![]() |
Norton meldet Zwischenfall: "HTTP Malicious Toolkit Variant Activity 13" Hallo! Seit 2 Tagen erhalte ich immer wieder Meldungen von Norton, dass folgender Angriff erkannt wurde: HTTP Malicious Toolkit Variant Activity 13 Angreifender Computer: Mein eigener?! Agreifer-URL: bikleman.com/sex/inex.php?s=IBB@G Zieladresse: bikleman.com (80.156.86.78 80) Beschreibung des Datenverkehrs: TCP, Port 49178 Habe nun das Programm SuperANtiSpyware mein System scannen lassen und folgenden Log erhalten: SUPERAntiSpyware Scan Log hxxp://www.superantispyware.com Generated 10/14/2010 at 04:57 PM Application Version : 4.44.1000 Core Rules Database Version : 5682 Trace Rules Database Version: 3494 Scan type : Complete Scan Total Scan Time : 01:37:48 Memory items scanned : 795 Memory threats detected : 0 Registry items scanned : 9796 Registry threats detected : 0 File items scanned : 52369 File threats detected : 111 Adware.Tracking Cookie cdn5.specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\FQBFC2YY ] .doubleclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .apmebf.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .ads.quartermedia.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .ads.quartermedia.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .mediaplex.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .mediaplex.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .imrworldwide.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .imrworldwide.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .ads.quartermedia.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .bs.serving-sys.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .serving-sys.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .serving-sys.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .serving-sys.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .serving-sys.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .serving-sys.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .ads.quartermedia.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .ads.quartermedia.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .adfarm1.adition.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] track.effiliation.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .adtech.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .smartadserver.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .smartadserver.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .smartadserver.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .smartadserver.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .tradedoubler.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .tradedoubler.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .webmasterplan.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .traffictrack.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] ad.yieldmanager.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] ad.yieldmanager.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .atdmt.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .atdmt.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .guj.122.2o7.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] ad.yieldmanager.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] de.sitestat.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] track.webtrekk.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] ad.yieldmanager.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .tradedoubler.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] ad.zanox.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .tracking.quisma.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] tracking.quisma.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .adbrite.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .fastclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .adviva.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] cdn5.specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] eas.apm.emediate.eu [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] cdn5.specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .statcounter.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .revsci.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .revsci.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .revsci.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .4stats.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .serving-sys.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .serving-sys.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] www.zanox-affiliate.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .fastclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .adinterax.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .adinterax.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .xiti.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .secmedia.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] de.sitestat.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] de.sitestat.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] rotator.adjuggler.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] rotator.adjuggler.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] track.effiliation.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] ad.adserver01.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] adsrv.admediate.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] adsrv.admediate.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .bluestreak.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .tradedoubler.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .tradedoubler.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] ad.yieldmanager.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .specificclick.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] eas.apm.emediate.eu [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] eas.apm.emediate.eu [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .zieltrack.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] studivz.adfarm1.adition.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] adfarm1.adition.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .webmasterplan.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] www.etracker.de [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] track.adform.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] track.adform.net [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .tradedoubler.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] .tradedoubler.com [ C:\Users\Arbeit\AppData\Roaming\Mozilla\Firefox\Profiles\1p9fqmk9.default\cookies.sqlite ] akamai.smartadserver.com [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] bc.youporn.com [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] cdn5.specificclick.net [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] content.oddcast.com [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] imagesrv.adition.com [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] media01.kyte.tv [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] objects.tremormedia.com [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] www.pornme.in [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] www.revenuewire.com [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] www.sexkiste.com [ C:\Users\Maike\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\6HMJC5ML ] C:\Users\Maike\AppData\Roaming\Microsoft\Windows\Cookies\Low\maike@www.googleadservices[1].txt C:\Users\Maike\AppData\Roaming\Microsoft\Windows\Cookies\Low\maike@www.googleadservices[7].txt C:\Users\Maike\AppData\Roaming\Microsoft\Windows\Cookies\Low\maike@www.googleadservices[6].txt C:\Users\Maike\AppData\Roaming\Microsoft\Windows\Cookies\Low\maike@www.googleadservices[4].txt C:\Users\Maike\AppData\Roaming\Microsoft\Windows\Cookies\Low\maike@www.googleadservices[3].txt C:\Users\Maike\AppData\Roaming\Microsoft\Windows\Cookies\Low\maike@www.googleadservices[2].txt C:\Users\Maike\AppData\Roaming\Microsoft\Windows\Cookies\Low\maike@www.googleadservices[5].txt mehrere Tracking Cookies. Was kann ich gegen den Hack Angriff tun? Habe in keinem Forum wirkliche Hilfen finden können. Wisst ihr, was zu tun ist? |
:hallo: Eine Bereinigung ist mitunter mit viel Arbeit für Dich verbunden.
Hinweis: Ich kann Dir niemals eine Garantie geben, dass ich auch alles finde. Eine Formatierung ist meist der Schnellere und immer der sicherste Weg. Solltest Du Dich für eine Bereinigung entscheiden, arbeite solange mit, bis dir jemand vom Team sagt, dass Du clean bist. Vista und Win7 User Alle Tools mit Rechtsklick "als Administrator ausführen" starten. Schritt 1 CustomScan mit OTL Falls noch nicht vorhanden, lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop
Code: netsvcs
Schritt 2 Rootkit-Suche mit Gmer Was sind Rootkits? Wichtig: Bei jedem Rootkit-Scans soll/en:
Lade Dir Gmer von dieser Seite herunter (auf den Button Download EXE drücken) und das Programm auf dem Desktop speichern.
Nun das Logfile in Code-Tags posten. |
Hallo! ERstmal super lieben Dank für die rasche Unterstützung. Das gibt mir Hoffnung! Hier nun der neue Log:OTL Logfile: Code: OTL logfile created on: 15.10.2010 16:38:26 - Run 1 |
Und wo bleibt der Rest? :) |
HIer der Rest - Sorry - musste gestern noch schnell weg... <code> GMER Logfile: Code: GMER 1.0.15.15315 - hxxp://www.gmer.net </code> |
Schritt 1
Code: :OTL
Schritt 2 ESET Online Scanner Bitte während der Online-Scans evtl. vorhandene externe Festplatten einschalten! Bitte während der Scans alle Hintergrundwächter (Anti-Virus-Programm, Firewall, Skriptblocking und ähnliches) abstellen und nicht vergessen, alles hinterher wieder einzuschalten.
|
Hier die beiden Logs: <code> All processes killed ========== OTL ========== Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\ deleted successfully. Starting removal of ActiveX control {8AD9C840-044E-11D1-B3E9-00805F499D93} Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully. Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found. Starting removal of ActiveX control {CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA} Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}\ deleted successfully. Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0020-ABCDEFFEDCBA}\ not found. Starting removal of ActiveX control {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found. ========== COMMANDS ========== [EMPTYTEMP] User: All Users User: Arbeit ->Temp folder emptied: 25845064 bytes ->Temporary Internet Files folder emptied: 3738960 bytes ->Java cache emptied: 0 bytes ->FireFox cache emptied: 137987954 bytes ->Flash cache emptied: 1081 bytes User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: Maike ->Temp folder emptied: 456264862 bytes ->Temporary Internet Files folder emptied: 116774110 bytes ->Java cache emptied: 52477785 bytes ->FireFox cache emptied: 222502194 bytes ->Flash cache emptied: 3406 bytes User: Public %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 0 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 23618153 bytes RecycleBin emptied: 341052468 bytes Total Files Cleaned = 1.316,00 mb OTL by OldTimer - Version 3.2.15.2 log created on 10162010_165031 Files\Folders moved on Reboot... Registry entries deleted on Reboot... </code> <code> ESETSmartInstaller@High as downloader log: all ok # version=7 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6211 # api_version=3.0.2 # EOSSerial=604da2f81aceea478a84209f697855ad # end=finished # remove_checked=false # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2010-10-16 06:28:33 # local_time=2010-10-16 08:28:33 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # lang=1033 # osver=6.0.6002 NT Service Pack 2 # compatibility_mode=512 16777215 100 0 0 0 0 0 # compatibility_mode=3588 16777214 85 88 1750114 26822611 0 0 # compatibility_mode=5892 16776574 100 95 35601785 124775309 0 0 # compatibility_mode=8192 67108863 100 0 913 913 0 0 # scanned=243771 # found=0 # cleaned=0 # scan_time=11132 </code> |
Ich würde mir noch gerne eine zweitmeinung einholen mit einem Onlinescan: Schritt 1 Temp File Cleaner Downloade Dir bitte TFC ( von Oldtimer ) und speichere die Datei auf dem Desktop. Schließe nun alle offenen Programme und trenne Dich von dem Internet. Doppelklick auf die TFC.exe Sollte TFC nicht alle Dateien löschen können wird es einen Neustart verlangen. Dies bitte zulassen. Schritt 2 Bitte während der Online-Scans evtl. vorhandene externe Festplatten einschalten! Bitte während der Scans alle Hintergrundwächter (Anti-Virus-Programm, Firewall, Skriptblocking und ähnliches) abstellen und nicht vergessen, alles hinterher wieder einzuschalten.
Schritt 3 Kommen von Norton noch Meldungen? |
Hallo Swiss, habe ein Problembeo Kaspersky - der Download der Signaturen dauert bei mir extrem lange!!! Habe nun bereits 3 Std gedownloaded und bin immer noch bei nur 28%....Habe nun abgebrochen. Gibt es hier nicht noch eine andere Möglichkeit? Ja, die Meldung von Norton kommt nach wie vor! Grüße |
Downloade Dir bitte RKUnhookerLE und speichere die Datei auf deinem Desktop.
Zitat:
|
RkU Version: 3.8.388.590, Type LE (SR2) ============================================== OS Name: Windows Vista Version 6.0.6002 (Service Pack 2) Number of processors #2 ============================================== >Drivers ============================================== 0x8EC0C000 C:\Windows\system32\DRIVERS\nvlddmkm.sys 9789440 bytes (NVIDIA Corporation, NVIDIA Windows Kernel Mode Driver, Version 186.31 ) 0x82801000 C:\Windows\system32\ntkrnlpa.exe 3903488 bytes (Microsoft Corporation, NT Kernel & System) 0x82801000 PnpManager 3903488 bytes 0x82801000 RAW 3903488 bytes 0x82801000 WMIxWDM 3903488 bytes 0x90209000 C:\Windows\system32\drivers\RTKVHDA.sys 2359296 bytes (Realtek Semiconductor Corp., Realtek(r) High Definition Audio Function Driver) 0x9FC00000 Win32k 2109440 bytes 0x9FC00000 C:\Windows\System32\win32k.sys 2109440 bytes (Microsoft Corporation, Mehrbenutzer-Win32-Treiber) 0x92202000 C:\Windows\system32\DRIVERS\snp2uvc.sys 1753088 bytes (-, UVC Camera Streaming Driver) 0xAAE00000 C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_17.0.0.136\Definitions\VirusDefs\20101019.039\NAVEX15.SYS 1368064 bytes (Symantec Corporation, AV Engine) 0x8AE07000 C:\Windows\System32\Drivers\Ntfs.sys 1114112 bytes (Microsoft Corporation, NT-Dateisystemtreiber) 0x8AA78000 C:\Windows\system32\drivers\ndis.sys 1093632 bytes (Microsoft Corporation, NDIS 6.0 wrapper driver) 0x8AC0F000 C:\Windows\System32\drivers\tcpip.sys 958464 bytes (Microsoft Corporation, TCP/IP Driver) 0x8FC0B000 C:\Windows\system32\DRIVERS\athr.sys 946176 bytes (Atheros Communications, Inc., Atheros Extensible Wireless LAN device driver) 0x804D2000 C:\Windows\system32\CI.dll 917504 bytes (Microsoft Corporation, Codeintegritätsmodul) 0xA7603000 C:\Windows\system32\drivers\peauth.sys 909312 bytes (Microsoft Corporation, Protected Environment Authentication and Authorization Export Driver) 0x920B0000 C:\Windows\System32\Drivers\dump_iaStor.sys 897024 bytes 0x82E07000 C:\Windows\system32\DRIVERS\iaStor.sys 897024 bytes (Intel Corporation, Intel Matrix Storage Manager driver - ia32) 0x8AD14000 C:\Windows\system32\drivers\spsys.sys 720896 bytes (Microsoft Corporation, security processor) 0x92004000 C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_17.0.0.136\Definitions\BASHDefs\20101001.001\BHDrvx86.sys 704512 bytes (Symantec Corporation, BASH Driver) 0x8FA0B000 C:\Windows\System32\drivers\dxgkrnl.sys 659456 bytes (Microsoft Corporation, DirectX Graphics Kernel) 0x8FB10000 C:\Windows\system32\DRIVERS\HDAudBus.sys 577536 bytes (Microsoft Corporation, High Definition Audio Bus Driver) 0x918F3000 C:\Windows\system32\drivers\NIS\1108000.005\ccHPx86.sys 520192 bytes (Symantec Corporation, Common Client Hash Provider Driver) 0x80606000 C:\Windows\system32\drivers\Wdf01000.sys 507904 bytes (Microsoft Corporation, WDF Dynamic) 0x8AA07000 C:\Windows\System32\Drivers\ksecdd.sys 462848 bytes (Microsoft Corporation, Kernel Security Support Provider Interface) 0x80408000 C:\Windows\system32\mcupdate_GenuineIntel.dll 458752 bytes (Microsoft Corporation, Intel Microcode Update Library) 0x91972000 C:\Windows\system32\drivers\HTTP.sys 446464 bytes (Microsoft Corporation, HTTP-Protokollstapel) 0x91861000 C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys 385024 bytes (Symantec Corporation, Symantec Eraser Control Driver) 0xAAF8F000 C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_17.0.0.136\Definitions\IPSDefs\20101019.001\IDSvix86.sys 372736 bytes (Symantec Corporation, IDS Core Driver) 0x90571000 C:\Windows\System32\Drivers\NIS\1108000.005\SYMTDIV.SYS 364544 bytes (Symantec Corporation, Network Dispatch Driver) 0x8F564000 C:\Windows\system32\DRIVERS\itecir.sys 360448 bytes (ITE Tech. Inc. , ITE Consumer IR Driver for eHome) 0xA76FB000 C:\Windows\System32\Drivers\NIS\1108000.005\SRTSP.SYS 356352 bytes (Symantec Corporation, Symantec AutoProtect) 0x82F62000 C:\Windows\system32\drivers\NIS\1108000.005\SYMDS.SYS 352256 bytes (Symantec Corporation, Symantec Data Store) 0x8FD71000 C:\Windows\system32\DRIVERS\rixdptsk.sys 335872 bytes (REDC, RICOH XD SM Driver) 0xA6AA0000 C:\Windows\System32\DRIVERS\srv.sys 319488 bytes (Microsoft Corporation, Server driver) 0x9FE50000 C:\Windows\System32\ATMFD.DLL 311296 bytes (Adobe Systems Incorporated, Windows NT OpenType/Type 1 Font Driver) 0x80738000 C:\Windows\System32\drivers\volmgrx.sys 303104 bytes (Microsoft Corporation, Volume Manager Extension Driver) 0x900B7000 C:\Windows\system32\drivers\afd.sys 294912 bytes (Microsoft Corporation, Ancillary Function Driver for WinSock) 0x8068F000 C:\Windows\system32\drivers\acpi.sys 286720 bytes (Microsoft Corporation, ACPI-Treiber für NT) 0xA6AEE000 C:\Windows\system32\DRIVERS\atksgt.sys 274432 bytes 0x80491000 C:\Windows\system32\CLFS.SYS 266240 bytes (Microsoft Corporation, Common Log File System Driver) 0x80792000 C:\Windows\system32\DRIVERS\storport.sys 266240 bytes (Microsoft Corporation, Microsoft Storage Port Driver) 0x8FAC3000 C:\Windows\system32\DRIVERS\USBPORT.SYS 253952 bytes (Microsoft Corporation, USB 1.1 & 2.0 Port Driver) 0x901A5000 C:\Windows\system32\DRIVERS\rdbss.sys 245760 bytes (Microsoft Corporation, Redirected Drive Buffering SubSystem Driver) 0x8ABAE000 C:\Windows\system32\drivers\NETIO.SYS 241664 bytes (Microsoft Corporation, Network I/O Subsystem) 0xA6A27000 C:\Windows\system32\DRIVERS\mrxsmb10.sys 233472 bytes (Microsoft Corporation, Longhorn SMB Downlevel SubRdr) 0x8AF17000 C:\Windows\system32\drivers\volsnap.sys 233472 bytes (Microsoft Corporation, Volumeschattenkopie-Treiber) 0x9005D000 C:\Windows\system32\DRIVERS\usbhub.sys 217088 bytes (Microsoft Corporation, Default Hub Driver for USB) 0x82BBA000 ACPI_HAL 208896 bytes 0x82BBA000 C:\Windows\system32\hal.dll 208896 bytes (Microsoft Corporation, Hardware Abstraction Layer DLL) 0x82F20000 C:\Windows\system32\drivers\fltmgr.sys 204800 bytes (Microsoft Corporation, Microsoft Dateisystem-Filter-Manager) 0x900FF000 C:\Windows\System32\DRIVERS\netbt.sys 204800 bytes (Microsoft Corporation, MBT Transport driver) 0x8F5BC000 C:\Windows\system32\DRIVERS\msiscsi.sys 192512 bytes (Microsoft Corporation, Microsoft iSCSI Initiator Driver) 0x8FB9D000 C:\Windows\system32\DRIVERS\SynTP.sys 192512 bytes (Synaptics, Inc., Synaptics Touchpad Driver) 0x90449000 C:\Windows\system32\drivers\portcls.sys 184320 bytes (Microsoft Corporation, Port Class (Class Driver for Port/Miniport Devices)) 0x82FC2000 C:\Windows\system32\drivers\NIS\1108000.005\SYMEFA.SYS 184320 bytes (Symantec Corporation, Symantec Extended File Attributes) 0x8AB83000 C:\Windows\system32\drivers\msrpc.sys 176128 bytes (Microsoft Corporation, Kernel Remote Procedure Call Provider) 0x9000E000 C:\Windows\system32\DRIVERS\ks.sys 172032 bytes (Microsoft Corporation, Kernel CSA Library) 0x921A6000 C:\Windows\system32\DRIVERS\nwifi.sys 172032 bytes (Microsoft Corporation, NativeWiFi Miniport Driver) 0xA6B39000 C:\Windows\System32\Drivers\fastfat.SYS 163840 bytes (Microsoft Corporation, Fast FAT File System Driver) 0xA6A78000 C:\Windows\System32\DRIVERS\srv2.sys 163840 bytes (Microsoft Corporation, Smb 2.0 Server driver) 0x8AF67000 C:\Windows\System32\drivers\ecache.sys 159744 bytes (Microsoft Corporation, Special Memory Device Cache) 0x806E6000 C:\Windows\system32\drivers\pci.sys 159744 bytes (Microsoft Corporation, NT-Plug & Play PCI-Enumerator) 0x90476000 C:\Windows\system32\drivers\drmk.sys 151552 bytes (Microsoft Corporation, Microsoft Kernel DRM Descrambler Filter) 0x905CA000 C:\Windows\system32\Drivers\SYMEVENT.SYS 151552 bytes (Symantec Corporation, Symantec Event Library) 0x807D3000 C:\Windows\system32\DRIVERS\ndiswan.sys 143360 bytes (Microsoft Corporation, MS PPP Framing Driver (Strong Encryption)) 0x8FCF2000 C:\Windows\system32\DRIVERS\Rtlh86.sys 139264 bytes (Realtek Corporation , Realtek 8101E/8168/8169 NDIS6 32-bit Driver ) 0x90183000 C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 139264 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASKUTIL.SYS) 0x8AF9F000 C:\Windows\system32\drivers\CLASSPNP.SYS 135168 bytes (Microsoft Corporation, SCSI Class System Dll) 0x805DB000 C:\Windows\system32\drivers\mrxdav.sys 135168 bytes (Microsoft Corporation, Windows NT WebDav Minirdr) 0x904F1000 C:\Windows\System32\drivers\VIDEOPRT.SYS 135168 bytes (Microsoft Corporation, Video Port Driver) 0x9015A000 C:\Windows\system32\drivers\NIS\1108000.005\Ironx86.SYS 126976 bytes (Symantec Corporation, Iron Driver) 0xA6A08000 C:\Windows\system32\DRIVERS\mrxsmb.sys 126976 bytes (Microsoft Corporation, Windows NT SMB Minirdr) 0x82EEA000 C:\Windows\system32\drivers\ataport.SYS 122880 bytes (Microsoft Corporation, ATAPI Driver Extension) 0x918BF000 C:\Program Files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys 118784 bytes (Symantec Corporation, Symantec Eraser Utility Driver) 0x919DF000 C:\Windows\System32\DRIVERS\srvnet.sys 118784 bytes (Microsoft Corporation, Server Network driver) 0x8ACF9000 C:\Windows\System32\drivers\fwpkclnt.sys 110592 bytes (Microsoft Corporation, FWP/IPsec Kernel-Mode API) 0x9218B000 C:\Windows\system32\drivers\luafv.sys 110592 bytes (Microsoft Corporation, LUA-Filtertreiber zur Dateivirtualisierung) 0x8FD32000 C:\Windows\system32\DRIVERS\sdbus.sys 106496 bytes (Microsoft Corporation, SecureDigital Bus Driver) 0x8ADC4000 C:\Windows\system32\DRIVERS\bowser.sys 102400 bytes (Microsoft Corporation, NT Lan Manager Datagram Receiver Driver) 0x8FBCC000 C:\Windows\system32\DRIVERS\cdrom.sys 98304 bytes (Microsoft Corporation, SCSI CD-ROM Driver) 0xA6A60000 C:\Windows\system32\DRIVERS\mrxsmb20.sys 98304 bytes (Microsoft Corporation, Longhorn SMB 2.0 Redirector) 0x918DC000 C:\Windows\System32\Drivers\dfsc.sys 94208 bytes (Microsoft Corporation, DFS Namespace Client Driver) 0x8ABE9000 C:\Windows\system32\DRIVERS\rasl2tp.sys 94208 bytes (Microsoft Corporation, RAS L2TP mini-port/call-manager driver) 0x9052D000 C:\Windows\system32\DRIVERS\usbccgp.sys 94208 bytes (Microsoft Corporation, USB Common Class Generic Parent Driver) 0xAAF70000 C:\Windows\system32\DRIVERS\cdfs.sys 90112 bytes (Microsoft Corporation, CD-ROM File System Driver) 0x90131000 C:\Windows\system32\DRIVERS\pacer.sys 90112 bytes (Microsoft Corporation, QoS-Paketplaner) 0x9055B000 C:\Windows\system32\DRIVERS\tdx.sys 90112 bytes (Microsoft Corporation, TDI Translation Driver) 0x901EB000 C:\Windows\System32\drivers\mpsdrv.sys 86016 bytes (Microsoft Corporation, Microsoft Protection Service Driver) 0x805C6000 C:\Windows\system32\DRIVERS\rassstp.sys 86016 bytes (Microsoft Corporation, RAS SSTP Miniport Call Manager) 0xAAF4E000 C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_17.0.0.136\Definitions\VirusDefs\20101019.039\NAVENG.SYS 81920 bytes (Symantec Corporation, AV Engine) 0x805B2000 C:\Windows\system32\DRIVERS\raspptp.sys 81920 bytes (Microsoft Corporation, Peer-to-Peer Tunneling Protocol) 0x8FD5D000 C:\Windows\system32\DRIVERS\rimsptsk.sys 81920 bytes (REDC, RICOH MS Driver) 0x900A3000 C:\Windows\system32\DRIVERS\smb.sys 81920 bytes (Microsoft Corporation, SMB Transport driver) 0x8FDC3000 C:\Windows\system32\DRIVERS\i8042prt.sys 77824 bytes (Microsoft Corporation, i8042-Anschlusstreiber) 0x921DA000 C:\Windows\system32\DRIVERS\rspndr.sys 77824 bytes (Microsoft Corporation, Link-Layer Topology Responder Driver for NDIS 6) 0x90147000 C:\Windows\system32\DRIVERS\wanarp.sys 77824 bytes (Microsoft Corporation, MS Remote Access and Routing ARP Driver) 0x8AF8E000 C:\Windows\system32\drivers\disk.sys 69632 bytes (Microsoft Corporation, PnP Disk Driver) 0x90092000 C:\Windows\System32\Drivers\NDProxy.SYS 69632 bytes (Microsoft Corporation, NDIS Proxy) 0x80478000 C:\Windows\system32\PSHED.dll 69632 bytes (Microsoft Corporation, Plattformspezifischer Hardwarefehlertreiber) 0x8FD4C000 C:\Windows\system32\DRIVERS\rimmptsk.sys 69632 bytes (REDC, RICOH SD Driver) 0x82F52000 C:\Windows\system32\drivers\fileinfo.sys 65536 bytes (Microsoft Corporation, FileInfo Filter Driver) 0x904A6000 C:\Windows\system32\DRIVERS\HIDCLASS.SYS 65536 bytes (Microsoft Corporation, Hid Class Library) 0x923E8000 C:\Windows\system32\DRIVERS\lltdio.sys 65536 bytes (Microsoft Corporation, Link-Layer Topology Mapper I/O Driver) 0x80782000 C:\Windows\System32\drivers\mountmgr.sys 65536 bytes (Microsoft Corporation, Mount Point Manager) 0x8FD14000 C:\Windows\system32\DRIVERS\ohci1394.sys 65536 bytes (Microsoft Corporation, 1394 OpenHCI Port Driver) 0x8ADEF000 C:\Windows\system32\DRIVERS\termdd.sys 65536 bytes (Microsoft Corporation, Terminal Server Driver) 0x8AFEA000 C:\Windows\system32\DRIVERS\intelppm.sys 61440 bytes (Microsoft Corporation, Processor Device Driver) 0x923D9000 C:\Windows\system32\DRIVERS\monitor.sys 61440 bytes (Microsoft Corporation, Monitor Driver) 0x8AF58000 C:\Windows\System32\Drivers\mup.sys 61440 bytes (Microsoft Corporation, Multiple UNC Provider driver) 0x8070D000 C:\Windows\System32\drivers\partmgr.sys 61440 bytes (Microsoft Corporation, Partition Management Driver) 0x8F5EB000 C:\Windows\system32\DRIVERS\raspppoe.sys 61440 bytes (Microsoft Corporation, RAS PPPoE mini-port/call-manager driver) 0x8FB01000 C:\Windows\system32\DRIVERS\usbehci.sys 61440 bytes (Microsoft Corporation, EHCI eUSB Miniport Driver) 0x80729000 C:\Windows\system32\drivers\volmgr.sys 61440 bytes (Microsoft Corporation, Volume Manager Driver) 0x8FD24000 C:\Windows\system32\DRIVERS\1394BUS.SYS 57344 bytes (Microsoft Corporation, 1394 Bus Device Driver) 0x9FE40000 C:\Windows\System32\cdd.dll 57344 bytes (Microsoft Corporation, Canonical Display Driver) 0x90038000 C:\Windows\system32\DRIVERS\circlass.sys 57344 bytes (Microsoft Corporation, Consumer IR Class Driver for eHome) 0x905EF000 C:\Windows\system32\DRIVERS\netbios.sys 57344 bytes (Microsoft Corporation, NetBIOS interface driver) 0x90544000 C:\Windows\System32\Drivers\Npfs.SYS 57344 bytes (Microsoft Corporation, NPFS Driver) 0x82F12000 C:\Windows\system32\drivers\PCIIDEX.SYS 57344 bytes (Microsoft Corporation, PCI IDE Bus Driver Extension) 0x923C2000 C:\Windows\System32\Drivers\crashdmp.sys 53248 bytes (Microsoft Corporation, Crash Dump Driver) 0x923AE000 C:\Windows\system32\DRIVERS\STREAM.SYS 53248 bytes (Microsoft Corporation, WDM CODEC Class Device Driver 2.0) 0x90050000 C:\Windows\system32\DRIVERS\umbus.sys 53248 bytes (Microsoft Corporation, User-Mode Bus Enumerator) 0x80682000 C:\Windows\system32\drivers\WDFLDR.SYS 53248 bytes (Microsoft Corporation, WDFLDR) 0xA76EB000 C:\Windows\System32\drivers\tcpipreg.sys 49152 bytes (Microsoft Corporation, TCP/IP Registry Compatibility Driver) 0x904E5000 C:\Windows\System32\drivers\vga.sys 49152 bytes (Microsoft Corporation, VGA/Super VGA Video Driver) 0x8FAAC000 C:\Windows\System32\drivers\watchdog.sys 49152 bytes (Microsoft Corporation, Watchdog Driver) 0x9049B000 C:\Windows\system32\DRIVERS\hidir.sys 45056 bytes (Microsoft Corporation, Infrared Miniport Driver for Input Devices) 0x8FDDE000 C:\Windows\system32\DRIVERS\kbdclass.sys 45056 bytes (Microsoft Corporation, Tastaturklassentreiber) 0x8FDEB000 C:\Windows\system32\DRIVERS\mouclass.sys 45056 bytes (Microsoft Corporation, Mausklassentreiber) 0x90522000 C:\Windows\System32\Drivers\Msfs.SYS 45056 bytes (Microsoft Corporation, Mailslot driver) 0x8FBEF000 C:\Windows\system32\DRIVERS\ndistapi.sys 45056 bytes (Microsoft Corporation, NDIS 3.0 connection wrapper driver) 0x8FBE4000 C:\Windows\system32\DRIVERS\TDI.SYS 45056 bytes (Microsoft Corporation, TDI Wrapper) 0x8AFD6000 C:\Windows\system32\DRIVERS\tunnel.sys 45056 bytes (Microsoft Corporation, Microsoft Tunnel Interface Driver) 0x8FAB8000 C:\Windows\system32\DRIVERS\usbuhci.sys 45056 bytes (Microsoft Corporation, UHCI USB Miniport Driver) 0x82FB8000 C:\Windows\System32\Drivers\AsDsm.sys 40960 bytes (Windows (R) Codename Longhorn DDK provider, Data Security Manager Driver) 0x8071F000 C:\Windows\system32\DRIVERS\BATTC.SYS 40960 bytes (Microsoft Corporation, Battery Class Driver) 0x923CF000 C:\Windows\System32\drivers\Dxapi.sys 40960 bytes (Microsoft Corporation, DirectX API Driver) 0x82F08000 C:\Windows\system32\drivers\msahci.sys 40960 bytes (Microsoft Corporation, MS AHCI 1.0 Standard Driver) 0x90046000 C:\Windows\system32\DRIVERS\mssmbios.sys 40960 bytes (Microsoft Corporation, System Management BIOS Driver) 0x921D0000 C:\Windows\system32\DRIVERS\ndisuio.sys 40960 bytes (Microsoft Corporation, NDIS User mode I/O driver) 0x901E1000 C:\Windows\system32\drivers\nsiproxy.sys 40960 bytes (Microsoft Corporation, NSI Proxy) 0xA76E1000 C:\Windows\System32\Drivers\secdrv.SYS 40960 bytes (Macrovision Corporation, Macrovision Europe Limited, and Macrovision Japan and Asia K.K., Macrovision SECURITY Driver) 0x90179000 C:\Windows\system32\drivers\NIS\1108000.005\SRTSPX.SYS 40960 bytes (Symantec Corporation, Symantec AutoProtect) 0xAAF86000 C:\Windows\system32\DRIVERS\asyncmac.sys 36864 bytes (Microsoft Corporation, MS Remote Access serial network driver) 0x8AFC0000 C:\Windows\system32\drivers\crcdisk.sys 36864 bytes (Microsoft Corporation, Disk Block Verification Filter Driver) 0x904CE000 C:\Windows\System32\Drivers\Fs_Rec.SYS 36864 bytes (Microsoft Corporation, File System Recognizer Driver) 0x904BD000 C:\Windows\system32\DRIVERS\kbdhid.sys 36864 bytes (Microsoft Corporation, HID-Tastaturfiltertreiber) 0xAAF62000 C:\Windows\System32\Drivers\Normandy.SYS 36864 bytes (RKU Driver) 0x90552000 C:\Windows\System32\DRIVERS\rasacd.sys 36864 bytes (Microsoft Corporation, RAS Automatic Connection Driver) 0x9FE20000 C:\Windows\System32\TSDDD.dll 36864 bytes (Microsoft Corporation, Framebuffer Display Driver) 0x8AFE1000 C:\Windows\system32\DRIVERS\tunmp.sys 36864 bytes (Microsoft Corporation, Microsoft Tunnel Interface Driver) 0x806D5000 C:\Windows\system32\drivers\WMILIB.SYS 36864 bytes (Microsoft Corporation, WMILIB WMI support library Dll) 0x82EE2000 C:\Windows\system32\drivers\atapi.sys 32768 bytes (Microsoft Corporation, ATAPI IDE Miniport Driver) 0x8FC00000 C:\Windows\system32\DRIVERS\ATKACPI.sys 32768 bytes (ATK0100, ATK0100 ACPI Utility) 0x80489000 C:\Windows\system32\BOOTVID.dll 32768 bytes (Microsoft Corporation, VGA Boot Driver) 0x8FDD6000 C:\Windows\system32\DRIVERS\kbfiltr.sys 32768 bytes ( , Keyboard Filter Driver) 0x904C6000 C:\Windows\system32\DRIVERS\mouhid.sys 32768 bytes (Microsoft Corporation, HID-Mausfiltertreiber) 0x806DE000 C:\Windows\system32\drivers\msisadrv.sys 32768 bytes (Microsoft Corporation, ISA Driver) 0x90512000 C:\Windows\System32\DRIVERS\RDPCDD.sys 32768 bytes (Microsoft Corporation, RDP Miniport) 0x9051A000 C:\Windows\system32\drivers\rdpencdd.sys 32768 bytes (Microsoft Corporation, RDP Miniport) 0x8AF50000 C:\Windows\System32\Drivers\spldr.sys 32768 bytes (Microsoft Corporation, loader for security processor) 0x923F8000 C:\Program Files\ATKGFNEX\ASMMAP.sys 28672 bytes (-, -) 0x904DE000 C:\Windows\System32\Drivers\Beep.SYS 28672 bytes (Microsoft Corporation, BEEP Driver) 0x904B6000 C:\Windows\system32\DRIVERS\HIDPARSE.SYS 28672 bytes (Microsoft Corporation, Hid Parsing Library) 0x80401000 C:\Windows\system32\kdcom.dll 28672 bytes (Microsoft Corporation, Kernel Debugger HW Extension DLL) 0x904D7000 C:\Windows\System32\Drivers\Null.SYS 28672 bytes (Microsoft Corporation, NULL Driver) 0x923BB000 C:\Windows\system32\DRIVERS\sncduvc.SYS 28672 bytes (-, USBCAMD for Sonix UVC) 0x8FDF6000 C:\Windows\system32\DRIVERS\GEARAspiWDM.sys 24576 bytes (GEAR Software Inc., CD DVD Filter) 0x90200000 C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 24576 bytes (SUPERAdBlocker.com and SUPERAntiSpyware.com, SASDIFSV.SYS) 0xA6B34000 C:\Windows\system32\DRIVERS\lirsgt.sys 20480 bytes 0x8FDFC000 C:\Windows\system32\DRIVERS\CmBatt.sys 16384 bytes (Microsoft Corporation, Control Method Battery Driver) 0x8071C000 C:\Windows\system32\DRIVERS\compbatt.sys 12288 bytes (Microsoft Corporation, Composite Battery Driver) 0xA6B31000 C:\Program Files\ASUS\NB Probe\SPM\ghaio.sys 12288 bytes 0x8F562000 C:\Windows\system32\DRIVERS\nvBridge.kmd 8192 bytes (NVIDIA Corporation, NVIDIA Compatible Windows Vista Kernel Mode Driver, Version 186.31 ) 0x8FC08000 C:\Windows\system32\DRIVERS\swenum.sys 8192 bytes (Microsoft Corporation, Plug and Play Software Device Enumerator) 0x8FDE9000 C:\Windows\system32\DRIVERS\USBD.SYS 8192 bytes (Microsoft Corporation, Universal Serial Bus Driver) ============================================== >Stealth ============================================== |
Betreibst Du selber eine Internetseite und hast evtl auf anderen Seiten Werbebanner gesetzt? |
Ja, die Internetseite www.griechen-farm.de. Aber ich betreibe keine Werbebanner auf anderen Seiten... Gruß Maike |
Combofix darf ausschließlich ausgeführt werden, wenn ein Kompetenzler dies ausdrücklich empfohlen hat!Lade ComboFix von einem der unten aufgeführten Links herunter. Du musst diese umbenennen, bevor Du es auf den Desktop speicherst. Speichere ComboFix auf deinen Desktop.**NB: Es ist wichtig, das ComboFix.exe auf dem Desktop gespeichert wird** http://i266.photobucket.com/albums/i...ownload_FF.gif http://i94.photobucket.com/albums/l8...x-Download.png
|
Combofix Logfile: Code: ComboFix 10-10-24.06 - Maike 25.10.2010 17:56:51.1.2 - x86 |
Erneuter CustomScan mit OTL Falls noch nicht vorhanden, lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop
Code: netsvcs
|
OTL Logfile: Code: OTL logfile created on: 26.10.2010 11:08:36 - Run 2 Das ist der einzige Log, der auf dem Desktop erstellt wurde. |
Bitte lasse die Dateien aus der Code-Box bei Virustotal überprüfen Code: c:\windows\System32\AmbRunE.dll
|
Es ergab keine Ergebnisse - konnte auch nirgendwo "Filter" anclicken, daher poste ich das ganze jetzt mal so: Antivirus Version Last Update Result AhnLab-V3 2010.10.31.00 2010.10.30 - AntiVir 7.10.13.74 2010.10.29 - Antiy-AVL 2.0.3.7 2010.10.31 - Authentium 5.2.0.5 2010.10.31 - Avast 4.8.1351.0 2010.10.31 - Avast5 5.0.594.0 2010.10.31 - AVG 9.0.0.851 2010.10.31 - BitDefender 7.2 2010.10.31 - CAT-QuickHeal 11.00 2010.10.26 - ClamAV 0.96.2.0-git 2010.10.31 - Comodo 6570 2010.10.31 - DrWeb 5.0.2.03300 2010.10.30 - Emsisoft 5.0.0.50 2010.10.31 - eSafe 7.0.17.0 2010.10.28 - eTrust-Vet 36.1.7943 2010.10.29 - F-Prot 4.6.2.117 2010.10.30 - F-Secure 9.0.16160.0 2010.10.31 - Fortinet 4.2.249.0 2010.10.31 - GData 21 2010.10.31 - Ikarus T3.1.1.90.0 2010.10.31 - Jiangmin 13.0.900 2010.10.31 - K7AntiVirus 9.67.2865 2010.10.29 - Kaspersky 7.0.0.125 2010.10.31 - McAfee 5.400.0.1158 2010.10.31 - McAfee-GW-Edition 2010.1C 2010.10.30 - Microsoft 1.6301 2010.10.31 - NOD32 5578 2010.10.31 - Norman 6.06.10 2010.10.31 - nProtect 2010-10-31.01 2010.10.31 - Panda 10.0.2.7 2010.10.30 - PCTools 7.0.3.5 2010.10.31 - Prevx 3.0 2010.10.31 - Rising 22.71.03.02 2010.10.29 - Sophos 4.59.0 2010.10.31 - Sunbelt 7177 2010.10.31 - SUPERAntiSpyware 4.40.0.1006 2010.10.31 - Symantec 20101.2.0.161 2010.10.31 - TheHacker 6.7.0.1.074 2010.10.30 - TrendMicro 9.120.0.1004 2010.10.31 - TrendMicro-HouseCall 9.120.0.1004 2010.10.31 - VBA32 3.12.14.1 2010.10.29 - ViRobot 2010.10.30.4121 2010.10.31 - VirusBuster 12.70.13.0 2010.10.30 - Additional information Show all MD5 : 574c1fbc726c89faf309332e17d029cc SHA1 : 72802109c051e09e063414192d9ebc092bb964df SHA256: e0ebc26689d1271d4e950c8e69b06c3ab7c50fffa3b7d309474556c30bda629c ssdeep: 384:Z4W7oTOY231pnM3d47Wg3z/Y4pWrENO29:foqh8dUhRF File size : 14848 bytes First seen: 2009-08-05 19:07:40 Last seen : 2010-10-31 12:18:13 TrID: Win64 Executable Generic (80.9%) Win32 Executable Generic (8.0%) Win32 Dynamic Link Library (generic) (7.1%) Generic Win/DOS Executable (1.8%) DOS Executable Generic (1.8%) sigcheck: publisher....: Creative Technology Ltd. copyright....: Copyright (C) 2009 product......: AmbRun Endpoints Dynamic Link Library description..: AmbRun Endpoints Dynamic Link Library original name: AmbRunE.dll internal name: AmbRunE file version.: 1, 1, 2, 0 comments.....: signers......: - signing date.: - verified.....: Unsigned PEInfo: PE structure information [[ basic data ]] entrypointaddress: 0x2D4E timedatestamp....: 0x49A6156C (Thu Feb 26 04:07:08 2009) machinetype......: 0x14c (I386) [[ 4 section(s) ]] name, viradd, virsiz, rawdsiz, ntropy, md5 .text, 0x1000, 0x29BA, 0x2A00, 6.35, c51062977604e7a9aab07df7c14d0154 .data, 0x4000, 0x3D0, 0x200, 0.28, 38a465ab13e516ac4d90e19854e125b5 .rsrc, 0x5000, 0x420, 0x600, 2.46, f2d712b54e70a35d899e65b3028ae430 .reloc, 0x6000, 0x34E, 0x400, 4.67, 653e1f6b0a1bed3fca7ad0db4e6ca429 [[ 6 import(s) ]] msvcrt.dll: _adjust_fdiv, _amsg_exit, _except_handler4_common, _initterm, free, malloc, _XcptFilter, _vsnwprintf, __2@YAPAXI@Z, _purecall, _vsnprintf, __3@YAXPAX@Z KERNEL32.dll: InterlockedExchange, Sleep, InterlockedCompareExchange, GetTickCount, CreateEventA, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, InitializeCriticalSection, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, WaitForSingleObject, CloseHandle, SetEvent, CreateThread, QueryPerformanceCounter USER32.dll: TranslateMessage, DispatchMessageA, GetMessageA ADVAPI32.dll: RegCloseKey, RegQueryValueExW, RegOpenKeyExA, RegEnumKeyExA ole32.dll: CoTaskMemAlloc, IIDFromString, PropVariantClear, CoTaskMemFree, CoInitialize, CoUninitialize, CoCreateInstance SHELL32.dll: ShellExecuteW, SHGetFolderPathA [[ 1 export(s) ]] RunDLLEntry ExifTool: file metadata CharacterSet: Unicode CodeSize: 10752 Comments: CompanyName: Creative Technology Ltd. EntryPoint: 0x2d4e FileDescription: AmbRun Endpoints Dynamic Link Library FileFlagsMask: 0x0017 FileOS: Win32 FileSize: 14 kB FileSubtype: 0 FileType: Win32 DLL FileVersion: 1, 1, 2, 0 FileVersionNumber: 1.1.2.0 ImageVersion: 6.0 InitializedDataSize: 3584 InternalName: AmbRunE LanguageCode: English (U.S.) LegalCopyright: Copyright (C) 2009 LegalTrademarks: LinkerVersion: 8.0 MIMEType: application/octet-stream MachineType: Intel 386 or later, and compatibles OSVersion: 6.0 ObjectFileType: Dynamic link library OriginalFilename: AmbRunE.dll PEType: PE32 PrivateBuild: ProductName: AmbRun Endpoints Dynamic Link Library ProductVersion: 1, 1, 2, 0 ProductVersionNumber: 1.1.2.0 SpecialBuild: Subsystem: Windows GUI SubsystemVersion: 6.0 TimeStamp: 2009:02:26 05:07:08+01:00 UninitializedDataSize: 0 |
Wie läufts zur Zeit? |
habe seit mehreren Tagen keine Meldungen von Norton mehr erhalten. Wollte dem Freiden aber erstmal nicht trauen, da vorher auch nur bei ca. jedem 2ten Mal die Meldung angezeigt wurde. Wie gesagt seit ca. 4 Tagen keine Meldungen mehr. Meinst du, das ist ein gutes Zeichen? ;-) |
Ich würde sagen sehr gut. Beobachte es einmal einige Zeit. Und mach noch folgenden Scan. Ich bin diese Woche nicht mehr hier. Werde mich danach wieder melden.
|
Hallo Swiss! Nach einigen Wochen ohne erneuten Angriff hat mein Norton heute wieder etwas gemeldet: ame des Risikos: HTTP Malicious Toolkit Variant Activity 13 Angreifender PC: MAIKESPC Angreifer URL: bikleman.com/sex/index.php?s=IBB@G Zieladresse: bikleman.com (62.157.140.133, 80) Quelladresse: 192.168.2.106 Beschreibung des Datenverkehrs: TCP, Port 50629 Habe gerade meine ITunes geupdated. Meinst du, das könnte damit in Verbindung stehen? Vielen Dank und viele Grüße Maikeost |
Schritt 1 Downloade Dir bitte Malwarebytes
Schritt 2 Falls noch nicht vorhanden, lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop
Code: netsvcs
|
Malwarebytes' Anti-Malware 1.50 www.malwarebytes.org Datenbank Version: 5260 Windows 6.0.6002 Service Pack 2 Internet Explorer 8.0.6001.18975 07.12.2010 11:31:02 mbam-log-2010-12-07 (11-31-02).txt Art des Suchlaufs: Quick-Scan Durchsuchte Objekte: 166246 Laufzeit: 7 Minute(n), 13 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 0 Infizierte Registrierungswerte: 0 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 0 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: (Keine bösartigen Objekte gefunden) |
OTL Logfile: Code: OTL logfile created on: 07.12.2010 11:34:54 - Run 3 |
Combofix darf ausschließlich ausgeführt werden, wenn ein Kompetenzler dies ausdrücklich empfohlen hat!Lade ComboFix von einem der unten aufgeführten Links herunter. Du musst diese umbenennen, bevor Du es auf den Desktop speicherst. Speichere ComboFix auf deinen Desktop.**NB: Es ist wichtig, das ComboFix.exe auf dem Desktop gespeichert wird** http://i266.photobucket.com/albums/i...ownload_FF.gif http://i94.photobucket.com/albums/l8...x-Download.png
|
Combofix Logfile: Code: ComboFix 10-12-07.04 - Maike 08.12.2010 16:14:32.2.2 - x86 |
Bitte lasse die Dateien aus der Code-Box bei Virustotal überprüfen Code: c:\program files\putty06.exe
|
VT Community Sign in ▼ My account ▼ Sign out Signing out... Languages ▼ VirusTotal's website has changed, we need new translations, do you feel like helping the community? info@virustotal.com Sign in to VT Community Safety ratings and user comments (disinfection, in-the-wild locations, reverse engineering reports, etc.) on malware and URLs, free and easy. password Keep me logged in Sign in Signing in, please wait... Login failed, please try again Forgot your password? Create an account Edit my profile View my profile Inbox Virus Total Virustotal is a service that analyzes suspicious files and URLs and facilitates the quick detection of viruses, worms, trojans, and all kinds of malware detected by antivirus engines. More information... 10 VT Community user(s) with a total of 1882 reputation credit(s) say(s) this sample is goodware. 1 VT Community user(s) with a total of 1169 reputation credit(s) say(s) this sample is malware. File name: putty.exe Submission date: 2010-12-11 16:58:26 (UTC) Current status: finished Result: 0 /43 (0.0%) VT Community goodware Safety score: 61.7% Compact Print results Antivirus Version Last Update Result AhnLab-V3 2010.12.11.00 2010.12.10 - AntiVir 7.10.14.255 2010.12.10 - Antiy-AVL 2.0.3.7 2010.12.11 - Avast 4.8.1351.0 2010.12.11 - Avast5 5.0.677.0 2010.12.11 - AVG 9.0.0.851 2010.12.11 - BitDefender 7.2 2010.12.11 - CAT-QuickHeal 11.00 2010.12.11 - ClamAV 0.96.4.0 2010.12.11 - Command 5.2.11.5 2010.12.11 - Comodo 7024 2010.12.11 - DrWeb 5.0.2.03300 2010.12.11 - Emsisoft 5.1.0.1 2010.12.11 - eSafe 7.0.17.0 2010.12.09 - eTrust-Vet 36.1.8034 2010.12.10 - F-Prot 4.6.2.117 2010.12.11 - F-Secure 9.0.16160.0 2010.12.11 - Fortinet 4.2.254.0 2010.12.11 - GData 21 2010.12.11 - Ikarus T3.1.1.90.0 2010.12.11 - Jiangmin 13.0.900 2010.12.11 - K7AntiVirus 9.72.3219 2010.12.11 - Kaspersky 7.0.0.125 2010.12.11 - McAfee 5.400.0.1158 2010.12.11 - McAfee-GW-Edition 2010.1C 2010.12.11 - Microsoft 1.6402 2010.12.11 - NOD32 5694 2010.12.11 - Norman 6.06.12 2010.12.11 - nProtect 2010-12-11.01 2010.12.11 - Panda 10.0.2.7 2010.12.11 - PCTools 7.0.3.5 2010.12.11 - Prevx 3.0 2010.12.11 - Rising 22.77.04.00 2010.12.11 - Sophos 4.60.0 2010.12.11 - SUPERAntiSpyware 4.40.0.1006 2010.12.11 - Symantec 20101.3.0.103 2010.12.11 - TheHacker 6.7.0.1.098 2010.12.11 - TrendMicro 9.120.0.1004 2010.12.11 - TrendMicro-HouseCall 9.120.0.1004 2010.12.11 - VBA32 3.12.14.2 2010.12.10 - VIPRE 7604 2010.12.11 - ViRobot 2010.12.11.4196 2010.12.11 - VirusBuster 13.6.87.0 2010.12.11 - Additional information Show all MD5 : 9bb6826905965c13be1c84cc0ff83f42 SHA1 : ae7734e7a54353ab13ecba780ed62344332fbc6f SHA256: cfa4f56807405fd36e406688feb970a0d0d4854456ba2da72e4a33a27b01d9ae ssdeep: 12288:yLXmgMb4Xd+Uh8ggdE8Ox4GoyPV4qOr1nBMIQn6:yDmgMbVujg9u4GBPVLOr1nvM6 File size : 454656 bytes First seen: 2007-07-14 15:01:39 Last seen : 2010-12-11 16:58:26 Magic: PE32 executable for MS Windows (GUI) Intel 80386 32-bit TrID: InstallShield setup (37.7%) Win32 Executable MS Visual C++ (generic) (33.0%) Windows Screen Saver (11.4%) Win32 Executable Generic (7.4%) Win32 Dynamic Link Library (generic) (6.6%) sigcheck: publisher....: Simon Tatham copyright....: Copyright (c) 1997-2007 Simon Tatham. product......: PuTTY suite description..: SSH, Telnet and Rlogin client original name: PuTTY internal name: PuTTY file version.: Release 0.60 comments.....: n/a signers......: - signing date.: - verified.....: Unsigned PEiD: - PEInfo: PE structure information [[ basic data ]] entrypointaddress: 0x4777F timedatestamp....: 0x463484D0 (Sun Apr 29 11:43:12 2007) machinetype......: 0x14C (Intel I386) [[ 4 section(s) ]] name, viradd, virsiz, rawdsiz, ntropy, md5 .text, 0x1000, 0x4E4D1, 0x4F000, 6.63, 2f6fa9117dbe61d9723c63816f6e49fd .rdata, 0x50000, 0x19536, 0x1A000, 6.12, 528f4201171d63b6057d28346d31f26b .data, 0x6A000, 0x7064, 0x1000, 3.97, 427740272b7cbb5da523a05992b88b4f .rsrc, 0x72000, 0x3AB0, 0x4000, 3.78, d0531fa0b83a47042fed7f07849032ff ThreatExpert: hxxp://www.threatexpert.com/report.aspx?md5=9bb6826905965c13be1c84cc0ff83f42 ExifTool: file metadata CharacterSet: Unicode CodeSize: 323584 CompanyName: Simon Tatham EntryPoint: 0x4777f FileDescription: SSH, Telnet and Rlogin client FileFlagsMask: 0x000b FileOS: Win32 FileSize: 444 kB FileSubtype: 0 FileType: Win32 EXE FileVersion: Release 0.60 FileVersionNumber: 0.60.0.0 ImageVersion: 0.0 InitializedDataSize: 155648 InternalName: PuTTY LanguageCode: English (British) LegalCopyright: Copyright 1997-2007 Simon Tatham. LinkerVersion: 7.1 MIMEType: application/octet-stream MachineType: Intel 386 or later, and compatibles OSVersion: 4.0 ObjectFileType: Executable application OriginalFilename: PuTTY PEType: PE32 ProductName: PuTTY suite ProductVersion: Release 0.60 ProductVersionNumber: 0.60.0.0 Subsystem: Windows GUI SubsystemVersion: 4.0 TimeStamp: 2007:04:29 13:43:12+02:00 UninitializedDataSize: 0 Symantec reputation:Suspicious.Insight VT Community 12 User: Anonymous Reputation: 1 credits Comment date: 2010-08-28 17:22:52 (UTC) Good To Go ! -XTC- Was this comment helpful? Yes (0) | No (0) | Report abuse Reported as abuseful User: demonicalmonk Reputation: 15 credits Comment date: 2010-08-29 12:13:41 (UTC) Official putty client. Tags: Goodware, Was this comment helpful? Yes (2) | No (0) | Report abuse Reported as abuseful User: bartblaze Reputation: 1612 credits Comment date: 2010-09-02 07:02:59 (UTC) Tags: Goodware, Was this comment helpful? Yes (4) | No (0) | Report abuse Reported as abuseful User: CRDF Reputation: 1169 credits Comment date: 2010-09-11 10:00:03 (UTC) The file is a malware known as "CaM.Malware.Win32.PEx.C.286220132". - 30271 - Tags: malware Was this comment helpful? Yes (0) | No (9) | Report abuse Reported as abuseful User: TJM Reputation: 242 credits Comment date: 2010-09-14 09:06:30 (UTC) The user above me must be joking, this is putty 0.60 downloaded from the homepage. Tags: Goodware, Was this comment helpful? Yes (2) | No (0) | Report abuse Reported as abuseful User: Anonymous Reputation: 1 credits Comment date: 2010-08-28 17:22:52 (UTC) Good To Go ! -XTC- Was this comment helpful? Yes (0) | No (0) | Report abuse Reported as abuseful User: demonicalmonk Reputation: 15 credits Comment date: 2010-08-29 12:13:41 (UTC) Official putty client. Tags: Goodware, Was this comment helpful? Yes (2) | No (0) | Report abuse Reported as abuseful User: bartblaze Reputation: 1612 credits Comment date: 2010-09-02 07:02:59 (UTC) Tags: Goodware, Was this comment helpful? Yes (4) | No (0) | Report abuse Reported as abuseful User: CRDF Reputation: 1169 credits Comment date: 2010-09-11 10:00:03 (UTC) The file is a malware known as "CaM.Malware.Win32.PEx.C.286220132". - 30271 - Tags: malware Was this comment helpful? Yes (0) | No (9) | Report abuse Reported as abuseful User: TJM Reputation: 242 credits Comment date: 2010-09-14 09:06:30 (UTC) The user above me must be joking, this is putty 0.60 downloaded from the homepage. Tags: Goodware, Was this comment helpful? Yes (2) | No (0) | Report abuse Reported as abuseful Loading... Prev123Next Add your comment... Remember that when you write comments as an anonymous user they receive the lowest possible reputation. So if you have not signed in yet don't forget to do so. How to markup your comments? You can add basic styles to your comments using the following accepted bbcode tags: text -- bold text -- italics text -- underline Code: text You can also address comments to particular users using the "@" twitter-like mode. By prepending a "#" symbol to a word you can add custom tags to your comment, tags that can then be searched for. Goodware Malware Spam attachment/link P2P download Propagating via IM Network worm Drive-by-download Anonymous limit exceeded: anonymous users can only make one comment per file or URL, either sign in or register in order to continue making reviews on this item. Note that anonymous user discrimination is based on IP addresses, hence, it may be possible that another user behind your same proxy or NAT connection already made a review. Preview comment Edit comment Post comment Posting comment... Comment successfully posted ATTENTION: VirusTotal is a free service offered by Hispasec Sistemas. There are no guarantees about the availability and continuity of this service. Although the detection rate afforded by the use of multiple antivirus engines is far superior to that offered by just one product, these results DO NOT guarantee the harmlessness of a file. Currently, there is not any solution that offers a 100% effectiveness rate for detecting viruses and malware. VirusTotal © Hispasec Sistemas - Blog - Twitter - Contact: info@virustotal.com - Terms of Service & Privacy Policy |
Bitte während der Online-Scans evtl. vorhandene externe Festplatten einschalten! Bitte während der Scans alle Hintergrundwächter (Anti-Virus-Programm, Firewall, Skriptblocking und ähnliches) abstellen und nicht vergessen, alles hinterher wieder einzuschalten.
|
Alle Zeitangaben in WEZ +1. Es ist jetzt 07:51 Uhr. |
Copyright ©2000-2025, Trojaner-Board