![]() |
|
Plagegeister aller Art und deren Bekämpfung: Hupigon13, Win32.Delf.uv - Antivir und Hijackthis gehen nichtWindows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
![]() | #16 |
![]() ![]() | ![]() Hupigon13, Win32.Delf.uv - Antivir und Hijackthis gehen nicht Hallo Chris, zunächst die Auswertung von Virustotal: Prüfung von Virustotal: - C:\Windows\system32\AgCPanelFrenchb.exe INternal server error - Datei MemeoBackgroundService.exe empfangen 2009.03.09 16:01:06 (UTC) Status: Beendet Ergebnis: 0/38 (0.00%) Filter Drucken der Ergebnisse Antivirus Version letzte aktualisierung Ergebnis a-squared 4.0.0.101 2009.03.09 - AhnLab-V3 5.0.0.2 2009.02.27 - AntiVir 7.9.0.107 2009.03.09 - Authentium 5.1.0.4 2009.03.08 - Avast 4.8.1335.0 2009.03.09 - AVG 8.0.0.237 2009.03.09 - BitDefender 7.2 2009.03.09 - CAT-QuickHeal 10.00 2009.03.09 - ClamAV 0.94.1 2009.03.06 - Comodo 1039 2009.03.09 - DrWeb 4.44.0.09170 2009.03.09 - eSafe 7.0.17.0 2009.03.09 - eTrust-Vet 31.6.6386 2009.03.06 - F-Prot 4.4.4.56 2009.03.08 - F-Secure 8.0.14470.0 2009.03.09 - Fortinet 3.117.0.0 2009.03.09 - GData 19 2009.03.09 - Ikarus T3.1.1.45.0 2009.03.09 - K7AntiVirus 7.10.664 2009.03.09 - Kaspersky 7.0.0.125 2009.03.09 - McAfee 5547 2009.03.08 - McAfee+Artemis 5547 2009.03.08 - Microsoft 1.4405 2009.03.09 - NOD32 3921 2009.03.09 - Norman 6.00.06 2009.03.06 - nProtect 2009.1.8.0 2009.03.09 - Panda 10.0.0.10 2009.03.09 - PCTools 4.4.2.0 2009.03.09 - Prevx1 V2 2009.03.09 - Rising 21.20.02.00 2009.03.09 - SecureWeb-Gateway 6.7.6 2009.03.09 - Sophos 4.39.0 2009.03.09 - Sunbelt 3.2.1858.2 2009.03.08 - Symantec 1.4.4.12 2009.03.09 - TheHacker 6.3.3.0.277 2009.03.09 - TrendMicro 8.700.0.1004 2009.03.09 - ViRobot 2009.3.9.1641 2009.03.09 - VirusBuster 4.5.11.0 2009.03.09 - weitere Informationen File size: 25824 bytes MD5 : ed6235c93981d8658fa433092a809303 SHA1 : 8dbcb53fcb1c59e05bc1989c461da83e00a27590 SHA256: da61f67f5ddb731920e087484298c6c2a4cad872b648f28f75ec8fbe3fe8d88f PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x365E timedatestamp.....: 0x48EA636C (Mon Oct 6 21:13:48 2008) machinetype.......: 0x14C (Intel I386) ( 3 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x2000 0x1664 0x2000 4.04 69eedbf3f6114e54de1d49e46bbe8f00 .rsrc 0x4000 0x3B0 0x1000 0.97 64361d258a0cca538dbc9741ea146c4e .reloc 0x6000 0xC 0x1000 0.01 7bc88186bd13ccc3a4ae424983d9513a ( 0 imports ) ( 0 exports ) TrID : File type identification Win64 Executable Generic (85.4%) Win32 Executable Generic (8.5%) Win16/32 Executable Delphi generic (2.0%) Generic Win/DOS Executable (1.9%) DOS Executable Generic (1.9%) ssdeep: 192:TDUMjo+xqu654r7L5f/Zw0dx1MHWlbUjhsb2yowJL/aMjGwP7rMiR7+ebMKtMKUj:TDUMjbxq5c7L5XRdIQ4jhq2YJLWmtb2j PEiD : - RDS : NSRL Reference Data Set - Datei Macromedia_Licensing.exe empfangen 2009.05.27 12:05:08 (UTC) Status: Beendet Ergebnis: 0/35 (0.00%) Filter Drucken der Ergebnisse Antivirus Version letzte aktualisierung Ergebnis a-squared 4.0.0.101 2009.05.27 - AhnLab-V3 5.0.0.2 2009.05.27 - AntiVir 7.9.0.168 2009.05.27 - Antiy-AVL 2.0.3.1 2009.05.27 - Authentium 5.1.2.4 2009.05.27 - Avast 4.8.1335.0 2009.05.26 - BitDefender 7.2 2009.05.27 - CAT-QuickHeal 10.00 2009.05.27 - ClamAV 0.94.1 2009.05.27 - Comodo 1203 2009.05.26 - eSafe 7.0.17.0 2009.05.27 - eTrust-Vet 31.6.6524 2009.05.27 - F-Prot 4.4.4.56 2009.05.27 - GData 19 2009.05.27 - Ikarus T3.1.1.57.0 2009.05.27 - K7AntiVirus 7.10.745 2009.05.26 - Kaspersky 7.0.0.125 2009.05.27 - McAfee 5627 2009.05.26 - McAfee+Artemis 5627 2009.05.26 - McAfee-GW-Edition 6.7.6 2009.05.27 - Microsoft 1.4701 2009.05.27 - NOD32 4108 2009.05.27 - Norman 6.01.05 2009.05.26 - nProtect 2009.1.8.0 2009.05.27 - Panda 10.0.0.14 2009.05.26 - PCTools 4.4.2.0 2009.05.21 - Prevx 3.0 2009.05.27 - Rising 21.31.21.00 2009.05.27 - Sophos 4.42.0 2009.05.27 - Sunbelt 3.2.1858.2 2009.05.27 - Symantec 1.4.4.12 2009.05.27 - TheHacker 6.3.4.3.332 2009.05.26 - TrendMicro 8.950.0.1092 2009.05.27 - ViRobot 2009.5.27.1757 2009.05.27 - VirusBuster 4.6.5.0 2009.05.26 - weitere Informationen File size: 68096 bytes MD5 : 04d3a71875699098af856ee5f9f72ac3 SHA1 : 33e1a9fa46e14f1b18865be4de0f62271687ba91 SHA256: b7eb995882cb2f4fe24f9df516583c428840e878d5416965196ba2e2c5943edb PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x4AC0 timedatestamp.....: 0x3FFBDAC2 (Wed Jan 7 11:09:06 2004) machinetype.......: 0x14C (Intel I386) ( 4 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0xB526 0xB600 6.62 4780c0778a6efd2f7679079c924bae6a .rdata 0xD000 0x14D8 0x1600 5.26 4a676530334aaf67698db04c23c381d1 .data 0xF000 0x4CC8 0x3600 1.53 5babcb5864ef60a8716def6459fdda0e .rsrc 0x14000 0x248 0x400 2.03 882edf91479ee55186688d7f35f651c4 ( 3 imports ) > advapi32.dll: RegDeleteValueA, QueryServiceConfigA, RegEnumKeyExA, RegCloseKey, RegOpenKeyExA, RegisterEventSourceA, ReportEventA, RegDeleteKeyA, SetServiceStatus, RegisterServiceCtrlHandlerA, DeregisterEventSource, OpenServiceA, CloseServiceHandle, OpenSCManagerA, SetSecurityDescriptorDacl, StartServiceCtrlDispatcherA, InitializeSecurityDescriptor, RegSetValueExA, GetLengthSid, RegCreateKeyExA, QueryServiceStatus, OpenServiceW, StartServiceW, RegQueryValueExA, OpenSCManagerW > kernel32.dll: ConnectNamedPipe, FindClose, FindNextFileA, FindFirstFileA, CreateDirectoryA, GetProcAddress, LeaveCriticalSection, EnterCriticalSection, WaitForSingleObject, WaitForMultipleObjectsEx, ReleaseMutex, QueryDosDeviceA, CreateFileW, GetExitCodeThread, GetModuleHandleA, lstrcpyW, lstrlenW, QueryDosDeviceW, SetWaitableTimer, CreateWaitableTimerA, DisconnectNamedPipe, GetOverlappedResult, GetTickCount, SetEvent, ResumeThread, SuspendThread, CreateEventA, InitializeCriticalSection, LoadLibraryA, CreateThread, CreateMutexA, CreateNamedPipeA, WriteFile, FreeLibrary, WaitForSingleObjectEx, GetSystemDirectoryA, GetVersionExA, GetLastError, lstrlenA, SetFilePointer, ReadFile, OpenProcess, DeviceIoControl, TlsAlloc, CloseHandle, CreateFileA, SetLastError, SetEnvironmentVariableA, CompareStringA, FlushFileBuffers, GetStringTypeW, GetStringTypeA, HeapFree, HeapAlloc, RtlUnwind, InterlockedDecrement, InterlockedIncrement, GetTimeZoneInformation, GetSystemTime, GetLocalTime, GetCommandLineA, GetVersion, ExitProcess, GetModuleFileNameA, GetEnvironmentVariableA, HeapDestroy, HeapCreate, VirtualFree, VirtualAlloc, HeapReAlloc, IsBadWritePtr, DeleteCriticalSection, TerminateProcess, GetCurrentProcess, HeapSize, GetCurrentThreadId, TlsSetValue, CompareStringW, GetStdHandle, TlsGetValue, WideCharToMultiByte, MultiByteToWideChar, LCMapStringA, LCMapStringW, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetFileType, GetStartupInfoA, SetUnhandledExceptionFilter, IsBadReadPtr, IsBadCodePtr, GetCPInfo, GetACP, GetOEMCP, SetStdHandle > user32.dll: wsprintfA, DestroyWindow, DispatchMessageA, TranslateMessage, GetMessageA, CreateWindowExA, RegisterClassA, DefWindowProcA ( 0 exports ) TrID : File type identification Win64 Executable Generic (59.6%) Win32 Executable MS Visual C++ (generic) (26.2%) Win32 Executable Generic (5.9%) Win32 Dynamic Link Library (generic) (5.2%) Generic Win/DOS Executable (1.3%) ssdeep: 1536:exJBQsGcBTJwKogS+Oiag8yTzxeroxhs:8Ji9McgSzTg8yTzxeroxhs PEiD : Armadillo v1.71 RDS : NSRL Reference Data Set Datei CF15184.exe empfangen 2009.04.29 12:53:18 (UTC) Status: Beendet Ergebnis: 0/40 (0.00%) Filter Drucken der Ergebnisse Antivirus Version letzte aktualisierung Ergebnis a-squared 4.0.0.101 2009.04.29 - AhnLab-V3 5.0.0.2 2009.04.29 - AntiVir 7.9.0.156 2009.04.29 - Antiy-AVL 2.0.3.1 2009.04.29 - Authentium 5.1.2.4 2009.04.29 - Avast 4.8.1335.0 2009.04.28 - AVG 8.5.0.287 2009.04.29 - BitDefender 7.2 2009.04.29 - CAT-QuickHeal 10.00 2009.04.29 - ClamAV 0.94.1 2009.04.29 - Comodo 1141 2009.04.29 - DrWeb 4.44.0.09170 2009.04.29 - eSafe 7.0.17.0 2009.04.27 - eTrust-Vet 31.6.6482 2009.04.29 - F-Prot 4.4.4.56 2009.04.29 - F-Secure 8.0.14470.0 2009.04.29 - Fortinet 3.117.0.0 2009.04.29 - GData 19 2009.04.29 - Ikarus T3.1.1.49.0 2009.04.29 - K7AntiVirus 7.10.719 2009.04.29 - Kaspersky 7.0.0.125 2009.04.29 - McAfee 5599 2009.04.28 - McAfee+Artemis 5599 2009.04.28 - McAfee-GW-Edition 6.7.6 2009.04.29 - Microsoft 1.4602 2009.04.29 - NOD32 4042 2009.04.29 - Norman 6.00.06 2009.04.28 - nProtect 2009.1.8.0 2009.04.29 - Panda 10.0.0.14 2009.04.28 - PCTools 4.4.2.0 2009.04.29 - Prevx1 3.0 2009.04.29 - Rising 21.27.22.00 2009.04.29 - Sophos 4.41.0 2009.04.29 - Sunbelt 3.2.1858.2 2009.04.28 - Symantec 1.4.4.12 2009.04.29 - TheHacker 6.3.4.1.317 2009.04.29 - TrendMicro 8.950.0.1092 2009.04.29 - VBA32 3.12.10.3 2009.04.29 - ViRobot 2009.4.29.1715 2009.04.29 - VirusBuster 4.6.5.0 2009.04.28 - weitere Informationen File size: 401920 bytes MD5 : 5c0105e6265558b4ebda18b635d26500 SHA1 : 2c166211f44866ec9243373809faad1ab3532e81 SHA256: 8c044a53182c568942851a5bd636c4658cb6c1785fe692aa552c5aa7ff32faab PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x5046 timedatestamp.....: 0x48025BAF (Sun Apr 13 21:14:55 2008) machinetype.......: 0x14C (Intel I386) ( 3 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0x1F620 0x1F800 6.58 074a19da2eb2f1166671c2e2747967cd .data 0x21000 0x1CA24 0x1CA00 0.17 ac08e12c2ca9c0b872b354378edde336 .rsrc 0x3E000 0x25AA0 0x25C00 3.87 3bc81433cf5354e1c22400c381af5a22 ( 0 imports ) ( 0 exports ) TrID : File type identification Win32 Executable MS Visual C++ (generic) (65.2%) Win32 Executable Generic (14.7%) Win32 Dynamic Link Library (generic) (13.1%) Generic Win/DOS Executable (3.4%) DOS Executable Generic (3.4%) ThreatExpert: http://www.threatexpert.com/report.aspx?md5=5c0105e6265558b4ebda18b635d26500 ssdeep: 3072:NhRx1S315oF8opcnD1hOOrWGzN2lcR2u8JnxIbU+qwlTMbxrCsmqwju5HeEUcWj2:bkF5oXpcFb5DRsNxIbUNaM9+KNGA PEiD : - RDS : NSRL Reference Data Set - Datei CF15184.exe empfangen 2009.04.29 12:53:18 (UTC) Status: Beendet Ergebnis: 0/40 (0.00%) Filter Drucken der Ergebnisse Antivirus Version letzte aktualisierung Ergebnis a-squared 4.0.0.101 2009.04.29 - AhnLab-V3 5.0.0.2 2009.04.29 - AntiVir 7.9.0.156 2009.04.29 - Antiy-AVL 2.0.3.1 2009.04.29 - Authentium 5.1.2.4 2009.04.29 - Avast 4.8.1335.0 2009.04.28 - AVG 8.5.0.287 2009.04.29 - BitDefender 7.2 2009.04.29 - CAT-QuickHeal 10.00 2009.04.29 - ClamAV 0.94.1 2009.04.29 - Comodo 1141 2009.04.29 - DrWeb 4.44.0.09170 2009.04.29 - eSafe 7.0.17.0 2009.04.27 - eTrust-Vet 31.6.6482 2009.04.29 - F-Prot 4.4.4.56 2009.04.29 - F-Secure 8.0.14470.0 2009.04.29 - Fortinet 3.117.0.0 2009.04.29 - GData 19 2009.04.29 - Ikarus T3.1.1.49.0 2009.04.29 - K7AntiVirus 7.10.719 2009.04.29 - Kaspersky 7.0.0.125 2009.04.29 - McAfee 5599 2009.04.28 - McAfee+Artemis 5599 2009.04.28 - McAfee-GW-Edition 6.7.6 2009.04.29 - Microsoft 1.4602 2009.04.29 - NOD32 4042 2009.04.29 - Norman 6.00.06 2009.04.28 - nProtect 2009.1.8.0 2009.04.29 - Panda 10.0.0.14 2009.04.28 - PCTools 4.4.2.0 2009.04.29 - Prevx1 3.0 2009.04.29 - Rising 21.27.22.00 2009.04.29 - Sophos 4.41.0 2009.04.29 - Sunbelt 3.2.1858.2 2009.04.28 - Symantec 1.4.4.12 2009.04.29 - TheHacker 6.3.4.1.317 2009.04.29 - TrendMicro 8.950.0.1092 2009.04.29 - VBA32 3.12.10.3 2009.04.29 - ViRobot 2009.4.29.1715 2009.04.29 - VirusBuster 4.6.5.0 2009.04.28 - weitere Informationen File size: 401920 bytes MD5 : 5c0105e6265558b4ebda18b635d26500 SHA1 : 2c166211f44866ec9243373809faad1ab3532e81 SHA256: 8c044a53182c568942851a5bd636c4658cb6c1785fe692aa552c5aa7ff32faab PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x5046 timedatestamp.....: 0x48025BAF (Sun Apr 13 21:14:55 2008) machinetype.......: 0x14C (Intel I386) ( 3 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0x1F620 0x1F800 6.58 074a19da2eb2f1166671c2e2747967cd .data 0x21000 0x1CA24 0x1CA00 0.17 ac08e12c2ca9c0b872b354378edde336 .rsrc 0x3E000 0x25AA0 0x25C00 3.87 3bc81433cf5354e1c22400c381af5a22 ( 0 imports ) ( 0 exports ) TrID : File type identification Win32 Executable MS Visual C++ (generic) (65.2%) Win32 Executable Generic (14.7%) Win32 Dynamic Link Library (generic) (13.1%) Generic Win/DOS Executable (3.4%) DOS Executable Generic (3.4%) ThreatExpert: http://www.threatexpert.com/report.aspx?md5=5c0105e6265558b4ebda18b635d26500 ssdeep: 3072:NhRx1S315oF8opcnD1hOOrWGzN2lcR2u8JnxIbU+qwlTMbxrCsmqwju5HeEUcWj2:bkF5oXpcFb5DRsNxIbUNaM9+KNGA PEiD : - RDS : NSRL Reference Data Set Datei CF15184.exe empfangen 2009.04.29 12:53:18 (UTC) Status: Beendet Ergebnis: 0/40 (0.00%) Filter Drucken der Ergebnisse Antivirus Version letzte aktualisierung Ergebnis a-squared 4.0.0.101 2009.04.29 - AhnLab-V3 5.0.0.2 2009.04.29 - AntiVir 7.9.0.156 2009.04.29 - Antiy-AVL 2.0.3.1 2009.04.29 - Authentium 5.1.2.4 2009.04.29 - Avast 4.8.1335.0 2009.04.28 - AVG 8.5.0.287 2009.04.29 - BitDefender 7.2 2009.04.29 - CAT-QuickHeal 10.00 2009.04.29 - ClamAV 0.94.1 2009.04.29 - Comodo 1141 2009.04.29 - DrWeb 4.44.0.09170 2009.04.29 - eSafe 7.0.17.0 2009.04.27 - eTrust-Vet 31.6.6482 2009.04.29 - F-Prot 4.4.4.56 2009.04.29 - F-Secure 8.0.14470.0 2009.04.29 - Fortinet 3.117.0.0 2009.04.29 - GData 19 2009.04.29 - Ikarus T3.1.1.49.0 2009.04.29 - K7AntiVirus 7.10.719 2009.04.29 - Kaspersky 7.0.0.125 2009.04.29 - McAfee 5599 2009.04.28 - McAfee+Artemis 5599 2009.04.28 - McAfee-GW-Edition 6.7.6 2009.04.29 - Microsoft 1.4602 2009.04.29 - NOD32 4042 2009.04.29 - Norman 6.00.06 2009.04.28 - nProtect 2009.1.8.0 2009.04.29 - Panda 10.0.0.14 2009.04.28 - PCTools 4.4.2.0 2009.04.29 - Prevx1 3.0 2009.04.29 - Rising 21.27.22.00 2009.04.29 - Sophos 4.41.0 2009.04.29 - Sunbelt 3.2.1858.2 2009.04.28 - Symantec 1.4.4.12 2009.04.29 - TheHacker 6.3.4.1.317 2009.04.29 - TrendMicro 8.950.0.1092 2009.04.29 - VBA32 3.12.10.3 2009.04.29 - ViRobot 2009.4.29.1715 2009.04.29 - VirusBuster 4.6.5.0 2009.04.28 - weitere Informationen File size: 401920 bytes MD5 : 5c0105e6265558b4ebda18b635d26500 SHA1 : 2c166211f44866ec9243373809faad1ab3532e81 SHA256: 8c044a53182c568942851a5bd636c4658cb6c1785fe692aa552c5aa7ff32faab PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x5046 timedatestamp.....: 0x48025BAF (Sun Apr 13 21:14:55 2008) machinetype.......: 0x14C (Intel I386) ( 3 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0x1F620 0x1F800 6.58 074a19da2eb2f1166671c2e2747967cd .data 0x21000 0x1CA24 0x1CA00 0.17 ac08e12c2ca9c0b872b354378edde336 .rsrc 0x3E000 0x25AA0 0x25C00 3.87 3bc81433cf5354e1c22400c381af5a22 ( 0 imports ) ( 0 exports ) TrID : File type identification Win32 Executable MS Visual C++ (generic) (65.2%) Win32 Executable Generic (14.7%) Win32 Dynamic Link Library (generic) (13.1%) Generic Win/DOS Executable (3.4%) DOS Executable Generic (3.4%) ThreatExpert: http://www.threatexpert.com/report.aspx?md5=5c0105e6265558b4ebda18b635d26500 ssdeep: 3072:NhRx1S315oF8opcnD1hOOrWGzN2lcR2u8JnxIbU+qwlTMbxrCsmqwju5HeEUcWj2:bkF5oXpcFb5DRsNxIbUNaM9+KNGA PEiD : - RDS : NSRL Reference Data Set - Datei CF15195.exe empfangen 2009.06.02 12:17:26 (UTC) Status: Beendet Ergebnis: 0/40 (0%) Filter Drucken der Ergebnisse Antivirus Version letzte aktualisierung Ergebnis a-squared 4.0.0.101 2009.06.02 - AhnLab-V3 5.0.0.2 2009.06.02 - AntiVir 7.9.0.180 2009.06.02 - Antiy-AVL 2.0.3.1 2009.06.02 - Authentium 5.1.2.4 2009.06.02 - Avast 4.8.1335.0 2009.06.01 - AVG 8.5.0.339 2009.06.02 - BitDefender 7.2 2009.06.02 - CAT-QuickHeal 10.00 2009.06.02 - ClamAV 0.94.1 2009.06.02 - Comodo 1233 2009.06.02 - DrWeb 5.0.0.12182 2009.06.02 - eSafe 7.0.17.0 2009.06.01 - eTrust-Vet 31.6.6535 2009.06.02 - F-Prot 4.4.4.56 2009.06.02 - F-Secure 8.0.14470.0 2009.06.02 - Fortinet 3.117.0.0 2009.06.02 - GData 19 2009.06.02 - Ikarus T3.1.1.57.0 2009.06.02 - K7AntiVirus 7.10.749 2009.05.29 - Kaspersky 7.0.0.125 2009.06.02 - McAfee 5633 2009.06.01 - McAfee+Artemis 5633 2009.06.01 - McAfee-GW-Edition 6.7.6 2009.05.29 - Microsoft 1.4701 2009.06.02 - NOD32 4122 2009.06.02 - Norman 6.01.05 2009.06.01 - nProtect 2009.1.8.0 2009.06.02 - Panda 10.0.0.14 2009.06.01 - PCTools 4.4.2.0 2009.06.02 - Prevx 3.0 2009.06.02 - Rising 21.32.13.00 2009.06.02 - Sophos 4.42.0 2009.06.02 - Sunbelt 3.2.1858.2 2009.06.02 - Symantec 1.4.4.12 2009.06.02 - TheHacker 6.3.4.3.335 2009.06.01 - TrendMicro 8.950.0.1092 2009.06.02 - VBA32 3.12.10.6 2009.06.02 - ViRobot 2009.6.2.1765 2009.06.02 - VirusBuster 4.6.5.0 2009.06.01 - weitere Informationen File size: 401920 bytes MD5...: 5c0105e6265558b4ebda18b635d26500 SHA1..: 2c166211f44866ec9243373809faad1ab3532e81 SHA256: 8c044a53182c568942851a5bd636c4658cb6c1785fe692aa552c5aa7ff32faab ssdeep: - PEiD..: - TrID..: File type identification Win32 Executable MS Visual C++ (generic) (65.2%) Win32 Executable Generic (14.7%) Win32 Dynamic Link Library (generic) (13.1%) Generic Win/DOS Executable (3.4%) DOS Executable Generic (3.4%) PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x5046 timedatestamp.....: 0x48025baf (Sun Apr 13 19:14:55 2008) machinetype.......: 0x14c (I386) ( 3 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0x1f620 0x1f800 6.58 074a19da2eb2f1166671c2e2747967cd .data 0x21000 0x1ca24 0x1ca00 0.17 ac08e12c2ca9c0b872b354378edde336 .rsrc 0x3e000 0x25aa0 0x25c00 3.87 3bc81433cf5354e1c22400c381af5a22 ( 3 imports ) > KERNEL32.dll: FlushConsoleInputBuffer, LoadLibraryA, InterlockedExchange, FreeLibrary, LocalAlloc, GetVDMCurrentDirectories, CmdBatNotification, GetModuleHandleA, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, GetThreadLocale, GetDiskFreeSpaceExW, CompareFileTime, RemoveDirectoryW, GetCurrentDirectoryW, SetCurrentDirectoryW, TerminateProcess, WaitForSingleObject, GetExitCodeProcess, CopyFileW, SetFileAttributesW, DeleteFileW, SetFileTime, CreateDirectoryW, FillConsoleOutputAttribute, SetConsoleTextAttribute, ScrollConsoleScreenBufferW, FormatMessageW, DuplicateHandle, FlushFileBuffers, HeapReAlloc, HeapSize, GetFileAttributesExW, LocalFree, GetDriveTypeW, InitializeCriticalSection, SetConsoleCtrlHandler, GetWindowsDirectoryW, GetConsoleTitleW, GetModuleFileNameW, GetVersion, EnterCriticalSection, LeaveCriticalSection, ExpandEnvironmentStringsW, SearchPathW, WriteFile, GetVolumeInformationW, SetLastError, MoveFileW, SetConsoleTitleW, MoveFileExW, GetBinaryTypeW, GetFileAttributesW, GetCurrentThreadId, CreateProcessW, LoadLibraryW, ReadProcessMemory, SetErrorMode, GetConsoleMode, SetConsoleMode, VirtualAlloc, VirtualFree, SetEnvironmentVariableW, GetEnvironmentVariableW, GetCommandLineW, GetEnvironmentStringsW, GetLocalTime, GetTimeFormatW, FileTimeToLocalFileTime, GetDateFormatW, GetLastError, CloseHandle, SetThreadLocale, GetProcAddress, GetModuleHandleW, SetFilePointer, lstrcmpW, lstrcmpiW, HeapAlloc, GetProcessHeap, HeapFree, MultiByteToWideChar, ReadFile, WriteConsoleW, FillConsoleOutputCharacterW, SetConsoleCursorPosition, ReadConsoleW, GetConsoleScreenBufferInfo, GetStdHandle, GetFileType, VirtualQuery, RaiseException, GetCPInfo, GetConsoleOutputCP, WideCharToMultiByte, GetFileSize, CreateFileW, FindClose, FindNextFileW, FindFirstFileW, GetFullPathNameW, GetUserDefaultLCID, GetLocaleInfoW, SetLocalTime, SystemTimeToFileTime, GetSystemTime, FileTimeToSystemTime > msvcrt.dll: __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __initenv, _cexit, _XcptFilter, _exit, _c_exit, calloc, _wcslwr, qsort, _vsnwprintf, wcsstr, _dup2, _dup, _open_osfhandle, _close, swscanf, _ultoa, _pipe, _seh_longjmp_unwind, _setmode, wcsncmp, iswxdigit, fflush, exit, _wtol, time, srand, __set_app_type, wcsrchr, malloc, free, wcstoul, _errno, iswalpha, printf, rand, swprintf, _iob, fprintf, towlower, realloc, setlocale, _snwprintf, wcscat, _wcsupr, wcsncpy, _wpopen, fgets, _pclose, memmove, wcschr, iswspace, _tell, longjmp, wcscmp, _wcsnicmp, _wcsicmp, wcstol, iswdigit, _getch, _get_osfhandle, _controlfp, _setjmp3, _except_handler3, wcscpy, wcslen, wcsspn, towupper > USER32.dll: GetUserObjectInformationW, GetThreadDesktop, MessageBeep, GetProcessWindowStation ( 0 exports ) PDFiD.: - RDS...: NSRL Reference Data Set - ThreatExpert info: <a href='http://www.threatexpert.com/report.aspx?md5=5c0105e6265558b4ebda18b635d26500' target='_blank'>http://www.threatexpert.com/report.aspx?md5=5c0105e6265558b4ebda18b635d26500</a> |
Themen zu Hupigon13, Win32.Delf.uv - Antivir und Hijackthis gehen nicht |
anfang, antivir, c:\windows, controlset002, einstellungen, firefox, folge, hijack, hijackthis, hupigon, hupigon13, image, log, nicht mehr, problem, rechner, scan, scan32.exe, services, software, spybot, starten, system, win, win32.delf.uv, windows, windows xp, zonealarm.exe |