Страная сылка появилась в motd |
Здравствуйте, гость Вход | Регистрация
Наши новости:
|
| ! | В разделе запрещено создавать темы связанные с раскруткой игровых серверов |
|
|
Страная сылка появилась в motd |
medgroup
|
22.8.2012, 4:44
Сообщение
|
|
|
Скрытый текст Код CodeSize.................: 110592 FileDescription..........: Netu opisanya Comments.................: Fdjghjgufc hgjghjf LinkerVersion............: 6.0 ImageVersion.............: 1.0 ProductName..............: Resers FileVersionNumber........: 1.0.0.0 LanguageCode.............: English (U.S.) FileFlagsMask............: 0x0000 CharacterSet.............: Unicode InitializedDataSize......: 12288 OriginalFilename.........: masterstab.exe MIMEType.................: application/octet-stream Subsystem................: Windows GUI FileVersion..............: 1.0 TimeStamp................: 2012:08:20 14:11:42-07:00 FileType.................: Win32 EXE PEType...................: PE32 InternalName.............: masterstab SubsystemVersion.........: 4.0 ProductVersion...........: 1.0 UninitializedDataSize....: 0 OSVersion................: 4.0 FileOS...................: Win32 LegalCopyright...........: Konchelis MachineType..............: Intel 386 or later, and compatibles CompanyName..............: SERVICE center MICROSOFT LegalTrademarks..........: Service centr FileSubtype..............: 0 ProductVersionNumber.....: 1.0.0.0 EntryPoint...............: 0x1604 ObjectFileType...........: Executable application Скрытый текст Код [############################################################################ #] Analysis Report for cstrike.exe MD5: 220a45eb8ee91265cdff36501f8f3a11 [############################################################################ #] Summary: - Packed Binary: This executable is protected with a packer in order to prevent it from being reverse engineered. [============================================================================ =] Table of Contents [============================================================================ =] - General information - cstrike.ex.exe a) Registry Activities b) File Activities c) Other Activities [############################################################################ #] 1. General Information [############################################################################ #] [============================================================================ =] Information about Anubis' invocation [============================================================================ =] Time needed: 252 s Report created: 08/22/12, 00:09:27 UTC Termination reason: Timeout Program version: 1.76.3886 [############################################################################ #] 2. cstrike.ex.exe [############################################################################ #] [============================================================================ =] General information about this executable [============================================================================ =] Analysis Reason: Primary Analysis Subject Filename: cstrike.ex.exe MD5: 220a45eb8ee91265cdff36501f8f3a11 SHA-1: 90f935b078018267fab09482b20278ec5f990df9 File Size: 34562 Bytes Command Line: "C:\cstrike.ex.exe" Process-status at analysis end: alive Exit Code: 0 [============================================================================ =] Load-time Dlls [============================================================================ =] Module Name: [ C:\WINDOWS\system32\ntdll.dll ], Base Address: [0x7C900000 ], Size: [0x000AF000 ] Module Name: [ C:\WINDOWS\system32\kernel32.dll ], Base Address: [0x7C800000 ], Size: [0x000F6000 ] [============================================================================ =] Run-time Dlls [============================================================================ =] Module Name: [ C:\WINDOWS\system32\MSVBVM60.DLL ], Base Address: [0x73420000 ], Size: [0x00153000 ] Module Name: [ C:\WINDOWS\system32\MSCTF.dll ], Base Address: [0x74720000 ], Size: [0x0004C000 ] Module Name: [ C:\WINDOWS\system32\OLEAUT32.dll ], Base Address: [0x77120000 ], Size: [0x0008B000 ] Module Name: [ C:\WINDOWS\system32\ole32.dll ], Base Address: [0x774E0000 ], Size: [0x0013D000 ] Module Name: [ C:\WINDOWS\system32\msvcrt.dll ], Base Address: [0x77C10000 ], Size: [0x00058000 ] Module Name: [ C:\WINDOWS\system32\ADVAPI32.dll ], Base Address: [0x77DD0000 ], Size: [0x0009B000 ] Module Name: [ C:\WINDOWS\system32\RPCRT4.dll ], Base Address: [0x77E70000 ], Size: [0x00092000 ] Module Name: [ C:\WINDOWS\system32\GDI32.dll ], Base Address: [0x77F10000 ], Size: [0x00049000 ] Module Name: [ C:\WINDOWS\system32\Secur32.dll ], Base Address: [0x77FE0000 ], Size: [0x00011000 ] Module Name: [ C:\WINDOWS\system32\user32.dll ], Base Address: [0x7E410000 ], Size: [0x00091000 ] Module Name: [ C:\WINDOWS\system32\SXS.DLL ], Base Address: [0x7E720000 ], Size: [0x000B0000 ] [============================================================================ =] SigBuster Output [============================================================================ =] PE_Compact v2.X SN:660 [============================================================================ =] 2.a) cstrike.ex.exe - Registry Activities [============================================================================ =] [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Registry Values Read: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Key: [ HKLM\SOFTWARE\Microsoft\CTF\SystemShared\ ], Value Name: [ CUAS ], Value: [ 0 ], 1 time Key: [ HKLM\SYSTEM\CurrentControlSet\Control\Session Manager ], Value Name: [ CriticalSectionTimeout ], Value: [ 2592000 ], 1 time Key: [ HKLM\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers ], Value Name: [ TransparentEnabled ], Value: [ 1 ], 1 time Key: [ HKLM\System\CurrentControlSet\Control\Nls\Codepage ], Value Name: [ 932 ], Value: [ c_932.nls ], 1 time Key: [ HKLM\System\CurrentControlSet\Control\Nls\Codepage ], Value Name: [ 936 ], Value: [ c_936.nls ], 1 time Key: [ HKLM\System\CurrentControlSet\Control\Nls\Codepage ], Value Name: [ 949 ], Value: [ c_949.nls ], 1 time Key: [ HKLM\System\CurrentControlSet\Control\Nls\Codepage ], Value Name: [ 950 ], Value: [ c_950.nls ], 1 time Key: [ HKLM\System\CurrentControlSet\Control\Terminal Server ], Value Name: [ TSUserEnabled ], Value: [ 0 ], 1 time Key: [ HKU\S-1-5-21-842925246-1425521274-308236825-500\Keyboard Layout\Toggle ], Value Name: [ Language Hotkey ], Value: [ 1 ], 2 times Key: [ HKU\S-1-5-21-842925246-1425521274-308236825-500\Keyboard Layout\Toggle ], Value Name: [ Layout Hotkey ], Value: [ 2 ], 2 times [============================================================================ =] 2.b) cstrike.ex.exe - File Activities [============================================================================ =] [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Files Read: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] File Name: [ C:\cstrike.ex.exe ] [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] File System Control Communication: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] File: [ C:\Program Files\Common Files\ ], Control Code: [ 0x00090028 ], 1 time [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Device Control Communication: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] File: [ \Device\KsecDD ], Control Code: [ 0x00390008 ], 8 times [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Memory Mapped Files: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] File Name: [ C:\WINDOWS\system32\MSCTF.dll ] File Name: [ C:\WINDOWS\system32\MSVBVM60.DLL ] File Name: [ C:\WINDOWS\system32\SXS.DLL ] File Name: [ C:\WINDOWS\system32\imm32.dll ] File Name: [ C:\WINDOWS\system32\rpcss.dll ] [============================================================================ =] 2.c) cstrike.ex.exe - Other Activities [============================================================================ =] [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Mutexes Created: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Mutex: [ CTF.Asm.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ] Mutex: [ CTF.Compart.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ] Mutex: [ CTF.LBES.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ] Mutex: [ CTF.Layouts.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ] Mutex: [ CTF.TMD.MutexDefaultS-1-5-21-842925246-1425521274-308236825-500 ] Mutex: [ CTF.TimListCache.FMPDefaultS-1-5-21-842925246-1425521274-308236825-500MUTEX.DefaultS-1-5-21-842925246-1425521274-308236825-500 ] [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Windows SEH exceptions: [=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=] Description: [ Exception 0xc0000005 (STATUS_ACCESS_VIOLATION) at 0x40161a ], 1 time [############################################################################ #] Очевидно же. https://www.virustotal.com/file/f529f4dc9da...0a487/analysis/ http://anubis.iseclab.org/?action=result&a...&format=txt |
|
|
|
cs-portal
|
22.8.2012, 9:16
Сообщение
|
|
|
motd.txt = только чтение - ну такие наивные. я как ето вижу ( couldnt open motd.txt ) так умиляюсь
Отредактировал: cs-portal, - 22.8.2012, 9:16
|
|
|
|
![]() ![]() |