![]() |
| |||||||
Log-Analyse und Auswertung: AVCare, Win32Trojan.TDss und mehr ?Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() |
| | #1 |
![]() | AVCare, Win32Trojan.TDss und mehr ? Hallo, ich habe mir gestern so gegen 23.00 AVCare eingefangen, des weiteren fielen mir ein Prozess msa.exe und eine beim Systemstart ausgeführte b.exe auf. Symptome waren neben dem nervenden AVCare ein paar Systemabstürze und beim darauffolgenden Neustart ein schwarzer Bildschirm mit bewegbarer Maus (Icon:Uhrenglas) statt des Anmeldebildschirms, Ein weiterer Neustart verlief dann "normal". Avira AntiVir startete seitdem aber den Guard nicht mehr. Die Dateien von AVCare habe ich nach einer Anleitung von www*411-spyware*com_de_avcare-entfernen gelöscht, ebenso die msa.exe aus C:\Windows. Unter C:\Dokumente und Einstellungen\*Name*\Lokale Einstellungen\Temp\ fanden sich; - a.exe, b.exe, c.exe - eine Launcher.exe (Icon:Borland C++ Builder) die höchstwahrscheinlich unschuldig war. Auch diese Dateien habe ich gelöscht und nach einem Neustart waren keine auffälligen Einträge mehr zu entdecken. Antivir startete aber immernoch nicht den Guard, also unter services.msc den StartTyp auf Auto gesetzt. Jetzt ist der Schirm zwar auf, aber so richtig traute ich dem ganzen nicht. AdAware zurategezogen und beim Intelligenten Scan "Win32Trojan.TDss" und ein paar Cookies gefunden, leider endete der Entfernvorgang aber mit einer Fehlermeldung und der zweimaligen Aufforderung einen Fehlerbericht an den Hersteller zu senden. Die Recherche im Internet führte mich dann wieder auf ein paar Threads hier im Forum, die Programme um das Rootkit (und was sonst noch so da ist) zu entfernen waren mir zu speziell und griffen zu stark ins System ein um sie auszuprobieren. Also liess ich die Finger davon. Vermutlich hätte ich so eine Idee schon ganz am Anfang haben sollen und nicht versuchen das ganze alleine zu lösen, ich hatte aber nicht mit einem solch schwerwiegenden und widerstandsfähigen Befall gerechnet. (Das Ding kann sich immerhin gegen viele Sachen wehren) Malware Bytes Programm liess sich zuerst natürlich nicht richtig installieren. Am Ende startet der Prozess mbam.exe und das Setup bleibt beim Beenden hängen, startet man das Programm so erscheint wieder besagter Prozess, dummerweise aber kein passendes Fenster. Das Starten von einer "Kopie von mbam.exe" funktioniert zwar aber der Entfernvorgang ist nutzlos, da nach dem notwendigen Neustart alles beim alten zu sein scheint, denn zumindest finden Prevx und AdAware immernoch Sachen. Den Rat im abges. Modus UAC****** und Co zu entfernen habe ich auch befolgen wollen, dummerweise konnte ich diese Einträge nicht finden (Prevx meldet aber 4x uac***.dll und 1x uac***.sys). Als Vorbereitung auf diesen Thread habe ich CCleaner durchlaufen lassen (und u.a. den Verlauf habe ich aber nicht löschen lassen) und dieser hat vermutlich auch die b.exe aus dem Autostart entfernt. Ich bin mir inzwischen unsicher was sich alles eingeschlichen hat, gehören -AVCare -msa.exe - a|b|c.exe -Win32Trojan.TDSss denn alle zusammen ? Benutzen kann ich im Moment die meisten Programme normal und ohne merkliche Geschwindigkeitseinbußen. Auch ein kleiner Blick auf den Netzwerkverkehr (Ethereal) bleibt ohne Befund. Hier im Forum habe ich bereits ein paar Beiträge gefunden die sich mit einem ähnlichen oder sogar demselben Krankheitsbild beschäftigen und wie geschildert habe ich versucht Teile davon umzusetzen. Ich werde jetzt versuchen mich am Riemen zu reißen und nicht mehr am System rumdoktorn. Ich hoffe das mir jemand hilft das System wieder von dem Befall oder den Befällen zu befreien. Bitte nicht schlagen, aber mit HijackThis habe ich ganz am Anfang auch schon ein wenig gearbeitet, weil ich damit mal vor längerer Zeit ein anderes Anhängsel losgeworden bin. Hier das aktuelle Log (CAPM4RSK.EXE und CAPM4SWK.EXE gehören zu einem Netzwerkdrucker): Code:
ATTFilter Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 14:29:00, on 08/20/2009 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet Explorer v8.00 (8.00.6001.18702) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\Ati2evxx.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\spoolsv.exe C:\WINDOWS\system32\Ati2evxx.exe C:\Programme\Avira\AntiVir Desktop\sched.exe C:\Programme\Avira\AntiVir Desktop\avguard.exe C:\WINDOWS\system32\CAPM4RSK.EXE C:\WINDOWS\system32\spool\drivers\w32x86\3\CAPM4SWK.EXE C:\WINDOWS\Explorer.EXE C:\Programme\ASUS\Probe\AsusProb.exe C:\WINDOWS\system32\taskswitch.exe C:\Programme\Avira\AntiVir Desktop\avgnt.exe C:\WINDOWS\system32\ctfmon.exe C:\Programme\DAEMON Tools Lite\daemon.exe C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe F:\Programme\TortoiseSVN\bin\TSVNCache.exe C:\Programme\Prevx\prevx.exe E:\HDV3\DTemp\DTemp.exe C:\Programme\Borland\InterBase\bin\ibguard.exe C:\WINDOWS\System32\svchost.exe C:\remindme\RemindMe.exe C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe C:\Programme\Prevx\prevx.exe C:\WINDOWS\System32\svchost.exe C:\Programme\Analog Devices\SoundMAX\SMAgent.exe C:\WINDOWS\System32\svchost.exe C:\Programme\Borland\InterBase\bin\ibserver.exe C:\WINDOWS\system32\devldr32.exe C:\npp\notepad++.exe C:\WINDOWS\system32\NOTEPAD.EXE C:\WINDOWS\system32\NOTEPAD.EXE C:\Programme\Lavasoft\Ad-Aware\AAWService.exe C:\Programme\Lavasoft\Ad-Aware\AAWTray.exe C:\Programme\Mozilla Firefox\firefox.exe D:\bases\hijackthis\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://hardware.thgweb.de/index.html R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Programme\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll O2 - BHO: Windows Live Anmelde-Hilfsprogramm - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: FDMIECookiesBHO Class - {CC59E0F9-7E43-44FA-9FAA-8377850BF205} - F:\Programme\Free Download Manager\iefdmcks.dll O4 - HKLM\..\Run: [ASUS Probe] C:\Programme\ASUS\Probe\AsusProb.exe O4 - HKLM\..\Run: [CoolSwitch] C:\WINDOWS\system32\taskswitch.exe O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k O4 - HKLM\..\Run: [StartCCC] "C:\Programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun O4 - HKLM\..\Run: [avgnt] "C:\Programme\Avira\AntiVir Desktop\avgnt.exe" /min O4 - HKLM\..\RunOnce: [ Malwarebytes Anti-Malware (reboot)] "F:\Programme\Mabytes\Kopie von mbam.exe" /runcleanupscript O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Programme\DAEMON Tools Lite\daemon.exe" -autorun O4 - HKCU\..\Run: [StartCCC] "C:\Programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETZWERKDIENST') O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user') O4 - Startup: DTemp.lnk = E:\HDV3\DTemp\DTemp.exe O4 - Startup: RemindMe.lnk = C:\remindme\RemindMe.exe O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Programme\Adobe\Acrobat 7.0\Reader\reader_sl.exe O8 - Extra context menu item: Download all with Free Download Manager - file://F:\Programme\Free Download Manager\dlall.htm O8 - Extra context menu item: Download selected with Free Download Manager - file://F:\Programme\Free Download Manager\dlselected.htm O8 - Extra context menu item: Download with Free Download Manager - file://F:\Programme\Free Download Manager\dllink.htm O8 - Extra context menu item: Download with GetRight - C:\Programme\GetRight\GRdownload.htm O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://F:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000 O8 - Extra context menu item: Open with GetRight Browser - C:\Programme\GetRight\GRbrowse.htm O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.5.0_04\bin\npjpi150_04.dll O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.5.0_04\bin\npjpi150_04.dll O9 - Extra button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll O15 - Trusted Zone: *.otherchance.com O15 - Trusted Zone: *.whatsnew.name O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - http://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1228848741171 O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1228848725906 O16 - DPF: {CAFEEFAC-0014-0000-0002-ABCDEFFEDCBA} (Java Runtime Environment 1.4.0_02) - O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/zone/datafiles/heartbeat.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O17 - HKLM\System\CS1\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O17 - HKLM\System\CS2\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O17 - HKLM\System\CS3\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O23 - Service: Adobe LM Service - Unknown owner - C:\Programme\Gemeinsame Dateien\Adobe Systems Shared\Service\Adobelmsvc.exe O23 - Service: Avira AntiVir Planer (AntiVirSchedulerService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\sched.exe O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\avguard.exe O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe O23 - Service: CSIScanner - Prevx - C:\Programme\Prevx\prevx.exe O23 - Service: getPlus(R) Helper - NOS Microsystems Ltd. - C:\Programme\NOS\bin\getPlus_HelperSvc.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: InterBase Guardian (InterBaseGuardian) - Borland Software Corporation - C:\Programme\Borland\InterBase\bin\ibguard.exe O23 - Service: InterBase Server (InterBaseServer) - Borland Software Corporation - C:\Programme\Borland\InterBase\bin\ibserver.exe O23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Programme\iPod\bin\iPodService.exe O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Programme\Lavasoft\Ad-Aware\AAWService.exe O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Programme\CyberLink\Shared Files\RichVideo.exe O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Programme\WinPcap\rpcapd.exe O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Programme\Analog Devices\SoundMAX\SMAgent.exe O24 - Desktop Component 1: (no name) - http://www.tomshardware.de/ O24 - Desktop Component 2: (no name) - C:\Dokumente und Einstellungen\*User*\Desktop\Neu Textdokument (4).html -- End of file - 8793 bytes Code:
ATTFilter O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
|
| | #2 | |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() | AVCare, Win32Trojan.TDss und mehr ? Hallo und Herzlich Willkommen!
__________________![]() Was ist ein Rootkit? (Professionelle Erklärung von `Wikipedia` und Kaspersky - bitte unbedingt lesen!: (englisch etwa: „Administratorenbausatz“; root ist unter unixoiden und unixähnlichen Betriebssystemen der Benutzer mit Administratorrechten) ist eine Sammlung von Softwarewerkzeugen, die nach dem Einbruch in ein Computersystem auf dem kompromittierten System installiert wird, um zukünftige Logins des Eindringlings zu verbergen und Prozesse und Dateien zu verstecken) Wie übertragen sich Rootkits? ►Da eine hundertprozentige Erkennung von Rootkits unmöglich ist, ist die beste Methode zur Entfernung die komplette Neuinstallation. Rootkit/wikipedia.org Falls Du dein System doch reinigen möchtest: - Die Anweisungen bitte gründlich lesen und immer streng einhalten, da ich die Reihenfolge nach bestimmten Kriterien vorbereitet habe: 1. ich brauche mehr `Übersicht` bzw Daten über einen längeren Zeitraum - dazu bitte Versteckte - und Systemdateien sichtbar machen:: → Klicke unter Start auf Arbeitsplatz. → Klicke im Menü Extras auf Ordneroptionen. → Dateien und Ordner/Erweiterungen bei bekannten Dateitypen ausblenden → Haken entfernen → Geschützte und Systemdateien ausblenden → Haken entfernen → Versteckte Dateien und Ordner/Alle Dateien und Ordner anzeigen → Haken setzen. → Bei "Geschützte Systemdateien ausblenden" darf kein Häkchen sein und "Alle Dateien und Ordner anzeigen" muss aktiviert sein. 2. Für XP und Win2000 (ansonsten auslassen) → lade Dir das filelist.zip auf deinen Desktop herunter → entpacke die Zip-Datei auf deinen Desktop → starte nun mit einem Doppelklick auf die Datei "filelist.bat" - Dein Editor (Textverarbeitungsprogramm) wird sich öffnen → kopiere aus die erzeugten Logfile alle 7 Verzeichnisse ("C\...") usw - aber nur die Einträge der letzten 6 Monate - hier in deinem Thread ** vor jedem Eintrag steht ein Datum, also Einträge, die älter als 6 Monate sind bitte herauslöschen! 3. Ich würde gerne noch all deine installierten Programme sehen: Lade dir das Tool CCleaner herunter installieren ("Füge CCleaner Yahoo! Toolbar hinzu" abwählen)→ starten→ unter Options settings-> "german" einstellen dann klick auf "Extra (um die installierten Programme auch anzuzeigen)→ weiter auf "Als Textdatei speichern..." wird eine Textdatei (*.txt) erstellt, kopiere dazu den Inhalt und füge ihn da ein 4. Um einen tieferen Einblick in dein System, um eine mögliche Infektion mit einem Rootkit/Info v.wikipedia.org) aufzuspüren, werden wir ein Tool - Gmer - einsetzen :
** keine Verbindung zu einem Netzwerk und Internet - WLAN nicht vergessen Wenn der Scan beendet ist, bitte alle Programme und Tools wieder aktivieren! 5. Lade und installiere das Tool RootRepeal herunter - setze einen Hacken bei: "Drivers", "Stealth Objects" und "Hidden Services" dann klick auf "OK" - nach der Scan, klick auf "Save Report" - speichere das Logfile als RootRepeal.txt auf dem Desktop und Kopiere den Inhalt hier in den Thread ** keine Verbindung zu einem Netzwerk und Internet - WLAN nicht vergessen Wenn der Scan beendet ist, bitte alle Programme und Tools wieder aktivieren! Zitat:
** Möglichst nicht ins internet gehen, kein Online-Banking, File-sharing, Chatprogramme usw gruß Coverflow |
| | #3 |
![]() | AVCare, Win32Trojan.TDss und mehr ? Ich habe jetzt mehrmals versucht mit GMER das System zu scannen und jedesmal scheint er etwas weiter zu kommen, bevor er aufhört.
__________________Dann geht nichts mehr, ein paar Klicks sind vielleicht noch möglich, aber selbst die Systemuhr wird dabei schon nicht mehr aktualisiert und auch die Festplatte hat dann schon länger aufgehört zu rattern. Wie lange dauert ein erfolgreicher Scan bei ~20GB ungefähr auf einem P4 3 GHz, 3 oder eher 10 Stunden ? Wenn ich das Programm starte wird direkt angefangen zu scannen, dann wird ein Komplett-Scan empfohlen welcher wie gesagt noch nicht durchgelaufen ist. Ich werds weiter versuchen, die Punkte davor hab ich schon abgearbeitet, aber hier komm ich noch nicht voran da das scannen ja leider sehr langsam ist. Nur um sicherzugehen, dieser komplette Scan ist erforderlich die Einträge die ganz am Anfang oder innerhalb der ersten halben Stunde gefunden werden reichen nicht ? Es scheinen keine neuen Einträge hinzuzukommen oder zumindest sieht es so aus wenn man auf die dicke des Balkens in der Scrollleiste achtet. Ein weiterer Versuch dürfte gleich wieder scheitern, ich häng dann die Berichte der ersten drei Punkte an. |
| | #4 |
![]() | AVCare, Win32Trojan.TDss und mehr ? Ich bzw. Gmer hat es wieder nicht geschafft, gibt es überhaupt eine Meldung wenn er fertig ist ? Bin ich einfach zu ungeduldig und nach 12h scheinbarem Nichtstun ist er dann durch ? Ich versuchs weiter. Aufgabenliste: 1. Ist (bei mir) Standard 2. filelist 1.Teil Code:
ATTFilter <----- Root -----------------------------
Volume in Laufwerk C: hat keine Bezeichnung.
Volumeseriennummer: 8435-0B01
Verzeichnis von C:\
08/20/2009 17:30 43 filelist.txt
08/20/2009 17:21 2.146.226.176 hiberfil.sys
08/20/2009 17:21 805.306.368 pagefile.sys
08/20/2009 02:17 211 boot.ini
04/20/2009 22:12 206 Statistik.txt
04/06/2009 01:23 13.030 PDOXUSRS.NET
03/03/2009 01:48 3.361 LGSInst.Log
----- Windows --------------------------
Verzeichnis von C:\WINDOWS
08/20/2009 17:22 0 0.log
08/20/2009 17:22 157 wiadebug.log
08/20/2009 17:22 1.358.455 WindowsUpdate.log
08/20/2009 17:22 50 wiaservc.log
08/20/2009 17:22 2.256 axcapmon.log
08/20/2009 17:21 2.048 bootstat.dat
08/20/2009 14:45 2.582 axcapmon.bak
08/20/2009 14:45 32.540 SchedLgU.Txt
08/20/2009 12:08 121 WinInit.ini
08/20/2009 12:02 499.150 setupapi.log
08/20/2009 11:57 476.198 ntbtlog.txt
08/20/2009 02:17 261 SYSTEM.INI
08/20/2009 02:17 11.427 win.ini
08/19/2009 23:19 10 run.log
08/19/2009 23:19 12 srun.log
08/17/2009 21:41 49 NeroDigital.ini
08/17/2009 20:11 3.937 scad3.INI
08/14/2009 22:27 244.987 wmsetup.log
08/11/2009 23:23 54.156 QTFont.qfn
08/10/2009 21:20 197.737 War3Unin.dat
07/24/2009 12:41 199.608 setupact.log
07/16/2009 11:40 80.030 spupdsvc.log
07/16/2009 11:39 352 spupdsvc.log.1.log
07/15/2009 21:43 1.878.390 iis6.log
07/15/2009 21:43 486.633 comsetup.log
07/15/2009 21:43 300.715 ntdtcsetup.log
07/15/2009 21:43 1.374 imsins.log
07/15/2009 21:43 739.451 tsoc.log
07/15/2009 21:43 78.871 ocmsn.log
07/15/2009 21:43 78.175 tabletoc.log
07/15/2009 21:43 85.547 KB973346.log
07/15/2009 21:43 276.519 netfxocm.log
07/15/2009 21:43 106.872 medctroc.Log
07/15/2009 21:43 813.466 ocgen.log
07/15/2009 21:43 80.517 msgsocm.log
07/15/2009 21:43 1.556.892 FaxSetup.log
07/15/2009 21:43 517.138 msmqinst.log
07/15/2009 21:39 1.374 imsins.BAK
07/15/2009 21:39 93.473 KB961371.log
07/15/2009 21:38 283.545 updspapi.log
07/15/2009 21:38 92.852 KB971633.log
07/15/2009 21:37 121.409 ie8_main.log
07/15/2009 21:37 84.229 KB971930-IE8.log
07/15/2009 21:37 99.076 KB969897-IE8.log
07/15/2009 21:36 93.335 ie8.log
07/15/2009 21:17 37.201 WgaNotify.log
07/15/2009 21:15 8.263 KB961118.log
06/14/2009 00:39 44 rdrive.ini
06/10/2009 21:29 112.136 KB969897-IE7.log
06/10/2009 21:28 27.420 KB970238.log
06/10/2009 21:28 26.743 KB968537.log
06/10/2009 21:28 26.383 KB961501.log
06/10/2009 21:28 20.389 KB969898.log
06/10/2009 21:17 20.802 KB959426.log
06/10/2009 21:17 19.790 KB960803.log
06/10/2009 21:16 20.259 KB952004.log
06/10/2009 21:16 16.661 KB956572.log
06/10/2009 21:16 15.111 KB961373.log
06/10/2009 21:16 10.203 KB923561.log
06/10/2009 20:41 13.549 KB967715.log
06/10/2009 20:41 5.676 KB938464-v2.log
06/10/2009 20:41 13.153 KB960225.log
06/09/2009 19:15 8.067 KB893803v2.log
04/06/2009 23:53 605 ODBC.INI
03/03/2009 16:40 1.409 QTFont.for
03/03/2009 01:36 32.863 setuplog.txt
----- System ---
Verzeichnis von C:\WINDOWS\system
----- System 32 (Achtung: Zeitfenster beachten!) ---
Verzeichnis von C:\WINDOWS\system32
08/20/2009 17:22 12.598 wpa.dbl
08/20/2009 11:50 357.752 FNTCACHE.DAT
08/02/2009 23:34 4.096 crash
07/07/2009 17:10 24.539.592 MRT.exe
06/16/2009 16:36 81.920 fontsub.dll
06/16/2009 16:36 119.808 t2embed.dll
06/10/2009 21:40 434.838 perfh009.dat
06/10/2009 21:40 68.828 perfc009.dat
06/10/2009 21:40 452.038 perfh007.dat
06/10/2009 21:40 81.842 perfc007.dat
06/10/2009 21:40 1.051.804 PerfStringBackup.INI
06/10/2009 19:15 18.620 CCCInstall_200906101915151093.log
06/03/2009 21:09 1.296.896 quartz.dll
05/13/2009 07:02 915.456 wininet.dll
05/13/2009 07:02 5.936.128 mshtml.dll
05/07/2009 17:32 348.160 localspl.dll
04/30/2009 23:13 1.985.024 iertutil.dll
04/30/2009 23:13 11.064.832 ieframe.dll
04/30/2009 23:12 1.207.808 urlmon.dll
04/30/2009 23:12 1.469.440 inetcpl.cpl
04/30/2009 23:12 25.600 jsproxy.dll
04/30/2009 23:12 385.536 iedkcs32.dll
04/30/2009 13:21 173.056 ie4uinit.exe
04/29/2009 06:41 133.120 extmgr.dll
04/19/2009 21:46 1.847.296 win32k.sys
04/15/2009 16:51 585.216 rpcrt4.dll
03/21/2009 16:06 1.063.424 kernel32.dll
03/10/2009 22:18 1.482.112 LegitCheckControl.dll
03/10/2009 22:18 970.632 WgaTray.exe
03/10/2009 22:18 265.096 WgaLogon.dll
03/08/2009 14:29 1.302.528 ieframe.dll.mui
03/08/2009 14:29 57.344 msrating.dll.mui
03/08/2009 14:28 2.560 mshta.exe.mui
03/08/2009 14:27 4.096 ie4uinit.exe.mui
03/08/2009 14:27 12.288 advpack.dll.mui
03/08/2009 14:27 81.920 iedkcs32.dll.mui
03/08/2009 04:52 21.840 SIntfNT.dll
03/08/2009 04:52 17.212 SIntf32.dll
03/08/2009 04:52 12.067 SIntf16.dll
03/08/2009 04:35 385.024 html.iec
03/08/2009 04:34 208.384 WinFXDocObj.exe
03/08/2009 04:34 236.544 webcheck.dll
03/08/2009 04:34 43.008 licmgr10.dll
03/08/2009 04:34 105.984 url.dll
03/08/2009 04:34 193.536 msrating.dll
03/08/2009 04:34 109.568 occache.dll
03/08/2009 04:33 18.944 corpol.dll
03/08/2009 04:33 726.528 jscript.dll
03/08/2009 04:33 229.376 ieaksie.dll
03/08/2009 04:33 420.352 vbscript.dll
03/08/2009 04:33 125.952 ieakeng.dll
03/08/2009 04:32 72.704 admparse.dll
03/08/2009 04:32 163.840 ieakui.dll
03/08/2009 04:32 36.864 ieudinit.exe
03/08/2009 04:32 71.680 iesetup.dll
03/08/2009 04:32 55.808 iernonce.dll
03/08/2009 04:32 128.512 advpack.dll
03/08/2009 04:32 94.720 inseng.dll
03/08/2009 04:32 594.432 msfeeds.dll
03/08/2009 04:32 611.840 mstime.dll
03/08/2009 04:31 183.808 iepeers.dll
03/08/2009 04:31 13.312 msfeedssync.exe
03/08/2009 04:31 59.904 icardie.dll
03/08/2009 04:31 55.296 msfeedsbs.dll
03/08/2009 04:31 348.160 dxtmsft.dll
03/08/2009 04:31 34.816 imgutil.dll
03/08/2009 04:31 216.064 dxtrans.dll
03/08/2009 04:31 46.592 pngfilt.dll
03/08/2009 04:31 66.560 mshtmled.dll
03/08/2009 04:31 48.128 mshtmler.dll
03/08/2009 04:31 1.638.912 mshtml.tlb
03/08/2009 04:31 45.568 mshta.exe
03/08/2009 04:30 66.560 tdc.ocx
03/08/2009 04:22 164.352 ieui.dll
03/08/2009 04:22 156.160 msls31.dll
03/08/2009 04:15 57.667 ieuinit.inf
03/08/2009 04:11 445.952 ieapfltr.dll
03/06/2009 16:19 286.720 pdh.dll
03/03/2009 01:36 12.540 wpa.bak
02/25/2009 23:42 442.368 ATIDEMGX.dll
02/25/2009 23:41 325.120 ati2dvag.dll
02/25/2009 23:30 11.841.536 atioglxx.dll
02/25/2009 23:30 204.800 atipdlxx.dll
02/25/2009 23:29 155.648 Oemdspif.dll
02/25/2009 23:29 26.112 Ati2mdxx.exe
02/25/2009 23:29 43.520 ati2edxx.dll
02/25/2009 23:29 155.648 ati2evxx.dll
02/25/2009 23:27 602.112 ati2evxx.exe
02/25/2009 23:26 53.248 ATIDDC.DLL
02/25/2009 23:16 3.817.984 ati3duag.dll
02/25/2009 23:09 307.200 atiiiexx.dll
02/25/2009 22:59 2.670.080 ativvaxx.dll
02/25/2009 22:58 151.824 ativvaxx.cap
02/25/2009 22:58 3.107.788 ativva5x.dat
02/25/2009 22:58 887.724 ativva6x.dat
02/25/2009 22:44 49.664 amdpcom32.dll
02/25/2009 22:40 475.136 atikvmag.dll
02/25/2009 22:38 126.976 atiadlxx.dll
02/25/2009 22:38 17.408 atitvo32.dll
02/25/2009 22:35 290.816 atiok3x2.dll
02/25/2009 22:32 45.056 aticalrt.dll
02/25/2009 22:32 45.056 aticalcl.dll
02/25/2009 22:32 626.688 ati2cqag.dll
02/25/2009 22:30 3.227.648 aticaldd.dll
02/25/2009 15:15 593.920 ati2sgag.exe
02/12/2009 22:20 6.873 IE8Eula.rtf
10/30/1617 07:13 3.120 ALLFSAF5a.ocx
----- Prefetch -------------------------
Verzeichnis von C:\WINDOWS\Prefetch
08/20/2009 17:30 16.542 CMD.EXE-034B0549.pf
08/20/2009 17:29 65.042 NOTEPAD++.EXE-20E43543.pf
08/20/2009 17:29 31.034 VERCLSID.EXE-28F52AD2.pf
08/20/2009 17:29 20.928 EXPLORER.EXE-02121B1A.pf
08/20/2009 17:29 179.934 WINRAR.EXE-1A0EFB18.pf
08/20/2009 17:24 19.306 FLASHGOT.EXE-24301770.pf
08/20/2009 17:24 99.948 FIREFOX.EXE-28BE8AE1.pf
08/20/2009 17:23 29.912 LOGONUI.EXE-05FEDB13.pf
08/20/2009 17:23 19.514 AAWTRAY.EXE-11640CC2.pf
08/20/2009 17:23 28.724 WUAUCLT.EXE-1360D60A.pf
08/20/2009 17:23 21.566 ALG.EXE-275708CF.pf
08/20/2009 17:23 28.796 DEVLDR32.EXE-3266C67C.pf
08/20/2009 17:23 33.254 WMIPRVSE.EXE-0D449B4F.pf
08/20/2009 17:23 53.426 IMAPI.EXE-201490BB.pf
08/20/2009 17:23 21.710 UNSECAPP.EXE-16EB9856.pf
08/20/2009 17:23 22.500 IBSERVER.EXE-2134BE34.pf
08/20/2009 17:23 1.212.172 NTOSBOOT-B00DFAAD.pf
08/20/2009 14:29 20.562 NOTEPAD.EXE-2F2D61E1.pf
08/20/2009 14:29 61.714 HIJACKTHIS.EXE-0217D948.pf
08/20/2009 13:46 42.622 AD-AWAREADMIN.EXE-2E1F7B25.pf
08/20/2009 13:46 63.810 AAWSERVICE.EXE-03154300.pf
08/20/2009 13:30 28.780 TASKMGR.EXE-06144C13.pf
08/20/2009 13:25 30.360 SYSINT~1.SCR-1085C59C.pf
08/20/2009 13:04 18.058 RUNDLL32.EXE-6E8D4657.pf
08/20/2009 12:16 56.706 AVSCAN.EXE-068A2CAC.pf
08/20/2009 12:16 61.750 AVCENTER.EXE-377C5668.pf
08/20/2009 11:17 23.206 REGSVR32.EXE-396DEA2C.pf
08/20/2009 11:15 14.428 MBAMGUI.EXE-3688636F.pf
08/20/2009 11:15 16.584 MBAM.EXE-32061666.pf
08/20/2009 11:15 44.412 MSCONFIG.EXE-1EF1EA0F.pf
08/20/2009 11:04 64.782 AVNOTIFY.EXE-22D2A6A0.pf
08/20/2009 11:04 69.270 UPDATE.EXE-33FE454B.pf
08/20/2009 02:32 49.492 AVGUARD.EXE-0EBF8B13.pf
08/20/2009 02:00 19.240 CTFMON.EXE-05E57A5E.pf
08/20/2009 02:00 19.946 B.EXE-1FEED026.pf
08/20/2009 02:00 20.470 MSA.EXE-02AC1082.pf
08/20/2009 01:32 27.356 LAMBAM-SETUP.TMP-0B46C02C.pf
08/20/2009 01:32 20.168 LAMBAM-SETUP.EXE-132847CA.pf
08/20/2009 01:31 13.650 MBAM-SETUP.EXE-39A61CA3.pf
08/20/2009 01:28 18.826 REGEDIT.COM-0204AD01.pf
08/20/2009 01:19 59.114 WDFMGR.EXE-22A3D9C5.pf
08/20/2009 01:19 25.364 SVCHOST.EXE-2D5FBD18.pf
08/20/2009 01:19 14.700 SMAGENT.EXE-09FD679F.pf
08/20/2009 01:19 22.324 CAPM4SWK.EXE-0BF8F428.pf
08/20/2009 01:15 49.318 HH.EXE-104606B2.pf
08/20/2009 01:12 14.744 CAPM4RSK.EXE-1F94D2CB.pf
08/20/2009 01:12 15.586 CAPM4LAK.EXE-39D4C6BC.pf
08/20/2009 01:09 71.198 AAWDRIVERTOOL.EXE-16062C11.pf
08/20/2009 01:07 60.398 MSIEXEC.EXE-330626DC.pf
08/20/2009 01:07 49.240 AD-AWAREAE.EXE-0C9B0A78.pf
08/20/2009 01:07 16.200 LAVASOFTGCHELPER.EXE-03D94920.pf
08/20/2009 01:06 78.888 AD-AWAREAE.EXE-13863249.pf
08/20/2009 00:54 20.840 HJTINSTALL202.EXE-2DCBE448.pf
08/20/2009 00:53 24.434 HIJACKTHIS.EXE-3918B6A3.pf
08/20/2009 00:53 57.992 ACRORD32INFO.EXE-3AD69296.pf
08/20/2009 00:50 14.376 QTTASK.EXE-0C419446.pf
08/20/2009 00:23 113.324 IEXPLORE.EXE-360BBB5C.pf
08/19/2009 23:28 80.236 PROGDVB.EXE-1D681201.pf
08/19/2009 23:21 52.740 MSHTA.EXE-07121ECA.pf
08/19/2009 23:21 69.256 AVCARE.EXE-1F60CD5A.pf
08/19/2009 23:20 15.010 RMACWENOXS.TMP-06065F37.pf
08/19/2009 23:20 18.304 C.EXE-2F100D8C.pf
08/19/2009 23:20 31.118 OXNMRSEWAC.TMP-03850CC8.pf
08/19/2009 23:20 16.612 A.EXE-19DCBE1A.pf
08/19/2009 23:20 2.728 RASVSNET.TMP-36E5B046.pf
08/19/2009 23:20 13.704 SPOOLSV.EXE-3A613CE3.pf
08/19/2009 23:20 35.322 AVWSC.EXE-1742FD55.pf
08/19/2009 23:19 16.358 PING.EXE-30F9CA9D.pf
08/19/2009 23:19 5.220 INCOSNET.TMP-2B1B354C.pf
08/19/2009 23:19 19.934 GUARDGUI.EXE-1FA25B88.pf
08/19/2009 23:19 38.864 XWSARENCOM.TMP-37CCFB87.pf
08/19/2009 23:19 9.640 NXCAMOERSW.TMP-2C4179E0.pf
08/19/2009 23:09 31.000 ANSMXOWRCE.TMP-27004A67.pf
08/19/2009 23:09 31.790 SERR.TMP-073B206E.pf
08/19/2009 23:09 98.550 ACRORD32.EXE-0ABDA372.pf
08/19/2009 22:34 77.638 ACDSEE32.EXE-2D662CCB.pf
08/19/2009 22:34 101.534 7ZG.EXE-1175D9D1.pf
08/19/2009 22:34 40.246 7ZFM.EXE-1F4FC77C.pf
08/19/2009 20:17 111.356 HELPSVC.EXE-1C192440.pf
08/19/2009 20:16 57.614 DFRGNTFS.EXE-38C3807C.pf
08/19/2009 20:16 17.188 DEFRAG.EXE-2858C7E2.pf
08/19/2009 20:16 446.184 Layout.ini
08/19/2009 19:17 22.414 RUNDLL32.EXE-3C500167.pf
08/18/2009 23:50 18.096 SNDVOL32.EXE-0EC6FD20.pf
08/18/2009 22:56 12.986 RUNDLL32.EXE-4FF9832D.pf
08/18/2009 22:55 31.094 EAGLE.EXE-26660B75.pf
08/18/2009 17:06 22.976 REMINDME.EXE-24FF2143.pf
08/18/2009 17:06 80.312 THUNDERBIRD.EXE-05833C98.pf
08/18/2009 13:45 15.532 MCCS.EXE-20B31B1E.pf
08/18/2009 00:53 86.692 EXCEL.EXE-37225E3A.pf
08/18/2009 00:37 15.108 CALC.EXE-02A5B4B1.pf
08/17/2009 23:51 65.070 WMPLAYER.EXE-017735B2.pf
08/17/2009 21:41 86.902 WMPLAYER.EXE-017735B3.pf
08/17/2009 20:11 17.836 SCAD3.EXE-376C22AD.pf
08/17/2009 20:06 68.196 FLVPLAYER.EXE-0999C13C.pf
08/17/2009 11:36 95.642 I_VIEW32.EXE-3680CA15.pf
08/16/2009 20:36 16.394 ASUSPROB.EXE-00420C19.pf
08/16/2009 20:32 35.698 NTVDM.EXE-0A81AB7B.pf
08/15/2009 22:51 58.376 WAR3.EXE-1839AED7.pf
08/15/2009 22:51 26.790 FROZEN THRONE.EXE-1A98598B.pf
08/15/2009 22:50 50.646 WC3BANLIST.EXE-1D56D029.pf
08/14/2009 22:27 43.336 SETUP_WM.EXE-21CBB822.pf
08/14/2009 19:26 85.584 UTORRENT.EXE-00B6F9FC.pf
08/13/2009 00:04 19.916 MSPAINT.EXE-146E0237.pf
08/12/2009 19:35 132.990 VLC.EXE-0B96AEC3.pf
08/12/2009 19:23 63.204 WMPLAYER.EXE-017735B4.pf
08/12/2009 00:52 31.526 WISH84.EXE-37B3B1EA.pf
08/12/2009 00:18 17.904 AVRBURNER.EXE-11E40BCC.pf
08/11/2009 23:48 16.250 AVRDUDE-GUI.EXE-1ACC90D5.pf
08/11/2009 23:47 13.850 AVRDUDE.EXE-36055496.pf
08/11/2009 23:47 68.886 SINAPROG.EXE-3A6DC24E.pf
08/11/2009 23:47 18.330 AVRBURNER.EXE-02D44B03.pf
08/11/2009 23:24 66.260 EXPORTCONTROLLER.EXE-29DA913E.pf
08/11/2009 23:24 91.998 QUICKTIMEPLAYER.EXE-370268C9.pf
08/11/2009 22:59 21.642 WIAACMGR.EXE-335C1EE8.pf
08/11/2009 18:50 65.074 MPLAYERC.EXE-116F880F.pf
08/11/2009 18:50 20.894 MPLAYER2.EXE-2F0692F3.pf
08/11/2009 18:50 22.632 ZPLAYER.EXE-2230A905.pf
08/10/2009 22:46 42.828 CCC.EXE-2F3357A9.pf
08/10/2009 21:19 76.476 BNUPDATE.EXE-3A52293C.pf
08/10/2009 07:39 29.048 RUNDLL32.EXE-4EE39BB6.pf
08/08/2009 01:14 13.956 RICHVIDEO.EXE-22863F01.pf
08/08/2009 01:14 48.182 POWERDVD.EXE-28BB77AA.pf
08/08/2009 01:14 9.350 OLRSTATECHECK.EXE-2ACB7E03.pf
08/07/2009 22:45 10.082 SNETCAT.EXE-0A8C4AF8.pf
08/07/2009 22:34 17.896 RUNDLL32.EXE-3E20222E.pf
08/06/2009 22:26 31.650 DIVXSM.EXE-052AE590.pf
07/16/2009 11:46 34.524 AVWSC.EXE-124724D5.pf
07/15/2009 21:40 51.674 UPDATE.EXE-16715754.pf
07/15/2009 21:40 15.142 PREUPD.EXE-0B43CCF7.pf
130 Datei(en) 6.864.530 Bytes
0 Verzeichnis(se), 2.109.587.456 Bytes frei
----- Tasks ----------------------------
Verzeichnis von C:\WINDOWS\tasks
08/20/2009 17:21 6 SA.DAT
08/20/2009 01:09 458 Ad-Aware Update (Weekly).job
----- Windows/Temp -----------------------
Verzeichnis von C:\WINDOWS\Temp
08/20/2009 17:24 483 WGAErrLog.txt
08/20/2009 17:22 18.270 dbg_RA_proc.txt
08/20/2009 17:22 18.900 dbg_RA_printer.txt
06/09/2009 19:15 14.178 dd_netfx20UI4C5A.txt
01/25/2009 20:06 29.684 PQ_DEBUG.TXT
01/25/2009 19:11 1.607 PQ_BATCH.PQB
01/25/2009 16:55 9.575 PQ_DEBUG.001
01/16/2009 17:37 383 HPZIDS000.log
01/16/2009 17:37 1.232 hppldcoi.log
01/16/2009 17:37 607 update000.log
09/16/2008 19:33 20.425 PQ_DEBUG.002
09/16/2008 19:32 1.500 PQ_BATCH.002
|
| | #5 |
![]() | AVCare, Win32Trojan.TDss und mehr ? 2.filelist 2.Teil Code:
ATTFilter ----- Temp -----------------------------
Verzeichnis von C:\DOKUME~1\Jens\LOKALE~1\Temp
08/20/2009 17:22 16.384 ~DFC1AE.tmp
08/20/2009 12:32 16.384 ~DF20F8.tmp
08/20/2009 11:53 0 mmc20D13DAE.xml
08/20/2009 02:31 16.384 ~DF9E9B.tmp
08/20/2009 02:22 19.012 a.dat
08/20/2009 02:22 16.384 ~DFA757.tmp
08/20/2009 02:15 16.384 ~DFD530.tmp
08/20/2009 01:43 16.384 ~DFD6B6.tmp
08/20/2009 01:18 16.384 ~DF94E3.tmp
08/20/2009 01:15 28.644 Cab4.tmp
08/20/2009 01:15 0 Tar5.tmp
08/20/2009 01:11 16.384 ~DFC837.tmp
08/20/2009 00:48 16.384 ~DF8BC8.tmp
08/20/2009 00:23 0 ~DFDA35.tmp
08/20/2009 00:23 0 ~DFC7A9.tmp
08/20/2009 00:02 0 etilqs_fgKVBIWHlzQ1CKkIyWIi
08/19/2009 23:51 16.384 ~DFE3C4.tmp
08/19/2009 23:37 0 ~DF4B11.tmp
08/19/2009 23:37 0 ~DF2A1F.tmp
08/19/2009 23:27 16.384 ~DFAAEA.tmp
08/19/2009 23:24 0 ~DF65CA.tmp
08/19/2009 23:24 0 ~DF539F.tmp
08/19/2009 23:19 32.768 ~DFB9C7.tmp
08/19/2009 23:19 196.608 xwsarencom.tmp
08/19/2009 23:15 16.624.654 flaCA.tmp
08/19/2009 23:15 20.074.518 flaC9.tmp
08/19/2009 23:15 19.957.695 flaC8.tmp
08/19/2009 23:08 7.488 java_install_reg.log
08/18/2009 17:06 16.384 ~DF2524.tmp
08/18/2009 17:05 16.384 ~DF8AC2.tmp
08/18/2009 12:52 16.384 ~DF9C14.tmp
08/16/2009 20:35 16.384 ~DF3CE3.tmp
08/16/2009 20:32 215.449 wavetool.zip
08/16/2009 20:22 1.052 nscopy.tmp
08/16/2009 20:22 801 nsmail.eml
08/15/2009 22:00 0 2lx_TR24.pdf.part
08/14/2009 22:27 12.818 control.xml
08/12/2009 18:56 0 jblD1.tmp
08/11/2009 23:47 169 SinaProg_8.6.1_Jens_cur.txt
08/10/2009 22:45 16.384 ~DF4140.tmp
08/10/2009 20:55 0 etilqs_eU1hGyGITvaftUGQUO2Z
08/05/2009 19:41 2.439.487 card_installation_guide.pdf
08/05/2009 19:16 31.509 Elektroniklabor_Grundausrstung_3_tmp.xlsx
08/05/2009 19:16 28.014 Elektroniklabor_Grundausrstung_3.ods
08/03/2009 19:59 893 TWAIN.LOG
08/03/2009 19:59 2 Twain001.Mtx
08/03/2009 19:59 156 Twunk001.MTX
08/03/2009 18:50 16.384 ~DFB476.tmp
08/02/2009 23:36 16.384 ~DFF817.tmp
08/02/2009 18:37 16.384 ~DF6C6A.tmp
08/02/2009 18:34 16.384 Perflib_Perfdata_f2c.dat
08/02/2009 18:19 16.384 ~DF5ADF.tmp
08/02/2009 18:17 16.384 Perflib_Perfdata_c34.dat
08/02/2009 17:25 381.005 fla4D9.tmp
08/02/2009 17:25 392.923 fla4D8.tmp
08/02/2009 17:21 1.048.735 fla4AF.tmp
08/02/2009 13:52 1.509.741 JDAC.zip
07/28/2009 17:52 15.660 +~JF47275.tmp
07/28/2009 17:52 20.416 +~JF47276.tmp
07/28/2009 17:52 20.432 +~JF47274.tmp
07/28/2009 17:52 17.424 +~JF47273.tmp
07/28/2009 17:52 17.488 +~JF47267.tmp
07/28/2009 17:52 22.576 +~JF47262.tmp
07/28/2009 17:52 21.472 +~JF47263.tmp
07/28/2009 17:52 29.888 +~JF47261.tmp
07/28/2009 17:52 29.524 +~JF47260.tmp
07/28/2009 17:52 29.296 +~JF47258.tmp
07/28/2009 17:52 26.904 +~JF47259.tmp
07/28/2009 17:52 37.320 +~JF47255.tmp
07/28/2009 17:47 210.432 Schwingungen_Schwebungen.ppt
07/27/2009 23:34 1.116.630 ECv62aSj.zip.part
07/26/2009 18:44 16.384 ~DFBE32.tmp
07/25/2009 17:33 517.338 haax+0qu.rar.part
07/25/2009 17:22 16.384 ~DFE5E4.tmp
07/24/2009 12:31 16.384 ~DFCAA3.tmp
07/23/2009 23:29 860 options.vnc
07/23/2009 22:39 0 GJ3+LqG7.htm.part
07/22/2009 23:49 0 Twunk002.MTX
07/22/2009 18:58 16.384 ~DFA849.tmp
07/21/2009 18:48 16.384 ~DF1873.tmp
07/18/2009 08:11 16.384 ~DFA838.tmp
07/17/2009 21:48 2.439.673 L”sungen Klausur Monien-1.pdf
07/16/2009 19:41 2.439.673 L”sungen Klausur Monien.pdf
07/16/2009 11:59 16.411.176 Compatibility Pack for the 2007 Office system (1).log
07/16/2009 11:50 16.384 ~DF5FB7.tmp
07/16/2009 11:47 11.374 dd_vcredistUI3FE3.txt
07/16/2009 11:47 480.504 dd_vcredistMSI3FE3.txt
07/16/2009 11:39 16.384 ~DFD390.tmp
07/15/2009 22:43 14.782 Elektroniklabor_Grundausrstung_2_tmp2.xlsx
07/15/2009 22:43 0 c7jF29D+.ods.part
07/15/2009 22:23 14.782 Elektroniklabor_Grundausrstung_2_tmp1.xlsx
07/15/2009 22:21 11.659 Elektroniklabor_Grundausrstung_tmp.xlsx
07/15/2009 22:19 15.905.630 Compatibility Pack for the 2007 Office system (0).log
07/15/2009 21:38 76.370 Microsoft .NET Framework 3.5-KB963707_20090715_193846765.html
07/15/2009 21:38 424.072 Microsoft .NET Framework 3.5-KB963707_20090715_193846765-Msi0.txt
07/15/2009 21:17 383 HPZIDS000.log
07/15/2009 21:17 1.232 hppldcoi.log
07/15/2009 21:17 565 update000.log
07/15/2009 21:15 466 MSI39aa1.LOG
07/15/2009 20:56 14.782 Elektroniklabor_Grundausrstung_2_tmp.xlsx
07/15/2009 20:54 123 CFG5C3.tmp
07/15/2009 19:43 29.266 tmp7A3.tmp
07/15/2009 19:43 29.266 tmp7A2.tmp
07/15/2009 19:43 29.266 tmp79E.tmp
07/13/2009 23:53 0 FZ9YgIjj.wmv.part
07/13/2009 22:08 0 9mNOrdfg.wmv.part
07/13/2009 22:08 0 fyYxFWAX.wmv.part
07/13/2009 21:38 0 q0v55B.tmp
07/13/2009 21:33 0 neGvPQvb.wmv.part
07/13/2009 20:40 0 U9iIfqSu.wmv.part
07/12/2009 13:14 0 utt430.tmp
07/12/2009 13:14 68 utt430.tmp.bat
07/12/2009 13:14 0 utt42F.tmp
07/09/2009 00:45 0 HXT3pQf4.pdf.part
07/05/2009 22:36 0 _iUfJr9C.txt.part
07/05/2009 22:35 0 CET_X8Cm.txt.part
07/05/2009 22:35 0 0XO9PrYM.txt.part
07/05/2009 21:54 0 6qOEWhjn.zip.part
07/05/2009 21:47 0 hgCWnh52.wmv.part
07/05/2009 20:48 0 tx669f06.bmp
07/04/2009 21:02 16.384 ~DFB109.tmp
07/04/2009 02:25 0 jbl4B8.tmp
07/04/2009 01:26 0 zkw42D.tmp
07/04/2009 01:26 0 gok42C.tmp
07/04/2009 01:22 0 bf541B.tmp
07/04/2009 01:05 0 o5l3E6.tmp
07/04/2009 00:48 0 h4l3AB.tmp
07/04/2009 00:36 0 1v5387.tmp
07/04/2009 00:20 0 zvc343.tmp
07/04/2009 00:12 0 86z32F.tmp
07/04/2009 00:11 0 oj432D.tmp
07/04/2009 00:10 0 hwb32A.tmp
07/04/2009 00:05 0 4ou315.tmp
07/03/2009 23:53 0 26y2F8.tmp
07/03/2009 23:52 0 eyq2EF.tmp
07/03/2009 23:48 0 aph2E3.tmp
07/03/2009 23:21 0 esv2A6.tmp
07/03/2009 23:17 0 6fc29D.tmp
07/03/2009 23:17 0 21429C.tmp
07/03/2009 23:12 0 aee28C.tmp
07/03/2009 23:09 0 fdf27E.tmp
07/03/2009 23:03 0 25l275.tmp
07/03/2009 23:01 0 k5m271.tmp
07/03/2009 23:01 0 ynk270.tmp
07/03/2009 22:49 0 rzk25C.tmp
07/03/2009 22:42 0 nzh252.tmp
07/03/2009 22:38 0 0n424A.tmp
07/03/2009 21:39 0 rp51E5.tmp
07/03/2009 21:16 0 l3p1C8.tmp
07/03/2009 21:10 0 xth1BC.tmp
07/03/2009 20:59 0 6m91AC.tmp
07/03/2009 20:55 0 h0s1A6.tmp
07/03/2009 20:55 0 7ph1A3.tmp
07/03/2009 20:52 0 6bw1A1.tmp
07/03/2009 20:52 0 j9f1A0.tmp
07/03/2009 20:50 0 kk519B.tmp
07/03/2009 20:40 0 h0i18E.tmp
07/03/2009 20:40 0 lki18D.tmp
07/03/2009 20:07 0 im4167.tmp
07/03/2009 20:01 0 3db15E.tmp
07/03/2009 19:55 0 3d4154.tmp
07/03/2009 19:53 0 6vp14F.tmp
07/03/2009 19:50 0 14w148.tmp
07/03/2009 19:45 0 5x7134.tmp
07/03/2009 19:44 0 yxw133.tmp
07/03/2009 19:44 0 0g9131.tmp
07/03/2009 19:42 0 j1o12C.tmp
07/03/2009 19:37 0 shn120.tmp
07/01/2009 17:53 16.384 ~DF6261.tmp
06/27/2009 16:39 0 5+Wu9YeX.pdf.part
06/27/2009 16:36 813.835 USBASP-1.zip
06/27/2009 16:34 266.754 usbasp.2009-02-28.tar.gz
06/27/2009 16:23 813.835 USBASP.zip
06/26/2009 23:38 325.830 usbisp_v2.1_schematic.pdf
06/26/2009 23:35 359.000 AVRIsp.zip
06/26/2009 23:31 301.779 AVRUSB-ISP (DIL).zip
06/26/2009 20:05 144.406 mw0Wzt9O.rar.part
06/26/2009 18:07 898.351 Astaro_V7_Quick_Start_Guide.pdf
06/26/2009 00:08 0 kaCZLRdV.flv.part
06/25/2009 17:27 16.384 ~DF4613.tmp
06/22/2009 23:33 6.541 melody.zip
06/22/2009 20:16 113.664 Elektroniklabor_Bestellung_10.xls
06/22/2009 20:15 109.568 Elektroniklabor_Bestellung_11.xls
06/22/2009 20:13 103.936 Elektroniklabor_Bestellung_12_Conrad.xls
06/22/2009 16:25 375.479 USBasp_CH.zip
06/21/2009 06:54 70 3EE68A68.TMP
06/19/2009 20:41 0 js1A57.tmp
06/19/2009 20:41 0 in0A56.tmp
06/18/2009 18:19 435 TarTest.txt
06/15/2009 18:36 0 4a4763.tmp
06/13/2009 20:16 16.384 ~DF86B0.tmp
06/13/2009 16:48 16.384 ~DF3F7.tmp
06/11/2009 20:54 16.384 ~DF5F8B.tmp
06/11/2009 13:57 13.504 dd_msdnexpUI74BB.txt
06/11/2009 13:57 429.116 dd_msdnexpMSI74BB.txt
06/11/2009 13:33 16.384 ~DFD18E.tmp
06/10/2009 21:35 16.384 ~DFB318.tmp
06/10/2009 21:27 182.848 dd_dotnetfx35install_lp.txt
06/10/2009 21:27 177.688 uxeventlog.txt
06/10/2009 21:27 695.795 dd_depcheck_NETFX_EXP_35.txt
06/10/2009 21:27 17.042 dd_XPS_LP.txt
06/10/2009 21:27 471.272 dd_NET_Framework35_LangPack_MSI7F2B.txt
06/10/2009 21:27 952.808 dd_NET_Framework_30LP_Agile_Setup7F0E.txt
06/10/2009 21:26 1.765.380 dd_NET_Framework_20LP_Agile_Setup7ECC.txt
06/10/2009 21:26 2 dd_dotnetfx35error_lp.txt
06/10/2009 21:26 94.288 Microsoft .NET Framework 3.5-KB958484_20090610_192614406.html
06/10/2009 21:26 749.232 Microsoft .NET Framework 3.5-KB958484_20090610_192614406-Msi0.txt
06/10/2009 21:26 113.452 Microsoft .NET Framework 3.0-KB958483_20090610_192546781.html
06/10/2009 21:26 2.118.502 Microsoft .NET Framework 3.0-KB958483_20090610_192546781-Msi0.txt
06/10/2009 21:26 4.242 dd_wcf_retCA4254.txt
06/10/2009 21:25 506.154 Microsoft .NET Framework 2.0-KB958481_20090610_192324984.html
06/10/2009 21:25 9.407.584 Microsoft .NET Framework 2.0-KB958481_20090610_192324984-Msi0.txt
06/10/2009 21:25 5.158 ASPNETSetup_00001.log
06/10/2009 21:23 661.584 dd_dotnetfx35install.txt
06/10/2009 21:23 1.443.552 dd_NET_Framework35_MSI7BDD.txt
06/10/2009 21:22 3.225.840 dd_NET_Framework30_Setup7B37.txt
06/10/2009 21:22 4.377 dd_wcf_retCA725B.txt
06/10/2009 21:21 21.735 dd_XPS.txt
06/10/2009 21:21 383 HPZIDS004.log
06/10/2009 21:21 620 update003.log
06/10/2009 21:21 25.138.694 dd_NET_Framework20_Setup7841.txt
06/10/2009 21:19 5.158 ASPNETSetup_00000.log
06/10/2009 21:18 133.906 dd_RGB9RAST_x86.msi7837.txt
06/10/2009 21:18 15.915 dd_clwireg.txt
06/10/2009 20:03 16.384 ~DFECFD.tmp
06/10/2009 19:54 16.384 ~DF19A1.tmp
06/10/2009 19:39 16.384 ~DF9B42.tmp
06/10/2009 19:28 16.384 ~DFC37C.tmp
06/10/2009 19:00 16.384 ~DFAE91.tmp
06/09/2009 23:27 16.384 ~DFBA9E.tmp
06/09/2009 23:21 28.704 etilqs_HfdnEryT3Ed1tYYa5IVr
06/09/2009 23:17 16.384 ~DF450A.tmp
06/09/2009 23:05 12.304 etilqs_WDzEtZ3a11NwhBxWcEF7
06/09/2009 22:54 16.384 ~DFB9AA.tmp
06/09/2009 21:14 16.384 ~DFAE5.tmp
06/09/2009 21:08 16.384 ~DF5718.tmp
06/09/2009 20:55 16.384 ~DFA51E.tmp
06/09/2009 20:52 6.170 dd_dotnetfx35error.txt
06/09/2009 20:52 0 bch59.tmp
06/09/2009 20:52 0 bch56.tmp
06/09/2009 20:51 0 bch53.tmp
06/09/2009 20:51 0 bch50.tmp
06/09/2009 20:51 0 bch4D.tmp
06/09/2009 20:51 0 bch4A.tmp
06/09/2009 20:50 0 bch47.tmp
06/09/2009 20:50 0 bch44.tmp
06/09/2009 20:50 0 bch42.tmp
06/09/2009 20:50 0 bch3F.tmp
06/09/2009 20:50 0 bch3C.tmp
06/09/2009 20:38 0 bchE.tmp
06/09/2009 20:38 0 bchB.tmp
06/09/2009 20:38 0 bch8.tmp
06/09/2009 20:37 0 bch5.tmp
06/09/2009 20:27 16.384 ~DF14A4.tmp
06/09/2009 20:25 174 MSIdbaf4.LOG
06/09/2009 20:12 16.384 ~DFD6DE.tmp
06/09/2009 20:08 16.384 ~DFC86C.tmp
06/09/2009 20:04 438 MSIba255.LOG
06/09/2009 20:04 0 is56.tmp
06/09/2009 19:59 174 MSI781a1.LOG
06/09/2009 19:53 16.384 ~DF411.tmp
06/09/2009 19:50 174 MSIab219.LOG
06/09/2009 19:40 16.384 ~DF790F.tmp
06/09/2009 19:35 16.384 ~DF5525.tmp
06/09/2009 19:20 0 isF3.tmp
06/09/2009 19:12 16.384 ~DFE206.tmp
06/09/2009 18:45 16.384 ~DFE0CB.tmp
05/26/2009 00:37 16.384 ~DFDCAF.tmp
04/19/2009 14:48 196.781 270xA_datasheet.pdf
04/05/2009 18:31 1.637.636 ZEOSDBO-6.6.4-stable.zip
04/05/2009 17:49 716.800 Compact_Express_Comparison.doc
04/05/2009 17:41 100.352 sqlservercompactdatasheet_final.doc
04/05/2009 17:36 79.360 SSCEOverview.doc
03/22/2009 00:49 20.500 etilqs_rDKgRRNxgEECId8jpQdy
03/10/2009 01:46 295.410 doc6296.pdf
03/10/2009 01:07 7.992.685 datasheet-1.pdf
03/09/2009 22:40 168.497 054-07461-0-AT91R40008.pdf
03/09/2009 22:15 123.191 STM32_EVAL_rev00.pdf
03/09/2009 20:42 437.675 75016140.pdf
02/02/2009 17:33 12.304 etilqs_Xo8nblBcbInaI76HQcIr
Code:
ATTFilter "WPF/E" (codename) Community Technology Preview (Dec 2006)
7-Zip 4.59 beta
Abe's Oddysee
ACDSee 32
ACDSee 9 Photo Manager
Active Ports
Ad-Aware
Ad-Aware SE Personal
Adobe Audition 1.5
Adobe Flash Player Plugin
Adobe Photoshop CS
Adobe Reader 7.0.5 Language Support
Adobe Reader 7.1.0
Adobe Reader Chinese Simplified Fonts
Adobe Reader Japanese Fonts
Advanced LAN Pump version 3.1
AGEIA PhysX v7.09.13
aGSM v2.35c, altSoft
Alcohol 120%
Aliens vs. Predator 2
Alt-Tab Task Switcher Powertoy for Windows XP
Antman 2
Apple Mobile Device Support
Apple Software Update
ASUS Probe V2.21.07
ATI - Software Uninstall Utility
ATI AVIVO Codecs
ATI Catalyst Control Center
ATI Display Driver
ATITool Overclocking Utility
Avira AntiVir Personal - Free Antivirus
AviSynth 2.5
AXIS NetPilot
AXIS Print Monitor for Canon CAPT Printers
Battlefield 1942
BitTorrent 4.0.2
Bonjour
Bontago
Borland C++Builder 6
Borland Delphi 7
Bricx Command Center
Bullzip PDF Printer 5.0.0.609
Cain & Abel v2.69
Calculator Powertoy for Windows XP
Canon iR1510-1670
CCleaner (remove only)
CD Audio Reader Filter (remove only)
CloneCD
CmdHere Powertoy For Windows XP
Code::Blocks
Compatibility Pack for the 2007 Office system
Creative Treiber für Massenspeicher
DC++ 0.698
Derive 5
Digital Video
Direct Connect 1.0 Preview Build 9
DirectVobSub (remove only)
DivX
DivX Converter
DivX Player
DivX Web Player
Driver Sweeper 1.5.5
DS-MP3 Source 1.30
DScaler 5 Mpeg Decoders
DVD Decrypter (Remove Only)
DVD Shrink 3.2
DVDFab Platinum 3.1.8.0
EAGLE 4.16r1
Ethereal 0.99.0
Ettercap NG 0.7.3
Express Rip
ffdshow [rev 988] [2007-03-04]
Firebird/InterBase(r) ODBC driver 2.0
FlashFXP
FlatOut2
FLV Player 1.3.3
Free Download Manager 2.1
Free Fire Screensaver
FreeBASIC 0.15b
G3 Torrent
GetASFStream
GetRight
GPL Ghostscript 8.54
GPL Ghostscript Fonts
GSview 4.8
GUI for dvdauthor 1.04
Haali Media Splitter
Half-Life(R) 2
HijackThis 2.0.2
HP Photosmart All-In-One Software 9.0
Huffyuv AVI lossless video codec (Remove Only)
Hurrican 1.0.0.4
HydraVision
Icy Tower v1.2 (11kHz)
IL-2 Sturmovik
IL-2 Sturmovik 1946
innovatek Leistungsrechner 2007
InterBase 6.5
InterVideo WinDVD 4
IrfanView (remove only)
iTunes
J2SE Development Kit 5.0 Update 1
J2SE Runtime Environment 5.0 Update 1
J2SE Runtime Environment 5.0 Update 2
J2SE Runtime Environment 5.0 Update 4
JAlbum
Java 3D 1.5.1
Klingon Academy
LANLEECH R3
LANWalk Scanner 3.x
Lazarus 0.9.26.2
LC5
Logitech Gaming Software
Look@LAN 2.50 Build 29
LTspice IV
LTspice/SwCADIII
Macromedia Extension Manager
Macromedia Flash MX
Macromedia Shockwave Player
Malwarebytes' Anti-Malware
Manufactoid (remove only)
Maple 11
Maya Fluid Effects Screensaver
Metal Slug Series with Enabled MAME 0.78
Metasploit Framework 3.0
Mic1 Emulator
Microsoft .NET Framework 1.1
Microsoft .NET Framework 1.1 Hotfix (KB928366)
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 2.0 Service Pack 2 Language Pack - DEU
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 3.0 Service Pack 2 Language Pack - DEU
Microsoft .NET Framework 3.5 Language Pack SP1 - DEU
Microsoft .NET Framework 3.5 SP1
Microsoft Age of Empires II
Microsoft Age of Empires II: The Conquerors Expansion
Microsoft AppLocale
Microsoft Office Small Business Edition 2003
Microsoft Platform SDK (R2) (3790.2075)
Microsoft Rechner-Plus
Microsoft Rise Of Nations
Microsoft SQL Server 2005 Compact Edition [DEU]
Microsoft SQL Server Management Studio Express
Microsoft Visual C++ 2005 Express Edition - ENU
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
Microsoft Windows Application Compatibility Database
Microsoft XML Parser and SDK
MIDI File Converter
MilkShape 3D 1.8.0
MinGW 5.0.3
mIRC
mirkes.de Tiny Hexer
MIT MathML Fonts 1.0
Mozilla (1.6)
Mozilla Firefox (3.5.2)
Mozilla Thunderbird (2.0.0.22)
mpowerplayer
MSN Gaming Zone
MSXML 4.0 SP2 (KB927978)
MSXML 4.0 SP2 (KB936181)
MSXML 4.0 SP2 (KB954430)
MSXML 6 Service Pack 2 (KB954459)
MSXML4 Parser
Natural Selection 3.1
Nero OEM
NetBeans IDE 4.0
Network Chemistry Packetyzer 5.0.0
Nimo Codecs Pack v5.0 (Remove Only)
ODF Add-In für Microsoft Office
OpenSource Flash Video Splitter (remove only)
Origin 6.0G
PHP-GTK 2 (remove only)
PicaLoader 1.50.1201
PowerDVD
Prevx 3.0
Prism Video Converter
ProgDVB
PSpice Student 9.1
Python 2.4 pygame-1.7.1release
Python 2.4.3
Qtracker
Quake III Arena
QuickTime
RealMedia (remove only)
RealPlayer
Riva FLV Player
RivaTuner v2.24
Robotics Invention System 2.0
Serious Samurize
Shared Add-in Extensibility Update for Microsoft .NET Framework 2.0 (KB908002)
Shared Add-in Support Update for Microsoft .NET Framework 2.0 (KB908002)
SHOUTcast Source (remove only)
SketchUp 5
SketchUp 5 Mechanical Design Library
SketchUp 5 Symbols Library
SmartFTP Client
SmartFTP Client 2.0
SmartFTP Client 2.0 Setup Files (remove only)
SoundMAX
SpeechRedist
sPlan 6.0
SQL Server Command Line Query Tool
Star Trek Armada II
Star Wars JK II Jedi Outcast
Steam(TM)
Stereoscopic Player
Street Hacker Update 1.1.3
Switch
TARGET 3001! V12 discover
THE HOUSE OF THE DEAD 3
TmNationsForever
TortoiseSVN 1.6.0.15855 (32 bit)
TrackMania Nations ESWC 0.1.7.5
Tweak UI
Ultra RM Converter 2.3.4
UltraVNC v1.0.2
Unreal Tournament 2004
Uplink
ViewSonic Windows XP Signed Files
VisiBroker for Cpp 4.5
VLS
VNC 4.0
WavePad Uninstall
WC3Banlist
Winamp (remove only)
Windows Genuine Advantage Validation Tool (KB892130)
Windows Internet Explorer 8
Windows Live Anmelde-Assistent
Windows Live installer
Windows Live Messenger
Windows XP Service Pack 3
WinPcap 3.1
WinRAR archiver
WinTV NOVA
XVID Codec Installation
Zoom Player (remove only)
|
| | #6 |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() | AVCare, Win32Trojan.TDss und mehr ? hi 1. deinstalliere Gmer 2. Lade es erneut herunter, aber: Achtung!: wenn Gmer nicht ausgeführt werden kann (ein Rootkit kann es verhindern): - ** also bevor Du "gmer.exe" auf dem Desktop anlegst: - ** versuche gmer.exe umbenennen und dann ausführen - Wähle eine beliebige Dateiname, die Endung soll *.com sein! ca 30 Min. (max 60 Min.) Laufabschnitt sollte reichen! - wenn es wieder probleme gibt, fahre einfach mit Punkt 5. (Rootrepeal) fort |
| | #7 |
![]() | AVCare, Win32Trojan.TDss und mehr ? Hi, von GMER habe ich mit zufällig generiertem Namen heruntergeladen und starten lässt es sich ja. Ich habe es diesmal angehalten bevor er sich wieder aufhing, vollständig ist die Liste also vermutlich nicht, auch wenn ich mir sicher bin dass in den darauffolgenden 40min keine weiteren Einträge in der folgenden Auflistung gemacht werden. Erstmal das was er ganz am Anfang meldet: Code:
ATTFilter GMER 1.0.15.15077 [2d1ohsw7.exe] - http://www.gmer.net
Rootkit quick scan 2009-08-21 09:18:50
Windows 5.1.2600 Service Pack 3
---- System - GMER 1.0.15 ----
Code 8A3AECD0 ZwEnumerateKey
Code 8A1A12E8 ZwFlushInstructionCache
Code 8A5B10AE IofCallDriver
Code 8A4F7D6E IofCompleteRequest
Code 8A51E68D ZwSaveKey
Code 8A5A900D ZwSaveKeyEx
---- Devices - GMER 1.0.15 ----
Device \FileSystem\Ntfs \Ntfs 8A80B1F8
AttachedDevice \Driver\Tcpip \Device\Tcp Lbd.sys (Boot Driver/Lavasoft AB)
---- Modules - GMER 1.0.15 ----
Module _________ F7A37000-F7A4F000 (98304 bytes)
---- Services - GMER 1.0.15 ----
Service C:\WINDOWS\system32\drivers\UACootjxyfoaw.sys (*** hidden *** ) [SYSTEM] UACd.sys <-- ROOTKIT !!!
---- EOF - GMER 1.0.15 ----
|
| | #8 |
![]() | AVCare, Win32Trojan.TDss und mehr ? Hier besagter Teil des komplett Scans Code:
ATTFilter GMER 1.0.15.15077 [2d1ohsw7.exe] - http://www.gmer.net
Rootkit scan 2009-08-21 11:34:37
Windows 5.1.2600 Service Pack 3
---- System - GMER 1.0.15 ----
INT 0x62 ? 8A79EBF8
INT 0x63 ? 8A430F00
INT 0x73 ? 8A430F00
INT 0x73 ? 8A430F00
INT 0x82 ? 8A79EBF8
INT 0x83 ? 8A79EBF8
INT 0x83 ? 8A79EBF8
INT 0x83 ? 8A430F00
INT 0x83 ? 8A79EBF8
INT 0xB4 ? 8A430F00
Code 8A30E1B0 ZwEnumerateKey
Code 8A2E6218 ZwFlushInstructionCache
Code 8A5DEAD6 IofCallDriver
Code 8A3E0256 IofCompleteRequest
Code 8A2E627D ZwSaveKey
Code 8A31A255 ZwSaveKeyEx
---- Kernel code sections - GMER 1.0.15 ----
.text ntoskrnl.exe!IofCallDriver 804E13A7 5 Bytes JMP 8A5DEADB
.text ntoskrnl.exe!IofCompleteRequest 804E17BD 5 Bytes JMP 8A3E025B
.text ntoskrnl.exe!ZwSaveKey 804E42AE 1 Byte [E9]
.text ntoskrnl.exe!ZwSaveKey 804E42AE 5 Bytes JMP 8A2E6282
.text ntoskrnl.exe!ZwSaveKeyEx 804E42C2 5 Bytes JMP 8A31A25A
PAGE ntoskrnl.exe!ZwEnumerateKey 80578E14 5 Bytes JMP 8A30E1B4
PAGE ntoskrnl.exe!ZwFlushInstructionCache 80587BFB 5 Bytes JMP 8A2E621C
? spfx.sys Das System kann die angegebene Datei nicht finden. !
.text USBPORT.SYS!DllUnload B8FBA8AC 5 Bytes JMP 8A4304E0
---- Kernel IAT/EAT - GMER 1.0.15 ----
IAT \WINDOWS\System32\Drivers\SCSIPORT.SYS[ntoskrnl.exe!DbgBreakPoint] 8A80F2D8
IAT pci.sys[ntoskrnl.exe!IoDetachDevice] [F7508C4C] spfx.sys
IAT pci.sys[ntoskrnl.exe!IoAttachDeviceToDeviceStack] [F7508CA0] spfx.sys
IAT \SystemRoot\System32\DRIVERS\USBPORT.SYS[ntoskrnl.exe!DbgBreakPoint] 8A4305E0
IAT \SystemRoot\System32\DRIVERS\i8042prt.sys[HAL.dll!READ_PORT_UCHAR] [F74E8048] spfx.sys
---- Devices - GMER 1.0.15 ----
Device \FileSystem\Ntfs \Ntfs 8A80B1F8
Device \Driver\sptd \Device\3220481158 spfx.sys
Device \Driver\usbuhci \Device\USBPDO-0 8A2C2500
Device \Driver\dmio \Device\DmControl\DmIoDaemon 8A80D1F8
Device \Driver\dmio \Device\DmControl\DmConfig 8A80D1F8
Device \Driver\dmio \Device\DmControl\DmPnP 8A80D1F8
Device \Driver\dmio \Device\DmControl\DmInfo 8A80D1F8
Device \Driver\usbuhci \Device\USBPDO-1 8A2C2500
Device \Driver\usbuhci \Device\USBPDO-2 8A2C2500
Device \Driver\usbuhci \Device\USBPDO-3 8A2C2500
Device \Driver\usbehci \Device\USBPDO-4 8A319500
AttachedDevice \Driver\Tcpip \Device\Tcp Lbd.sys (Boot Driver/Lavasoft AB)
Device \Driver\prodrv06 \Device\ProDrv06 E1C8E248
Device \Driver\NetBT \Device\NetBT_Tcpip_{31392642-2787-4AA7-A08C-85E146C00CA4} 8A38F500
Device \Driver\Ftdisk \Device\HarddiskVolume1 8A79F1F8
Device \Driver\NetBT \Device\NetBT_Tcpip_{C1C71F34-1886-40B2-BDD7-41047B3AE2DF} 8A38F500
Device \Driver\Ftdisk \Device\HarddiskVolume2 8A79F1F8
Device \FileSystem\Rdbss \Device\FsWrap 8A401840
Device \Driver\Ftdisk \Device\HarddiskVolume3 8A79F1F8
Device \Driver\atapi \Device\Ide\IdeDeviceP1T1L0-24 8A6343E8
Device \Driver\atapi \Device\Ide\IdePort0 8A6343E8
Device \Driver\atapi \Device\Ide\IdeDeviceP2T0L0-5 8A6343E8
Device \Driver\atapi \Device\Ide\IdePort1 8A6343E8
Device \Driver\atapi \Device\Ide\IdePort2 8A6343E8
Device \Driver\atapi \Device\Ide\IdePort3 8A6343E8
Device \Driver\atapi \Device\Ide\IdeDeviceP1T0L0-1c 8A6343E8
Device \Driver\atapi \Device\Ide\IdeDeviceP3T0L0-10 8A6343E8
Device \Driver\PCI_PNP9908 \Device\00000066 spfx.sys
Device \Driver\PCI_PNP9908 \Device\00000066 spfx.sys
Device \Driver\Ftdisk \Device\HarddiskVolume4 8A79F1F8
Device \Driver\prohlp02 \Device\ProHlp02 E182A5F0
Device \Driver\NetBT \Device\NetBt_Wins_Export 8A38F500
Device \Driver\NetBT \Device\NetbiosSmb 8A38F500
Device \FileSystem\Srv \Device\LanmanServer 8A41B698
Device \Driver\usbuhci \Device\USBFDO-0 8A2C2500
Device \Driver\usbuhci \Device\USBFDO-1 8A2C2500
Device \FileSystem\MRxSmb \Device\LanmanDatagramReceiver 8A3D0368
Device \FileSystem\MRxSmb \Device\LanmanDatagramReceiver 8A549030
Device \Driver\usbuhci \Device\USBFDO-2 8A2C2500
Device \FileSystem\MRxSmb \Device\LanmanRedirector 8A3D0368
Device \FileSystem\MRxSmb \Device\LanmanRedirector 8A549030
Device \Driver\usbuhci \Device\USBFDO-3 8A2C2500
Device \FileSystem\Npfs \Device\NamedPipe 8A475E70
Device \Driver\usbehci \Device\USBFDO-4 8A319500
Device \Driver\Ftdisk \Device\FtControl 8A79F1F8
Device \FileSystem\Msfs \Device\Mailslot 8A3153B0
Device \Driver\abezo9r8 \Device\Scsi\abezo9r81Port4Path0Target1Lun0 8A45A008
Device \Driver\abezo9r8 \Device\Scsi\abezo9r81 8A45A008
Device \Driver\a347scsi \Device\Scsi\a347scsi1Port5Path0Target0Lun0 89854AB0
Device \Driver\abezo9r8 \Device\Scsi\abezo9r81Port4Path0Target0Lun0 8A45A008
Device \Driver\a347scsi \Device\Scsi\a347scsi1 89854AB0
Device \FileSystem\Fs_Rec \FileSystem\UdfsCdRomRecognizer 8A344170
Device \FileSystem\Fs_Rec \FileSystem\FatCdRomRecognizer 8A344170
Device \FileSystem\Fs_Rec \FileSystem\CdfsRecognizer 8A344170
Device \FileSystem\Fs_Rec \FileSystem\FatDiskRecognizer 8A344170
Device \FileSystem\Fs_Rec \FileSystem\UdfsDiskRecognizer 8A344170
Device \FileSystem\Cdfs \Cdfs 8A3773C8
Device \FileSystem\Cdfs \Cdfs 8A2F01E8
---- Modules - GMER 1.0.15 ----
Module _________ F7A37000-F7A4F000 (98304 bytes)
---- Processes - GMER 1.0.15 ----
Library \\?\globalroot\systemroot\system32\UACaxujnepyof.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [228] 0x10000000
Library \\?\globalroot\systemroot\system32\UACaxujnepyof.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [264] 0x10000000
Library \\?\globalroot\systemroot\system32\UACaxujnepyof.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [396] 0x10000000
Library \\?\globalroot\systemroot\system32\UACaxujnepyof.dll (*** hidden *** ) @ C:\WINDOWS\system32\svchost.exe [908] 0x10000000
Library \\?\globalroot\systemroot\system32\UACaxujnepyof.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [960] 0x10000000
Library \\?\globalroot\systemroot\system32\UACaxujnepyof.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [1068] 0x10000000
Library \\?\globalroot\systemroot\system32\UACaxujnepyof.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [1108] 0x10000000
Library \\?\globalroot\systemroot\system32\UACaxujnepyof.dll (*** hidden *** ) @ C:\WINDOWS\System32\svchost.exe [1488] 0x10000000
---- Services - GMER 1.0.15 ----
Service C:\WINDOWS\system32\drivers\UACootjxyfoaw.sys (*** hidden *** ) [SYSTEM] UACd.sys <-- ROOTKIT !!!
---- Registry - GMER 1.0.15 ----
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xE2 0xAA 0x42 0xC2 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 C:\Programme\DAEMON Tools Lite\
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x14 0x16 0xAF 0x33 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0x33 0xFD 0x83 0xB9 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41@khjeh 0x22 0x66 0xD1 0x49 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACootjxyfoaw.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys\modules
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACootjxyfoaw.sys
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACqcwooiyyvp.dll
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACaxujnepyof.dll
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACkkurhhtsar.dat
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys\modules@uacmal \\?\globalroot\systemroot\system32\UACocbirxjadt.db
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys\modules@uacrem \\?\globalroot\systemroot\system32\UACqerpbdogdk.dll
Reg HKLM\SYSTEM\CurrentControlSet\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACalitjljxoc.dll
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xE2 0xAA 0x42 0xC2 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 C:\Programme\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x14 0x16 0xAF 0x33 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0x33 0xFD 0x83 0xB9 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41@khjeh 0x22 0x66 0xD1 0x49 ...
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@start 1
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@type 1
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@imagepath \systemroot\system32\drivers\UACootjxyfoaw.sys
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys@group file system
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACd \\?\globalroot\systemroot\system32\drivers\UACootjxyfoaw.sys
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@UACc \\?\globalroot\systemroot\system32\UACqcwooiyyvp.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacbbr \\?\globalroot\systemroot\system32\UACaxujnepyof.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacsr \\?\globalroot\systemroot\system32\UACkkurhhtsar.dat
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacmal \\?\globalroot\systemroot\system32\UACocbirxjadt.db
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacrem \\?\globalroot\systemroot\system32\UACqerpbdogdk.dll
Reg HKLM\SYSTEM\ControlSet002\Services\UACd.sys\modules@uacserf \\?\globalroot\systemroot\system32\UACalitjljxoc.dll
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xF9 0xA3 0x99 0xD2 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 C:\Programme\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x14 0x16 0xAF 0x33 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0xFB 0xBF 0x3C 0x18 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf41@khjeh 0xB6 0xA8 0xC8 0xF5 ...
---- Files - GMER 1.0.15 ----
File C:\Dokumente und Einstellungen\Jens\Lokale Einstellungen\Temp\UACc96b.tmp 343040 bytes executable
---- EOF - GMER 1.0.15 ----
Geändert von Befallener (21.08.2009 um 10:57 Uhr) |
| | #9 |
![]() | AVCare, Win32Trojan.TDss und mehr ? Als erstes meldet Root Repeal 5x "Could not read Boot sector. Try adjusting the Disk level in the Options dialog" (Ich habe 4 Partitionen). Deine Anleitung zu den Einstellungen die ich vornehmen soll, verstehe ich leider nicht. Wo soll ich ein Häkchen machen, die angegebenen Punkte existieren als Reiter. Scannen ergab folgendes: Edit: Jetzt hab ichs, unter Report und dann auf Scan. Drivers: Code:
ATTFilter ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2009/08/21 11:51
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Drivers
-------------------
Name:
Image Path:
Address: 0x00000000 Size: -2141804192 File Visible: - Signed: -
Status: -
Name:
Image Path:
Address: 0xF7A37000 Size: 98304 File Visible: No Signed: -
Status: -
Name: a347bus.sys
Image Path: a347bus.sys
Address: 0xF7497000 Size: 158720 File Visible: - Signed: -
Status: -
Name: a347scsi.sys
Image Path: a347scsi.sys
Address: 0xF798D000 Size: 5248 File Visible: - Signed: -
Status: -
Name: a347scsi.sys
Image Path: a347scsi.sys
Address: 0xF798D000 Size: 5248 File Visible: - Signed: -
Status: Hidden from the Windows API!
Name: abezo9r8.SYS
Image Path: C:\WINDOWS\System32\Drivers\abezo9r8.SYS
Address: 0xB8EA6000 Size: 225280 File Visible: - Signed: -
Status: -
Name: ACPI.sys
Image Path: ACPI.sys
Address: 0xF7858000 Size: 188800 File Visible: - Signed: -
Status: -
Name: ACPI_HAL
Image Path: \Driver\ACPI_HAL
Address: 0x804D7000 Size: 2265088 File Visible: - Signed: -
Status: -
Name: afd.sys
Image Path: C:\WINDOWS\System32\drivers\afd.sys
Address: 0xA8B3E000 Size: 138496 File Visible: - Signed: -
Status: -
Name: agp440.sys
Image Path: agp440.sys
Address: 0xF7697000 Size: 42368 File Visible: - Signed: -
Status: -
Name: aslm75.sys
Image Path: C:\WINDOWS\system32\drivers\aslm75.sys
Address: 0xBA5A8000 Size: 3488 File Visible: - Signed: -
Status: -
Name: ati2cqag.dll
Image Path: C:\WINDOWS\System32\ati2cqag.dll
Address: 0xBF065000 Size: 626688 File Visible: - Signed: -
Status: -
Name: ati2dvag.dll
Image Path: C:\WINDOWS\System32\ati2dvag.dll
Address: 0xBF012000 Size: 339968 File Visible: - Signed: -
Status: -
Name: ati2mtag.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ati2mtag.sys
Address: 0xB9002000 Size: 3891200 File Visible: - Signed: -
Status: -
Name: ati3duag.dll
Image Path: C:\WINDOWS\System32\ati3duag.dll
Address: 0xBF1CD000 Size: 3821568 File Visible: - Signed: -
Status: -
Name: atikvmag.dll
Image Path: C:\WINDOWS\System32\atikvmag.dll
Address: 0xBF0FE000 Size: 540672 File Visible: - Signed: -
Status: -
Name: atiok3x2.dll
Image Path: C:\WINDOWS\System32\atiok3x2.dll
Address: 0xBF182000 Size: 307200 File Visible: - Signed: -
Status: -
Name: ATITool.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ATITool.sys
Address: 0xF7466000 Size: 49152 File Visible: - Signed: -
Status: -
Name: ativvaxx.dll
Image Path: C:\WINDOWS\System32\ativvaxx.dll
Address: 0xBF572000 Size: 2670592 File Visible: - Signed: -
Status: -
Name: atksgt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\atksgt.sys
Address: 0xA6056000 Size: 165376 File Visible: - Signed: -
Status: -
Name: ATMFD.DLL
Image Path: C:\WINDOWS\System32\ATMFD.DLL
Address: 0xBFFA0000 Size: 286720 File Visible: - Signed: -
Status: -
Name: audstub.sys
Image Path: C:\WINDOWS\System32\DRIVERS\audstub.sys
Address: 0xB8FDF000 Size: 3072 File Visible: - Signed: -
Status: -
Name: aujasnkj.sys
Image Path: C:\DOKUME~1\Jens\LOKALE~1\Temp\aujasnkj.sys
Address: 0xA5783000 Size: 84352 File Visible: No Signed: -
Status: -
Name: avgio.sys
Image Path: C:\Programme\Avira\AntiVir Desktop\avgio.sys
Address: 0xF79DD000 Size: 6144 File Visible: - Signed: -
Status: -
Name: avgntflt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\avgntflt.sys
Address: 0xA66CC000 Size: 81920 File Visible: - Signed: -
Status: -
Name: avipbb.sys
Image Path: C:\WINDOWS\system32\DRIVERS\avipbb.sys
Address: 0xA8A4C000 Size: 114688 File Visible: - Signed: -
Status: -
Name: Beep.SYS
Image Path: C:\WINDOWS\System32\Drivers\Beep.SYS
Address: 0xF79CF000 Size: 4224 File Visible: - Signed: -
Status: -
Name: BOOTVID.dll
Image Path: C:\WINDOWS\system32\BOOTVID.dll
Address: 0xF7897000 Size: 12288 File Visible: - Signed: -
Status: -
Name: CAPM4LP.SYS
Image Path: C:\WINDOWS\system32\Drivers\CAPM4LP.SYS
Address: 0xA6241000 Size: 15264 File Visible: - Signed: -
Status: -
Name: Cdfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Cdfs.SYS
Address: 0xF76F7000 Size: 63744 File Visible: - Signed: -
Status: -
Name: cdrom.sys
Image Path: C:\WINDOWS\System32\DRIVERS\cdrom.sys
Address: 0xF7887000 Size: 62976 File Visible: - Signed: -
Status: -
Name: CLASSPNP.SYS
Image Path: C:\WINDOWS\System32\DRIVERS\CLASSPNP.SYS
Address: 0xF7647000 Size: 53248 File Visible: - Signed: -
Status: -
Name: ctlfacem.sys
Image Path: C:\WINDOWS\system32\drivers\ctlfacem.sys
Address: 0xF79C1000 Size: 6912 File Visible: - Signed: -
Status: -
Name: ctljystk.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ctljystk.sys
Address: 0xB8FED000 Size: 3712 File Visible: - Signed: -
Status: -
Name: cvintdrv.SYS
Image Path: C:\WINDOWS\System32\Drivers\cvintdrv.SYS
Address: 0xB9C02000 Size: 3776 File Visible: - Signed: -
Status: -
Name: disk.sys
Image Path: disk.sys
Address: 0xF7637000 Size: 36352 File Visible: - Signed: -
Status: -
Name: disk.sys
Image Path: disk.sys
Address: 0xF7637000 Size: 36352 File Visible: - Signed: -
Status: Hidden from the Windows API!
Name: dmio.sys
Image Path: dmio.sys
Address: 0xF7961000 Size: 154112 File Visible: - Signed: -
Status: -
Name: dmload.sys
Image Path: dmload.sys
Address: 0xF798B000 Size: 5888 File Visible: - Signed: -
Status: -
Name: drmk.sys
Image Path: C:\WINDOWS\system32\drivers\drmk.sys
Address: 0xF7446000 Size: 61440 File Visible: - Signed: -
Status: -
Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xA8A34000 Size: 98304 File Visible: No Signed: -
Status: -
Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF79DF000 Size: 8192 File Visible: No Signed: -
Status: -
Name: Dxapi.sys
Image Path: C:\WINDOWS\System32\drivers\Dxapi.sys
Address: 0xB8D4D000 Size: 12288 File Visible: - Signed: -
Status: -
Name: dxg.sys
Image Path: C:\WINDOWS\System32\drivers\dxg.sys
Address: 0xBF000000 Size: 73728 File Visible: - Signed: -
Status: -
Name: dxgthk.sys
Image Path: C:\WINDOWS\System32\drivers\dxgthk.sys
Address: 0xF7A97000 Size: 4096 File Visible: - Signed: -
Status: -
Name: EL2K_XP.sys
Image Path: C:\WINDOWS\System32\DRIVERS\EL2K_XP.sys
Address: 0xB8F7E000 Size: 147456 File Visible: - Signed: -
Status: -
Name: ElbyCDFL.sys
Image Path: C:\WINDOWS\System32\Drivers\ElbyCDFL.sys
Address: 0xB9AB0000 Size: 15360 File Visible: - Signed: -
Status: -
Name: ElbyCDIO.sys
Image Path: C:\WINDOWS\System32\Drivers\ElbyCDIO.sys
Address: 0xA60E7000 Size: 9792 File Visible: - Signed: -
Status: -
Name: emu10k1m.sys
Image Path: C:\WINDOWS\system32\drivers\emu10k1m.sys
Address: 0xB8F38000 Size: 283904 File Visible: - Signed: -
Status: -
Name: fdc.sys
Image Path: C:\WINDOWS\System32\DRIVERS\fdc.sys
Address: 0xF7787000 Size: 27392 File Visible: - Signed: -
Status: -
Name: Fips.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fips.SYS
Address: 0xB9B5F000 Size: 44672 File Visible: - Signed: -
Status: -
Name: flpydisk.sys
Image Path: C:\WINDOWS\System32\DRIVERS\flpydisk.sys
Address: 0xB943A000 Size: 20480 File Visible: - Signed: -
Status: -
Name: fltmgr.sys
Image Path: fltmgr.sys
Address: 0xF7A17000 Size: 129792 File Visible: - Signed: -
Status: -
Name: Fs_Rec.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fs_Rec.SYS
Address: 0xF79CD000 Size: 7936 File Visible: - Signed: -
Status: -
Name: fsvga.sys
Image Path: C:\WINDOWS\system32\DRIVERS\fsvga.sys
Address: 0xF794B000 Size: 12288 File Visible: - Signed: -
Status: -
Name: ftdisk.sys
Image Path: ftdisk.sys
Address: 0xF7839000 Size: 126336 File Visible: - Signed: -
Status: -
Name: gameenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\gameenum.sys
Address: 0xB9AC0000 Size: 10624 File Visible: - Signed: -
Status: -
Name: GEARAspiWDM.sys
Image Path: C:\WINDOWS\System32\Drivers\GEARAspiWDM.sys
Address: 0xB9AAC000 Size: 9472 File Visible: - Signed: -
Status: -
Name: hal.dll
Image Path: C:\WINDOWS\system32\hal.dll
Address: 0x80700000 Size: 134400 File Visible: - Signed: -
Status: -
Name: HIDCLASS.SYS
Image Path: C:\WINDOWS\System32\DRIVERS\HIDCLASS.SYS
Address: 0xB9BBF000 Size: 36864 File Visible: - Signed: -
Status: -
Name: HIDPARSE.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS
Address: 0xB942A000 Size: 28672 File Visible: - Signed: -
Status: -
Name: hidusb.sys
Image Path: C:\WINDOWS\System32\DRIVERS\hidusb.sys
Address: 0xBA5EC000 Size: 10368 File Visible: - Signed: -
Status: -
Name: HTTP.sys
Image Path: C:\WINDOWS\System32\Drivers\HTTP.sys
Address: 0xA58B0000 Size: 264832 File Visible: - Signed: -
Status: -
Name: hwinterface.sys
Image Path: C:\WINDOWS\System32\Drivers\hwinterface.sys
Address: 0xB9A6B000 Size: 2624 File Visible: - Signed: -
Status: -
Name: i8042prt.sys
Image Path: C:\WINDOWS\System32\DRIVERS\i8042prt.sys
Address: 0xF7416000 Size: 52992 File Visible: - Signed: -
Status: -
Name: imapi.sys
Image Path: C:\WINDOWS\System32\DRIVERS\imapi.sys
Address: 0xBA7E0000 Size: 42112 File Visible: - Signed: -
Status: -
Name: intelppm.sys
Image Path: C:\WINDOWS\System32\DRIVERS\intelppm.sys
Address: 0xF7456000 Size: 40448 File Visible: - Signed: -
Status: -
Name: io.sys
Image Path: C:\WINDOWS\system32\drivers\io.sys
Address: 0xB9995000 Size: 2944 File Visible: - Signed: -
Status: -
Name: ipnat.sys
Image Path: C:\WINDOWS\System32\DRIVERS\ipnat.sys
Address: 0xA8B88000 Size: 152832 File Visible: - Signed: -
Status: -
Name: ipsec.sys
Image Path: C:\WINDOWS\System32\DRIVERS\ipsec.sys
Address: 0xA8C07000 Size: 75264 File Visible: - Signed: -
Status: -
Name: isapnp.sys
Image Path: isapnp.sys
Address: 0xF75F7000 Size: 37632 File Visible: - Signed: -
Status: -
Name: kbdclass.sys
Image Path: C:\WINDOWS\System32\DRIVERS\kbdclass.sys
Address: 0xF777F000 Size: 25216 File Visible: - Signed: -
Status: -
Name: KDCOM.DLL
Image Path: C:\WINDOWS\system32\KDCOM.DLL
Address: 0xF7987000 Size: 8192 File Visible: - Signed: -
Status: -
Name: kmixer.sys
Image Path: C:\WINDOWS\system32\drivers\kmixer.sys
Address: 0xA5B01000 Size: 172416 File Visible: - Signed: -
Status: -
Name: ks.sys
Image Path: C:\WINDOWS\system32\drivers\ks.sys
Address: 0xB8EF1000 Size: 143360 File Visible: - Signed: -
Status: -
Name: KSecDD.sys
Image Path: KSecDD.sys
Address: 0xBA749000 Size: 92288 File Visible: - Signed: -
Status: -
Name: Lbd.sys
Image Path: Lbd.sys
Address: 0xF7667000 Size: 57472 File Visible: - Signed: -
Status: -
Name: lirsgt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\lirsgt.sys
Address: 0xF77B7000 Size: 18048 File Visible: - Signed: -
Status: -
Name: LMIRfsDriver.sys
Image Path: C:\WINDOWS\system32\drivers\LMIRfsDriver.sys
Address: 0xA679C000 Size: 40960 File Visible: - Signed: -
Status: -
Name: mnmdd.SYS
Image Path: C:\WINDOWS\System32\Drivers\mnmdd.SYS
Address: 0xF79D1000 Size: 4224 File Visible: - Signed: -
Status: -
Name: mouclass.sys
Image Path: C:\WINDOWS\System32\DRIVERS\mouclass.sys
Address: 0xB944A000 Size: 23552 File Visible: - Signed: -
Status: -
Name: mouhid.sys
Image Path: C:\WINDOWS\System32\DRIVERS\mouhid.sys
Address: 0xBA5E8000 Size: 12288 File Visible: - Signed: -
Status: -
Name: MountMgr.sys
Image Path: MountMgr.sys
Address: 0xF7607000 Size: 42368 File Visible: - Signed: -
Status: -
Name: mrxdav.sys
Image Path: C:\WINDOWS\System32\DRIVERS\mrxdav.sys
Address: 0xA6341000 Size: 180608 File Visible: - Signed: -
Status: -
Name: mrxsmb.sys
Image Path: C:\WINDOWS\System32\DRIVERS\mrxsmb.sys
Address: 0xA8A68000 Size: 455296 File Visible: - Signed: -
Status: -
Name: Msfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Msfs.SYS
Address: 0xF77E7000 Size: 19072 File Visible: - Signed: -
Status: -
Name: msgpc.sys
Image Path: C:\WINDOWS\System32\DRIVERS\msgpc.sys
Address: 0xB9B9F000 Size: 35072 File Visible: - Signed: -
Status: -
Name: mssmbios.sys
Image Path: C:\WINDOWS\System32\DRIVERS\mssmbios.sys
Address: 0xBA610000 Size: 15488 File Visible: - Signed: -
Status: -
Name: Mup.sys
Image Path: Mup.sys
Address: 0xBA650000 Size: 105344 File Visible: - Signed: -
Status: -
Name: NDIS.sys
Image Path: NDIS.sys
Address: 0xBA68F000 Size: 182656 File Visible: - Signed: -
Status: -
Name: ndistapi.sys
Image Path: C:\WINDOWS\System32\DRIVERS\ndistapi.sys
Address: 0xBA62C000 Size: 10112 File Visible: - Signed: -
Status: -
Name: ndiswan.sys
Image Path: C:\WINDOWS\System32\DRIVERS\ndiswan.sys
Address: 0xB8E8F000 Size: 91520 File Visible: - Signed: -
Status: -
Name: NDProxy.SYS
Image Path: C:\WINDOWS\System32\Drivers\NDProxy.SYS
Address: 0xBA770000 Size: 40576 File Visible: - Signed: -
Status: -
Name: netbios.sys
Image Path: C:\WINDOWS\System32\DRIVERS\netbios.sys
Address: 0xB9B7F000 Size: 34688 File Visible: - Signed: -
Status: -
Name: netbt.sys
Image Path: C:\WINDOWS\System32\DRIVERS\netbt.sys
Address: 0xA8B60000 Size: 162816 File Visible: - Signed: -
Status: -
Name: Npfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Npfs.SYS
Address: 0xF77EF000 Size: 30848 File Visible: - Signed: -
Status: -
Name: Ntfs.sys
Image Path: Ntfs.sys
Address: 0xBA6BC000 Size: 574976 File Visible: - Signed: -
Status: -
Name: ntoskrnl.exe
Image Path: C:\WINDOWS\system32\ntoskrnl.exe
Address: 0x804D7000 Size: 2265088 File Visible: - Signed: -
Status: -
Name: Null.SYS
Image Path: C:\WINDOWS\System32\Drivers\Null.SYS
Address: 0xB9C01000 Size: 2944 File Visible: - Signed: -
Status: -
Name: nwlnkipx.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nwlnkipx.sys
Address: 0xA659E000 Size: 88320 File Visible: - Signed: -
Status: -
Name: nwlnknb.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nwlnknb.sys
Address: 0xB8E6F000 Size: 63232 File Visible: - Signed: -
Status: -
Name: nwlnkspx.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nwlnkspx.sys
Address: 0xA64C6000 Size: 55936 File Visible: - Signed: -
Status: -
Name: parport.sys
Image Path: C:\WINDOWS\System32\DRIVERS\parport.sys
Address: 0xB8EDD000 Size: 80384 File Visible: - Signed: -
Status: -
Name: PartMgr.sys
Image Path: PartMgr.sys
Address: 0xF770F000 Size: 19712 File Visible: - Signed: -
Status: -
Name: ParVdm.SYS
Image Path: C:\WINDOWS\System32\Drivers\ParVdm.SYS
Address: 0xF79B1000 Size: 7040 File Visible: - Signed: -
Status: -
Name: pci.sys
Image Path: pci.sys
Address: 0xF7486000 Size: 68224 File Visible: - Signed: -
Status: -
Name: PCI_PNP9908
Image Path: \Driver\PCI_PNP9908
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -
Name: pciide.sys
Image Path: pciide.sys
Address: 0xF7A4F000 Size: 3328 File Visible: - Signed: -
Status: -
Name: PCIIDEX.SYS
Image Path: C:\WINDOWS\System32\DRIVERS\PCIIDEX.SYS
Address: 0xF7707000 Size: 28672 File Visible: - Signed: -
Status: -
Name: pcouffin.sys
Image Path: C:\WINDOWS\System32\Drivers\pcouffin.sys
Address: 0xBA7A0000 Size: 47360 File Visible: - Signed: -
Status: -
Name: pfc.sys
Image Path: C:\WINDOWS\system32\drivers\pfc.sys
Address: 0xB9AB4000 Size: 10368 File Visible: - Signed: -
Status: -
Name: PnpManager
Image Path: \Driver\PnpManager
Address: 0x804D7000 Size: 2265088 File Visible: - Signed: -
Status: -
Name: portcls.sys
Image Path: C:\WINDOWS\system32\drivers\portcls.sys
Address: 0xB8F14000 Size: 147456 File Visible: - Signed: -
Status: -
Name: prodrv06.sys
Image Path: C:\WINDOWS\System32\drivers\prodrv06.sys
Address: 0xA8AD8000 Size: 77184 File Visible: - Signed: -
Status: -
Name: prohlp02.sys
Image Path: prohlp02.sys
Address: 0xF7687000 Size: 65504 File Visible: - Signed: -
Status: -
Name: prosync1.sys
Image Path: prosync1.sys
Address: 0xF7991000 Size: 6944 File Visible: - Signed: -
Status: -
Name: ptilink.sys
Image Path: C:\WINDOWS\System32\DRIVERS\ptilink.sys
Address: 0xB945A000 Size: 17792 File Visible: - Signed: -
Status: -
Name: PxHelp20.sys
Image Path: PxHelp20.sys
Address: 0xF7677000 Size: 35648 File Visible: - Signed: -
Status: -
Name: pxscan.sys
Image Path: pxscan.sys
Address: 0xF7617000 Size: 36864 File Visible: - Signed: -
Status: -
Name: pxsec.sys
Image Path: pxsec.sys
Address: 0xF7657000 Size: 40960 File Visible: - Signed: -
Status: -
Name: rasacd.sys
Image Path: C:\WINDOWS\System32\DRIVERS\rasacd.sys
Address: 0xBA5CE000 Size: 8832 File Visible: - Signed: -
Status: -
Name: rasl2tp.sys
Image Path: C:\WINDOWS\System32\DRIVERS\rasl2tp.sys
Address: 0xBA7D0000 Size: 51328 File Visible: - Signed: -
Status: -
Name: raspppoe.sys
Image Path: C:\WINDOWS\System32\DRIVERS\raspppoe.sys
Address: 0xBA7C0000 Size: 41472 File Visible: - Signed: -
Status: -
Name: raspptp.sys
Image Path: C:\WINDOWS\System32\DRIVERS\raspptp.sys
Address: 0xBA7B0000 Size: 48384 File Visible: - Signed: -
Status: -
Name: raspti.sys
Image Path: C:\WINDOWS\System32\DRIVERS\raspti.sys
Address: 0xB9452000 Size: 16512 File Visible: - Signed: -
Status: -
Name: RAW
Image Path: \FileSystem\RAW
Address: 0x804D7000 Size: 2265088 File Visible: - Signed: -
Status: -
Name: rdbss.sys
Image Path: C:\WINDOWS\System32\DRIVERS\rdbss.sys
Address: 0xA8B13000 Size: 175744 File Visible: - Signed: -
Status: -
Name: RDPCDD.sys
Image Path: C:\WINDOWS\System32\DRIVERS\RDPCDD.sys
Address: 0xF79D3000 Size: 4224 File Visible: - Signed: -
Status: -
Name: rdpdr.sys
Image Path: C:\WINDOWS\System32\DRIVERS\rdpdr.sys
Address: 0xB8DBF000 Size: 196224 File Visible: - Signed: -
Status: -
Name: redbook.sys
Image Path: C:\WINDOWS\System32\DRIVERS\redbook.sys
Address: 0xBA7F0000 Size: 57728 File Visible: - Signed: -
Status: -
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA57A8000 Size: 49152 File Visible: No Signed: -
Status: -
Name: SCSIPORT.SYS
Image Path: C:\WINDOWS\System32\Drivers\SCSIPORT.SYS
Address: 0xF74BE000 Size: 98304 File Visible: - Signed: -
Status: -
Name: secdrv.sys
Image Path: C:\WINDOWS\System32\DRIVERS\secdrv.sys
Address: 0xA61B1000 Size: 40960 File Visible: - Signed: -
Status: -
Name: serenum.sys
Image Path: C:\WINDOWS\System32\DRIVERS\serenum.sys
Address: 0xB9AB8000 Size: 15744 File Visible: - Signed: -
Status: -
Name: serial.sys
Image Path: C:\WINDOWS\System32\DRIVERS\serial.sys
Address: 0xF7406000 Size: 65536 File Visible: - Signed: -
Status: -
Name: sfdrv01.sys
Image Path: sfdrv01.sys
Address: 0xBA66A000 Size: 73728 File Visible: - Signed: -
Status: -
Name: sfhlp01.sys
Image Path: sfhlp01.sys
Address: 0xF798F000 Size: 4832 File Visible: - Signed: -
Status: -
Name: sfhlp02.sys
Image Path: sfhlp02.sys
Address: 0xF7717000 Size: 32768 File Visible: - Signed: -
Status: -
Name: sfmanm.sys
Image Path: C:\WINDOWS\system32\drivers\sfmanm.sys
Address: 0xF7436000 Size: 36480 File Visible: - Signed: -
Status: -
Name: sfvfs02.sys
Image Path: sfvfs02.sys
Address: 0xBA67C000 Size: 77824 File Visible: - Signed: -
Status: -
Name: spfx.sys
Image Path: spfx.sys
Address: 0xF74D6000 Size: 1048576 File Visible: No Signed: -
Status: -
Name: sptd
Image Path: \Driver\sptd
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -
Name: sr.sys
Image Path: sr.sys
Address: 0xF7827000 Size: 73472 File Visible: - Signed: -
Status: -
Name: srv.sys
Image Path: C:\WINDOWS\System32\DRIVERS\srv.sys
Address: 0xA5F14000 Size: 333952 File Visible: - Signed: -
Status: -
Name: SVKP.sys
Image Path: C:\WINDOWS\system32\SVKP.sys
Address: 0xF7AAB000 Size: 2368 File Visible: - Signed: -
Status: -
Name: swenum.sys
Image Path: C:\WINDOWS\System32\DRIVERS\swenum.sys
Address: 0xF79C9000 Size: 4352 File Visible: - Signed: -
Status: -
Name: sysaudio.sys
Image Path: C:\WINDOWS\system32\drivers\sysaudio.sys
Address: 0xA6614000 Size: 60800 File Visible: - Signed: -
Status: -
Name: tcpip.sys
Image Path: C:\WINDOWS\System32\DRIVERS\tcpip.sys
Address: 0xA8BAE000 Size: 361600 File Visible: - Signed: -
Status: -
Name: TDI.SYS
Image Path: C:\WINDOWS\System32\DRIVERS\TDI.SYS
Address: 0xB9462000 Size: 20480 File Visible: - Signed: -
Status: -
Name: termdd.sys
Image Path: C:\WINDOWS\System32\DRIVERS\termdd.sys
Address: 0xBA790000 Size: 40704 File Visible: - Signed: -
Status: -
Name: ttdvblcd.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ttdvblcd.sys
Address: 0xF7426000 Size: 63520 File Visible: - Signed: -
Status: -
Name: update.sys
Image Path: C:\WINDOWS\System32\DRIVERS\update.sys
Address: 0xB8D61000 Size: 384768 File Visible: - Signed: -
Status: -
Name: USBD.SYS
Image Path: C:\WINDOWS\System32\DRIVERS\USBD.SYS
Address: 0xF79CB000 Size: 8192 File Visible: - Signed: -
Status: -
Name: usbehci.sys
Image Path: C:\WINDOWS\System32\DRIVERS\usbehci.sys
Address: 0xF7777000 Size: 30208 File Visible: - Signed: -
Status: -
Name: usbhub.sys
Image Path: C:\WINDOWS\System32\DRIVERS\usbhub.sys
Address: 0xB9BDF000 Size: 59520 File Visible: - Signed: -
Status: -
Name: USBPORT.SYS
Image Path: C:\WINDOWS\System32\DRIVERS\USBPORT.SYS
Address: 0xB8FA2000 Size: 147456 File Visible: - Signed: -
Status: -
Name: usbuhci.sys
Image Path: C:\WINDOWS\System32\DRIVERS\usbuhci.sys
Address: 0xF776F000 Size: 20608 File Visible: - Signed: -
Status: -
Name: vga.sys
Image Path: C:\WINDOWS\System32\drivers\vga.sys
Address: 0xB9422000 Size: 20992 File Visible: - Signed: -
Status: -
Name: VIDEOPRT.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS
Address: 0xB8FC6000 Size: 81920 File Visible: - Signed: -
Status: -
Name: VolSnap.sys
Image Path: VolSnap.sys
Address: 0xF7627000 Size: 53760 File Visible: - Signed: -
Status: -
Name: wanarp.sys
Image Path: C:\WINDOWS\System32\DRIVERS\wanarp.sys
Address: 0xB9B8F000 Size: 34560 File Visible: - Signed: -
Status: -
Name: watchdog.sys
Image Path: C:\WINDOWS\System32\watchdog.sys
Address: 0xF77FF000 Size: 20480 File Visible: - Signed: -
Status: -
Name: wdmaud.sys
Image Path: C:\WINDOWS\system32\drivers\wdmaud.sys
Address: 0xA6214000 Size: 83072 File Visible: - Signed: -
Status: -
Name: Win32k
Image Path: \Driver\Win32k
Address: 0xBF800000 Size: 1847296 File Visible: - Signed: -
Status: -
Name: win32k.sys
Image Path: C:\WINDOWS\System32\win32k.sys
Address: 0xBF800000 Size: 1847296 File Visible: - Signed: -
Status: -
Name: WmBEnum.sys
Image Path: C:\WINDOWS\system32\drivers\WmBEnum.sys
Address: 0xBA614000 Size: 10144 File Visible: - Signed: -
Status: -
Name: WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\WMILIB.SYS
Address: 0xF7989000 Size: 8192 File Visible: - Signed: -
Status: -
Name: WMIxWDM
Image Path: \Driver\WMIxWDM
Address: 0x804D7000 Size: 2265088 File Visible: - Signed: -
Status: -
Name: WmXlCore.sys
Image Path: C:\WINDOWS\system32\drivers\WmXlCore.sys
Address: 0xBA780000 Size: 45504 File Visible: - Signed: -
Status: -
Name: ws2ifsl.sys
Image Path: C:\WINDOWS\System32\drivers\ws2ifsl.sys
Address: 0xBA5C2000 Size: 12032 File Visible: - Signed: -
Status: -
Code:
ATTFilter ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2009/08/21 11:50
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Hidden Services
-------------------
Service Name: UACd.sys
Image PathC:\WINDOWS\system32\drivers\UACootjxyfoaw.sys
Geändert von Befallener (21.08.2009 um 11:12 Uhr) |
| | #10 |
![]() | AVCare, Win32Trojan.TDss und mehr ? Stealth Obj. Code:
ATTFilter ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2009/08/21 11:51
Program Version: Version 1.3.5.0
Windows Version: Windows XP SP3
==================================================
Stealth Objects
-------------------
Object: Hidden Module [Name: UACqcwooiyyvp.dll]
Process: svchost.exe (PID: 836) Address: 0x00a60000 Size: 73728
Object: Hidden Module [Name: UACe051.tmpnepyof.dll]
Process: svchost.exe (PID: 836) Address: 0x10000000 Size: 217088
Object: Hidden Module [Name: UACalitjljxoc.dll]
Process: Explorer.EXE (PID: 3352) Address: 0x10000000 Size: 49152
Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP]
Process: System Address: 0x8a80b1f8 Size: 121
Object: Hidden Code [Driver: a347scsi, IRP_MJ_CREATE]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_CLOSE]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_READ]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_WRITE]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_QUERY_EA]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_SET_EA]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_SHUTDOWN]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_CLEANUP]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_SET_SECURITY]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_POWER]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_SET_QUOTA]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: a347scsi, IRP_MJ_PNP]
Process: System Address: 0x89854ab0 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_EA]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_EA]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLEANUP]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP]
Process: System Address: 0x8a4c7b98 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_CLOSE]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_READ]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_WRITE]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_EA]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_SET_EA]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_CLEANUP]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_POWER]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: atapi, IRP_MJ_PNP]
Process: System Address: 0x8a6343e8 Size: 99
Object: Hidden Code [Driver: dmio, IRP_MJ_CREATE]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_CLOSE]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_READ]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_WRITE]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_POWER]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_PNP]
Process: System Address: 0x8a80d1f8 Size: 121
Object: Hidden Code [Driver: prodrv06䵃慖쐐㶀అ瑎䱆ᙸ䏀, IRP_MJ_CREATE]
Process: System Address: 0xe1c8e248 Size: 1945
Object: Hidden Code [Driver: prodrv06䵃慖쐐㶀అ瑎䱆ᙸ䏀, IRP_MJ_CLOSE]
Process: System Address: 0xe1c8e248 Size: 1945
Object: Hidden Code [Driver: prodrv06䵃慖쐐㶀అ瑎䱆ᙸ䏀, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0xe1c8e248 Size: 1945
Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE]
Process: System Address: 0x8a2c2500 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE]
Process: System Address: 0x8a2c2500 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a2c2500 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a2c2500 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER]
Process: System Address: 0x8a2c2500 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a2c2500 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP]
Process: System Address: 0x8a2c2500 Size: 121
Object: Hidden Code [Driver: Hard, IRP_MJ_CREATE]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_CLOSE]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_READ]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_WRITE]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_QUERY_EA]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_SET_EA]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_CLEANUP]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_POWER]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Hard, IRP_MJ_PNP]
Process: System Address: 0x8a45a008 Size: 99
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP]
Process: System Address: 0x8a79f1f8 Size: 121
Object: Hidden Code [Driver: prohlp02, IRP_MJ_CREATE]
Process: System Address: 0xe182a5f0 Size: 2580
Object: Hidden Code [Driver: prohlp02, IRP_MJ_CLOSE]
Process: System Address: 0xe182a5f0 Size: 2580
Object: Hidden Code [Driver: prohlp02, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0xe182a5f0 Size: 2580
Object: Hidden Code [Driver: NetBT, IRP_MJ_CREATE]
Process: System Address: 0x8a38f500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_CLOSE]
Process: System Address: 0x8a38f500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a38f500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a38f500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_CLEANUP]
Process: System Address: 0x8a38f500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_PNP]
Process: System Address: 0x8a38f500 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE]
Process: System Address: 0x8a319500 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE]
Process: System Address: 0x8a319500 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a319500 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a319500 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER]
Process: System Address: 0x8a319500 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a319500 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP]
Process: System Address: 0x8a319500 Size: 121
Object: Hidden Code [Driver: Rdbss, IRP_MJ_READ]
Process: System Address: 0x8a401840 Size: 11
Object: Hidden Code [Driver: Srv, IRP_MJ_READ]
Process: System Address: 0x8a41b698 Size: 11
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLOSE]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_READ]
Process: System Address: 0x8a549030 Size: 11
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_WRITE]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_EA]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_EA]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLEANUP]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_POWER]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_PNP]
Process: System Address: 0x8a3d0368 Size: 121
Object: Hidden Code [Driver: Npfsȅః瑎て, IRP_MJ_READ]
Process: System Address: 0x8a475e70 Size: 11
Object: Hidden Code [Driver: MsfsЅఉ敓, IRP_MJ_READ]
Process: System Address: 0x8a3153b0 Size: 11
Object: Hidden Code [Driver: Fs_Rec, IRP_MJ_READ]
Process: System Address: 0x8a344170 Size: 11
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_CREATE]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_CLOSE]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_READ]
Process: System Address: 0x8a2f01e8 Size: 11
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_CLEANUP]
Process: System Address: 0x8a3773c8 Size: 121
Object: Hidden Code [Driver: Cdfsఅ瑎獆ꒈ, IRP_MJ_PNP]
Process: System Address: 0x8a3773c8 Size: 121
Geändert von Befallener (21.08.2009 um 11:09 Uhr) |
| | #11 |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() | AVCare, Win32Trojan.TDss und mehr ? hi doch haben wir ja also: Rootkit/wikipedia.org Da eine hundertprozentige Erkennung von Rootkits unmöglich ist, ist die beste Methode zur Entfernung wäre die komplette Neuinstallation. Falls Du dein System doch reinigen möchtest: 1. - Kopiere den Text aus der Code-Box in ein Notepad-Dokument und speichere ihn als remove.txt auf deiner Festplatte C:\ Code:
ATTFilter Drivers to disable:
UACd.sys
Drivers to delete:
UACd.sys
Files to delete:
c:\windows\system32\drivers\UACootjxyfoaw.sys
c:\windows\system32\UACqcwooiyyvp.dll
c:\windows\system32\UACaxujnepyof.dll
c:\windows\system32\UACkkurhhtsar.dat
c:\windows\system32\UACocbirxjadt.db
c:\windows\system32\UACqerpbdogdk.dll
c:\windows\system32\UACalitjljxoc.dll
C:\Dokumente und Einstellungen\Jens\Lokale Einstellungen\Temp\UACc96b.tmp
→ Lade den Avenger herunter und entzippe ihn auf den Desktop. (direkt als `EXE` *hier* erhältlich ) → die avenger.exe per Doppelklick starten → füge den Inhalt aus der Codebox vollständig und unverändert in das leere Textfeld bei "Input script here" ein → dann klicke auf "Execute" → wirst Du gefragt, ob Du das Script ausführen willst. Beantworte die Frage "Ja". → auf die Fragae ob dein Rechner jetzt neu starten soll "Rebot now" bejahe bitte auch → nach Neustart wird ein Dos Fenster aufgehen. → wenn wieder geschlossen ist, es öffnet sich der Editor mit die Scanergebnisse : C:\avenger.txt → kopiere und füge den Inhalt direkt aus der Textdatei hier rein Achtung!: Wenn Avenger nicht ausgeführt werden kann (ein Rootkit kann es verhindern), benenne avenger.exe um in "arniee.com" und versuche es erneut. (also wie vorher mit Gmer) 3.
poste erneut: Trend Micro HijackThis-Logfile Geändert von kira (21.08.2009 um 16:40 Uhr) |
| | #12 |
![]() | AVCare, Win32Trojan.TDss und mehr ? Hatte gestern und heute wenig Zeit, deshalb konnte ich erst jetzt weitermachen avenger.txt Code:
ATTFilter Logfile of The Avenger Version 2.0, (c) by Swandog46
http://swandog46.geekstogo.com
Platform: Windows XP
*******************
Script file opened successfully.
Script file read successfully.
Backups directory opened successfully at C:\Avenger
*******************
Beginning to process script file:
Rootkit scan active.
Hidden driver "a2vmuvj4" found!
Could not open driver a2vmuvj4 for rootkit scan. Error:c0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist
Rootkit scan completed.
Disablement of driver "UACd.sys" failed!
Status: 0xc0000001 (STATUS_UNSUCCESSFUL)
Driver "UACd.sys" deleted successfully.
File "c:\windows\system32\drivers\UACootjxyfoaw.sys" deleted successfully.
File "c:\windows\system32\UACqcwooiyyvp.dll" deleted successfully.
File "c:\windows\system32\UACaxujnepyof.dll" deleted successfully.
File "c:\windows\system32\UACkkurhhtsar.dat" deleted successfully.
File "c:\windows\system32\UACocbirxjadt.db" deleted successfully.
File "c:\windows\system32\UACqerpbdogdk.dll" deleted successfully.
File "c:\windows\system32\UACalitjljxoc.dll" deleted successfully.
File "C:\Dokumente und Einstellungen\Jens\Lokale Einstellungen\Temp\UACc96b.tmp" deleted successfully.
Completed script processing.
*******************
Finished! Terminate.
Code:
ATTFilter Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 22:16:47, on 08/22/2009 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet Explorer v8.00 (8.00.6001.18702) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\Ati2evxx.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Programme\Lavasoft\Ad-Aware\AAWService.exe C:\WINDOWS\system32\spoolsv.exe C:\Programme\Avira\AntiVir Desktop\sched.exe C:\WINDOWS\system32\Ati2evxx.exe C:\Programme\Avira\AntiVir Desktop\avguard.exe C:\WINDOWS\system32\CAPM4RSK.EXE C:\WINDOWS\system32\spool\drivers\w32x86\3\CAPM4SWK.EXE C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe C:\Programme\Prevx\prevx.exe C:\Programme\Borland\InterBase\bin\ibguard.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Programme\Analog Devices\SoundMAX\SMAgent.exe C:\WINDOWS\System32\svchost.exe C:\Programme\Borland\InterBase\bin\ibserver.exe C:\Programme\Prevx\prevx.exe C:\WINDOWS\Explorer.EXE C:\Programme\Lavasoft\Ad-Aware\AAWTray.exe C:\WINDOWS\system32\NOTEPAD.EXE C:\Programme\ASUS\Probe\AsusProb.exe C:\WINDOWS\system32\taskswitch.exe C:\Programme\Avira\AntiVir Desktop\avgnt.exe C:\WINDOWS\system32\ctfmon.exe F:\Programme\TortoiseSVN\bin\TSVNCache.exe C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe C:\Programme\DAEMON Tools Lite\daemon.exe E:\HDV3\DTemp\DTemp.exe C:\remindme\RemindMe.exe C:\WINDOWS\system32\devldr32.exe C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe C:\Programme\Mozilla Firefox\firefox.exe D:\bases\hijackthis\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://hardware.thgweb.de/index.html R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Programme\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll O2 - BHO: Windows Live Anmelde-Hilfsprogramm - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: FDMIECookiesBHO Class - {CC59E0F9-7E43-44FA-9FAA-8377850BF205} - F:\Programme\Free Download Manager\iefdmcks.dll O4 - HKLM\..\Run: [ASUS Probe] C:\Programme\ASUS\Probe\AsusProb.exe O4 - HKLM\..\Run: [CoolSwitch] C:\WINDOWS\system32\taskswitch.exe O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k O4 - HKLM\..\Run: [StartCCC] "C:\Programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun O4 - HKLM\..\Run: [avgnt] "C:\Programme\Avira\AntiVir Desktop\avgnt.exe" /min O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Programme\DAEMON Tools Lite\daemon.exe" -autorun O4 - HKCU\..\Run: [StartCCC] "C:\Programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETZWERKDIENST') O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user') O4 - Startup: DTemp.lnk = E:\HDV3\DTemp\DTemp.exe O4 - Startup: RemindMe.lnk = C:\remindme\RemindMe.exe O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Programme\Adobe\Acrobat 7.0\Reader\reader_sl.exe O8 - Extra context menu item: Download all with Free Download Manager - file://F:\Programme\Free Download Manager\dlall.htm O8 - Extra context menu item: Download selected with Free Download Manager - file://F:\Programme\Free Download Manager\dlselected.htm O8 - Extra context menu item: Download with Free Download Manager - file://F:\Programme\Free Download Manager\dllink.htm O8 - Extra context menu item: Download with GetRight - C:\Programme\GetRight\GRdownload.htm O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://F:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000 O8 - Extra context menu item: Open with GetRight Browser - C:\Programme\GetRight\GRbrowse.htm O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.5.0_04\bin\npjpi150_04.dll O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.5.0_04\bin\npjpi150_04.dll O9 - Extra button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - http://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1228848741171 O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1228848725906 O16 - DPF: {CAFEEFAC-0014-0000-0002-ABCDEFFEDCBA} (Java Runtime Environment 1.4.0_02) - O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/zone/datafiles/heartbeat.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O17 - HKLM\System\CS1\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O17 - HKLM\System\CS2\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O17 - HKLM\System\CS3\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O23 - Service: Adobe LM Service - Unknown owner - C:\Programme\Gemeinsame Dateien\Adobe Systems Shared\Service\Adobelmsvc.exe O23 - Service: Avira AntiVir Planer (AntiVirSchedulerService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\sched.exe O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\avguard.exe O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe O23 - Service: CSIScanner - Prevx - C:\Programme\Prevx\prevx.exe O23 - Service: getPlus(R) Helper - NOS Microsystems Ltd. - C:\Programme\NOS\bin\getPlus_HelperSvc.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: InterBase Guardian (InterBaseGuardian) - Borland Software Corporation - C:\Programme\Borland\InterBase\bin\ibguard.exe O23 - Service: InterBase Server (InterBaseServer) - Borland Software Corporation - C:\Programme\Borland\InterBase\bin\ibserver.exe O23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Programme\iPod\bin\iPodService.exe O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Programme\Lavasoft\Ad-Aware\AAWService.exe O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Programme\CyberLink\Shared Files\RichVideo.exe O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Programme\WinPcap\rpcapd.exe O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Programme\Analog Devices\SoundMAX\SMAgent.exe O24 - Desktop Component 1: (no name) - http://www.tomshardware.de/ O24 - Desktop Component 2: (no name) - C:\Dokumente und Einstellungen\*User*\Desktop\Neu Textdokument (4).html -- End of file - 8542 bytes Die DelDomains.inf wird bei mir durch doppelklick nur geöffnet, ich hab dann mal installieren gewählt und jetzt sind diese Einträge von wegen Trusted Zone weg (von denen ich glaube das sie das Ziel dieser Maßnahme waren). Prevx findet aus irgendeinem Grund immernoch das Rootkit und dessen Dateien (sowie den Avenger), im Skript angegeben sind alle. Was soll ich davon halten ? AdAware findet keinen Win32Trojan.TDss mehr. Ich habe außerdem immernoch nicht herausgefunden woher ich dieses nette AddOn für meinen PC habe. Zwei Archive sind momentan heiße Kandidaten, kann ich diese Dateien wenigstens markieren und dann löschen oder sollte ich diese lieber über DOS/Knoppix/Avenger diese direkt löschen ? Eine Neuinfektion möchte ich vermeiden. Geändert von Befallener (22.08.2009 um 21:36 Uhr) |
| | #13 | |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() | AVCare, Win32Trojan.TDss und mehr ? hi Sind wir noch `lange` nicht fertig ![]() 1. den Quarantäne Ordner überall leeren - Antivirus bzw Anti-Spy-Programm usw - Gmer entfernen - C:\avenger\backup.zip löschen– (mit den Inhalt der gelöschten Dateien) → Papierkorb leeren - Rootrepeal entfernen 2. Lade Dir Malwarebytes Anti-Malware von→ malwarebytes.org
3. Schliesse alle Programme einschliesslich Internet Explorer und fixe mit Hijackthis die Einträge aus der nachfolgenden Codebox (HijackThis starten→ Einträge auswählen→ Häckhen setzen→ "Fix checked"klicken→ PC neu aufstarten): Zitat:
reinige dein System mit Ccleaner:
5. Schalte den Rechner ab und nach ca 2-3 Minuten fahre wieder hoch 6.
8. Windows und die installierten Programme auf den neuesten Stand zu halten,sind Garanten für eine erhöhte Sicherheit! - Java aktualisieren `Start→ Systemsteuereung→ Java→ Aktualisierung... - Falls danach noch alte Updates unter `Systemsteuerung → Software → Ändern/Entfernen...` existieren, deinstallieren: - Adobe Reader: sehe nach, ob neuere Versionen vorhanden sind 9. poste erneut: Trend Micro HijackThis-Logfile filelist.bat - den letzten sechs Monaten! ** Berichte wie es dein Rechner geht? Geändert von kira (23.08.2009 um 16:56 Uhr) |
| | #14 |
![]() | AVCare, Win32Trojan.TDss und mehr ? Anti Malware hat beim ersten Start den Fehler 732 (0, 0) geworfen. Ich schätze das lag daran, dass das Netzwerkkabel abgesteckt war (Ein Update habe ich dann durchgeführt), 1. erledigt 2. Malwarebytes Anti-Malware Log Code:
ATTFilter Malwarebytes' Anti-Malware 1.40
Datenbank Version: 2683
Windows 5.1.2600 Service Pack 3
08/23/2009 20:55:38
mbam-log-2009-08-23 (20-55-38).txt
Scan-Methode: Vollständiger Scan (C:\|)
Durchsuchte Objekte: 252283
Laufzeit: 49 minute(s), 4 second(s)
Infizierte Speicherprozesse: 0
Infizierte Speichermodule: 0
Infizierte Registrierungsschlüssel: 1
Infizierte Registrierungswerte: 0
Infizierte Dateiobjekte der Registrierung: 0
Infizierte Verzeichnisse: 0
Infizierte Dateien: 3
Infizierte Speicherprozesse:
(Keine bösartigen Objekte gefunden)
Infizierte Speichermodule:
(Keine bösartigen Objekte gefunden)
Infizierte Registrierungsschlüssel:
HKEY_LOCAL_MACHINE\SOFTWARE\UAC (Rootkit.Trace) -> Quarantined and deleted successfully.
Infizierte Registrierungswerte:
(Keine bösartigen Objekte gefunden)
Infizierte Dateiobjekte der Registrierung:
(Keine bösartigen Objekte gefunden)
Infizierte Verzeichnisse:
(Keine bösartigen Objekte gefunden)
Infizierte Dateien:
C:\WINDOWS\system32\uacinit.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACalitjljxoc.dll (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\UACkkurhhtsar.dat (Trojan.Agent) -> Quarantined and deleted successfully.
|
| | #15 |
![]() | AVCare, Win32Trojan.TDss und mehr ? So, ich musste kurz unterbrechen und ich kann irgendwie den vorherigen Beitrag editieren. 3. Hijackthis: erledigt 4. CCleaner: erledigt 5. War deutlich länger 6. SUPERAntiSpyware FREE Edition: Den Bildschirmschoner hab ich draufgelassen Code:
ATTFilter SUPERAntiSpyware Scan Log
http://www.superantispyware.com
Generated 08/23/2009 at 10:35 PM
Application Version : 4.27.1002
Core Rules Database Version : 4067
Trace Rules Database Version: 2007
Scan type : Complete Scan
Total Scan Time : 00:43:32
Memory items scanned : 642
Memory threats detected : 0
Registry items scanned : 5843
Registry threats detected : 9
File items scanned : 31134
File threats detected : 34
Unclassified.PC MightyMax
HKU\S-1-5-21-606747145-920026266-839522115-1003\Software\PC MightyMax
C:\Programme\PC MightyMax\lic.conf
C:\Programme\PC MightyMax\lic.dat
C:\Programme\PC MightyMax\pcdocrx.conf
C:\Programme\PC MightyMax\tmp_res_x_101.tmp
C:\Programme\PC MightyMax\tmp_res_x_102.tmp
C:\Programme\PC MightyMax\tmp_res_x_103.tmp
C:\Programme\PC MightyMax\tmp_res_x_104.tmp
C:\Programme\PC MightyMax\tmp_res_x_105.tmp
C:\Programme\PC MightyMax\tmp_res_x_106.tmp
C:\Programme\PC MightyMax\tmp_res_x_107.tmp
C:\Programme\PC MightyMax\tmp_res_x_108.tmp
C:\Programme\PC MightyMax\tmp_res_x_109.tmp
C:\Programme\PC MightyMax\tmp_res_x_110.tmp
C:\Programme\PC MightyMax\tmp_res_x_111.tmp
C:\Programme\PC MightyMax\tmp_res_x_112.tmp
C:\Programme\PC MightyMax\tmp_res_x_113.tmp
C:\Programme\PC MightyMax\tmp_res_x_114.tmp
C:\Programme\PC MightyMax\tmp_res_x_115.tmp
C:\Programme\PC MightyMax\tmp_res_x_116.tmp
C:\Programme\PC MightyMax\tmp_res_x_117.tmp
C:\Programme\PC MightyMax\tmp_res_x_118.tmp
C:\Programme\PC MightyMax\tmp_res_x_119.tmp
C:\Programme\PC MightyMax\tmp_res_x_120.tmp
C:\Programme\PC MightyMax\tmp_res_x_121.tmp
C:\Programme\PC MightyMax\tmp_res_x_122.tmp
C:\Programme\PC MightyMax\tmp_res_x_123.tmp
C:\Programme\PC MightyMax\tmp_res_x_124.tmp
C:\Programme\PC MightyMax\tmp_res_x_125.tmp
C:\Programme\PC MightyMax\undo
C:\Programme\PC MightyMax
Rootkit.Agent/Gen
HKLM\SYSTEM\CurrentControlSet\Services\uacd.sys
HKLM\SYSTEM\CurrentControlSet\Services\uacd.sys#start
HKLM\SYSTEM\CurrentControlSet\Services\uacd.sys#type
HKLM\SYSTEM\CurrentControlSet\Services\uacd.sys#group
HKLM\SYSTEM\CurrentControlSet\Services\uacd.sys#imagepath
HKLM\SYSTEM\CurrentControlSet\Services\uacd.sys\modules
HKLM\SYSTEM\CurrentControlSet\Services\uacd.sys\modules#UACd
HKLM\SYSTEM\CurrentControlSet\Services\uacd.sys\modules#UACc
NotHarmful.Sysinternals Bluescreen Screen Saver
C:\WINDOWS\SYSTEM32\SYSINTERNALS BLUESCREEN.SCR
Trojan.Downloader-Gen/Suspicious
F:\PROGRAMME\FLASHFXP\TOOLS\WINRAR V3.50 BETA6\WDC-PATCH.EXE
Adware.Lop
F:\PROGRAMME\NETPUMPER\ZM\NP_0123_1.EXE
F:\SYSTEM VOLUME INFORMATION\_RESTORE{3D460867-A620-4D6C-88AC-A50227E74D0A}\RP1096\A0253968.EXE
7. ![]() 8.Java war wirklich deutlich älter als ich dachte, wurde also auch gleich ein Update eingeleitet 9. HijackThis Log Frage: Was sind eigentlich diese Einträge bei O16 ? Code:
ATTFilter Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 23:14:26, on 08/23/2009 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet Explorer v8.00 (8.00.6001.18702) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\Ati2evxx.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\spoolsv.exe C:\Programme\Avira\AntiVir Desktop\sched.exe C:\Programme\Avira\AntiVir Desktop\avguard.exe C:\WINDOWS\system32\Ati2evxx.exe C:\WINDOWS\system32\CAPM4RSK.EXE C:\WINDOWS\system32\spool\drivers\w32x86\3\CAPM4SWK.EXE C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe C:\Programme\Borland\InterBase\bin\ibguard.exe C:\Programme\Java\jre6\bin\jqs.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Programme\Analog Devices\SoundMAX\SMAgent.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\Explorer.EXE C:\Programme\ASUS\Probe\AsusProb.exe C:\WINDOWS\system32\taskswitch.exe F:\Programme\TortoiseSVN\bin\TSVNCache.exe C:\Programme\Borland\InterBase\bin\ibserver.exe C:\Programme\Avira\AntiVir Desktop\avgnt.exe C:\Programme\Java\jre6\bin\jusched.exe C:\WINDOWS\system32\ctfmon.exe C:\Programme\DAEMON Tools Lite\daemon.exe C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe E:\HDV3\DTemp\DTemp.exe C:\remindme\RemindMe.exe C:\WINDOWS\system32\devldr32.exe C:\WINDOWS\system32\wuauclt.exe C:\Programme\Mozilla Firefox\firefox.exe D:\bases\hijackthis\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://hardware.thgweb.de/index.html R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Programme\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll O2 - BHO: Windows Live Anmelde-Hilfsprogramm - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: FDMIECookiesBHO Class - {CC59E0F9-7E43-44FA-9FAA-8377850BF205} - F:\Programme\Free Download Manager\iefdmcks.dll O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Programme\Java\jre6\bin\jp2ssv.dll O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Programme\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll O4 - HKLM\..\Run: [ASUS Probe] C:\Programme\ASUS\Probe\AsusProb.exe O4 - HKLM\..\Run: [CoolSwitch] C:\WINDOWS\system32\taskswitch.exe O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k O4 - HKLM\..\Run: [StartCCC] "C:\Programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun O4 - HKLM\..\Run: [avgnt] "C:\Programme\Avira\AntiVir Desktop\avgnt.exe" /min O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Programme\Java\jre6\bin\jusched.exe" O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Programme\DAEMON Tools Lite\daemon.exe" -autorun O4 - HKCU\..\Run: [StartCCC] "C:\Programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" O4 - HKCU\..\Run: [SUPERAntiSpyware] F:\Programme\SUPERAntiSpyware\SUPERAntiSpyware.exe O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETZWERKDIENST') O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'Default user') O4 - Startup: DTemp.lnk = E:\HDV3\DTemp\DTemp.exe O4 - Startup: RemindMe.lnk = C:\remindme\RemindMe.exe O4 - Global Startup: Adobe Reader Speed Launch.lnk = C:\Programme\Adobe\Acrobat 7.0\Reader\reader_sl.exe O8 - Extra context menu item: Download all with Free Download Manager - file://F:\Programme\Free Download Manager\dlall.htm O8 - Extra context menu item: Download selected with Free Download Manager - file://F:\Programme\Free Download Manager\dlselected.htm O8 - Extra context menu item: Download with Free Download Manager - file://F:\Programme\Free Download Manager\dllink.htm O8 - Extra context menu item: Download with GetRight - C:\Programme\GetRight\GRdownload.htm O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://F:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000 O8 - Extra context menu item: Open with GetRight Browser - C:\Programme\GetRight\GRbrowse.htm O9 - Extra button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - F:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O10 - Unknown file in Winsock LSP: c:\windows\system32\nwprovau.dll O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} - http://download.mcafee.com/molbin/shared/mcinsctl/4,0,0,101/mcinsctl.cab O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1228848741171 O16 - DPF: {6E32070A-766D-4EE6-879C-DC1FA91D2FC3} (MUWebControl Class) - http://www.update.microsoft.com/microsoftupdate/v6/V5Controls/en/x86/client/muweb_site.cab?1228848725906 O16 - DPF: {CAFEEFAC-0014-0000-0002-ABCDEFFEDCBA} (Java Runtime Environment 1.4.0_02) - O16 - DPF: {E5D419D6-A846-4514-9FAD-97E826C84822} (HeartbeatCtl Class) - http://fdl.msn.com/zone/datafiles/heartbeat.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O17 - HKLM\System\CS1\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O17 - HKLM\System\CS2\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O17 - HKLM\System\CS3\Services\Tcpip\..\{31392642-2787-4AA7-A08C-85E146C00CA4}: NameServer = 217.237.150.115,217.237.151.205 O20 - Winlogon Notify: !SASWinLogon - F:\Programme\SUPERAntiSpyware\SASWINLO.dll O23 - Service: Adobe LM Service - Unknown owner - C:\Programme\Gemeinsame Dateien\Adobe Systems Shared\Service\Adobelmsvc.exe O23 - Service: Avira AntiVir Planer (AntiVirSchedulerService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\sched.exe O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\avguard.exe O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe O23 - Service: CSIScanner - Prevx - C:\Programme\Prevx\prevx.exe O23 - Service: getPlus(R) Helper - NOS Microsystems Ltd. - C:\Programme\NOS\bin\getPlus_HelperSvc.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: InterBase Guardian (InterBaseGuardian) - Borland Software Corporation - C:\Programme\Borland\InterBase\bin\ibguard.exe O23 - Service: InterBase Server (InterBaseServer) - Borland Software Corporation - C:\Programme\Borland\InterBase\bin\ibserver.exe O23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Programme\iPod\bin\iPodService.exe O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Programme\Java\jre6\bin\jqs.exe O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Programme\Lavasoft\Ad-Aware\AAWService.exe O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Programme\CyberLink\Shared Files\RichVideo.exe O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Programme\WinPcap\rpcapd.exe O23 - Service: SoundMAX Agent Service (SoundMAX Agent Service (default)) - Analog Devices, Inc. - C:\Programme\Analog Devices\SoundMAX\SMAgent.exe -- End of file - 8656 bytes Geändert von Befallener (23.08.2009 um 22:24 Uhr) |
![]() |
| Themen zu AVCare, Win32Trojan.TDss und mehr ? |
| ad-aware, anfang, antivir, antivir guard, bho, bildschirm, browser, c.exe, desktop, einstellungen, excel, firefox, free download, helper, hijack, hijackthis, hkus\s-1-5-18, hängen, internet, internet explorer, malwarebytes anti-malware, maus, mozilla, netzwerkverkehr, prozess, rootkit, scan, schwarzer bildschirm, software, starten, teile davon, trojan.tdss, windows xp |