eXecutor | 13.07.2008 12:07 | tvecapsvc.exe
Im ersten Teil steht bei Ergenis immer ein -
Hier das andere: Code:
weitere Informationen
File size: 290908 bytes
MD5...: b5a12fe3da880d2c5e1bb35942d64f06
SHA1..: cfef0f73efebde7e5b036bf43262177fadcf55c3
SHA256: a448cec82fd9ea926526b7b43f060ea5369d0a2eebe460bd2670f196f76cd711
SHA512: 7c340339e1c31b0d5bfcb8e6cbc2b2025209cd96e9c4a1c2e0b88b6a0dadd359
b8eae1f00f170531910fb1da55ce232e6cff0e86aaebc851dd13b204f172fb9a
PEiD..: Armadillo v1.71
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x41e8b1
timedatestamp.....: 0x45a25761 (Mon Jan 08 14:38:25 2007)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x28056 0x29000 6.47 2d28f7d4688bf045d96340571dc7f7bc
.rdata 0x2a000 0x6438 0x7000 4.15 022a49fd74bbfccc96df4bad03ea36ae
.data 0x31000 0xa11c 0x7000 3.92 298b752c796c444caed8c7b87f10b9c1
.rsrc 0x3c000 0xe500 0xf000 4.82 285bd7ad90d7274b4f5e0a62f8499f7b
( 9 imports )
> SHLWAPI.dll: PathFileExistsW
> PSAPI.DLL: GetProcessImageFileNameA, EnumProcesses
> SHELL32.dll: ShellExecuteA, ShellExecuteExW
> KERNEL32.dll: lstrlenW, GetShortPathNameA, WideCharToMultiByte, SizeofResource, LoadResource, FindResourceA, LoadLibraryExA, lstrcpynA, IsDBCSLeadByte, lstrcpyA, lstrcatA, GetCurrentThread, GetSystemTime, OutputDebugStringW, GetModuleFileNameW, ReadFile, SetEndOfFile, CreateFileA, FlushFileBuffers, SetStdHandle, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, SetFilePointer, IsBadCodePtr, IsBadReadPtr, SetUnhandledExceptionFilter, GetFileType, GetModuleFileNameA, SetHandleCount, GetEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsW, FreeEnvironmentStringsA, WriteFile, HeapSize, IsBadWritePtr, VirtualAlloc, lstrlenA, GetCommandLineA, lstrcmpiA, GetCurrentThreadId, InterlockedDecrement, CreateMutexA, GetLastError, OutputDebugStringA, DeleteFileW, CopyFileW, ExpandEnvironmentStringsA, GetVersionExA, CloseHandle, OpenProcess, GetExitCodeProcess, TerminateProcess, MultiByteToWideChar, Sleep, GetDiskFreeSpaceExW, GetDriveTypeW, WaitForSingleObject, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSection, LoadLibraryA, GetProcAddress, FreeLibrary, GetModuleHandleA, GetCurrentProcess, GetPrivateProfileSectionW, MoveFileW, WritePrivateProfileStringW, InterlockedIncrement, VirtualFree, HeapCreate, HeapDestroy, GetOEMCP, GetACP, GetCPInfo, UnhandledExceptionFilter, TlsGetValue, SetLastError, TlsAlloc, RaiseException, ExitProcess, GetVersion, GetStartupInfoA, HeapAlloc, HeapReAlloc, HeapFree, ExitThread, TlsSetValue, CreateThread, CompareStringA, CompareStringW, SetEnvironmentVariableA, GetStdHandle, InterlockedExchange, RtlUnwind, GetTimeZoneInformation, GetLocalTime
> USER32.dll: GetWindowLongA, SetTimer, SetWindowLongA, PostQuitMessage, GetClassInfoA, RegisterClassExA, ShowWindow, MessageBoxA, IsWindow, GetMessageA, DispatchMessageA, PostThreadMessageA, CharNextA, FindWindowA, IsWindowVisible, PostMessageA, LoadStringA, DefWindowProcA, KillTimer, DestroyWindow, UnregisterClassA, LoadCursorA, RegisterClassA, CreateWindowExA
> ADVAPI32.dll: StartServiceCtrlDispatcherA, RegQueryValueExA, RegOpenKeyExA, RegSetValueExA, RegQueryValueExW, RegOpenKeyExW, RegCreateKeyExA, GetTokenInformation, OpenThreadToken, OpenProcessToken, SetSecurityDescriptorGroup, SetSecurityDescriptorOwner, GetLengthSid, CopySid, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, RegEnumValueA, RegQueryInfoKeyA, RegEnumKeyExA, RegDeleteKeyA, DeleteService, CreateServiceA, RegDeleteValueA, SetServiceStatus, RegisterServiceCtrlHandlerA, RegisterEventSourceA, ReportEventA, DeregisterEventSource, OpenSCManagerA, CloseServiceHandle, OpenServiceA, ControlService, RegCloseKey
> ole32.dll: CoInitialize, CoCreateInstance, CoInitializeSecurity, CoDisconnectObject, CoTaskMemFree, CoTaskMemAlloc, CoTaskMemRealloc, CoRegisterClassObject, CoRevokeClassObject, CoUninitialize
> OLEAUT32.dll: -, -, -, -, -, -, -, -, -, -
> CLSchRecordMonitor.dll: _SetCallback@CSchRecordMonitor@@QAEHPAUICallback@@@Z, __0CSchRecordMonitor@@QAE@XZ, _StopMonitorPath@CSchRecordMonitor@@QAEHXZ, _FindConflictSchedule@CSchRecordMonitor@@QAEHJJ@Z, _IsTunerAvailable@CSchRecordMonitor@@QAEHXZ, _StartMonitorPath@CSchRecordMonitor@@QAEHPBDK@Z, __1CSchRecordMonitor@@QAE@XZ
( 0 exports ) sfrem01.exe
Im ersten Teil steht bei Ergebnis immer ein -
Hier das andere: Code:
weitere Informationen
File size: 353912 bytes
MD5...: 7b1197a1a684c3fa8bea75fe4ef54443
SHA1..: d6a96926c5111f44b54beae9fea9a753fe5534fe
SHA256: da4392e4311fea99206881febe383e71154c4a451f4bec7c323702330b4fa488
SHA512: 1b139d2c0079fa0a77f9c4d26b46d1bde6d0c67a34adea02a3bda2a7217b14af
54334c93e894b7adde856a453ce596c4b5067857a6e1daefd6897924a3064e5b
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x416fc3
timedatestamp.....: 0x4461b963 (Wed May 10 09:58:59 2006)
machinetype.......: 0x14c (I386)
( 4 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x3578c 0x36000 6.60 156e5f7f0cfb6e39f65c54946a844685
.rdata 0x37000 0x17470 0x18000 4.71 09b879ede26eb503cb6b3559279c0aa8
.data 0x4f000 0x6898 0x5000 4.63 c0068cd204334df37e032782061f0b4d
.rsrc 0x56000 0x434 0x1000 3.76 70c8912f2a452398137f3f95ff4b4646
( 4 imports )
> KERNEL32.dll: CreateFileW, GetModuleFileNameA, CreateFileMappingA, CreateFileMappingW, CreateMutexA, CreateMutexW, GetSystemDirectoryA, GetSystemDirectoryW, GetWindowsDirectoryA, GetWindowsDirectoryW, GetDriveTypeW, FindFirstFileA, FindFirstFileW, GetEnvironmentVariableW, GetModuleHandleW, WriteConsoleW, CreateProcessA, CreateProcessW, GetFileAttributesA, GetFileAttributesW, CreateFileA, SetFileAttributesW, DeleteFileA, DeleteFileW, CloseHandle, SystemTimeToFileTime, GetSystemTime, GetCurrentProcess, AreFileApisANSI, GetOEMCP, GetACP, FreeLibrary, GetFileSize, ReadFile, WriteFile, SetFileTime, MapViewOfFile, UnmapViewOfFile, FindClose, DeviceIoControl, GetExitCodeProcess, WaitForSingleObject, GetCommandLineA, LoadLibraryW, LoadLibraryA, GetVersionExW, GetVersionExA, ReleaseMutex, WaitForMultipleObjectsEx, QueryDosDeviceW, GetFullPathNameW, SetLastError, WideCharToMultiByte, GetCPInfo, GetModuleHandleA, GetProcAddress, LCMapStringW, MultiByteToWideChar, InterlockedDecrement, InterlockedIncrement, GetTickCount, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, GetEnvironmentVariableA, GetStdHandle, WriteConsoleA, VirtualFree, VirtualAlloc, GetLastError, SetFileAttributesA, SetEndOfFile, RtlUnwind, RaiseException, HeapFree, HeapAlloc, GetProcessHeap, GetStartupInfoA, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, ExitProcess, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, GetFileType, HeapDestroy, HeapCreate, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetConsoleCP, GetConsoleMode, FlushFileBuffers, Sleep, HeapSize, LCMapStringA, GetLocaleInfoA, HeapReAlloc, GetConsoleOutputCP, SetFilePointer, SetStdHandle, GetStringTypeA, GetStringTypeW
> USER32.dll: MessageBoxA, MessageBoxW
> ADVAPI32.dll: RegCloseKey, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, RegQueryValueExW, RegQueryValueExA, RegDeleteValueW, RegSetValueExW, RegSetValueExA, RegEnumKeyExW, RegDeleteKeyW, RegOpenKeyExW, RegOpenKeyExA, RegCreateKeyExW, RegisterServiceCtrlHandlerW, StartServiceCtrlDispatcherW, StartServiceW, ChangeServiceConfigW, QueryServiceConfigW, CreateServiceW, OpenServiceW, OpenSCManagerW, SetServiceStatus, CloseServiceHandle, DeleteService, ControlService
> VERSION.dll: GetFileVersionInfoA, GetFileVersionInfoSizeA, VerQueryValueA
( 0 exports ) Die Datei netfwdsl.sys gibt es bei mir nicht. Nur ein netbios.sys, netbt.sys und ein netio.sys
Und mal so nebenbei:
Der Windows Defender meldet sich beim Systemstart nicht mehr, und der Windows Explorer will die Registrierungsdatenbank auch nicht mehr ändern.
Ist der Virus jetzt weg?
eXecutor |