Gwendoline | 27.02.2010 15:07 | Dankeschön schonmal für die rasche Antwort ich habe die Datein überprüfen lassen,vielleicht hilfts ja weiter. Code:
Datei dwm.exe empfangen 2010.02.27 13:53:55 (UTC)
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.5.0.50 2010.02.27 -
AhnLab-V3 5.0.0.2 2010.02.27 -
AntiVir 8.2.1.176 2010.02.26 -
Antiy-AVL 2.0.3.7 2010.02.26 -
Authentium 5.2.0.5 2010.02.27 -
Avast 4.8.1351.0 2010.02.27 -
Avast5 5.0.332.0 2010.02.27 -
AVG 9.0.0.730 2010.02.26 -
BitDefender 7.2 2010.02.27 -
CAT-QuickHeal 10.00 2010.02.27 -
ClamAV 0.96.0.0-git 2010.02.27 -
Comodo 4084 2010.02.27 -
DrWeb 5.0.1.12222 2010.02.27 -
eSafe 7.0.17.0 2010.02.25 -
eTrust-Vet 35.2.7331 2010.02.26 -
F-Prot 4.5.1.85 2010.02.27 -
F-Secure 9.0.15370.0 2010.02.27 -
Fortinet 4.0.14.0 2010.02.27 -
GData 19 2010.02.27 -
Ikarus T3.1.1.80.0 2010.02.27 -
Jiangmin 13.0.900 2010.02.27 -
K7AntiVirus 7.10.984 2010.02.26 -
Kaspersky 7.0.0.125 2010.02.27 -
McAfee 5904 2010.02.26 -
McAfee+Artemis 5904 2010.02.26 -
McAfee-GW-Edition 6.8.5 2010.02.27 -
Microsoft 1.5502 2010.02.27 -
NOD32 4899 2010.02.26 -
Norman 6.04.08 2010.02.27 -
nProtect 2009.1.8.0 2010.02.27 -
Panda 10.0.2.2 2010.02.27 -
PCTools 7.0.3.5 2010.02.27 -
Rising 22.36.05.04 2010.02.27 -
Sophos 4.50.0 2010.02.27 -
Sunbelt 5702 2010.02.27 -
Symantec 20091.2.0.41 2010.02.27 -
TheHacker 6.5.1.6.213 2010.02.27 -
TrendMicro 9.120.0.1004 2010.02.27 -
VBA32 3.12.12.2 2010.02.26 -
ViRobot 2010.2.27.2206 2010.02.27 -
VirusBuster 5.0.27.0 2010.02.26 -
weitere Informationen
File size: 81920 bytes
MD5...: 01dd1004181fd46ecdc3628228eb269d
SHA1..: 7f99cd6716c9564c266e1086c62709fc7070111a
SHA256: 8aed6773ae1c8b65b4cad6229bd05e224d348cf2a9d9f7d50f2513a9b1e14f66
ssdeep: 1536:VJIp05PZYuOA9hsuO7gKRSgZp6dr8C+zjG4y4bH49:qiPuIhqzU4jjyW<br>
PEiD..: -
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x538d<br>timedatestamp.....: 0x49e01b94 (Sat Apr 11 04:24:52 2009)<br>machinetype.......: 0x14c (I386)<br><br>( 4 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x112dc 0x11400 6.46 9901d0f7d0c24273ec2bc71fc4ccb980<br>.data 0x13000 0x27a8 0x1000 0.71 71aa38e36a119573d1c1ad27284d635a<br>.rsrc 0x16000 0x938 0xa00 4.33 374930790fb61912ba9e8b9c66c4c156<br>.reloc 0x17000 0xd10 0xe00 6.53 545051dd4118fad1030d83a97fd7f8f2<br><br>( 11 imports ) <br>> ADVAPI32.dll: RegOpenKeyExW, RegQueryValueExW, RegCloseKey, RegisterTraceGuidsW, GetTraceLoggerHandle, GetTraceEnableLevel, UnregisterTraceGuids, TraceEvent, DeregisterEventSource, RegisterEventSourceW, ReportEventW, RegGetValueW, RegCreateKeyExW, RegSetValueExW<br>> KERNEL32.dll: RtlCaptureStackBackTrace, IsDebuggerPresent, DebugBreak, HeapFree, HeapAlloc, HeapReAlloc, GetProcessHeap, TerminateProcess, TerminateThread, GetCurrentThread, GetModuleHandleW, LoadLibraryA, GetSystemTimeAsFileTime, QueryPerformanceCounter, GetModuleHandleA, GetStartupInfoA, InterlockedCompareExchange, FreeLibrary, Sleep, GetUserDefaultLangID, FormatMessageW, GetExitCodeThread, WaitForSingleObject, RegisterWaitForSingleObject, GetThreadId, ProcessIdToSessionId, GetCurrentProcessId, GetCurrentProcess, SetProcessWorkingSetSize, GetSystemInfo, GetTickCount, GetProcAddress, LoadLibraryW, SetErrorMode, QueryFullProcessImageNameW, ExitProcess, GetCurrentThreadId, SetProcessShutdownParameters, SetUnhandledExceptionFilter, HeapSetInformation, WerSetFlags, SetLastError, GetLastError, GetTickCount64, DeleteCriticalSection, InitializeCriticalSection, LeaveCriticalSection, ResumeThread, DuplicateHandle, InterlockedDecrement, InterlockedIncrement, LocalReAlloc, LocalAlloc, LocalFree, lstrcmpiW, WaitForMultipleObjectsEx, IsWow64Process, SetThreadPriority, CreateThread, OpenProcess, ReleaseMutex, CreateMutexW, SetEvent, OpenEventW, CreateEventW, SignalObjectAndWait, CloseHandle, UnhandledExceptionFilter, DelayLoadFailureHook, EnterCriticalSection, InterlockedExchange<br>> GDI32.dll: CreateCompatibleBitmap, DeleteObject, GetDIBits, CreateDIBSection, GetRandomRgn, GetStockObject, CreateRectRgn, GdiAlphaBlend, OffsetRgn, CombineRgn, CreateCompatibleDC, SelectClipRgn, SelectObject, GetRgnBox, DeleteDC, BitBlt, GetDeviceCaps<br>> USER32.dll: RegisterSessionPort, DwmStopRedirection, GetDC, ReleaseDC, EnumDisplayDevicesW, DwmStartRedirection, UnregisterSessionPort, CheckDesktopByThreadId, EnumDisplaySettingsW, GetSystemMetrics, RegisterErrorReportingDialog, RegisterGhostWindow, HungWindowFromGhostWindow, InternalGetWindowIcon, GhostWindowFromHungWindow, RegisterFrostWindow, OpenThreadDesktop, SetForegroundWindow, IsHungAppWindow, MessageBeep, IsWindowEnabled, EnumWindows, FlashWindowEx, SystemParametersInfoW, IsWindow, GetCaretBlinkTime, EndTask, OpenDesktopW, IsDialogMessageW, GetAncestor, SetThreadDesktop, EndPaint, ClientToScreen, InternalGetWindowText, GetUpdateRgn, SetTimer, IsIconic, FillRect, KillTimer, IsZoomed, GetTitleBarInfo, GetWindowInfo, LogicalToPhysicalPoint, GetClientRect, BeginPaint, InvalidateRect, GetWindowLongW, GetWindowTextW, GetDCEx, SetWindowLongW, ShowWindow, GetSysColorBrush, GetGuiResources, SetWindowPos, LoadStringW, LoadIconW, RegisterWindowMessageW, DispatchMessageW, TranslateMessage, PeekMessageW, RegisterPowerSettingNotification, PostQuitMessage, DestroyWindow, UnregisterPowerSettingNotification, DefWindowProcW, CreateWindowExW, RegisterClassExW, SetProcessDPIAware, PostMessageW, MsgWaitForMultipleObjectsEx, GetThreadDesktop, GetUserObjectInformationW, CloseDesktop, ChangeWindowMessageFilter, GetWindow, GetMonitorInfoW, GetPropW, AdjustWindowRectEx, MonitorFromWindow, GetClassNameW, SetClassLongW, OffsetRect, GetWindowRect, GetWindowThreadProcessId, DestroyIcon, SetWindowTextW, UpdateWindow, SendMessageW, IsWindowVisible, PostThreadMessageW, CreateDialogParamW<br>> msvcrt.dll: _except_handler4_common, _onexit, _lock, __dllonexit, _unlock, memset, rand, srand, _controlfp, _terminate@@YAXXZ, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _amsg_exit, _purecall, _vsnwprintf, _wcsicmp, memmove, wcsrchr, __getmainargs, _cexit, _exit, _XcptFilter, _ismbblead, exit, _acmdln, _initterm, memcpy<br>> ntdll.dll: RtlEnumerateGenericTableWithoutSplaying, RtlDeleteElementGenericTable, RtlInitializeGenericTable, DbgPrompt, DbgBreakPoint, NtQuerySystemInformation, NtAcceptConnectPort, NtCompleteConnectPort, NtReplyWaitReceivePort, NtRequestPort, NtConnectPort, NtRequestWaitReplyPort, WinSqmIsOptedIn, RtlUpcaseUnicodeChar, NtClose, RtlFreeSid, NtAlpcSendWaitReceivePort, NtAlpcConnectPort, RtlAllocateAndInitializeSid, WinSqmEventWrite, WinSqmEventEnabled, NtQueryInformationProcess, DbgPrintEx, WinSqmAddToStream, NtReplyPort, NtCreateWaitablePort, RtlInitUnicodeString, RtlInsertElementGenericTable, RtlNumberGenericTableElements, RtlIsGenericTableEmpty, RtlLookupElementGenericTable<br>> ole32.dll: CoCreateInstance, CoUninitialize, CoInitialize<br>> OLEAUT32.dll: -, -<br>> UxTheme.dll: CloseThemeData, OpenThemeData<br>> IMM32.dll: ImmDisableIME<br>> dwmredir.dll: DwmRedirectionManagerDispatchMessage, DwmRedirectionManagerShutdown, DwmRedirectionManagerInitialize, DwmShutdownTransport, DwmRedirectionManagerPlayingVideo, DwmRedirectionManagerFailMessage, DwmVersionCheck, DwmRedirectionManagerLockMemoryAllocations, DwmRedirectionManagerWaitForMultipleObjects, DwmInitializeTransport, DwmRedirectionManagerEnableMMCSS<br><br>( 0 exports ) <br>
RDS...: NSRL Reference Data Set<br>-
pdfid.: -
trid..: Win32 Executable Generic (42.3%)<br>Win32 Dynamic Link Library (generic) (37.6%)<br>Generic Win/DOS Executable (9.9%)<br>DOS Executable Generic (9.9%)<br>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:<br>publisher....: Microsoft Corporation<br>copyright....: (c) Microsoft Corporation. All rights reserved.<br>product......: Microsoft_ Windows_ Operating System<br>description..: Desktop Window Manager<br>original name: dwm.exe<br>internal name: dwm.exe<br>file version.: 6.0.6002.18005 (lh_sp2rtm.090410-1830)<br>comments.....: n/a<br>signers......: -<br>signing date.: -<br>verified.....: Unsigned<br> Code:
Datei hkcmd.exe empfangen 2010.02.27 14:01:44 (UTC)
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.5.0.50 2010.02.27 -
AhnLab-V3 5.0.0.2 2010.02.27 -
AntiVir 8.2.1.176 2010.02.26 -
Antiy-AVL 2.0.3.7 2010.02.26 -
Authentium 5.2.0.5 2010.02.27 -
Avast 4.8.1351.0 2010.02.27 -
Avast5 5.0.332.0 2010.02.27 -
AVG 9.0.0.730 2010.02.26 -
BitDefender 7.2 2010.02.27 -
CAT-QuickHeal 10.00 2010.02.27 -
ClamAV 0.96.0.0-git 2010.02.27 -
Comodo 4084 2010.02.27 -
DrWeb 5.0.1.12222 2010.02.27 -
eSafe 7.0.17.0 2010.02.25 -
eTrust-Vet 35.2.7331 2010.02.26 -
F-Prot 4.5.1.85 2010.02.27 -
F-Secure 9.0.15370.0 2010.02.27 -
Fortinet 4.0.14.0 2010.02.27 -
GData 19 2010.02.27 -
Ikarus T3.1.1.80.0 2010.02.27 -
Jiangmin 13.0.900 2010.02.27 -
K7AntiVirus 7.10.984 2010.02.26 -
Kaspersky 7.0.0.125 2010.02.27 -
McAfee 5904 2010.02.26 -
McAfee+Artemis 5904 2010.02.26 -
McAfee-GW-Edition 6.8.5 2010.02.27 -
Microsoft 1.5502 2010.02.27 -
NOD32 4899 2010.02.26 -
Norman 6.04.08 2010.02.27 -
nProtect 2009.1.8.0 2010.02.27 -
Panda 10.0.2.2 2010.02.27 -
PCTools 7.0.3.5 2010.02.27 -
Prevx 3.0 2010.02.27 -
Rising 22.36.05.04 2010.02.27 -
Sophos 4.50.0 2010.02.27 -
Sunbelt 5702 2010.02.27 -
Symantec 20091.2.0.41 2010.02.27 -
TheHacker 6.5.1.6.213 2010.02.27 -
TrendMicro 9.120.0.1004 2010.02.27 -
VBA32 3.12.12.2 2010.02.26 -
ViRobot 2010.2.27.2206 2010.02.27 -
VirusBuster 5.0.27.0 2010.02.26 -
weitere Informationen
File size: 173592 bytes
MD5...: 63ffa18e782debbe8cc62195ad3783ca
SHA1..: 6619f2f10514da62e1d76f6b097d899b53cde406
SHA256: 11012e63516cef79519da83123d2200ad1ead7f2d80d6ec17eb0a63f638f96aa
ssdeep: 3072:f4raStqwdbdsTCRqIrjd487gL2J8KZ12ycIkTrID5IXJJ:PSDt/dHEh/ImI<br>iX7<br>
PEiD..: -
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x10cc0<br>timedatestamp.....: 0x49a6e7d3 (Thu Feb 26 19:04:51 2009)<br>machinetype.......: 0x14c (I386)<br><br>( 4 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x1d7e0 0x1d800 6.64 572e8259d7df1c32fa72c5af62180a71<br>.rdata 0x1f000 0x5444 0x5600 5.30 995c03ca4784db1a1366437ad7416ee8<br>.data 0x25000 0x6864 0x4c00 3.44 0d7b5e4bf73db7e11b9cdfd7cf966dc9<br>.rsrc 0x2c000 0xc8c 0xe00 4.44 2de30254063bd995e6355fc7747442c7<br><br>( 7 imports ) <br>> hccutils.DLL: FindResources, LoadSTRINGFromHKCU, LoadSTRING<br>> KERNEL32.dll: GetModuleHandleA, CreateProcessA, FreeLibrary, LoadLibraryA, CloseHandle, GetLastError, InterlockedDecrement, SearchPathA, CompareFileTime, MultiByteToWideChar, WideCharToMultiByte, lstrlenW, RaiseException, InitializeCriticalSection, DeleteCriticalSection, lstrlenA, lstrcmpiA, InterlockedIncrement, GetModuleFileNameA, GetModuleHandleW, IsDBCSLeadByte, SizeofResource, LoadResource, FindResourceA, LoadLibraryExA, GetWindowsDirectoryA, Sleep, CreateMutexA, GetCurrentThreadId, GetCommandLineA, EnterCriticalSection, LeaveCriticalSection, FlushInstructionCache, GetCurrentProcess, GetSystemDefaultLangID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoA, GetProcAddress, WriteConsoleA, SetStdHandle, GetConsoleMode, GetConsoleCP, SetFilePointer, InitializeCriticalSectionAndSpinCount, SetEnvironmentVariableA, CompareStringW, CompareStringA, GetStringTypeW, GetStringTypeA, LCMapStringA, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, HeapSize, GetStdHandle, WriteFile, HeapCreate, HeapReAlloc, ExitProcess, LCMapStringW, GetConsoleOutputCP, WriteConsoleW, CreateFileA, FlushFileBuffers, VirtualAlloc, TerminateProcess, UnhandledExceptionFilter, VirtualFree, SetUnhandledExceptionFilter, IsDebuggerPresent, SetLastError, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, GetStartupInfoA, VirtualQuery, GetSystemInfo, VirtualProtect, IsProcessorFeaturePresent, HeapAlloc, GetProcessHeap, HeapFree, InterlockedCompareExchange, RtlUnwind<br>> USER32.dll: CharNextW, PostThreadMessageA, UnregisterClassA, wsprintfA, CharNextA, GetWindowLongA, GetCursorPos, EnumDisplayDevicesA, EnumDisplaySettingsA, CreateDialogParamA, CallWindowProcA, RegisterClassExA, UnregisterHotKey, RegisterHotKey, ActivateKeyboardLayout, MapVirtualKeyExA, GetKeyNameTextA, GetKeyboardLayout, GetKeyboardLayoutList, LoadCursorA, GetClassInfoExA, SetWindowLongA, RegisterClassA, CreateWindowExA, GetMessageA, DispatchMessageA, SetTimer, IsWindow, SendMessageA, ShowWindow, PostQuitMessage, PeekMessageA, DefWindowProcA, KillTimer, DestroyWindow, GetDlgItem, GetDesktopWindow, GetWindowRect, SetWindowTextA, MessageBoxA<br>> ADVAPI32.dll: RegEnumKeyExA, RegQueryInfoKeyA, RegDeleteValueA, RegDeleteKeyA, RegSetValueExA, RegCreateKeyExA, RegOpenKeyA, RegQueryValueExA, RegOpenKeyExA, RegCloseKey<br>> SHELL32.dll: ShellExecuteExA<br>> ole32.dll: CoRevokeClassObject, CoCreateInstance, CoTaskMemRealloc, CoSuspendClassObjects, CoTaskMemAlloc, CoRegisterClassObject, CoTaskMemFree, StringFromGUID2, CoUninitialize, CoInitialize<br>> OLEAUT32.dll: -, -, -, -, -, -, -, -<br><br>( 0 exports ) <br>
RDS...: NSRL Reference Data Set<br>-
pdfid.: -
trid..: Win32 Executable Generic (42.3%)<br>Win32 Dynamic Link Library (generic) (37.6%)<br>Generic Win/DOS Executable (9.9%)<br>DOS Executable Generic (9.9%)<br>Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:<br>publisher....: Intel Corporation<br>copyright....: Copyright 1999-2006, Intel Corporation<br>product......: Intel(R) Common User Interface<br>description..: hkcmd Module<br>original name: HKCMD.EXE<br>internal name: HKCMD<br>file version.: 7.14.10.1666<br>comments.....: <br>signers......: Intel Corporation<br> VeriSign Class 3 Code Signing 2004 CA<br> Class 3 Public Primary Certification Authority<br>signing date.: 8:57 PM 2/26/2009<br>verified.....: -<br> Code:
Datei igfxpers.exe empfangen 2010.02.27 14:04:07 (UTC)
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.5.0.50 2010.02.27 -
AhnLab-V3 5.0.0.2 2010.02.27 -
AntiVir 8.2.1.176 2010.02.26 -
Antiy-AVL 2.0.3.7 2010.02.26 -
Authentium 5.2.0.5 2010.02.27 -
Avast 4.8.1351.0 2010.02.27 -
Avast5 5.0.332.0 2010.02.24 -
AVG 9.0.0.730 2010.02.26 -
BitDefender 7.2 2010.02.27 -
CAT-QuickHeal 10.00 2010.02.27 -
ClamAV 0.96.0.0-git 2010.02.27 -
Comodo 4084 2010.02.27 -
DrWeb 5.0.1.12222 2010.02.27 -
eSafe 7.0.17.0 2010.02.25 -
eTrust-Vet 35.2.7331 2010.02.26 -
F-Prot 4.5.1.85 2010.02.27 -
F-Secure 9.0.15370.0 2010.02.27 -
Fortinet 4.0.14.0 2010.02.27 -
GData 19 2010.02.27 -
Ikarus T3.1.1.80.0 2010.02.27 -
Jiangmin 13.0.900 2010.02.27 -
K7AntiVirus 7.10.984 2010.02.26 -
Kaspersky 7.0.0.125 2010.02.27 -
McAfee 5904 2010.02.26 -
McAfee+Artemis 5904 2010.02.26 -
McAfee-GW-Edition 6.8.5 2010.02.27 -
Microsoft 1.5502 2010.02.27 -
NOD32 4899 2010.02.26 -
Norman 6.04.08 2010.02.27 -
nProtect 2009.1.8.0 2010.02.27 -
Panda 10.0.2.2 2010.02.27 -
PCTools 7.0.3.5 2010.02.27 -
Prevx 3.0 2010.02.27 -
Rising 22.36.05.04 2010.02.27 -
Sophos 4.50.0 2010.02.27 -
Sunbelt 5702 2010.02.27 -
Symantec 20091.2.0.41 2010.02.27 -
TheHacker 6.5.1.6.213 2010.02.27 -
TrendMicro 9.120.0.1004 2010.02.27 -
VBA32 3.12.12.2 2010.02.26 -
ViRobot 2010.2.27.2206 2010.02.27 -
VirusBuster 5.0.27.0 2010.02.26 -
weitere Informationen
File size: 150552 bytes
MD5...: bbf84f08a343374bed5687aa6c5797b8
SHA1..: 77c883005b2ce4068502a6b0c436d54ad1a65291
SHA256: 73bd74f1d3397913f299797f5c69f1503901e4d046643990e753e0c238b665a6
ssdeep: 3072:wRXyzuEA05frcqnHJb/aDX31/6UdqEr75bMA:EX8uArdHJb/aL1SU4QJv<br>
PEiD..: -
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x104dc<br>timedatestamp.....: 0x49a6e7bc (Thu Feb 26 19:04:28 2009)<br>machinetype.......: 0x14c (I386)<br><br>( 4 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x1b760 0x1b800 6.62 0437dc48c818ccda2c529a15adff06a1<br>.rdata 0x1d000 0x4e42 0x5000 5.33 386e32bb3c986b2909a2fcab3e7880f5<br>.data 0x22000 0x3538 0x1800 3.55 a4917aed43d5ea19e08bfa7a0c1ced40<br>.rsrc 0x26000 0xcf4 0xe00 4.40 c50e787ad0822c2f6bcaccc18674d702<br><br>( 7 imports ) <br>> POWRPROF.dll: GetCurrentPowerPolicies<br>> KERNEL32.dll: GetLastError, GetProcAddress, GetModuleHandleA, lstrlenA, lstrcmpiA, CloseHandle, GetLocaleInfoA, GetUserDefaultUILanguage, TerminateProcess, GetExitCodeProcess, OpenProcess, Process32Next, Process32First, CreateToolhelp32Snapshot, CreateProcessA, InterlockedIncrement, GetModuleFileNameA, GetModuleHandleW, IsDBCSLeadByte, FreeLibrary, SizeofResource, LoadResource, FindResourceA, LoadLibraryExA, DeleteCriticalSection, LoadLibraryA, CreateMutexA, GetCurrentThreadId, GetCommandLineA, QueryPerformanceCounter, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, FlushFileBuffers, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetConsoleMode, GetConsoleCP, SetFilePointer, InitializeCriticalSection, RaiseException, lstrlenW, WideCharToMultiByte, GetCurrentProcessId, MultiByteToWideChar, CompareFileTime, InterlockedDecrement, GetSystemPowerStatus, GetTickCount, Sleep, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, GetEnvironmentStrings, InitializeCriticalSectionAndSpinCount, GetSystemTimeAsFileTime, FreeEnvironmentStringsA, HeapSize, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, GetStdHandle, WriteFile, EnterCriticalSection, LeaveCriticalSection, HeapFree, GetProcessHeap, RtlUnwind, HeapAlloc, VirtualProtect, VirtualAlloc, GetSystemInfo, VirtualQuery, GetStartupInfoA, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, VirtualFree, HeapReAlloc, HeapCreate, ExitProcess<br>> USER32.dll: PostThreadMessageA, ChangeDisplaySettingsExA, ChangeDisplaySettingsA, CharNextA, SetTimer, PostMessageA, RegisterWindowMessageA, CharNextW, KillTimer, PostQuitMessage, RegisterClassA, CreateWindowExA, GetMessageA, DispatchMessageA, FindWindowA, RegisterDeviceNotificationA, DefWindowProcA, EnumDisplayDevicesA, SendNotifyMessageA, EnumDisplaySettingsA<br>> ADVAPI32.dll: RegEnumKeyExA, RegOpenKeyA, RegQueryInfoKeyA, RegDeleteValueA, RegOpenKeyExA, RegQueryValueExA, RegDeleteKeyA, RegSetValueExA, RegCloseKey, RegCreateKeyExA<br>> SHELL32.dll: ShellExecuteExA<br>> ole32.dll: CoCreateInstance, CoTaskMemAlloc, CoTaskMemRealloc, CoRevokeClassObject, CoRegisterClassObject, CoTaskMemFree, CoUninitialize, CoInitialize, StringFromGUID2, CoSuspendClassObjects<br>> OLEAUT32.dll: -, -, -, -, -, -, -, -<br><br>( 0 exports ) <br>
RDS...: NSRL Reference Data Set<br>-
trid..: Win64 Executable Generic (59.6%)<br>Win32 Executable MS Visual C++ (generic) (26.2%)<br>Win32 Executable Generic (5.9%)<br>Win32 Dynamic Link Library (generic) (5.2%)<br>Generic Win/DOS Executable (1.3%)
pdfid.: -
sigcheck:<br>publisher....: Intel Corporation<br>copyright....: Copyright 1999-2006, Intel Corporation<br>product......: Intel(R) Common User Interface<br>description..: persistence Module<br>original name: IGFXPERS.EXE<br>internal name: PERSISTENCE<br>file version.: 7.14.10.1666<br>comments.....: <br>signers......: Intel Corporation<br> VeriSign Class 3 Code Signing 2004 CA<br> Class 3 Public Primary Certification Authority<br>signing date.: 8:57 PM 2/26/2009<br>verified.....: -<br> Code:
Datei igfxsrvc.exe empfangen 2010.02.27 14:05:55 (UTC)
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.5.0.50 2010.02.27 -
AhnLab-V3 5.0.0.2 2010.02.27 -
AntiVir 8.2.1.176 2010.02.26 -
Antiy-AVL 2.0.3.7 2010.02.26 -
Authentium 5.2.0.5 2010.02.27 -
Avast 4.8.1351.0 2010.02.27 -
Avast5 5.0.332.0 2010.02.27 -
AVG 9.0.0.730 2010.02.26 -
BitDefender 7.2 2010.02.27 -
CAT-QuickHeal 10.00 2010.02.27 -
ClamAV 0.96.0.0-git 2010.02.27 -
Comodo 4084 2010.02.27 -
DrWeb 5.0.1.12222 2010.02.27 -
eSafe 7.0.17.0 2010.02.25 -
eTrust-Vet 35.2.7331 2010.02.26 -
F-Prot 4.5.1.85 2010.02.27 -
F-Secure 9.0.15370.0 2010.02.27 -
Fortinet 4.0.14.0 2010.02.27 -
GData 19 2010.02.27 -
Ikarus T3.1.1.80.0 2010.02.27 -
Jiangmin 13.0.900 2010.02.27 -
K7AntiVirus 7.10.984 2010.02.26 -
Kaspersky 7.0.0.125 2010.02.27 -
McAfee 5904 2010.02.26 -
McAfee+Artemis 5904 2010.02.26 -
McAfee-GW-Edition 6.8.5 2010.02.27 -
Microsoft 1.5502 2010.02.27 -
NOD32 4899 2010.02.26 -
Norman 6.04.08 2010.02.27 -
nProtect 2009.1.8.0 2010.02.27 -
Panda 10.0.2.2 2010.02.27 -
PCTools 7.0.3.5 2010.02.27 -
Prevx 3.0 2010.02.27 -
Rising 22.36.05.04 2010.02.27 -
Sophos 4.50.0 2010.02.27 -
Sunbelt 5702 2010.02.27 -
Symantec 20091.2.0.41 2010.02.27 -
TheHacker 6.5.1.6.213 2010.02.27 -
TrendMicro 9.120.0.1004 2010.02.27 -
VBA32 3.12.12.2 2010.02.26 -
ViRobot 2010.2.27.2206 2010.02.27 -
VirusBuster 5.0.27.0 2010.02.26 -
weitere Informationen
File size: 252952 bytes
MD5...: c5c241a18788eed88e6c276d04b7d6ab
SHA1..: 4c591c4f04ca0967754f1c4d885e23e4d289ff2e
SHA256: 80a142883fdffcfbd6a0313e4e23c816d6efacfdd06223a7902df67cdb1aa2dc
ssdeep: 3072:NOxyVSVsvkGe6PJopLLt1eizV8vgNE65hV+dy1qAg0FumZVO5GfdLrPp:Ky<br>VSVsXPahLtISY0h081qAOehfdLl<br>
PEiD..: -
PEInfo: PE Structure information<br><br>( base data )<br>entrypointaddress.: 0x14374<br>timedatestamp.....: 0x49a6e7b0 (Thu Feb 26 19:04:16 2009)<br>machinetype.......: 0x14c (I386)<br><br>( 4 sections )<br>name viradd virsiz rawdsiz ntrpy md5<br>.text 0x1000 0x24880 0x24a00 6.65 533e3edd096066e527aed97b0906c1f3<br>.rdata 0x26000 0xb4a8 0xb600 5.69 1c5b8c513d2a860343213e26542889d3<br>.data 0x32000 0x46a4 0x2a00 4.44 f588750504b9dfcababf627e63844c75<br>.rsrc 0x37000 0x9264 0x9400 5.35 29b491fba218de003a2ec815030ec8bd<br><br>( 5 imports ) <br>> KERNEL32.dll: lstrlenA, lstrcmpiA, SetEvent, CloseHandle, CreateThread, CreateEventA, InterlockedIncrement, GetModuleFileNameA, GetProcAddress, GetModuleHandleW, IsDBCSLeadByte, FreeLibrary, SizeofResource, GetLastError, FindResourceA, LoadLibraryExA, GetModuleHandleA, Sleep, GetCurrentThreadId, GetCommandLineA, FlushFileBuffers, CreateFileA, ReadFile, WriteConsoleW, DeleteCriticalSection, InitializeCriticalSection, RaiseException, lstrlenW, WideCharToMultiByte, MultiByteToWideChar, InterlockedDecrement, CreateMutexA, WaitForSingleObject, LoadResource, ReleaseMutex, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, LoadLibraryA, InitializeCriticalSectionAndSpinCount, GetConsoleMode, GetConsoleCP, SetFilePointer, GetLocaleInfoA, GetStringTypeW, GetStringTypeA, EnterCriticalSection, LeaveCriticalSection, HeapFree, GetProcessHeap, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, HeapAlloc, VirtualProtect, VirtualAlloc, GetSystemInfo, VirtualQuery, GetStartupInfoA, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, LCMapStringA, LCMapStringW, HeapCreate, VirtualFree, HeapReAlloc, ExitProcess, WriteFile, GetStdHandle, HeapSize, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime<br>> USER32.dll: CharNextW, CharNextA, PostThreadMessageA, DispatchMessageA, GetMessageA, wsprintfA<br>> ADVAPI32.dll: RegSetValueExA, RegCreateKeyExA, RegDeleteValueA, RegDeleteKeyA, RegEnumKeyExA, RegOpenKeyA, RegOpenKeyExA, RegQueryValueExA, RegCloseKey, RegQueryInfoKeyA<br>> ole32.dll: CoRegisterClassObject, CoTaskMemRealloc, CoTaskMemAlloc, CoCreateInstance, CoTaskMemFree, StringFromGUID2, CoUninitialize, CoInitialize, CoRevokeClassObject<br>> OLEAUT32.dll: -, -, -, -, -, -, -, -, -, -<br><br>( 0 exports ) <br>
RDS...: NSRL Reference Data Set<br>-
pdfid.: -
trid..: Win32 Executable MS Visual C++ (generic) (65.2%)<br>Win32 Executable Generic (14.7%)<br>Win32 Dynamic Link Library (generic) (13.1%)<br>Generic Win/DOS Executable (3.4%)<br>DOS Executable Generic (3.4%)
sigcheck:<br>publisher....: Intel Corporation<br>copyright....: Copyright 1999-2006, Intel Corporation<br>product......: Intel(R) Common User Interface<br>description..: igfxsrvc Module<br>original name: IGFXSRVC.EXE<br>internal name: IGFXSRVC<br>file version.: 7.14.10.1666<br>comments.....: <br>signers......: Intel Corporation<br> VeriSign Class 3 Code Signing 2004 CA<br> Class 3 Public Primary Certification Authority<br>signing date.: 8:57 PM 2/26/2009<br>verified.....: -<br> |