Page 1 of 2 12 LastLast
Results 1 to 10 of 14

Thread: iobit security 360 scan

  1. #1
    Senior Member
    Join Date
    Jun 2003
    Posts
    349

    iobit security 360 scan

    Hi There,
    When i do the scan with iobit 360 this is the report i get:

    IObit Security 360

    OS:Windows XP
    Version:1.4.5.67
    Define Version:1722
    Time Elapsed:00:03:06
    Objects Scanned:48216
    Threats Found:8

    |Name|Type|Description|ID|
    Backdoor.Trojan, Registry Value, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Value=Taskman, 4-24908
    Trojan.Backdoor, File, C:\Documents and Settings\master\Local Settings\Temporary Internet Files\Content.IE5\6NNGNZZN\cfekiojk[1].exe, 11-7702
    Injector.ABN, File, C:\Documents and Settings\master\Start Menu\Programs\Startup\2faa6mm.exe, 11-8649
    Injector.ABN, File, C:\Documents and Settings\master\Start Menu\Programs\Startup\66m86y8.exe, 11-8649
    Injector.ABN, File, C:\Documents and Settings\master\Start Menu\Programs\Startup\70jfaa6.exe, 11-8649
    Injector.ABN, File, C:\Documents and Settings\master\Start Menu\Programs\Startup\9w1sooj.exe, 11-8649
    Injector.ABN, File, C:\Documents and Settings\master\Start Menu\Programs\Startup\c60op0a1wc.exe, 11-8649
    Injector.ABN, File, C:\Documents and Settings\master\Start Menu\Programs\Startup\m81tupv6.exe, 11-8649

    In my start up:

    C:\Documents and Settings\master\Start Menu\Programs\Startup
    i get all this files:
    oaavmmh.exe,oeezqll.exe,onyozvq.exe,owwriid.exe,2hc600.exe,2jeuk1l.exe,3efagmm.exe,6aa6mm6.exe and another around 50 same files.
    Cant do the screen shot but you might get an idea.

    Can you shed some light on it?
    Thanks

  2. #2
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    I am sorry mate I don't quite understand your question.

    It seems to think that it has found malware...........are they false positives?

    I would suggest scanning with Malwarebytes, Spybot S& D and A-Squared.

    At least confirm the suspicions?

    Cheers

  3. #3
    Banned
    Join Date
    Jan 2008
    Posts
    605
    And it was scanned with some chinese crapware that probably came with a box of cereal, at that.
    Heh thats cute...

  4. #4
    Senior Member gore's Avatar
    Join Date
    Oct 2002
    Location
    Michigan
    Posts
    7,177
    Quote Originally Posted by The-Spec View Post
    And it was scanned with some chinese crapware that probably came with a box of cereal, at that.
    Heh thats cute...
    Hmmm, I guess "Cerial Killer" really DID do more than make a funny movie about typing random yet funny keys into a screen saver.

    I knew there was something about that guy! He played in SLC Punk Too!

  5. #5
    Gonzo District BOFH westin's Avatar
    Join Date
    Jan 2006
    Location
    SW MO
    Posts
    1,187
    gore - That is your second 'Hackers' reference in about a week. I am starting to get worried. :-P

    Please don't ask us to teach you to hack.
    \"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"

    -HST

  6. #6
    Senior Member gore's Avatar
    Join Date
    Oct 2002
    Location
    Michigan
    Posts
    7,177
    You don't have to teach me, I have all kinds of bladed tools

    I need to try and make a Horror Geek movie... "Hacked up for Barbecue" or something... Lol. "He breaks into your computer, and then your skull!"..... Oh yea, I can see tht working out lol.

  7. #7
    Gonzo District BOFH westin's Avatar
    Join Date
    Jan 2006
    Location
    SW MO
    Posts
    1,187
    Heh. Can I pre-order a copy?
    \"Those of us that had been up all night were in no mood for coffee and donuts, we wanted strong drink.\"

    -HST

  8. #8
    Senior Member gore's Avatar
    Join Date
    Oct 2002
    Location
    Michigan
    Posts
    7,177
    LOL if you pre-order enough, I might have funding to start it

  9. #9
    Do a scan with Trend Micros' housecall: housecall.trendmicro.com

    Since i've seen trend miss quite a few of new malware you can also do a scan at safety.live.com (its by microsoft).

    I would advise you to quit on the AV that you have and get a free copy of microsoft's security essentials. It's free if you have a genuine copy of windows. I wouldnt waste money on any AV if my OS was not genuine. I hope you get the point.
    Parth Maniar,
    CISSP, CISM, CISA, SSCP

    *Thank you GOD*

    Greater the Difficulty, SWEETER the Victory.

    Believe in yourself.

  10. #10
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,188
    And it was scanned with some chinese crapware that probably came with a box of cereal, at that.
    Heh thats cute...
    IObit is an Australian outfit............remember them?.........they fought alongside you in VietNam........................the Chinese..............they supplied the Kong And IOBit is free for private use so you don't need to buy a box of cereal

    The "problem" with IOBit is it uses some pretty fancy heuristics and stuff, so it might come up with false positives.

    That is why I suggested trying other products. You might also submit your suspicious files to VirusTotal and have them scanned by the top twenty or so anti-malware products.

    http://www.virustotal.com/

    EDIT:

    I would advise you to quit on the AV that you have and get a free copy of microsoft's security essentials.
    I would not.................you don't know if the Microsoft product will detect what IOBit already claims to have?

    What I would suggest is getting Secunia PSI and the File Hippo Update Scanner................keep everything up to date? I have seen plenty of false positives from old apps I should have deleted ages before. They don't match more recent versions so your anti-malware is quite rightly suspicious?

    @ unvi$ible:

    Get the latest "Hijack This" and run it. Then submit the log here:

    http://www.hijackthis.de/

    Last edited by nihil; August 18th, 2010 at 07:34 PM.

Similar Threads

  1. Autopsy of a successful intrusion
    By gore in forum Miscellaneous Security Discussions
    Replies: 11
    Last Post: June 13th, 2006, 04:06 AM
  2. Security Policy Model Creation for a Networked World
    By tenzenryu in forum The Security Tutorials Forum
    Replies: 11
    Last Post: November 4th, 2005, 07:10 PM
  3. Windows Pc Data Security
    By nihil in forum The Security Tutorials Forum
    Replies: 6
    Last Post: December 24th, 2003, 03:04 AM
  4. CISSP Notes: Security Models: Access Control Models
    By MrLinus in forum The Security Tutorials Forum
    Replies: 4
    Last Post: October 11th, 2003, 03:22 AM
  5. NEWS: This weeks Security News 2/5/03
    By xmaddness in forum Miscellaneous Security Discussions
    Replies: 0
    Last Post: February 5th, 2003, 09:56 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •