matrix2904 | 06.08.2008 09:22 | Hallo root24 und Danke für die Hilfe,
Ich habe meine Daten auf eine externe HDD und USB-Stick gesichert.
So jetzt habe ich erstmal die 3 Dateien Suchen lassen und bei Virustotal gecheckt, weil ich mit der CCLEANER ANLEITUNG Anleitung nicht weiterkomme da die Bilder fehlen was ich einstellen soll. Hier die Suchergebnisse von mir. SLRUNDLL.EXE Code:
slrundll.exe C:\WINDOWS 33 KB Anwendung 14.04.2008 07:53
____slrundll.exe.1 C:\WINDOWS 33 KB 1-Datei 14.04.2008 07:53
___slrundll.exe.1 C:\WINDOWS 33 KB 1-Datei 14.04.2008 07:53
___slrundll.exe.1 C:\WINDOWS\system32 33 KB 1-Datei 14.04.2008 07:53
slrundll.exe C:\WINDOWS\system32 33 KB Anwendung 14.04.2008 07:53
slrundll.exe C:\WINDOWS\ServicePackFiles\i386 33 KB Anwendung 14.04.2008 07:53
slrundll.exe C:\WINDOWS\system32\dllcache 33 KB Anwendung 14.04.2008 07:53 Den HTML code wollte ich auch posten aber wird hier nicht dargestellt. Datei slrundll.exe empfangen 2008.08.06 09:34:14 (CET) | Status: Beendet | Ergebnis: 0/36 (0%) |
weitere Informationen
File size: 32866 bytes
MD5...: 5760eea88acc30289f22a3a6b83531f1
SHA1..: 257c3b6f735d4d5d8e64f66a0e40ca741c33ea5c SHA256: 6e62a4559b1a6d1d92cd7f6ca13b869eeb4b8e431d4c2b7d667ff48eeb050bfc
SHA512: 1b2a9d9e6c89c02333e476d27dfbd5fc5efd7f158f8051e9e7277d88e4d75117
ac6f5578c19dd70c2c9d3f1d25ae91d2803ffca330a92d665857bee5722e5554
PEiD..: Armadillo v1.71
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x40132c
timedatestamp.....: 0x4069704c (Tue Mar 30 13:04:12 2004)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x345a 0x4000 5.80 58f5c9738ae7b9f83c246c411083d821
.rdata 0x5000 0x784 0x1000 3.30 160c229abdf53753818daa006ab35147
.data 0x6000 0x99c 0x1000 0.87 8986d0756ca0cfb6f7e3ced3d916be94
.rsrc 0x7000 0x318 0x1000 3.52 782b22da29c09f173b564a18436f5217
( 1 imports )
> KERNEL32.dll: GetStdHandle, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, FreeLibrary, GetFileType, HeapDestroy, HeapCreate, VirtualFree, HeapFree, RtlUnwind, WriteFile, GetCPInfo, GetACP, GetOEMCP, HeapAlloc, VirtualAlloc, HeapReAlloc, IsBadWritePtr, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW
( 0 exports ) RXQSAK.DLL Code:
__rxqsak.dll._ C:\WINDOWS\system32 99 KB _-Datei 02.08.2008 19:20 Den HTML code wollte ich auch posten aber wird hier nicht dargestellt. Datei __rxqsak.dll._ empfangen 2008.08.06 09:17:11 (CET) | Überprüfung Beendet | Ergebnis: 13/36 (36.12%) |
weitere Informationen
File size: 100864 bytes
MD5...: b6e6269c589738d1683fa1072057f4b9
SHA1..: 7b61ee56af60573366e6f535007804ca610a6082
SHA256: fe1ef7dbce062e6542d17004c3c82905947fc930d374bf10ef61f3a5ce8b245b
SHA512: e456828b465303fc2bacf23942c7af886b3e2dc38804f29c41f6673706ecbc41
165d3cefa46d501b315d98be41cc6b8a12e678a54754ec1965396bf4c6a785fd
PEiD..: -
PEInfo: PE Structure information
base data )
entrypointaddress.: 0x10001000
timedatestamp.....: 0x0 (Thu Jan 01 00:00:00 1970)
machinetype.......: 0x14c (I386)
3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x11417 0x11e00 7.99 be813de91d1f65b8b1019fe64999a629
.rdata 0x13000 0xb41 0x400 4.47 c729fbf98d31ae3aa098010956341c20
.data 0x14000 0x2a974 0x6400 7.90 fdb9b3572672937df8f9b6ace1c50d76
2 imports )
> user32.dll: CreatePopupMenu, DeleteMenu, EnableScrollBar, EndPaint, EqualRect, FillRect, GetCursor, GetDC, GetDlgItem, CreateIconFromResource, IsCharLowerA, LoadBitmapA, OemToCharBuffA, RegisterClassA, SetCursor, ShowCursor, ShowOwnedPopups, ShowScrollBar, CreateDesktopW, CopyRect, CharUpperA, CharToOemA, CharPrevA, CharNextA, GetFocus, ChangeMenuA
> KERNEL32.dll: lstrcpynA, lstrcmpA, SetEndOfFile, SetCurrentDirectoryA, GetDateFormatA, ExitProcess, lstrlenA
( 0 exports )
ThreatExpert info: http://www.threatexpert.com/report.aspx?md5=b6e6269c589738d1683fa1072057f4b9
Prevx info: http://info.prevx.com/aboutprogramtext.asp?PX5=8FB301CE00A2C50D8A7A01EBF1C5C100B092F6FD WTGLASHV.DLL Code:
__wtglashv.dll.__ C:\WINDOWS\system32 89 KB ___-Datei 03.08.2008 19:22 Den HTML code wollte ich auch posten aber wird hier nicht dargestellt. Datei __wtglashv.dll.__ empfangen 2008.08.05 13:46:13 (CET) | Überprüfung Beendet | Ergebnis: 15/36 (41.67%) |
weitere Informationen
File size: 90624 bytes
MD5...: f2031621b924048f8cb5e0ec00b591fb
SHA1..: edbb5ec444139789e082a9ffa87767bde79e8ddd
SHA256: db393c72d1d249f379d68fd623401cfed62ae5bc45c5dd8a3d4c3d6ce8b896b7
SHA512: 9273dd699568b4964ccc9ae61959b506ac3f7da2bb5f9f97e3e9eb99b2894d21
ddb3eb8b78e87db417123381ae825091a4a6a0db8089537a9434628bc600718f
PEiD..: -
PEInfo: PE Structure information
base data )
entrypointaddress.: 0x10001000
timedatestamp.....: 0x0 (Thu Jan 01 00:00:00 1970)
machinetype.......: 0x14c (I386)
3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0xd534 0xe000 7.99 28b12526a25c995e1f257df327045ddc
.rdata 0xf000 0x455 0x400 3.06 f6d24263bb59f59a3980a43cbfae6c44
.data 0x10000 0x1fab6 0x7a00 7.91 8e22127fe2ec928156dbd73ed1681f65
2 imports )
> user32.dll: EmptyClipboard, EndMenu, EndPaint, FillRect, GetFocus, LoadCursorA, DeleteMenu, MessageBoxIndirectA, OffsetRect, SetCursor, SetMenuInfo, ShowCaret, CharUpperBuffA, CharLowerA, ChangeMenuA, LoadImageA, wsprintfA
> KERNEL32.dll: OpenFileMappingA, FlushFileBuffers, EnumResourceTypesA, lstrcmpA
( 0 exports )
ThreatExpert info: http://www.threatexpert.com/report.aspx?md5=f2031621b924048f8cb5e0ec00b591fb
Prevx info: http://info.prevx.com/aboutprogramtext.asp?PX5=30F3334F002AE69F622401359E8CB5009EEAC3BA
packers (F-Prot): embedded Der HTML-Code von SLRUNDLL.EXE der mit auf der Seite angezeigt wurde vieleicht kann von euch einer damit was anfangen | <table border="1"><tr><td colspan="4">Datei slrundll.exe empfangen 2008.08.06 09:34:14 (CET)</td></tr><tr><td>Antivirus</td><td>Version</td><td>letzte aktualisierung</td><td>Ergebnis</td</tr><tr><td>AhnLab-V3</td><td>2008.8.6.0</td><td>2008.08.06</td><td>-</td</tr><tr><td>AntiVir</td><td>7.8.1.15</td><td>2008.08.05</td><td>-</td</tr><tr><td>Authentium</td><td>5.1.0.4</td><td>2008.08.05</td><td>-</td</tr><tr><td>Avast</td><td>4.8.1195.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>AVG</td><td>8.0.0.156</td><td>2008.08.06</td><td>-</td</tr><tr><td>BitDefender</td><td>7.2</td><td>2008.08.06</td><td>-</td</tr><tr><td>CAT-QuickHeal</td><td>9.50</td><td>2008.08.05</td><td>-</td</tr><tr><td>ClamAV</td><td>0.93.1</td><td>2008.08.06</td><td>-</td</tr><tr><td>DrWeb</td><td>4.44.0.09170</td><td>2008.08.05</td><td>-</td</tr><tr><td>eSafe</td><td>7.0.17.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>eTrust-Vet</td><td>31.6.6013</td><td>2008.08.06</td><td>-</td</tr><tr><td>Ewido</td><td>4.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>F-Prot</td><td>4.4.4.56</td><td>2008.08.05</td><td>-</td</tr><tr><td>F-Secure</td><td>7.60.13501.0</td><td>2008.08.06</td><td>-</td</tr><tr><td>Fortinet</td><td>3.14.0.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>GData</td><td>2.0.7306.1023</td><td>2008.08.06</td><td>-</td</tr><tr><td>Ikarus</td><td>T3.1.1.34.0</td><td>2008.08.06</td><td>-</td</tr><tr><td>K7AntiVirus</td><td>7.10.404</td><td>2008.08.05</td><td>-</td</tr><tr><td>Kaspersky</td><td>7.0.0.125</td><td>2008.08.06</td><td>-</td</tr><tr><td>McAfee</td><td>5354</td><td>2008.08.05</td><td>-</td</tr><tr><td>Microsoft</td><td>1.3807</td><td>2008.08.06</td><td>-</td</tr><tr><td>NOD32v2</td><td>3331</td><td>2008.08.06</td><td>-</td</tr><tr><td>Norman</td><td>5.80.02</td><td>2008.08.05</td><td>-</td</tr><tr><td>Panda</td><td>9.0.0.4</td><td>2008.08.05</td><td>-</td</tr><tr><td>PCTools</td><td>4.4.2.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>Prevx1</td><td>V2</td><td>2008.08.06</td><td>-</td</tr><tr><td>Rising</td><td>20.56.20.00</td><td>2008.08.06</td><td>-</td</tr><tr><td>Sophos</td><td>4.31.0</td><td>2008.08.06</td><td>-</td</tr><tr><td>Sunbelt</td><td>3.1.1537.1</td><td>2008.08.06</td><td>-</td</tr><tr><td>Symantec</td><td>10</td><td>2008.08.06</td><td>-</td</tr><tr><td>TheHacker</td><td>6.2.96.393</td><td>2008.08.04</td><td>-</td</tr><tr><td>TrendMicro</td><td>8.700.0.1004</td><td>2008.08.06</td><td>-</td</tr><tr><td>VBA32</td><td>3.12.8.2</td><td>2008.08.05</td><td>-</td</tr><tr><td>ViRobot</td><td>2008.8.5.1324</td><td>2008.08.06</td><td>-</td</tr><tr><td>VirusBuster</td><td>4.5.11.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>Webwasher-Gateway</td><td>6.6.2</td><td>2008.08.06</td><td>-</td</tr><tr><td colspan="4"> </td></tr><tr><td colspan="4">weitere Informationen</td></tr><tr><td colspan="4">File size: 32866 bytes</td></tr><tr><td colspan="4">MD5...: 5760eea88acc30289f22a3a6b83531f1</td></tr><tr><td colspan="4">SHA1..: 257c3b6f735d4d5d8e64f66a0e40ca741c33ea5c</td></tr><tr><td colspan="4">SHA256: 6e62a4559b1a6d1d92cd7f6ca13b869eeb4b8e431d4c2b7d667ff48eeb050bfc</td></tr><tr><td colspan="4">SHA512: 1b2a9d9e6c89c02333e476d27dfbd5fc5efd7f158f8051e9e7277d88e4d75117<BR>ac6f5578c19dd70c2c9d3f1d25ae91d2803ffca330a92d665857bee5722e5554</td></tr><tr><td colspan="4">PEiD..: Armadillo v1.71</td></tr><tr><td colspan="4">PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x40132c<BR>timedatestamp.....: 0x4069704c (Tue Mar 30 13:04:12 2004)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 4 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x345a 0x4000 5.80 58f5c9738ae7b9f83c246c411083d821<BR>.rdata 0x5000 0x784 0x1000 3.30 160c229abdf53753818daa006ab35147<BR>.data 0x6000 0x99c 0x1000 0.87 8986d0756ca0cfb6f7e3ced3d916be94<BR>.rsrc 0x7000 0x318 0x1000 3.52 782b22da29c09f173b564a18436f5217<BR><BR>( 1 imports ) <BR>> KERNEL32.dll: GetStdHandle, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetStartupInfoA, GetCommandLineA, GetVersion, ExitProcess, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, GetModuleFileNameA, FreeEnvironmentStringsA, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, FreeLibrary, GetFileType, HeapDestroy, HeapCreate, VirtualFree, HeapFree, RtlUnwind, WriteFile, GetCPInfo, GetACP, GetOEMCP, HeapAlloc, VirtualAlloc, HeapReAlloc, IsBadWritePtr, MultiByteToWideChar, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW<BR><BR>( 0 exports ) <BR></td></tr></table> | Der HTML-Code von rxqsak.dll der mit auf der Seite angezeigt wurde vieleicht kann von euch einer damit was anfangen | <table border="1"><tr><td colspan="4">Datei __rxqsak.dll._ empfangen 2008.08.06 09:17:11 (CET)</td></tr><tr><td>Antivirus</td><td>Version</td><td>letzte aktualisierung</td><td>Ergebnis</td</tr><tr><td>AhnLab-V3</td><td>2008.8.6.0</td><td>2008.08.06</td><td>-</td</tr><tr><td>AntiVir</td><td>7.8.1.15</td><td>2008.08.05</td><td style="color: red;">ADSPY/Virtumonde.AA9</td</tr><tr><td>Authentium</td><td>5.1.0.4</td><td>2008.08.05</td><td>-</td</tr><tr><td>Avast</td><td>4.8.1195.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>AVG</td><td>8.0.0.156</td><td>2008.08.06</td><td style="color: red;">Vundo.AE</td</tr><tr><td>BitDefender</td><td>7.2</td><td>2008.08.06</td><td>-</td</tr><tr><td>CAT-QuickHeal</td><td>9.50</td><td>2008.08.05</td><td style="color: red;">AdWare.SuperJuan.cat (Not a Virus)</td</tr><tr><td>ClamAV</td><td>0.93.1</td><td>2008.08.06</td><td>-</td</tr><tr><td>DrWeb</td><td>4.44.0.09170</td><td>2008.08.05</td><td>-</td</tr><tr><td>eSafe</td><td>7.0.17.0</td><td>2008.08.05</td><td style="color: red;">Suspicious File</td</tr><tr><td>eTrust-Vet</td><td>31.6.6013</td><td>2008.08.06</td><td>-</td</tr><tr><td>Ewido</td><td>4.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>F-Prot</td><td>4.4.4.56</td><td>2008.08.05</td><td>-</td</tr><tr><td>F-Secure</td><td>7.60.13501.0</td><td>2008.08.06</td><td style="color: red;">AdWare.Win32.SuperJuan.cat</td</tr><tr><td>Fortinet</td><td>3.14.0.0</td><td>2008.08.05</td><td style="color: red;">PossibleThreat</td</tr><tr><td>GData</td><td>2.0.7306.1023</td><td>2008.08.06</td><td>-</td</tr><tr><td>Ikarus</td><td>T3.1.1.34.0</td><td>2008.08.06</td><td style="color: red;">AdWare.Virtumonde.AA9</td</tr><tr><td>K7AntiVirus</td><td>7.10.404</td><td>2008.08.05</td><td>-</td</tr><tr><td>Kaspersky</td><td>7.0.0.125</td><td>2008.08.06</td><td style="color: red;">not-a-virus:AdWare.Win32.SuperJuan.cat</td</tr><tr><td>McAfee</td><td>5354</td><td>2008.08.05</td><td>-</td</tr><tr><td>Microsoft</td><td>1.3807</td><td>2008.08.06</td><td>-</td</tr><tr><td>NOD32v2</td><td>3331</td><td>2008.08.06</td><td>-</td</tr><tr><td>Norman</td><td>5.80.02</td><td>2008.08.05</td><td style="color: red;">W32/Virtumonde.YXT</td</tr><tr><td>Panda</td><td>9.0.0.4</td><td>2008.08.05</td><td style="color: red;">Suspicious file</td</tr><tr><td>PCTools</td><td>4.4.2.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>Prevx1</td><td>V2</td><td>2008.08.06</td><td style="color: red;">Cloaked Malware</td</tr><tr><td>Rising</td><td>20.56.20.00</td><td>2008.08.06</td><td>-</td</tr><tr><td>Sophos</td><td>4.31.0</td><td>2008.08.06</td><td>-</td</tr><tr><td>Sunbelt</td><td>3.1.1537.1</td><td>2008.08.06</td><td>-</td</tr><tr><td>Symantec</td><td>10</td><td>2008.08.06</td><td>-</td</tr><tr><td>TheHacker</td><td>6.2.96.393</td><td>2008.08.04</td><td>-</td</tr><tr><td>TrendMicro</td><td>8.700.0.1004</td><td>2008.08.06</td><td style="color: red;">PAK_Generic.001</td</tr><tr><td>VBA32</td><td>3.12.8.2</td><td>2008.08.05</td><td>-</td</tr><tr><td>ViRobot</td><td>2008.8.5.1324</td><td>2008.08.06</td><td>-</td</tr><tr><td>VirusBuster</td><td>4.5.11.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>Webwasher-Gateway</td><td>6.6.2</td><td>2008.08.06</td><td style="color: red;">Ad-Spyware.Virtumonde.AA9</td</tr><tr><td colspan="4"> </td></tr><tr><td colspan="4">weitere Informationen</td></tr><tr><td colspan="4">File size: 100864 bytes</td></tr><tr><td colspan="4">MD5...: b6e6269c589738d1683fa1072057f4b9</td></tr><tr><td colspan="4">SHA1..: 7b61ee56af60573366e6f535007804ca610a6082</td></tr><tr><td colspan="4">SHA256: fe1ef7dbce062e6542d17004c3c82905947fc930d374bf10ef61f3a5ce8b245b</td></tr><tr><td colspan="4">SHA512: e456828b465303fc2bacf23942c7af886b3e2dc38804f29c41f6673706ecbc41<BR>165d3cefa46d501b315d98be41cc6b8a12e678a54754ec1965396bf4c6a785fd</td></tr><tr><td colspan="4">PEiD..: -</td></tr><tr><td colspan="4">PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x10001000<BR>timedatestamp.....: 0x0 (Thu Jan 01 00:00:00 1970)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 3 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0x11417 0x11e00 7.99 be813de91d1f65b8b1019fe64999a629<BR>.rdata 0x13000 0xb41 0x400 4.47 c729fbf98d31ae3aa098010956341c20<BR>.data 0x14000 0x2a974 0x6400 7.90 fdb9b3572672937df8f9b6ace1c50d76<BR><BR>( 2 imports ) <BR>> user32.dll: CreatePopupMenu, DeleteMenu, EnableScrollBar, EndPaint, EqualRect, FillRect, GetCursor, GetDC, GetDlgItem, CreateIconFromResource, IsCharLowerA, LoadBitmapA, OemToCharBuffA, RegisterClassA, SetCursor, ShowCursor, ShowOwnedPopups, ShowScrollBar, CreateDesktopW, CopyRect, CharUpperA, CharToOemA, CharPrevA, CharNextA, GetFocus, ChangeMenuA<BR>> KERNEL32.dll: lstrcpynA, lstrcmpA, SetEndOfFile, SetCurrentDirectoryA, GetDateFormatA, ExitProcess, lstrlenA<BR><BR>( 0 exports ) <BR></td></tr><tr><td colspan="4">ThreatExpert info: http://www.threatexpert.com/report.aspx?md5=b6e6269c589738d1683fa1072057f4b9</td></tr><tr><td colspan="4">Prevx info: http://info.prevx.com/aboutprogramtext.asp?PX5=8FB301CE00A2C50D8A7A01EBF1C5C100B092F6FD</td></tr></table> | Der HTML-Code von wtglashv.dll der mit auf der Seite angezeigt wurde vieleicht kann von euch einer damit was anfangen | <table border="1"><tr><td colspan="4">Datei __wtglashv.dll.__ empfangen 2008.08.05 12:55:21 (CET)</td></tr><tr><td>Antivirus</td><td>Version</td><td>letzte aktualisierung</td><td>Ergebnis</td</tr><tr><td>AhnLab-V3</td><td>2008.8.5.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>AntiVir</td><td>7.8.1.15</td><td>2008.08.05</td><td style="color: red;">ADSPY/Virtumonde.AA9</td</tr><tr><td>Authentium</td><td>5.1.0.4</td><td>2008.08.04</td><td>-</td</tr><tr><td>Avast</td><td>4.8.1195.0</td><td>2008.08.05</td><td style="color: red;">Win32:Trojan-gen {Other}</td</tr><tr><td>AVG</td><td>8.0.0.156</td><td>2008.08.05</td><td style="color: red;">Vundo.AE</td</tr><tr><td>BitDefender</td><td>7.2</td><td>2008.08.05</td><td>-</td</tr><tr><td>CAT-QuickHeal</td><td>9.50</td><td>2008.08.04</td><td>-</td</tr><tr><td>ClamAV</td><td>0.93.1</td><td>2008.08.05</td><td>-</td</tr><tr><td>DrWeb</td><td>4.44.0.09170</td><td>2008.08.05</td><td style="color: red;">Trojan.Virtumod.450</td</tr><tr><td>eSafe</td><td>7.0.17.0</td><td>2008.08.05</td><td style="color: red;">Suspicious File</td</tr><tr><td>eTrust-Vet</td><td>31.6.6009</td><td>2008.08.05</td><td>-</td</tr><tr><td>Ewido</td><td>4.0</td><td>2008.08.04</td><td>-</td</tr><tr><td>F-Prot</td><td>4.4.4.56</td><td>2008.08.04</td><td>-</td</tr><tr><td>F-Secure</td><td>7.60.13501.0</td><td>2008.08.05</td><td style="color: red;">Trojan.Win32.Monder.cmm</td</tr><tr><td>Fortinet</td><td>3.14.0.0</td><td>2008.08.04</td><td style="color: red;">W32/Monder.CMM!tr</td</tr><tr><td>GData</td><td>2.0.7306.1023</td><td>2008.08.05</td><td style="color: red;">Trojan.Win32.Monder.cmm</td</tr><tr><td>Ikarus</td><td>T3.1.1.34.0</td><td>2008.08.05</td><td style="color: red;">Virus.Trojan.Win32.Monder.cmm</td</tr><tr><td>K7AntiVirus</td><td>7.10.403</td><td>2008.08.04</td><td>-</td</tr><tr><td>Kaspersky</td><td>7.0.0.125</td><td>2008.08.05</td><td style="color: red;">Trojan.Win32.Monder.cmm</td</tr><tr><td>McAfee</td><td>5353</td><td>2008.08.04</td><td>-</td</tr><tr><td>Microsoft</td><td>1.3807</td><td>2008.08.05</td><td>-</td</tr><tr><td>NOD32v2</td><td>3327</td><td>2008.08.05</td><td>-</td</tr><tr><td>Norman</td><td>5.80.02</td><td>2008.08.05</td><td style="color: red;">W32/Virtumonde.YXU</td</tr><tr><td>Panda</td><td>9.0.0.4</td><td>2008.08.04</td><td style="color: red;">Suspicious file</td</tr><tr><td>PCTools</td><td>4.4.2.0</td><td>2008.08.04</td><td>-</td</tr><tr><td>Rising</td><td>20.56.12.00</td><td>2008.08.05</td><td>-</td</tr><tr><td>Sophos</td><td>4.31.0</td><td>2008.08.05</td><td>-</td</tr><tr><td>Sunbelt</td><td>3.1.1537.1</td><td>2008.08.01</td><td>-</td</tr><tr><td>Symantec</td><td>10</td><td>2008.08.05</td><td>-</td</tr><tr><td>TheHacker</td><td>6.2.96.393</td><td>2008.08.04</td><td>-</td</tr><tr><td>TrendMicro</td><td>8.700.0.1004</td><td>2008.08.05</td><td style="color: red;">PAK_Generic.001</td</tr><tr><td>VBA32</td><td>3.12.8.2</td><td>2008.08.04</td><td>-</td</tr><tr><td>ViRobot</td><td>2008.8.5.1324</td><td>2008.08.05</td><td>-</td</tr><tr><td>VirusBuster</td><td>4.5.11.0</td><td>2008.08.04</td><td>-</td</tr><tr><td>Webwasher-Gateway</td><td>6.6.2</td><td>2008.08.05</td><td style="color: red;">Ad-Spyware.Virtumonde.AA9</td</tr><tr><td colspan="4"> </td></tr><tr><td colspan="4">weitere Informationen</td></tr><tr><td colspan="4">File size: 90624 bytes</td></tr><tr><td colspan="4">MD5...: f2031621b924048f8cb5e0ec00b591fb</td></tr><tr><td colspan="4">SHA1..: edbb5ec444139789e082a9ffa87767bde79e8ddd</td></tr><tr><td colspan="4">SHA256: db393c72d1d249f379d68fd623401cfed62ae5bc45c5dd8a3d4c3d6ce8b896b7</td></tr><tr><td colspan="4">SHA512: 9273dd699568b4964ccc9ae61959b506ac3f7da2bb5f9f97e3e9eb99b2894d21<BR>ddb3eb8b78e87db417123381ae825091a4a6a0db8089537a9434628bc600718f</td></tr><tr><td colspan="4">PEiD..: -</td></tr><tr><td colspan="4">PEInfo: PE Structure information<BR><BR>( base data )<BR>entrypointaddress.: 0x10001000<BR>timedatestamp.....: 0x0 (Thu Jan 01 00:00:00 1970)<BR>machinetype.......: 0x14c (I386)<BR><BR>( 3 sections )<BR>name viradd virsiz rawdsiz ntrpy md5<BR>.text 0x1000 0xd534 0xe000 7.99 28b12526a25c995e1f257df327045ddc<BR>.rdata 0xf000 0x455 0x400 3.06 f6d24263bb59f59a3980a43cbfae6c44<BR>.data 0x10000 0x1fab6 0x7a00 7.91 8e22127fe2ec928156dbd73ed1681f65<BR><BR>( 2 imports ) <BR>> user32.dll: EmptyClipboard, EndMenu, EndPaint, FillRect, GetFocus, LoadCursorA, DeleteMenu, MessageBoxIndirectA, OffsetRect, SetCursor, SetMenuInfo, ShowCaret, CharUpperBuffA, CharLowerA, ChangeMenuA, LoadImageA, wsprintfA<BR>> KERNEL32.dll: OpenFileMappingA, FlushFileBuffers, EnumResourceTypesA, lstrcmpA<BR><BR>( 0 exports ) <BR></td></tr><tr><td colspan="4">ThreatExpert info: http://www.threatexpert.com/report.aspx?md5=f2031621b924048f8cb5e0ec00b591fb</td></tr><tr><td colspan="4">packers (F-Prot): embedded</td></tr></table> |
|