arpworks1.0-WaRlOrD
- Type:
- Applications > Windows
- Files:
- 2
- Size:
- 324.29 KB
- Tag(s):
- arpworks warlord
- Quality:
- +0 / -0 (0)
- Uploaded:
- Jun 7, 2009
- By:
- bitpirate
What is ARPWORKS? ----------------- ArpWorks is an utility for sending customized "ARP announce" packets over the network. All ARP and Ethernet parameters, can be changed as you like. Manipulation of ARP tables is only possible inside your "Broadcast Domain", ARP packets doesn't cross routers or VLANs. a-squared 4.0.0.101 2009.04.07 Backdoor.Cain.1.5!IK AhnLab-V3 5.0.0.2 2009.04.07 - AntiVir 7.9.0.138 2009.04.07 BDS/Cain.1.6 Antiy-AVL 2.0.3.1 2009.04.07 - Authentium 5.1.2.4 2009.04.07 - Avast 4.8.1335.0 2009.04.07 - AVG 8.5.0.285 2009.04.07 - BitDefender 7.2 2009.04.08 Backdoor.Cain.1.5 CAT-QuickHeal 10.00 2009.04.07 - ClamAV 0.94.1 2009.04.07 - Comodo 1102 2009.04.07 Unclassified Malware DrWeb 4.44.0.09170 2009.04.08 - eSafe 7.0.17.0 2009.04.07 Win32.Trojan eTrust-Vet 31.6.6442 2009.04.07 - F-Prot 4.4.4.56 2009.04.08 - F-Secure 8.0.14470.0 2009.04.07 - Fortinet 3.117.0.0 2009.04.07 - GData 19 2009.04.08 Backdoor.Cain.1.5 Ikarus T3.1.1.49.0 2009.04.07 Backdoor.Cain.1.5 K7AntiVirus 7.10.695 2009.04.07 - Kaspersky 7.0.0.125 2009.04.08 - McAfee 5577 2009.04.07 - McAfee+Artemis 5577 2009.04.07 - McAfee-GW-Edition 6.7.6 2009.04.07 Trojan.Backdoor.Cain.1.6 Microsoft 1.4502 2009.04.07 - NOD32 3994 2009.04.07 - Norman 6.00.06 2009.04.07 - nProtect 2009.1.8.0 2009.04.07 Trojan/W32.Cain.6267730 Panda 10.0.0.14 2009.04.07 - PCTools 4.4.2.0 2009.04.07 - Prevx1 V2 2009.04.08 High Risk System Back Door Rising 21.24.12.00 2009.04.07 - Sophos 4.40.0 2009.04.07 - Sunbelt 3.2.1858.2 2009.04.06 Email-Worm.Win32.GOPworm.196 Symantec 1.4.4.12 2009.04.08 Backdoor.Trojan TheHacker 6.3.4.0.303 2009.04.07 - TrendMicro 8.700.0.1004 2009.04.07 - VBA32 3.12.10.2 2009.04.07 - ViRobot 2009.4.7.1682 2009.04.07 - VirusBuster 4.6.5.0 2009.04.07 - Extra informatie File size: 342371 bytes MD5 : 61f048ae6dd0bb719ce4bb9d91689c60 SHA1 : 1f34fc9b92831190fb1a1ae1937df8582b8e67c2 SHA256: df3e09312979c44353c8a13e2ceb4b4589fe5eaa06e606564b2b7fe90d1f991e PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x31A0 timedatestamp.....: 0x338B6859 (Wed May 28 01:03:53 1997) machinetype.......: 0x14C (Intel I386) ( 6 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0x3D04 0x3E00 6.42 0dd05b8f8510932a61a191ae834be4c0 .rdata 0x5000 0x3A9 0x400 4.85 2d05733bc594b6a7937a6b504cb4c843 .data 0x6000 0x1578 0x1400 1.66 6980dcc5b84f08571e5547cc54d19be9 .idata 0x8000 0x7C2 0x800 5.00 582f61065d25bb6aa1fe226de4ed6a52 .rsrc 0x9000 0x39C 0x400 3.18 0e905c482a33ae10794d8d5072f26867 .reloc 0xA000 0x67C 0x800 5.30 7b8d1da59fd73510c8411c87eebb7f13 ( 3 imports ) > gdi32.dll: DeleteObject, GetDeviceCaps, RealizePalette, GetStockObject, SelectObject, PatBlt, SelectPalette, CreatePalette, CreateSolidBrush > kernel32.dll: LoadLibraryA, _lopen, _lcreat, lstrcpyA, GetProcAddress, _lclose, lstrlenA, GetWindowsDirectoryA, GlobalHandle, _lwrite, _llseek, FreeLibrary, WinExec, GlobalFree, _lread, GlobalUnlock, GetModuleFileNameA, SetErrorMode, GlobalLock, GetLastError, GetCurrentProcess, WriteFile, GetStdHandle, GetFileType, SetHandleCount, GetOEMCP, GetACP, GetCPInfo, WideCharToMultiByte, GetEnvironmentStringsW, GlobalAlloc, DeleteFileA, FreeEnvironmentStringsA, GetEnvironmentStrings, RtlUnwind, VirtualAlloc, UnhandledExceptionFilter, HeapCreate, HeapDestroy, HeapAlloc, HeapFree, ExitProcess, TerminateProcess, FreeEnvironmentStringsW, VirtualFree, GetFileAttributesA, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion > user32.dll: ExitWindowsEx, LoadCursorA, MessageBoxA, RegisterClassA, SetWindowPos, LoadIconA, UpdateWindow, ShowWindow, ReleaseDC, wsprintfA, PostQuitMessage, BeginPaint, EndPaint, DefWindowProcA, SendMessageA, InvalidateRect, GetClientRect, CreateWindowExA, GetDC ( 1 exports ) > _MainWndProc@16, _StubFileWrite@12 TrID : File type identification Win32 Executable MS Visual C++ 4.x (69.2%) Win32 Executable MS Visual C++ (generic) (19.3%) Win32 Executable Generic (4.3%) Win32 Dynamic Link Library (generic) (3.8%) Win16/32 Executable Delphi generic (1.0%) ssdeep: 6144:inBpobEVZY6rcRcF86IGkV5GdO0vHC7K/PgZPtACNF20rtsf0Zq4um2enjA7v:iBpOEvY6xJk2McHCu/P6PD2cuMZqrm2l Prevx Info: http://info.prevx.com/aboutprogramtext.asp?PX5=F665BDF863B8032039AF0527539D2E0018123FB9 PEiD : - CWSandbox: http://research.sunbelt-software.com/partnerresource/MD5.aspx?md5=61f048ae6dd0bb719ce4bb9d91689c60 RDS : NSRL Reference Data Set ( Silver Star Publishing ) Guide to Hacking Software Security 2002: Arpworks.exe I did NOT remove, modify, added something @ this tool. Using is on your own risk.