Wie kann ich den Trojaner vbsys2.dll löschen ? |
||
---|---|---|
#0
| ||
02.11.2005, 22:42
Ehrenmitglied
Beiträge: 29434 |
||
|
||
02.11.2005, 22:47
Member
Beiträge: 33 |
#92
2005-11-02, 22:24:45, Auto-clean mode specified.
2005-11-02, 22:24:45, Running scanner "c:\AV-CLS\Trend\TSC.BIN"... 2005-11-02, 22:26:23, Scanner "c:\AV-CLS\Trend\TSC.BIN" has finished running. 2005-11-02, 22:26:23, TSC Log: Damage Cleanup Engine (DCE) 3.9(Build 1020) Windows XP(Build 2600: ) Start time : Mi Nov 02 2005 22:24:48 Load Damage Cleanup Template (DCT) "c:\AV-CLS\Trend\tsc.ptn" (version 672) [success] Complete time : Mi Nov 02 2005 22:26:23 Execute pattern count(4504), Virus found count(0), Virus clean count(0), Clean failed count(0) 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\LocalService\NTUSER.DAT": Zugriff verweigert 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\LocalService\ntuser.dat.LOG": Zugriff verweigert 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows\UsrClass.dat": Zugriff verweigert 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows\UsrClass.dat.LOG": Zugriff verweigert 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\NetworkService\NTUSER.DAT": Zugriff verweigert 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\NetworkService\ntuser.dat.LOG": Zugriff verweigert 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\NetworkService\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows\UsrClass.dat": Zugriff verweigert 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\NetworkService\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows\UsrClass.dat.LOG": Zugriff verweigert 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\Sylvia\NTUSER.DAT": Zugriff verweigert 2005-11-02, 22:27:04, An error occurred while scanning file "C:\Dokumente und Einstellungen\Sylvia\ntuser.dat.LOG": Zugriff verweigert 2005-11-02, 22:44:20, Operation was aborted. |
|
|
||
02.11.2005, 22:49
Ehrenmitglied
Beiträge: 29434 |
||
|
||
02.11.2005, 22:59
Member
Beiträge: 33 |
#94
ich bin dabei, aber es sieht nicht gut aus...jede Menge...file could not be opened...bin sehr gespannt, was da noch so alles rauskommt.
|
|
|
||
02.11.2005, 23:02
Ehrenmitglied
Beiträge: 29434 |
#95
Zitat tipse postetedas ist normal und hat nichts mit viren zu tun __________ MfG Sabina rund um die PC-Sicherheit |
|
|
||
02.11.2005, 23:07
Member
Beiträge: 33 |
#96
Options:
"C:\WINDOWS\SYSTEM32" /UNZIP /WINMEM /SUB /ANALYZE /PANALYZE /STREAMS /CLEAN /ALL /DEL /PROGRAM /MIME /HTML "C:\AV-CLS\MCAFEE\SCANREPORT.HTML" Scanning C: [Festplatte] C:\WINDOWS\SYSTEM32\CSUNINST.EXE ... Found potentially unwanted program Adware-Cometsys. The file or process has been deleted. C:\WINDOWS\SYSTEM32\TFTP1452 ... Found the W32/Sdbot.worm.gen virus !!! The file or process has been deleted. Scanning C:\WINDOWS\SYSTEM32\*.* Summary report on C:\WINDOWS\SYSTEM32\*.* File(s) Total files: ........... 8819 Clean: ................. 8808 Possibly Infected: ..... 1 Cleaned: ............... 0 Deleted: ............... 2 Non-critical Error(s): 1 Time: 00:13.48 -------------------------------------------------------------------------------- Visit the McAfee Online Web Site Need some help or advice? Send email to Technical Support. |
|
|
||
02.11.2005, 23:12
Ehrenmitglied
Beiträge: 29434 |
#97
loesche:--> falls es noch da ist...... The file or process has been deleted....ueberpruefe es also.....
C:\WINDOWS\SYSTEM32\CSUNINST.EXE C:\WINDOWS\SYSTEM32\TFTP1452 dann scanne noch mal __________ MfG Sabina rund um die PC-Sicherheit |
|
|
||
02.11.2005, 23:40
Member
Beiträge: 33 |
#98
Options:
"C:\WINDOWS" /UNZIP /WINMEM /SUB /ANALYZE /PANALYZE /STREAMS /CLEAN /ALL /DEL /PROGRAM /MIME /HTML "C:\AV-CLS\MCAFEE\SCANREPORT.HTML" Scanning C: [Festplatte] Scanning C:\WINDOWS\*.* C:\WINDOWS\Downloaded Program Files\MirarSetup.exe ... Found potentially unwanted program Adware-SaveNow. The file or process has been deleted. C:\WINDOWS\Downloaded Program Files\YSBactivex.inf ... Found potentially unwanted program Adware-ISTBar. The file or process has been deleted. Summary report on C:\WINDOWS\*.* File(s) Total files: ........... 27587 Clean: ................. 27577 Possibly Infected: ..... 0 Cleaned: ............... 0 Deleted: ............... 2 Non-critical Error(s): 1 so, Schluss für heute... lieben Gruß |
|
|
||
02.11.2005, 23:46
Ehrenmitglied
Beiträge: 29434 |
#99
fein es kommt ja immer noch was dazu
scanne noch mal __________ MfG Sabina rund um die PC-Sicherheit |
|
|
||
03.11.2005, 07:15
Member
Beiträge: 33 |
#100
guten morgen, ja ich kann das ganze noch einmal laufen lassen.
gruß sylvia |
|
|
||
03.11.2005, 15:17
...neu hier
Beiträge: 7 |
#101
Hey Sabina! Hab alles wie beschrieben ausgeführt!
http://www.virustotal.com/flash/index_en.html ging bei mir jedoch nicht, entweder waren die dateien nicht mehr vorhanden, zu groß oder die Mail kam nicht an! ----------------------------------------------- Hier der Bericht von http://www.virustotal.com/flash/index_en.html : all.exe : Not detected by sandbox (Signature: W32/DLoader.GNN) C:\WINDOWS\s&f_UnIn.exe : something went wrong C:\cmd.hta C:\WINDOWS\System32\desktop.exe C:\WINDOWS\System32\msmsgs.exe c:\windows\system32\sysdxvid.exe C:\WINDOWS\System32\winlogon32.exe --> bei allen 5: The sandbox only run Windows 32-bit executable code. We try to decompress most archives and use a list of passwords (norman,infected,virus etc). If you are certain you submitted something containing binary code (Windows executables) try to repack the file with one of the passwords given and resend it. msgr7de.exe : Not detected by sandbox (Signature: NO_VIRUS) ---------------------------------------------- Bei HijackThis, CCleaner und KILLBOX hat alles geklappt Conterspy Spyware Scan Details Start Date: 01.11.2005 21:15:58 End Date: 01.11.2005 22:38:15 Total Time: 1 hrs 22 mins 17 secs Detected spyware Trojan.Downloader.Dluca.R Trojan Downloader more information... Details: Trojan.Downloader.Dluca.R is a downloading trojan and browser modifier. Status: Deleted Infected files detected c:\windows\system32\glwjmgeb.exe Accoona.Toolbar Toolbar more information... Details: The Accoona Toolbar is a Internet Explorer toolbar that is bundled and installed with other programs. Status: Deleted Infected files detected c:\programme\accoona\atoolbar.dll c:\programme\accoona\icon-a.ico c:\programme\accoona\showbar.exe C:\PROGRAM FILES\Accoona\quiesce.exe Infected registry entries detected HKEY_LOCAL_MACHINE\SOFTWARE\Accoona HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar\Components 1 {A12ACBAD-7775-486D-8732-8AE4BAD9AFA4} HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Application Path C:\PROGRA~1\Accoona HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Auto Complete HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Auto Update HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Birth Date HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Business Search Collection String col=BC& HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Business Search Tracking ID1 &utm_id=400005&utm_content=biz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Business Search Tracking ID2 &utm_source=wdz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Business Search Tracking ID3 &utm_medium=bund HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Business Search Tracking ID4 &utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Business Search URL http://www.accoona.com/search.jsp? HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Chess Link URL http://www.accoonachess.com HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar CommServer Tracking ID1 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar CommServer Tracking ID2 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar CommServer Tracking ID3 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar CommServer Tracking ID4 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar CommServer URL http://www.accoona.com/soap HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Company Name Search Tracking ID1 &utm_id=400005&utm_content=biz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Company Name Search Tracking ID2 &utm_source=wdz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Company Name Search Tracking ID3 &utm_medium=bund HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Company Name Search Tracking ID4 &utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Company Name Search URL http://www.accoona.com/company? HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Content Type text/xml HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Contact URL http://www.accoona.com/toolbar/toolbar_contact_us.jsp HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Country ID -193 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Desktop Search Version HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Distribution ID -145802430542808177431244920 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Download Tracking ID1 &utm_id=400005 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Download Tracking ID2 &utm_source=wdz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Download Tracking ID3 &utm_medium=bund HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Download Tracking ID4 &utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar DT Search Install URL http://www.accoona.com/desktop_search/desktop_search_installation.jsp HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar First Launch HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar First Search HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar General Urchin Code &utm_id=400005&utm_source=wdz&utm_medium=bund&utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Headline XML URL http://www.accoona.com/newsfeed/headline.xml HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Help Tracking ID1 &utm_id=400005 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Help Tracking ID2 &utm_source=wdz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Help Tracking ID3 &utm_medium=bund HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Help Tracking ID4 &utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Help URL http://www.accoona.com/toolbar/toolbar_help.jsp HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Home URL http://www.accoona.com HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Install Package Number 0.9.0.4 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar InstallPath C:\Programme\Accoona HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Language ID en HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar New Release HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Headline Update Rate -5 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Headlines Collection String col=NC& HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Home Tracking ID1 &utm_id=400005 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Home Tracking ID2 &utm_source=wdz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Home Tracking ID3 &utm_medium=bund HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Home Tracking ID4 &utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Home URL http://www.accoona.com/newsclick? HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Search Collection String col=MC& HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Search Tracking ID1 &utm_id=400005&utm_content=news HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Search Tracking ID2 &utm_source=wdz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Search Tracking ID3 &utm_medium=bund HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Search Tracking ID4 &utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar News Search URL http://www.accoona.com/search.jsp? HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar OTC Code HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Package ID 400005 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Popup Blocker Enabled HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Postal Code HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Scroll Speed -50 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Search History HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Show News HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Soap Action Tracking ID1 &utm_id=400005 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Soap Action Tracking ID2 &utm_source=wdz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Soap Action Tracking ID3 &utm_medium=bund HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Soap Action Tracking ID4 &utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Soap Action URL http://www.accoona.com/soap HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Terms Tracking ID1 &utm_id=400005 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Terms Tracking ID2 &utm_source=wdz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Terms Tracking ID3 &utm_medium=bund HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Terms Tracking ID4 &utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Terms URL http://www.accoona.com/legal/terms_and_conditions.jsp HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Toolbar Install URL http://www.accoona.com/toolbar/toolbar_installation.jsp HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Toolbar Version Number 1.0.0.1 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Update Stamp 11/01/2005 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Updates Rate 1 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar UTF utf-8 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Web Search Collection String col=WC& HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Web Search Tracking ID1 &utm_id=400005&utm_content=web HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Web Search Tracking ID2 &utm_source=wdz HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Web Search Tracking ID3 &utm_medium=bund HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Web Search Tracking ID4 &utm_campaign=wdz0605 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Web Search URL http://www.accoona.com/search.jsp? HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar XMLNS http://search.accoona.com HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar XMLNS http://search.accoona.com HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Web Search URL http://www.accoona.com/search.jsp? HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar UTF utf-8 HKEY_LOCAL_MACHINE\SOFTWARE\Accoona\Toolbar Updates Rate 1 Adw.Afriz.Downloader Browser Hijacker more information... Details: Adw.Afriz.Downloader silently travels to porn sites without displaying IE. Status: Deleted Infected files detected c:\all.exe Mirar Toolbar more information... Details: Mirar is actually adware that monitors the surfing activity of its users. It sends details of website visits to its home server so that targeted advertising can be returned to the user's PC. Status: Deleted Infected files detected C:\WINDOWS\Downloaded Program Files\CONFLICT.10\MirarSetup.exe C:\WINDOWS\Downloaded Program Files\CONFLICT.11\MirarSetup.exe C:\WINDOWS\Downloaded Program Files\CONFLICT.2\MirarSetup.exe C:\WINDOWS\Downloaded Program Files\CONFLICT.3\MirarSetup.exe C:\WINDOWS\Downloaded Program Files\CONFLICT.4\MirarSetup.exe C:\WINDOWS\Downloaded Program Files\CONFLICT.5\MirarSetup.exe C:\WINDOWS\Downloaded Program Files\CONFLICT.6\MirarSetup.exe C:\WINDOWS\Downloaded Program Files\CONFLICT.7\MirarSetup.exe C:\WINDOWS\Downloaded Program Files\CONFLICT.8\MirarSetup.exe C:\WINDOWS\Downloaded Program Files\CONFLICT.9\MirarSetup.exe Infected registry entries detected HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs C:\WINDOWS\Downloaded Program Files\MirarSetup.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/MirarSetup.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/MirarSetup.exe .Owner {43331111-1111-1111-1111-611111195622} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/MirarSetup.exe {43331111-1111-1111-1111-611111195622} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/MirarSetup.exe HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/MirarSetup.exe .Owner {43331111-1111-1111-1111-611111195622} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ModuleUsage\C:/WINDOWS/Downloaded Program Files/MirarSetup.exe {43331111-1111-1111-1111-611111195622} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs C:\WINDOWS\Downloaded Program Files\MirarSetup.exe iOpus STARR Commercial Key Logger more information... Details: STARR allows companies and individuals to track the use of PCs easily and invisibly. It logs keystrokes, user names, passwords, path names, access times, windows titles, both sides of a chat conversation for most popular chat software, AOL content and vis Status: Deleted Infected files detected D:\MAGIX\Fotos_auf_CD_DVD_35_dlx\ZIPDLL.DLL D:\MAGIX\Media_Manager_2004\ZIPDLL.DLL Advertising.com Cookie more information... Status: Deleted Infected cookies detected c:\dokumente und einstellungen\laura h\cookies\laura h@advertising[1].txt c:\dokumente und einstellungen\laura h\cookies\laura h@servedby.advertising[2].txt Radar Spy 1.0 Cookie more information... Status: Deleted Infected cookies detected c:\dokumente und einstellungen\laura h\cookies\laura h@tradedoubler[2].txt Kaspersky ------------------------------------------------------------------------------- KASPERSKY ON-LINE SCANNER REPORT Wednesday, November 02, 2005 15:59:30 Operating System: Microsoft Windows XP Home Edition, (Build 2600) Kaspersky On-line Scanner version: 5.0.67.0 Kaspersky Anti-Virus database last update: 2/11/2005 Kaspersky Anti-Virus database records: 148217 ------------------------------------------------------------------------------- Scan Settings: Scan using the following antivirus database: standard Scan Archives: true Scan Mail Bases: true Scan Target - Critical Areas: C:\WINDOWS C:\DOKUME~1\LAURAH~1\LOKALE~1\Temp\ Scan Statistics: Total number of scanned objects: 10048 Number of viruses found: 1 Number of infected objects: 2 Number of suspicious objects: 0 Duration of the scan process: 899 sec Infected Object Name - Virus Name C:\WINDOWS\system32\ijnpwzpd.exe Infected: Trojan-Downloader.Win32.Dluca.gen C:\WINDOWS\system32\lqluison.exe Infected: Trojan-Downloader.Win32.Dluca.gen Scan process completed. ------------------------------------------------ So das wars LG Laura |
|
|
||
03.11.2005, 17:47
Member
Beiträge: 33 |
#102
Hallo Sabina, ich habe alles noch einmal ausgeführt und anschließend den Norton auch drüber laufen lassen. Ergebnis: nichts gefunden!! Klasse.
Vielen Dank für deine geduldige Hilfe, ich bin sicher, ich werde sie noch öfter in Anspruch nehmen müssen. Kann man sich eigentlich gegen diese Einschleicher noch besser schützen? lieben Gruß sylvia |
|
|
||
04.11.2005, 00:51
Ehrenmitglied
Beiträge: 29434 |
#103
nienna
loesche mit der Killbox: C:\WINDOWS\system32\ijnpwzpd.exe C:\WINDOWS\system32\lqluison.exe wende die scanner an und poste mir die Scanreports http://virus-protect.org/multiavtool.html __________ MfG Sabina rund um die PC-Sicherheit |
|
|
||
04.11.2005, 00:54
Ehrenmitglied
Beiträge: 29434 |
#104
tipse
der beste Schutz sind die WindowsUpdates, aufpassen , was man laedt, wenn man ploetzlich dazu aufgefordert wird+ und auch die sogenannten free-Programme, die oft Spyware enthalten, bestimmte Seiten meiden.... + Eingeschränktes Benutzerkonto/ http://virus-protect.org/administrator.html __________ MfG Sabina rund um die PC-Sicherheit |
|
|
||
04.11.2005, 07:26
Member
Beiträge: 33 |
#105
Guten morgen Sabina,
danke für die Hinweise, aber die Windows Updates funktionieren bei mir komischerweise nicht. Aber ich halte die Augen auf! Schönen Tag! lg. |
|
|
||
__________
MfG Sabina
rund um die PC-Sicherheit