Gesperrt | TR/Daonol.AA hier die log von AVZ von deinem zweiten script... hast mich jut erschrocken, mit der reboot zeile.. hatte ich garnicht gelesen und dachte gerade was weiß ich was  da ich hier 20sachen gleichzeitig mache bzw machte ... Zitat:
Creating archive of files from Quarantine
Creating archive of files from Quarantine - complete
Script error: Not enough actual parameters, position [7:16]
1.1 Searching for user-mode API hooks
Analysis: kernel32.dll, export table found in section .text
Analysis: ntdll.dll, export table found in section .text
Analysis: user32.dll, export table found in section .text
Analysis: advapi32.dll, export table found in section .text
Analysis: ws2_32.dll, export table found in section .text
Analysis: wininet.dll, export table found in section .text
Analysis: rasapi32.dll, export table found in section .text
Analysis: urlmon.dll, export table found in section .text
Analysis: netapi32.dll, export table found in section .text
1.2 Searching for kernel-mode API hooks
Driver loaded successfully
SDT found (RVA=07B180)
Kernel ntkrnlpa.exe found in memory at address 804D7000
SDT = 80552180
KiST = 80501030 (284)
Function NtAllocateVirtualMemory (11) intercepted (8059C910->B72B5B30), hook C:\WINDOWS\system32\drivers\wpsdrvnt.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtClose (19) intercepted (805B0714->B4BCD6B8), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateKey (29) intercepted (80618BD2->B4BCD574), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtCreateThread (35) intercepted (805C5AD0->B87FA6FC), hook not defined
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeleteKey (3F) intercepted (80619062->B87FA70B), hook not defined
>>> Function restored successfully !
>>> Hook code blocked
Function NtDeleteValueKey (41) intercepted (80619232->B4BCDA52), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtDuplicateObject (44) intercepted (805B21F0->B4BCD14C), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtEnumerateKey (47) intercepted (80619412->B7ECDDA4), hook spkb.sys
>>> Function restored successfully !
>>> Hook code blocked
Function NtEnumerateValueKey (49) intercepted (8061967C->B7ECE132), hook spkb.sys
>>> Function restored successfully !
>>> Hook code blocked
Function NtLoadKey (62) intercepted (8061A902->B87FA71A), hook not defined
>>> Function restored successfully !
>>> Hook code blocked
Function NtMapViewOfSection (6C) intercepted (805A5F5A->B72B5470), hook C:\WINDOWS\system32\drivers\wpsdrvnt.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenKey (77) intercepted (80619F68->B4BCD64E), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenProcess (7A) intercepted (805BFB78->B4BCD08C), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtOpenThread (80) intercepted (805BFE04->B4BCD0F0), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtProtectVirtualMemory (89) intercepted (805AC4E2->B72B5C50), hook C:\WINDOWS\system32\drivers\wpsdrvnt.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryKey (A0) intercepted (8061A28C->B7ECE20A), hook spkb.sys
>>> Function restored successfully !
>>> Hook code blocked
Function NtQueryValueKey (B1) intercepted (80616C8C->B4BCD76E), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtReplaceKey (C1) intercepted (8061A7B2->B87FA724), hook not defined
>>> Function restored successfully !
>>> Hook code blocked
Function NtRestoreKey (CC) intercepted (80616FDA->B4BCD72E), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtSetValueKey (F7) intercepted (80617292->B4BCD8AE), hook C:\WINDOWS\System32\Drivers\aswSP.SYS, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtShutdownSystem (F9) intercepted (8060786E->B72B5990), hook C:\WINDOWS\system32\drivers\wpsdrvnt.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Function NtTerminateProcess (101) intercepted (805C74C8->B87FA6F7), hook not defined
>>> Function restored successfully !
>>> Hook code blocked
Function NtWriteVirtualMemory (115) intercepted (805A82F6->B72B5D60), hook C:\WINDOWS\system32\drivers\wpsdrvnt.sys, driver recognized as trusted
>>> Function restored successfully !
>>> Hook code blocked
Functions checked: 284, intercepted: 23, restored: 23
1.3 Checking IDT and SYSENTER
Analyzing CPU 1
CmpCallCallBacks = 0008802E
Disable callback OK
Checking IDT and SYSENTER - complete
1.4 Searching for masking processes and drivers
Checking not performed: extended monitoring driver (AVZPM) is not installed
Driver loaded successfully
1.5 Checking IRP handlers
\FileSystem\ntfs[IRP_MJ_CREATE] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_CLOSE] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_WRITE] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_EA] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_EA] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 89D601F8 -> hook not defined
\FileSystem\ntfs[IRP_MJ_PNP] = 89D601F8 -> hook not defined
Checking - complete
Delete file:C:\PROGRA~1\INTERN~1\..\lohe.old 0yAAAAAAAA
>>>To delete the file C:\PROGRA~1\INTERN~1\..\lohe.old 0yAAAAAAAA reboot is required
Removing traces of deleted files...
|
__________________ |