| john.doe |  16.07.2009 18:34 |        Habe den Link bekommen. Wenn man da draufklickt wird man auf eine Seite weitergeleitet. Das Klicken auf den Link ist  nicht gefährlich. Auf der Seite steht  Welcome to MSN PHOTOS V4 
We're sorry, your computer does not have ActiveX Photo Viewer! 
To view this image you must download  
ActiveX Photo Viewer. To download Click Here! 
Erst wenn du auf der Seite auf etwas klickst, dann wird ein Programm heruntergeladen oder gestartet. Hast du das getan? Oder hast du nur auf den ersten Link geklickt?  
ciao, andreas  
Edit: Du musst CCleaner nicht laden. Wenn du die Windowsdatenträgerbereinigung benutzt, geht das auch.  
Das Teil ist relativ neu:  Code:  
 Datei IMG009945-4-PHOTOBUCKET.exe empfangen 2009.07.16 17:39:24 (UTC) 
Status:    Beendet  
Ergebnis: 9/40 (22.5%)  
 Filter  
Drucken der Ergebnisse  Antivirus        Version        letzte aktualisierung        Ergebnis 
a-squared        4.5.0.24        2009.07.16        Trojan-Spy.Win32.Flux!IK 
AhnLab-V3        5.0.0.2        2009.07.16        - 
AntiVir        7.9.0.220        2009.07.16        - 
Antiy-AVL        2.0.3.7        2009.07.16        - 
Authentium        5.1.2.4        2009.07.16        W32/Heuristic-THX!Eldorado 
Avast        4.8.1335.0        2009.07.16        - 
AVG        8.5.0.387        2009.07.16        - 
BitDefender        7.2        2009.07.16        MemScan:Trojan.Loader.AZ 
CAT-QuickHeal        10.00        2009.07.16        - 
ClamAV        0.94.1        2009.07.16        - 
Comodo        1672        2009.07.16        - 
DrWeb        5.0.0.12182        2009.07.16        - 
eSafe        7.0.17.0        2009.07.16        - 
eTrust-Vet        31.6.6617        2009.07.15        - 
F-Prot        4.4.4.56        2009.07.16        W32/Heuristic-THX!Eldorado 
Fortinet        3.120.0.0        2009.07.16        - 
GData        19        2009.07.16        MemScan:Trojan.Loader.AZ 
Ikarus        T3.1.1.64.0        2009.07.16        Trojan-Spy.Win32.Flux 
Jiangmin        11.0.800        2009.07.16        TrojanDropper.VB.eso 
K7AntiVirus        7.10.794        2009.07.16        - 
Kaspersky        7.0.0.125        2009.07.16        - 
McAfee        5678        2009.07.16        - 
McAfee+Artemis        5678        2009.07.16        - 
McAfee-GW-Edition        6.8.5        2009.07.16        Heuristic.LooksLike.Win32.Suspicious.J 
Microsoft        1.4803        2009.07.16        VirTool:Win32/VBInject.gen!Q 
NOD32        4250        2009.07.16        - 
Norman        6.01.09        2009.07.16        - 
nProtect        2009.1.8.0        2009.07.16        - 
Panda        10.0.0.14        2009.07.16        - 
PCTools        4.4.2.0        2009.07.16        - 
Prevx        3.0        2009.07.16        - 
Rising        21.38.34.00        2009.07.16        - 
Sophos        4.43.0        2009.07.16        - 
Sunbelt        3.2.1858.2        2009.07.16        - 
Symantec        1.4.4.12        2009.07.16        - 
TheHacker        6.3.4.3.368        2009.07.15        - 
TrendMicro        8.950.0.1094        2009.07.16        - 
VBA32        3.12.10.8        2009.07.15        - 
ViRobot        2009.7.16.1839        2009.07.16        - 
VirusBuster        4.6.5.0        2009.07.16        - 
weitere Informationen 
File size: 498176 bytes 
MD5...: 2d7d7afbd68f7b1d76327cc61c8efdd1 
SHA1..: db5b828ac03218ef1277954ab211d0d40180f567 
SHA256: 2ae4a5e82643c876ff9153e651b8f7a17845c69fae25e4c671bf9ff3983238e8 
ssdeep: 12288:jkfkgUZr6+7xPUMhPh9+JWniNoerz0lRek2ovX/sRp:lZr6wPU8WJ1NokG 
e2 
PEiD..: - 
TrID..: File type identification 
Win64 Executable Generic (59.6%) 
Win32 Executable MS Visual C++ (generic) (26.2%) 
Win32 Executable Generic (5.9%) 
Win32 Dynamic Link Library (generic) (5.2%) 
Generic Win/DOS Executable (1.3%) 
PEInfo: PE Structure information   
( base data ) 
entrypointaddress.: 0x6b20 
timedatestamp.....: 0x47918ef1 (Sat Jan 19 05:47:29 2008) 
machinetype.......: 0x14c (I386)   
( 4 sections ) 
name viradd virsiz rawdsiz ntrpy md5 
.text 0x1000 0xa9e0 0xaa00 6.57 9ee0e124f68a3a1c8fa64ad51ff9fa45 
.data 0xc000 0x2260 0x600 6.60 f3764284f4d25ed35f75b9c16e1ab608 
.rsrc 0xf000 0x6e000 0x6d800 7.94 c2f869b3d33b2347e70f4d3caceba72f 
.reloc 0x7d000 0xcd0 0xe00 4.82 6ecf5ec5c89c4b613322d7793c0bd979   
( 7 imports )  
> ADVAPI32.dll: FreeSid, AllocateAndInitializeSid, EqualSid, GetTokenInformation, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueA, RegCloseKey, RegDeleteValueA, RegOpenKeyExA, RegQueryValueExA, RegQueryInfoKeyA, RegSetValueExA, RegCreateKeyExA 
> KERNEL32.dll: LocalFree, LocalAlloc, GetLastError, GetCurrentProcess, lstrlenA, _lclose, _llseek, _lopen, WritePrivateProfileStringA, GetWindowsDirectoryA, CreateDirectoryA, GetFileAttributesA, GetModuleFileNameA, GetSystemDirectoryA, RemoveDirectoryA, FindClose, FindNextFileA, DeleteFileA, SetFileAttributesA, lstrcmpA, FindFirstFileA, ExpandEnvironmentStringsA, GlobalFree, GlobalUnlock, GlobalLock, GlobalAlloc, IsDBCSLeadByte, GetShortPathNameA, GetPrivateProfileStringA, GetPrivateProfileIntA, CompareStringA, GetVersion, GetModuleHandleW, FreeResource, LockResource, LoadResource, SizeofResource, CloseHandle, ReadFile, WriteFile, SetFilePointer, SetFileTime, LocalFileTimeToFileTime, DosDateTimeToFileTime, CreateFileA, SetCurrentDirectoryA, GetTempFileNameA, GetVolumeInformationA, FormatMessageA, GetCurrentDirectoryA, ExitProcess, LoadLibraryExA, GetVersionExA, GetExitCodeProcess, GetProcAddress, CreateProcessA, GetTempPathA, GetSystemInfo, CreateMutexA, SetEvent, CreateEventA, CreateThread, ResetEvent, TerminateThread, GetDriveTypeA, FindResourceA, LoadLibraryA, FreeLibrary, InterlockedExchange, Sleep, InterlockedCompareExchange, GetStartupInfoA, RtlUnwind, SetUnhandledExceptionFilter, GetModuleHandleA, QueryPerformanceCounter, GetTickCount, GetCurrentThreadId, GetCurrentProcessId, GetSystemTimeAsFileTime, TerminateProcess, UnhandledExceptionFilter, EnumResourceLanguagesA, MulDiv, GetDiskFreeSpaceA, WaitForSingleObject 
> GDI32.dll: GetDeviceCaps 
> USER32.dll: SendDlgItemMessageA, GetDlgItem, SetForegroundWindow, SetWindowTextA, MessageBoxA, DialogBoxIndirectParamA, ShowWindow, EnableWindow, GetDlgItemTextA, GetDC, ReleaseDC, SetWindowPos, SendMessageA, PeekMessageA, MsgWaitForMultipleObjects, DispatchMessageA, CallWindowProcA, GetWindowLongA, SetWindowLongA, CharPrevA, CharUpperA, CharNextA, ExitWindowsEx, EndDialog, GetDesktopWindow, LoadStringA, SetDlgItemTextA, MessageBeep, GetWindowRect, GetSystemMetrics 
> msvcrt.dll: _cexit, _exit, _XcptFilter, _ismbblead, exit, _acmdln, _initterm, _amsg_exit, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _terminate@@YAXXZ, _controlfp, __getmainargs, memcpy, memset, _vsnprintf 
> COMCTL32.dll: - 
> VERSION.dll: GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA   
( 0 exports )  
PDFiD.: - 
RDS...: NSRL Reference Data Set 
- 
packers (F-Prot): CAB, Themida 
packers (Authentium): CAB, Themida      |