offline  
Old 01/10/2008, 20:15   #24730
 
xMedeia's Avatar
 
elite*gold: 0
Join Date: Sep 2007
Posts: 2,336
Received Thanks: 386
My sro closes when I selected char....
xMedeia is offline  
Old 01/10/2008, 20:26   #24731
 
BLinDaZ's Avatar
 
elite*gold: 0
Join Date: Jan 2008
Posts: 562
Received Thanks: 83
lol i was asking the same question grincas :P
BLinDaZ is offline  
Old 01/10/2008, 20:31   #24732
 
elite*gold: 0
Join Date: Jan 2008
Posts: 3
Received Thanks: 0
new mmorpg game just realesed

this mmorpg is looks like silkroad or L2 mmrorpg and free to play just opened fue days ago try OPEN BETA for all 2x exp first week . try it you will rly like it
whitewotka is offline  
Old 01/10/2008, 20:31   #24733
 
elite*gold: 0
Join Date: Jan 2008
Posts: 3
Received Thanks: 0
new mmorpg game just realesed

this mmorpg is looks like silkroad or L2 mmrorpg and free to play just opened fue days ago try OPEN BETA for all 2x exp first week . try it you will rly like it


LINK:
whitewotka is offline  
Old 01/10/2008, 20:33   #24734
 
blue3906's Avatar
 
elite*gold: 0
Join Date: Dec 2007
Posts: 57
Received Thanks: 12
he just put another one on that is not wat i scan last time
blue3906 is offline  
Old 01/10/2008, 20:36   #24735
 
rubenfreitas's Avatar
 
elite*gold: 0
Join Date: Dec 2007
Posts: 80
Received Thanks: 18
Dont click
Wast of time

Its just a stupid internet game. not a mmorpg like silkroad.


#ban
rubenfreitas is offline  
Closed Thread


Similar Threads Similar Threads
Banjo closed fast alle threads über VMWARE und Angelbotts!
04/17/2009 - Metin2 - 4 Replies
Also ich erzähl euch jetzt was ich weiss der text ist lang aber es wird sich lohnen ;) Ich habe eine feststellung preiszugeben undzwar dass banjo alle thread schließt die über VMWARE Workstation usw. da man erst recht nicht mehr sein angelbott gebrauchen könnte da man zwei stück hat wenn nicht mehr und man von daher nicht mal mehr ein wenig sein angelbot für ein gewissen preis braucht da man dann mehr als das doppelte machen könnte ! Dank Felix mit sehr guten AutoIT erfahrung seine...



All times are GMT +1. The time now is 10:47.


Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
SEO by vBSEO ©2011, Crawlability, Inc.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Support | Contact Us | FAQ | Advertising | Privacy Policy | Terms of Service | Abuse
Copyright ©2025 elitepvpers All Rights Reserved.