ciao
devo aver preso un virsu o qualcosa del genere aprendo un programmino da p2p...
prima non riuscivo neache a vedere Task Manager (mi diceva bloccato da amministratore)
poi ho fatto girare un po' di software e adesso almeno quello si vede
vi posto i log di alcuni programmi, penso vi siano utili per capire cosa fare.
Grazie dell'aiuto
----------------------
SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 02/21/2009 at 02:33 PM
Application Version : 4.25.1012
Core Rules Database Version : 3768
Trace Rules Database Version: 1728
Scan type : Quick Scan
Total Scan Time : 00:06:29
Memory items scanned : 411
Memory threats detected : 0
Registry items scanned : 432
Registry threats detected : 0
File items scanned : 6989
File threats detected : 46
Adware.Tracking Cookie
C:\Documents and Settings\casa\Cookies\casa@admanager.trackset[1].txt
C:\Documents and Settings\casa\Cookies\casa@ad.zanox[2].txt
C:\Documents and Settings\casa\Cookies\casa@cgm.adbureau[1].txt
C:\Documents and Settings\casa\Cookies\casa@www.mediaworld[1].txt
C:\Documents and Settings\casa\Cookies\casa@server.cpmstar[1].txt
C:\Documents and Settings\casa\Cookies\casa@arcus.adbureau[2].txt
C:\Documents and Settings\casa\Cookies\casa@tracker.shop[1].txt
C:\Documents and Settings\casa\Cookies\casa@adv.virgilio[1].txt
C:\Documents and Settings\casa\Cookies\casa@trvlnet.adbureau[1].txt
C:\Documents and Settings\casa\Cookies\casa@adrevolver[3].txt
C:\Documents and Settings\casa\Cookies\casa@apmebf[1].txt
C:\Documents and Settings\casa\Cookies\casa@ehg-jigsaw.hitbox[1].txt
C:\Documents and Settings\casa\Cookies\casa@www.burstbeacon[2].txt
C:\Documents and Settings\casa\Cookies\casa@www.burstnet[2].txt
C:\Documents and Settings\casa\Cookies\casa@stat.onestat[2].txt
C:\Documents and Settings\casa\Cookies\casa@media.intelia[1].txt
C:\Documents and Settings\casa\Cookies\casa@www.comprabanner[1].txt
C:\Documents and Settings\casa\Cookies\casa@eas.apm.emediate[2].txt
C:\Documents and Settings\casa\Cookies\casa@tripod.lycos[1].txt
C:\Documents and Settings\casa\Cookies\casa@ads.tripod.lycos.co[2].txt
C:\Documents and Settings\casa\Cookies\casa@stats.adbrite[1].txt
C:\Documents and Settings\casa\Cookies\casa@ads.bitage[2].txt
C:\Documents and Settings\casa\Cookies\casa@content.yieldmanager[1].txt
C:\Documents and Settings\casa\Cookies\casa@dynamic.media.adrevolve r[1].txt
C:\Documents and Settings\casa\Cookies\casa@compraonline.mediaworld[1].txt
C:\Documents and Settings\casa\Cookies\casa@adlegend[1].txt
C:\Documents and Settings\casa\Cookies\casa@sonyeurope.112.2o7[1].txt
C:\Documents and Settings\casa\Cookies\casa@adv.freeonline[2].txt
C:\Documents and Settings\casa\Cookies\casa@ads.tripod.lycos[1].txt
C:\Documents and Settings\casa\Cookies\casa@adserver.aol[1].txt
C:\Documents and Settings\casa\Cookies\casa@adv.alice[1].txt
C:\Documents and Settings\casa\Cookies\casa@gjacket.adbureau[2].txt
C:\Documents and Settings\casa\Cookies\casa@ads.gamesbannernet[1].txt
C:\Documents and Settings\casa\Cookies\casa@server.iad.liveperson[2].txt
C:\Documents and Settings\casa\Cookies\casa@invitemedia[1].txt
C:\Documents and Settings\casa\Cookies\casa@ads.lunaweb[1].txt
C:\Documents and Settings\casa\Cookies\casa@adv.adpartner[1].txt
C:\Documents and Settings\casa\Cookies\casa@bravenet[1].txt
C:\Documents and Settings\casa\Cookies\casa@kontera[2].txt
C:\Documents and Settings\casa\Cookies\casa@toplist[1].txt
C:\Documents and Settings\casa\Cookies\casa@videoegg.adbureau[2].txt
C:\Documents and Settings\casa\Cookies\casa@xiti[1].txt
C:\Documents and Settings\casa\Cookies\casa@zbox.zanox[1].txt
Trojan.Dropper/Multi-CN
C:\DOCUMENTS AND SETTINGS\CASA\IMPOSTAZIONI LOCALI\TEMP\MOUSEHOOK.DLL
C:\DOCUMENTS AND SETTINGS\IO\IMPOSTAZIONI LOCALI\TEMP\MOUSEHOOK.DLL
Trojan.Unknown Origin
C:\WINDOWS\SYSTEM32\VGHD.SCR
-------------------------------------------------------
Malwarebytes' Anti-Malware 1.34
Versione del database: 1778
Windows 5.1.2600 Service Pack 3
21/02/2009 14.45.19
mbam-log-2009-02-21 (14-45-19).txt
Tipo di scansione: Scansione rapida
Elementi scansionati: 62841
Tempo trascorso: 2 minute(s), 30 second(s)
Processi delle memoria infetti: 0
Moduli della memoria infetti: 0
Chiavi di registro infette: 0
Valori di registro infetti: 1
Elementi dato del registro infetti: 7
Cartelle infette: 2
File infetti: 2
Processi delle memoria infetti:
(Nessun elemento malevolo rilevato)
Moduli della memoria infetti:
(Nessun elemento malevolo rilevato)
Chiavi di registro infette:
(Nessun elemento malevolo rilevato)
Valori di registro infetti:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Run\Framework Windows (Trojan.FakeAlert) -> Quarantined and deleted successfully.
Elementi dato del registro infetti:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Policies\ActiveDesktop\NoChangingWallpap er (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Policies\activedesktop\NoChangingWallpa per (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\Policies\Explorer\NoActiveDesktopChange s (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Policies\Explorer\NoSetActiveDesktop (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Curre ntVersion\Policies\Explorer\NoActiveDesktopChanges (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Cartelle infette:
C:\Documents and Settings\io\Dati applicazioni\cogad (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\downld (Trojan.Agent) -> Files: 671 -> Quarantined and deleted successfully.
File infetti:
C:\AUTORUN.INF (Trojan.Agent) -> Quarantined and deleted successfully.
C:\SETUP.EXE (Trojan.Agent) -> Quarantined and deleted successfully.

Rispondi quotando
