sting@tna | 03.05.2010 11:47 | Code:
Antivirus Version letzte aktualisierung Ergebnis
a-squared 4.5.0.50 2010.05.03 Rootkit.Win32.TDSS!IK
AhnLab-V3 2010.05.02.00 2010.05.01 -
AntiVir 8.2.1.224 2010.05.03 TR/Patched.Gen
Antiy-AVL 2.0.3.7 2010.04.30 -
Authentium 5.2.0.5 2010.05.03 W32/SYStroj.AB2.gen!Eldorado
Avast 4.8.1351.0 2010.05.03 Win32:Alureon-FZ
Avast5 5.0.332.0 2010.05.03 Win32:Alureon-FZ
AVG 9.0.0.787 2010.05.03 Win32/Patched.DP
BitDefender 7.2 2010.05.03 Rootkit.Patched.TDSS.Gen
CAT-QuickHeal 10.00 2010.05.01 -
ClamAV 0.96.0.3-git 2010.05.03 -
Comodo 4746 2010.05.03 TrojWare.Win32.Rootkit.TDL3.gen
DrWeb 5.0.2.03300 2010.05.03 BackDoor.Tdss.2459
eSafe 7.0.17.0 2010.05.02 -
eTrust-Vet 35.2.7465 2010.05.03 Win32/Alureon.A!generic
F-Prot 4.5.1.85 2010.05.03 W32/SYStroj.AB2.gen!Eldorado
F-Secure 9.0.15370.0 2010.05.03 Rootkit.Patched.TDSS.Gen
Fortinet 4.0.14.0 2010.05.02 -
GData 21 2010.05.03 Rootkit.Patched.TDSS.Gen
Ikarus T3.1.1.80.0 2010.05.03 Rootkit.Win32.TDSS
Jiangmin 13.0.900 2010.05.03 Rootkit.TDSS.dgu
Kaspersky 7.0.0.125 2010.05.03 Rootkit.Win32.TDSS.ap
McAfee 5.400.0.1158 2010.05.03 -
McAfee-GW-Edition 6.8.5 2010.05.03 Trojan.Patched.Gen
Microsoft 1.5703 2010.05.03 Virus:Win32/Alureon.H
NOD32 5081 2010.05.03 Win32/Patched.EQ
Norman 6.04.12 2010.05.03 W32/tdss.drv.gen8
nProtect 2010-05-03.01 2010.05.03 -
Panda 10.0.2.7 2010.05.02 -
PCTools 7.0.3.5 2010.05.03 -
Prevx 3.0 2010.05.03 -
Rising 22.45.04.03 2010.04.30 RootKit.Win32.TDSS.c
Sophos 4.53.0 2010.05.03 Mal/TDSSRt-A
Sunbelt 6250 2010.05.02 LooksLike.Win32.PatchedDriver!A (v)
Symantec 20091.2.0.41 2010.05.03 Backdoor.Tidserv!inf
TheHacker 6.5.2.0.275 2010.05.02 -
TrendMicro 9.120.0.1004 2010.05.03 Mal_TIDIES-12
TrendMicro-HouseCall 9.120.0.1004 2010.05.03 Mal_TIDIES-12
VBA32 3.12.12.4 2010.05.03 Rootkit.Win32.TDSL.b
ViRobot 2010.5.1.2299 2010.05.03 -
VirusBuster 5.0.27.0 2010.05.02 Rootkit.TDSS.Gen.3
weitere Informationen
File size: 297040 bytes
MD5...: 8aa67814482d57105feef4fd0677547a
SHA1..: 26fffc5a9829a70292ee004c4bece4efef8fa9a5
SHA256: 8e5a15827b00bfe79e865d8c29c6c380e8f08434bf6ac848ab448d5083ca763a
ssdeep: 6144:NdF5ilGCHNKgx4V9pfj5h/gmSuDzRWd7+9TlOvSCiNG7cWh0XMRW:N/sfCg
iDzR2aTlkSCdSXF
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x46014
timedatestamp.....: 0x4a5bbf2d (Mon Jul 13 23:11:41 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x136cf 0x13800 6.47 6abc7d382ba96ae2b739ccd0a3edbf0c
.rdata 0x15000 0x918 0xa00 5.21 5f4ddf158f72905816c0005fd16b557e
.data 0x16000 0x879 0xa00 1.60 4c8bf658934b2686bf9aba8b3684f436
PAGE 0x17000 0x2d110 0x2d200 6.49 d035b8f153fe7da5e9d0a9b49b14c0c9
INIT 0x45000 0xdec 0xe00 6.10 6066b923575900f38fe671158a1f2e3b
.rsrc 0x46000 0x6b0 0x800 5.34 76c9ff9f944a53b978a6f0a4712c7d3d
.reloc 0x47000 0x322c 0x3400 6.59 9a3bd78fa017b4e24d741615e6964faf
( 2 imports )
> ntoskrnl.exe: ObfDereferenceObject, IoWMIWriteEvent, ExAllocatePoolWithTag, memcpy, MmGetSystemRoutineAddress, RtlInitUnicodeString, RtlCompareMemory, IoWMIRegistrationControl, IofCompleteRequest, IofCallDriver, KeDelayExecutionThread, KeWaitForSingleObject, IoBuildDeviceIoControlRequest, KeInitializeEvent, RtlStringFromGUID, IoGetDeviceObjectPointer, RtlQueryRegistryValues, ZwClose, ZwFlushKey, ZwOpenKey, RtlGUIDFromString, RtlFreeUnicodeString, RtlWriteRegistryValue, RtlDeleteRegistryValue, ZwQueryLicenseValue, IoReleaseCancelSpinLock, IoAcquireCancelSpinLock, _allmul, IoGetAttachedDeviceReference, ExUuidCreate, KeQuerySystemTime, _aulldiv, IoForwardIrpSynchronously, IoGetDevicePropertyData, KdDebuggerNotPresent, KdDebuggerEnabled, IoGetDeviceInterfaces, ExQueueWorkItem, RtlEqualUnicodeString, _vsnprintf, ExFreePoolWithTag, isspace, RtlCharToInteger, RtlInt64ToUnicodeString, _stricmp, IoBuildSynchronousFsdRequest, _aullrem, InterlockedPopEntrySList, InterlockedPushEntrySList, ExInitializeNPagedLookasideList, IoFreeMdl, KeClearEvent, IoFreeIrp, IoReuseIrp, IoAllocateIrp, ObfReferenceObject, _allshl, _aulldvrm, _aullshr, MmFreeMappingAddress, IoBuildPartialMdl, MmUnmapLockedPages, FsRtlIsTotalDeviceFailure, KeSetEvent, IoRaiseInformationalHardError, IoAllocateMdl, MmBuildMdlForNonPagedPool, IoCreateSymbolicLink, IoDeleteSymbolicLink, KefReleaseSpinLockFromDpcLevel, KefAcquireSpinLockAtDpcLevel, MmUnmapReservedMapping, MmMapLockedPagesWithReservedMapping, MmMapLockedPagesSpecifyCache, KeInitializeSemaphore, KeReleaseSemaphore, MmUnlockPages, IoBuildAsynchronousFsdRequest, KeBugCheckEx, MmAllocateMappingAddress, KeTickCount, memset, _purecall, _vsnwprintf, EtwWrite, EtwUnregister, EtwEventEnabled, EtwProviderEnabled, EtwRegister
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Generic Win/DOS Executable (49.9%)
DOS Executable Generic (49.8%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.1%)
sigcheck:
publisher....: n/a
copyright....: n/a
product......: n/a
description..: n/a
original name: n/a
internal name: n/a
file version.: n/a
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned Code:
GMER 1.0.15.15281 - hxxp://www.gmer.net
Rootkit scan 2010-05-03 12:47:04
Windows 6.1.7600
Running: y5cmvqwg.exe; Driver: C:\Users\Mario\AppData\Local\Temp\uglcypod.sys
---- System - GMER 1.0.15 ----
INT 0x1F \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 83020AF8
INT 0x37 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 83020104
INT 0xC1 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 830203F4
INT 0xD1 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 830092D8
INT 0xDF \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 830201DC
INT 0xE1 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 83020958
INT 0xE3 \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 830206F8
INT 0xFD \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 83020F2C
INT 0xFE \SystemRoot\system32\halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation) 830211A8
---- Kernel code sections - GMER 1.0.15 ----
.text ntoskrnl.exe!ZwSaveKeyEx + 13B1 82C3B8E9 1 Byte [06]
.text ntoskrnl.exe!KiDispatchInterrupt + 5A2 82C5B3D2 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
? System32\Drivers\spvk.sys Das System kann den angegebenen Pfad nicht finden. !
PAGE PCIIDEX.SYS!DllUnload 8C475606 5 Bytes JMP 854011D8
.text C:\Windows\system32\DRIVERS\atikmdag.sys section is writeable [0x9302E000, 0x2D5378, 0xE8000020]
.text USBPORT.SYS!DllUnload 93680CA0 5 Bytes JMP 866681D8
.text peauth.sys 9A168C9D 28 Bytes JMP 0692B869
.text peauth.sys 9A168CC1 28 Bytes JMP 0692B88D
PAGE peauth.sys 9A16EB9B 72 Bytes [4E, C1, 35, 30, 3C, 4C, C0, ...]
PAGE peauth.sys 9A16EBEC 60 Bytes [27, 4E, 38, 29, 53, 28, 55, ...]
PAGE peauth.sys 9A16EC29 50 Bytes [38, D4, 20, 59, 47, 67, 31, ...]
PAGE ...
---- User code sections - GMER 1.0.15 ----
.text C:\Windows\Explorer.EXE[1812] SHELL32.dll!SHFileOperationW 760B9708 5 Bytes JMP 10001102 C:\Program Files\Unlocker\UnlockerHook.dll
.text C:\Program Files\Mozilla Firefox\firefox.exe[4004] ntdll.dll!LdrLoadDll 775EF585 5 Bytes JMP 002C13F0 C:\Program Files\Mozilla Firefox\firefox.exe (Firefox/Mozilla Corporation)
---- Kernel IAT/EAT - GMER 1.0.15 ----
IAT \SystemRoot\system32\DRIVERS\pci.sys[ntoskrnl.exe!IoDetachDevice] [8C266ECE] \SystemRoot\System32\Drivers\spvk.sys
IAT \SystemRoot\system32\DRIVERS\pci.sys[ntoskrnl.exe!IoAttachDeviceToDeviceStack] [8C266F22] \SystemRoot\System32\Drivers\spvk.sys
IAT \SystemRoot\system32\DRIVERS\atapi.sys[ataport.SYS!AtaPortReadPortUchar] [8C23990E] \SystemRoot\System32\Drivers\spvk.sys
IAT \SystemRoot\system32\DRIVERS\atapi.sys[ataport.SYS!AtaPortWritePortUchar] [8C239F9C] \SystemRoot\System32\Drivers\spvk.sys
IAT \SystemRoot\system32\DRIVERS\atapi.sys[ataport.SYS!AtaPortWritePortUlong] [8C2393E6] \SystemRoot\System32\Drivers\spvk.sys
IAT \SystemRoot\system32\DRIVERS\atapi.sys[ataport.SYS!AtaPortWritePortBufferUshort] [8C23A178] \SystemRoot\System32\Drivers\spvk.sys
IAT \SystemRoot\system32\DRIVERS\atapi.sys[ataport.SYS!AtaPortReadPortBufferUshort] [8C2391D4] \SystemRoot\System32\Drivers\spvk.sys
IAT \SystemRoot\system32\DRIVERS\ataport.SYS[ntoskrnl.exe!KeInsertQueueDpc] 853FE5B8
---- Devices - GMER 1.0.15 ----
Device \FileSystem\Ntfs \Ntfs 854051F8
Device \Driver\NetBT \Device\NetBT_Tcpip_{CBF43A7E-EE3A-43D7-892E-DF7CDC6FF977} 865DD470
Device \Driver\volmgr \Device\VolMgrControl 854001F8
Device \Driver\usbuhci \Device\USBPDO-0 8665F1F8
Device \Driver\PCI_PNP4852 \Device\00000051 spvk.sys
Device \Driver\usbuhci \Device\USBPDO-1 8665F1F8
Device \Driver\usbehci \Device\USBPDO-2 86648470
Device \Driver\usbuhci \Device\USBPDO-3 8665F1F8
Device \Driver\usbuhci \Device\USBPDO-4 8665F1F8
Device \Driver\usbuhci \Device\USBPDO-5 8665F1F8
Device \Driver\ACPI_HAL \Device\00000049 halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)
Device \Driver\usbuhci \Device\USBPDO-6 8665F1F8
Device \Driver\volmgr \Device\HarddiskVolume1 854001F8
AttachedDevice \Driver\volmgr \Device\HarddiskVolume1 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
Device \Driver\usbehci \Device\USBPDO-7 86648470
Device \Driver\volmgr \Device\HarddiskVolume2 854001F8
AttachedDevice \Driver\volmgr \Device\HarddiskVolume2 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
Device \Driver\cdrom \Device\CdRom0 8652E1F8
Device \Driver\cdrom \Device\CdRom1 8652E1F8
Device \Driver\atapi \Device\Ide\IdePort0 854031F8
Device \Driver\atapi \Device\Ide\IdePort1 854031F8
Device \Driver\atapi \Device\Ide\IdePort2 854031F8
Device \Driver\atapi \Device\Ide\IdePort3 854031F8
Device \Driver\atapi \Device\Ide\IdePort4 854031F8
Device \Driver\atapi \Device\Ide\IdePort5 854031F8
Device \Driver\atapi \Device\Ide\IdeDeviceP1T0L0-1 854031F8
Device \Driver\atapi \Device\Ide\IdeDeviceP5T0L0-6 854031F8
Device \Driver\atapi \Device\Ide\IdeDeviceP4T0L0-5 854031F8
Device \Driver\NetBT \Device\NetBt_Wins_Export 865DD470
Device \Driver\sptd \Device\3231993602 spvk.sys
Device \Driver\usbuhci \Device\USBFDO-0 8665F1F8
Device \Driver\usbuhci \Device\USBFDO-1 8665F1F8
Device \Driver\usbehci \Device\USBFDO-2 86648470
Device \Driver\NetBT \Device\NetBT_Tcpip_{90CD409F-4B02-4458-AEF5-9A1D58AC1267} 865DD470
Device \Driver\usbuhci \Device\USBFDO-3 8665F1F8
Device \Driver\usbuhci \Device\USBFDO-4 8665F1F8
Device \Driver\usbuhci \Device\USBFDO-5 8665F1F8
Device \Driver\usbuhci \Device\USBFDO-6 8665F1F8
Device \Driver\usbehci \Device\USBFDO-7 86648470
Device \Driver\abxfku6p \Device\Scsi\abxfku6p1 866DB1F8
Device \Driver\abxfku6p \Device\Scsi\abxfku6p1Port6Path0Target0Lun0 866DB1F8
Device \FileSystem\cdfs \Cdfs 86E6E1F8
---- Registry - GMER 1.0.15 ----
Reg HKLM\SYSTEM\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}\{32C17511-1BC4-49D3-A99D-7A78BB541D10}\Connection@Name isatap.{CBF43A7E-EE3A-43D7-892E-DF7CDC6FF977}
Reg HKLM\SYSTEM\CurrentControlSet\Control\Network\{4d36e975-e325-11ce-bfc1-08002be10318}\{6B683E0E-1505-488C-8053-3C1301924246}\Linkage@Bind \Device\{32C17511-1BC4-49D3-A99D-7A78BB541D10}?\Device\{32E49564-6E3D-4E37-8B8B-89BBBD8D3A1B}?\Device\{10A19763-DD68-4591-A1FB-9D453A2DB415}?\Device\{BC8E02EB-F09F-4B82-93F7-7018E9217252}?\Device\{C4E288D5-8521-4920-9292-2D30DAE4634C}?
Reg HKLM\SYSTEM\CurrentControlSet\Control\Network\{4d36e975-e325-11ce-bfc1-08002be10318}\{6B683E0E-1505-488C-8053-3C1301924246}\Linkage@Route "{32C17511-1BC4-49D3-A99D-7A78BB541D10}"?"{32E49564-6E3D-4E37-8B8B-89BBBD8D3A1B}"?"{10A19763-DD68-4591-A1FB-9D453A2DB415}"?"{BC8E02EB-F09F-4B82-93F7-7018E9217252}"?"{C4E288D5-8521-4920-9292-2D30DAE4634C}"?
Reg HKLM\SYSTEM\CurrentControlSet\Control\Network\{4d36e975-e325-11ce-bfc1-08002be10318}\{6B683E0E-1505-488C-8053-3C1301924246}\Linkage@Export \Device\TCPIP6TUNNEL_{32C17511-1BC4-49D3-A99D-7A78BB541D10}?\Device\TCPIP6TUNNEL_{32E49564-6E3D-4E37-8B8B-89BBBD8D3A1B}?\Device\TCPIP6TUNNEL_{10A19763-DD68-4591-A1FB-9D453A2DB415}?\Device\TCPIP6TUNNEL_{BC8E02EB-F09F-4B82-93F7-7018E9217252}?\Device\TCPIP6TUNNEL_{C4E288D5-8521-4920-9292-2D30DAE4634C}?
Reg HKLM\SYSTEM\CurrentControlSet\services\iphlpsvc\Parameters\Isatap\{32C17511-1BC4-49D3-A99D-7A78BB541D10}@InterfaceName isatap.{CBF43A7E-EE3A-43D7-892E-DF7CDC6FF977}
Reg HKLM\SYSTEM\CurrentControlSet\services\iphlpsvc\Parameters\Isatap\{32C17511-1BC4-49D3-A99D-7A78BB541D10}@ReusableType 0
Reg HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Epoch@Epoch 5176
Reg HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Epoch2@Epoch 2535
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s1 771343423
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@s2 285507792
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg@h0 1
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x3C 0x65 0x8D 0xA3 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x99 0xE5 0x38 0xF1 ...
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0
Reg HKLM\SYSTEM\CurrentControlSet\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x97 0x0C 0xFC 0x93 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@p0 C:\Program Files\DAEMON Tools Lite\
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@u0 0x00 0x00 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@h0 0
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC@hdf12 0x3C 0x65 0x8D 0xA3 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001@hdf12 0x99 0xE5 0x38 0xF1 ...
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC\00000001\gdq0@hdf12 0x97 0x0C 0xFC 0x93 ...
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\System
Reg HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\System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
---- EOF - GMER 1.0.15 ---- |