Hitman Pro Support and Discussion Thread

Discussion in 'other anti-malware software' started by yashau, Mar 20, 2009.

  1. Mops21

    Mops21 Registered Member

    Joined:
    Oct 5, 2010
    Posts:
    2,746
    Location:
    Germany
  2. constantine76

    constantine76 Registered Member

    Joined:
    Dec 18, 2010
    Posts:
    191
    Last edited by a moderator: Apr 6, 2013
  3. Mops21

    Mops21 Registered Member

    Joined:
    Oct 5, 2010
    Posts:
    2,746
    Location:
    Germany
    hi erik

    Here is another one FP for you to whitelist

    SHA256: b452e9b41ab819810c29afdbcac0c0ed34cda7fe27d15be178065862b34c7e8b
    SHA1: 3984313e7e75687aa872c68bbf00fe59b89f8c9f
    MD5: 3c755701cbf21a612e1f6b1449f109ff
    Dateigröße: 3.1 MB ( 3219480 bytes )
    Dateiname: opr01CDO.tmp
    Datei-Typ: Win32 EXE
    Erkennungsrate: 0 / 46
    Analyse-Datum: 2013-04-07 12:53:52 UTC ( vor 0 Minuten )
     

    Attached Files:

  4. Mops21

    Mops21 Registered Member

    Joined:
    Oct 5, 2010
    Posts:
    2,746
    Location:
    Germany
    Hi erik

    And here is my Scan Log

    Code:
    HitmanPro 3.7.3.193
    www.hitmanpro.com
    
       Computer name . . . . : ALEXANDERROB-PC
       Windows . . . . . . . : 6.0.2.6002.X86/2
       User name . . . . . . : AlexanderRob-PC\Alexander Robrecht
       UAC . . . . . . . . . : Enabled
       License . . . . . . . : Free
    
       Scan date . . . . . . : 2013-04-07 14:42:16
       Scan mode . . . . . . : EWS
       Scan duration . . . . : 7m 18s
       Disk access mode  . . : Direct disk access (SRB)
       Cloud . . . . . . . . : Internet
       Reboot  . . . . . . . : No
    
       Threats . . . . . . . : 0
       Traces  . . . . . . . : 10
    
       Objects scanned . . . : 3.886.756
       Files scanned . . . . : 60.160
       Remnants scanned  . . : 2.283.934 files / 1.542.662 keys
    
    Suspicious files ____________________________________________________________
    
       C:\Users\Alexander Robrecht\AppData\Local\Opera\Opera\cache\g_0069\opr01CDO.tmp
          Size . . . . . . . : 3.219.480 bytes
          Age  . . . . . . . : 1.8 days (2013-04-05 19:09:16)
          Entropy  . . . . . : 8.0
          SHA-256  . . . . . : B452E9B41AB819810C29AFDBCAC0C0ED34CDA7FE27D15BE178065862B34C7E8B
          Needs elevation  . : Yes
          Fuzzy  . . . . . . : 28.0
             Program has no publisher information but prompts the user for permission elevation.
             Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
             The file name extension of this program is not common.
             Authors name is missing in version info. This is not common to most programs.
             Version control is missing. This file is probably created by an individual. This is not typical for most programs.
             Time indicates that the file appeared recently on this computer.
    
    
    Potential Unwanted Programs _________________________________________________
    
       HKLM\SOFTWARE\Classes\AppID\secman.DLL\ (Babylon)
       HKLM\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56}\ (Babylon)
       HKLM\SOFTWARE\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ (Babylon)
       HKLM\SOFTWARE\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}\ (Babylon)
       HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}\ (Babylon)
       HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ (Babylon)
       HKLM\SOFTWARE\Classes\secman.OutlookSecurityManager.1\ (Babylon)
       HKLM\SOFTWARE\Classes\secman.OutlookSecurityManager\ (Babylon)
       HKLM\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}\ (Babylon)
    
    
    
     
  5. BoerenkoolMetWorst

    BoerenkoolMetWorst Registered Member

    Joined:
    Dec 22, 2009
    Posts:
    4,872
    Location:
    Outer space
  6. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    Good question.
    Looking forward to the answer. ;)
     
  7. forwhatitsworth

    forwhatitsworth Registered Member

    Joined:
    Apr 10, 2013
    Posts:
    1
    Hello guys,

    I have been using HitmanPro for a while without any problems. Since the last two scans I get a message that I don't understand (see screenshot).

    It reads
    The only option is repair. But I dont want to do that because no file is indicated and I dont want to corrupt my system.

    Can anyone help me?

    Thank you!
     

    Attached Files:

  8. m00nbl00d

    m00nbl00d Registered Member

    Joined:
    Jan 4, 2009
    Posts:
    6,623
    Unless I missed it, have you folks changed the flag from excludefile to excludelist? :D I didn't notice it until now. :argh:
     
  9. Gandalf_The_Grey

    Gandalf_The_Grey Registered Member

    Joined:
    Jan 31, 2012
    Posts:
    1,188
    Location:
    The Netherlands
    Got the same Trojan warning on 1 of my 3 Bitdefender Free installs.
     
  10. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    HitmanPro 3.7.3 Build 194 BETA

    Changelog
    • FIXED: HitmanPro driver leaked some nonpaged kernel memory when scanning in Direct Disk Access mode.
    • IMPROVED: Minor improvements to Compatible Disk Access mode.
    • IMPROVED: Detection of zero-day Urausy ransomware through forensic file clustering.

    Download: http://www.surfright.nl/downloads/beta

    We've made a slight change to the driver. Please let me know how this version runs on your system! It should no longer leak nonpaged memory.
     
  11. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    Can you send me your scan log via PM ?
     
  12. G1111

    G1111 Registered Member

    Joined:
    May 11, 2005
    Posts:
    2,294
    Location:
    USA
    Downloaded and ran latest beta, No problems to report. Scan took 2 minutes and 4 seconds.
     
  13. Gandalf_The_Grey

    Gandalf_The_Grey Registered Member

    Joined:
    Jan 31, 2012
    Posts:
    1,188
    Location:
    The Netherlands
    Scan log sent via PM.
     
  14. Mops21

    Mops21 Registered Member

    Joined:
    Oct 5, 2010
    Posts:
    2,746
    Location:
    Germany
    Hi Erik

    I have 6 Files for the Whitelist for you

    Properties
    Name opr01CDO.tmp
    Location C:\Users\Alexander Robrecht\AppData\Local\Opera\Opera\cache\g_0069
    Size 3.1 MB
    Time 6.0 days ago (2013-04-05 19:09:16)
    Needs Elevation Yes
    Entropy 8.0
    SHA-256 B452E9B41AB819810C29AFDBCAC0C0ED34CDA7FE27D15BE178065862B34C7E8B

    Scoring (28.0)
    Program has no publisher information but prompts the user for permission elevation.
    Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
    The file name extension of this program is not common.
    Authors name is missing in version info. This is not common to most programs.
    Version control is missing. This file is probably created by an individual. This is not typical for most programs.
    Time indicates that the file appeared recently on this computer.


    Properties
    Name winsrv.dll
    Location C:\Windows\System32
    Size 368 KB
    Time 2.0 days ago (2013-04-09 19:30:53)
    Entropy 6.6
    Product Microsoft® Windows® Operating System
    Publisher Microsoft Corporation
    Description Multi-User Windows Server DLL
    Version 6.0.6002.18804
    Copyright © Microsoft Corporation. All rights reserved.
    SHA-256 D29BCFA967C23C7264592576D62D95FA8C687E8662D19DCCC73653A9EFB6340D

    Scoring (12.0)
    Program is running but currently exposes no human-computer interface (GUI).
    Program starts automatically without user intervention.
    Time indicates that the file appeared recently on this computer.
    The file is in use by one or more active processes.
    The file is located in a folder that contains core operating system files from Windows. This is not typical for most programs and is only common to system tools, drivers and hacking utilities.
    The file is protected by Windows File Protection (WFP). This is typical for critical Windows system files.

    Startup
    HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\SubSystems\Windows


    Properties
    Name ieframe.dll
    Location C:\Windows\System32
    Size 10.6 MB
    Time 2.0 days ago (2013-04-09 19:30:57)
    Entropy 6.4
    Product Windows® Internet Explorer
    Publisher Microsoft Corporation
    Description Internet Explorer
    Version 8.00.6001.19412
    Copyright © Microsoft Corporation. All rights reserved.
    SHA-256 762FA277CC3D8BAF673A8451CB35B0EAE6BDDF993EF035753C117DA40EF95AAD

    Scoring (8.0)
    Program starts automatically without user intervention.
    Time indicates that the file appeared recently on this computer.
    The file is in use by one or more active processes.
    The file is located in a folder that contains core operating system files from Windows. This is not typical for most programs and is only common to system tools, drivers and hacking utilities.
    The file is protected by Windows File Protection (WFP). This is typical for critical Windows system files.

    Startup
    HKU\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\UrlSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}
    HKU\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\UrlSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}
    HKU\S-1-5-21-911542882-2029379874-2294310465-1000\SOFTWARE\Microsoft\Internet Explorer\UrlSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}

    References
    HKLM\SOFTWARE\Classes\CLSID\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}\
    HKU\S-1-5-21-911542882-2029379874-2294310465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}\



    Properties
    Name ie4uinit.exe
    Location C:\Windows\system32
    Size 170 KB
    Time 2.0 days ago (2013-04-09 19:30:55)
    Entropy 7.3
    Product Windows® Internet Explorer
    Publisher Microsoft Corporation
    Description IE Per-User Initialization Utility
    Version 8.00.6001.19412
    Copyright © Microsoft Corporation. All rights reserved.
    SHA-256 CC847699CE885504142741AE46C8ADFCDAB33826522E37AFA3F8D3AA071729BC

    Scoring (11.0)
    Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
    Program starts automatically without user intervention.
    Time indicates that the file appeared recently on this computer.
    The file is located in a folder that contains core operating system files from Windows. This is not typical for most programs and is only common to system tools, drivers and hacking utilities.
    The file is protected by Windows File Protection (WFP). This is typical for critical Windows system files.

    Startup
    HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}\
    HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\


    Properties
    Name iedkcs32.dll
    Location C:\Windows\System32
    Size 379 KB
    Time 2.0 days ago (2013-04-09 19:30:55)
    Entropy 6.0
    Product Windows® Internet Explorer
    Publisher Microsoft Corporation
    Description IEAK branding
    Version 18.00.6001.19412
    Copyright © Microsoft Corporation. All rights reserved.
    SHA-256 B93A70B1B4285E99C7E04369D650780921A00BABD1DF2D21FF1BB121BFF04E86

    Scoring (6.0)
    Program starts automatically without user intervention.
    Time indicates that the file appeared recently on this computer.
    The file is located in a folder that contains core operating system files from Windows. This is not typical for most programs and is only common to system tools, drivers and hacking utilities.
    The file is protected by Windows File Protection (WFP). This is typical for critical Windows system files.

    Startup
    HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}\



    Properties
    Name NPSWF32_11_7_700_169.dll
    Location C:\Windows\system32\Macromed\Flash
    Size 15.3 MB
    Time 2.1 days ago (2013-04-09 17:09:39)
    Authenticode Valid
    Entropy 7.0
    RSA Key Size 2048
    SHA-256 5274440AC2C1F40D5224009695B20BA9BFC4C5E24BE4742AEAE995791F819585

    Scoring (6.0)
    Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
    Authors name is missing in version info. This is not common to most programs.
    Version control is missing. This file is probably created by an individual. This is not typical for most programs.
    Program starts automatically without user intervention.
    Time indicates that the file appeared recently on this computer.
    Program is code signed with a valid Authenticode certificate.

    Startup
    HKLM\SOFTWARE\MozillaPlugins\@adobe.com/FlashPlayer\

    References
    C:\Windows\system32\Macromed\Flash\flashplayer.xpt

    Forensic Cluster
    * C:\Windows\system32\Macromed\Flash\NPSWF32_11_7_700_169.dll
    0.3s C:\Windows\System32\Macromed\Flash\FlashUtil32_11_7_700_169_Plugin.exe
    0.5s C:\Windows\System32\Macromed\Flash\FlashPlayerPlugin_11_7_700_169.exe
     

    Attached Files:

  15. Mops21

    Mops21 Registered Member

    Joined:
    Oct 5, 2010
    Posts:
    2,746
    Location:
    Germany
    Hi

    And here is the Scan Log

    Code:
    HitmanPro 3.7.3.193
    www.hitmanpro.com
    
       Computer name . . . . : ALEXANDERROB-PC
       Windows . . . . . . . : 6.0.2.6002.X86/2
       User name . . . . . . : AlexanderRob-PC\Alexander Robrecht
       UAC . . . . . . . . . : Enabled
       License . . . . . . . : Free
    
       Scan date . . . . . . : 2013-04-11 20:07:23
       Scan mode . . . . . . : EWS
       Scan duration . . . . : 4m 18s
       Disk access mode  . . : Direct disk access (SRB)
       Cloud . . . . . . . . : Internet
       Reboot  . . . . . . . : No
    
       Threats . . . . . . . : 0
       Traces  . . . . . . . : 29
    
       Objects scanned . . . : 3.888.701
       Files scanned . . . . : 60.542
       Remnants scanned  . . : 2.280.433 files / 1.547.726 keys
    
    Suspicious files ____________________________________________________________
    
       C:\Users\Alexander Robrecht\AppData\Local\Opera\Opera\cache\g_0069\opr01CDO.tmp
          Size . . . . . . . : 3.219.480 bytes
          Age  . . . . . . . : 6.0 days (2013-04-05 19:09:16)
          Entropy  . . . . . : 8.0
          SHA-256  . . . . . : B452E9B41AB819810C29AFDBCAC0C0ED34CDA7FE27D15BE178065862B34C7E8B
          Needs elevation  . : Yes
          Fuzzy  . . . . . . : 28.0
             Program has no publisher information but prompts the user for permission elevation.
             Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
             The file name extension of this program is not common.
             Authors name is missing in version info. This is not common to most programs.
             Version control is missing. This file is probably created by an individual. This is not typical for most programs.
             Time indicates that the file appeared recently on this computer.
    
    
    Potential Unwanted Programs _________________________________________________
    
       HKLM\SOFTWARE\Classes\AppID\secman.DLL\ (Babylon)
       HKLM\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56}\ (Babylon)
       HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}\ (Babylon)
       HKLM\SOFTWARE\Classes\secman.OutlookSecurityManager.1\ (Babylon)
       HKLM\SOFTWARE\Classes\secman.OutlookSecurityManager\ (Babylon)
    
    Early Warning Scoring _______________________________________________________
    
       C:\Windows\system32\ie4uinit.exe
          Size . . . . . . . : 174.080 bytes
          Age  . . . . . . . : 2.0 days (2013-04-09 19:30:55)
          Entropy  . . . . . : 7.3
          SHA-256  . . . . . : CC847699CE885504142741AE46C8ADFCDAB33826522E37AFA3F8D3AA071729BC
          Product  . . . . . : Windows® Internet Explorer
          Publisher  . . . . : Microsoft Corporation
          Description  . . . : IE Per-User Initialization Utility
          Version  . . . . . : 8.00.6001.19412
          Copyright  . . . . : © Microsoft Corporation. All rights reserved.
          Fuzzy  . . . . . . : 11.0
             Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
             Program starts automatically without user intervention.
             Time indicates that the file appeared recently on this computer.
             The file is located in a folder that contains core operating system files from Windows. This is not typical for most programs and is only common to system tools, drivers and hacking utilities.
             The file is protected by Windows File Protection (WFP). This is typical for critical Windows system files.
          Startup
             HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\>{26923b43-4d38-484f-9b9e-de460746276c}\
             HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}\
    
       C:\Windows\System32\iedkcs32.dll
          Size . . . . . . . : 387.584 bytes
          Age  . . . . . . . : 2.0 days (2013-04-09 19:30:55)
          Entropy  . . . . . : 6.0
          SHA-256  . . . . . : B93A70B1B4285E99C7E04369D650780921A00BABD1DF2D21FF1BB121BFF04E86
          Product  . . . . . : Windows® Internet Explorer
          Publisher  . . . . : Microsoft Corporation
          Description  . . . : IEAK branding
          Version  . . . . . : 18.00.6001.19412
          Copyright  . . . . : © Microsoft Corporation. All rights reserved.
          Fuzzy  . . . . . . : 6.0
             Program starts automatically without user intervention.
             Time indicates that the file appeared recently on this computer.
             The file is located in a folder that contains core operating system files from Windows. This is not typical for most programs and is only common to system tools, drivers and hacking utilities.
             The file is protected by Windows File Protection (WFP). This is typical for critical Windows system files.
          Startup
             HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF}\
    
       C:\Windows\System32\ieframe.dll
          Size . . . . . . . : 11.111.424 bytes
          Age  . . . . . . . : 2.0 days (2013-04-09 19:30:57)
          Entropy  . . . . . : 6.4
          SHA-256  . . . . . : 762FA277CC3D8BAF673A8451CB35B0EAE6BDDF993EF035753C117DA40EF95AAD
          Product  . . . . . : Windows® Internet Explorer
          Publisher  . . . . : Microsoft Corporation
          Description  . . . : Internet Explorer
          Version  . . . . . : 8.00.6001.19412
          Copyright  . . . . : © Microsoft Corporation. All rights reserved.
          Fuzzy  . . . . . . : 8.0
             Program starts automatically without user intervention.
             Time indicates that the file appeared recently on this computer.
             The file is in use by one or more active processes.
             The file is located in a folder that contains core operating system files from Windows. This is not typical for most programs and is only common to system tools, drivers and hacking utilities.
             The file is protected by Windows File Protection (WFP). This is typical for critical Windows system files.
          Startup
             HKU\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\UrlSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}
             HKU\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\UrlSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}
             HKU\S-1-5-21-911542882-2029379874-2294310465-1000\SOFTWARE\Microsoft\Internet Explorer\UrlSearchHooks\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}
          References
             HKLM\SOFTWARE\Classes\CLSID\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}\
             HKU\S-1-5-21-911542882-2029379874-2294310465-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{CFBFAE00-17A6-11D0-99CB-00C04FD64497}\
    
       C:\Windows\system32\Macromed\Flash\NPSWF32_11_7_700_169.dll
          Size . . . . . . . : 16.032.648 bytes
          Age  . . . . . . . : 2.1 days (2013-04-09 17:09:39)
          Entropy  . . . . . : 7.0
          SHA-256  . . . . . : 5274440AC2C1F40D5224009695B20BA9BFC4C5E24BE4742AEAE995791F819585
          RSA Key Size . . . : 2048
          Authenticode . . . : Valid
          Fuzzy  . . . . . . : 6.0
             Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
             Authors name is missing in version info. This is not common to most programs.
             Version control is missing. This file is probably created by an individual. This is not typical for most programs.
             Program starts automatically without user intervention.
             Time indicates that the file appeared recently on this computer.
             Program is code signed with a valid Authenticode certificate.
          Startup
             HKLM\SOFTWARE\MozillaPlugins\@adobe.com/FlashPlayer\
          References
             C:\Windows\system32\Macromed\Flash\flashplayer.xpt
          Forensic Cluster
              0.0s C:\Windows\system32\Macromed\Flash\NPSWF32_11_7_700_169.dll
              0.3s C:\Windows\System32\Macromed\Flash\FlashUtil32_11_7_700_169_Plugin.exe
              0.5s C:\Windows\System32\Macromed\Flash\FlashPlayerPlugin_11_7_700_169.exe
    
       C:\Windows\System32\winsrv.dll
          Size . . . . . . . : 376.320 bytes
          Age  . . . . . . . : 2.0 days (2013-04-09 19:30:53)
          Entropy  . . . . . : 6.6
          SHA-256  . . . . . : D29BCFA967C23C7264592576D62D95FA8C687E8662D19DCCC73653A9EFB6340D
          Product  . . . . . : Microsoft® Windows® Operating System
          Publisher  . . . . : Microsoft Corporation
          Description  . . . : Multi-User Windows Server DLL
          Version  . . . . . : 6.0.6002.18804
          Copyright  . . . . : © Microsoft Corporation. All rights reserved.
          Fuzzy  . . . . . . : 12.0
             Program is running but currently exposes no human-computer interface (GUI).
             Program starts automatically without user intervention.
             Time indicates that the file appeared recently on this computer.
             The file is in use by one or more active processes.
             The file is located in a folder that contains core operating system files from Windows. This is not typical for most programs and is only common to system tools, drivers and hacking utilities.
             The file is protected by Windows File Protection (WFP). This is typical for critical Windows system files.
          Startup
             HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\SubSystems\Windows
    
    
    
    
     
  16. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    Solved. Thanks :thumb:
     
  17. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    Solved. Thanks :thumb:
     
  18. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    Do you still have the issue with the Build 194 (BETA)?
    http://www.surfright.nl/downloads/beta
     
  19. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    ATM we do not specifically search for Keyloggers. If we find it, then its 'behaving' suspiciously (Keyloggers generally do). In addition, when the keylogger is recognized by any of our partners in the cloud, then its listed as well.

    Hope this helps.
     
  20. ght1

    ght1 Guest

  21. erikloman

    erikloman Developer

    Joined:
    Jun 4, 2009
    Posts:
    3,152
    Location:
    Hengelo, The Netherlands
    Norton Power Eraser:
    More is not always better :doubt:
     
  22. ght1

    ght1 Guest

    Ok, I see. :doubt: Will the missed sample be added to HMP?
     
  23. vojta

    vojta Registered Member

    Joined:
    Feb 26, 2010
    Posts:
    830
    Norton Power Eraser could be compared to the EWS mode in HitmanPro. Every time that I run it I get at least half a dozen false positives. Symantec clearly states that it is a last resource scanner that should be used with extreme caution.
     
  24. Page42

    Page42 Registered Member

    Joined:
    Jun 18, 2007
    Posts:
    6,941
    Location:
    USA
    Without trying to put words in your mouth, but instead, seeking clarification, are you saying that you do or don't detect commercial monitoring software programs, such as eBlaster or Net Nanny?
     
  25. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    hi erik, check your messages please. :thumb:
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.