So endlich fertig. ;) Hier alle Ergebnisse untereinander: Code:
c:\windows\system32\drivers\kjmzewyd.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
AVG 9.0.0.851 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
DrWeb 5.0.2.03300 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
F-Secure 9.0.15370.0 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
Symantec 20101.1.1.7 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
pdfid.: -
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
c:\windows\system32\drivers\riuhtcvy.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
AVG 9.0.0.851 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
DrWeb 5.0.2.03300 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
F-Secure 9.0.15370.0 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
Symantec 20101.1.1.7 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
c:\windows\system32\drivers\xvhyecko.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
AVG 9.0.0.851 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
DrWeb 5.0.2.03300 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
F-Secure 9.0.15370.0 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
Symantec 20101.1.1.7 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
c:\windows\system32\drivers\wfvoligm.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
AVG 9.0.0.851 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
DrWeb 5.0.2.03300 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
F-Secure 9.0.15370.0 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
Symantec 20101.1.1.7 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
c:\windows\system32\drivers\mbmqgubi.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
AVG 9.0.0.851 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
DrWeb 5.0.2.03300 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
F-Secure 9.0.15370.0 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
Symantec 20101.1.1.7 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
c:\windows\system32\drivers\relcjtxj.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
AVG 9.0.0.851 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
DrWeb 5.0.2.03300 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
F-Secure 9.0.15370.0 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
Symantec 20101.1.1.7 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
c:\windows\system32\drivers\kzyioezg.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
AVG 9.0.0.851 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
DrWeb 5.0.2.03300 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
F-Secure 9.0.15370.0 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
Symantec 20101.1.1.7 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
pdfid.: -
c:\windows\system32\drivers\rucchpsf.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
c:\windows\system32\drivers\bhniaffv.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
AVG 9.0.0.851 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
DrWeb 5.0.2.03300 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
F-Secure 9.0.15370.0 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
Symantec 20101.1.1.7 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
pdfid.: -
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
c:\windows\system32\drivers\dgxexcsq.sys:
AhnLab-V3 2010.08.01.00 2010.07.31 -
AntiVir 8.2.4.32 2010.08.02 -
Antiy-AVL 2.0.3.7 2010.08.02 -
Authentium 5.2.0.5 2010.08.02 -
Avast 4.8.1351.0 2010.08.02 -
Avast5 5.0.332.0 2010.08.02 -
AVG 9.0.0.851 2010.08.02 -
BitDefender 7.2 2010.08.02 -
CAT-QuickHeal 11.00 2010.08.02 -
ClamAV 0.96.0.3-git 2010.08.02 -
Comodo 5620 2010.08.02 -
DrWeb 5.0.2.03300 2010.08.02 -
Emsisoft 5.0.0.34 2010.07.30 -
eSafe 7.0.17.0 2010.08.02 -
eTrust-Vet 36.1.7756 2010.08.02 -
F-Prot 4.6.1.107 2010.08.02 -
F-Secure 9.0.15370.0 2010.08.02 -
Fortinet 4.1.143.0 2010.08.02 -
GData 21 2010.08.02 -
Ikarus T3.1.1.84.0 2010.08.02 -
Jiangmin 13.0.900 2010.08.01 -
Kaspersky 7.0.0.125 2010.08.02 -
McAfee 5.400.0.1158 2010.08.02 -
McAfee-GW-Edition 2010.1 2010.08.02 -
Microsoft 1.6004 2010.08.02 -
NOD32 5334 2010.08.02 -
Norman 6.05.11 2010.08.02 -
nProtect 2010-08-02.02 2010.08.02 -
Panda 10.0.2.7 2010.08.02 -
PCTools 7.0.3.5 2010.08.02 -
Prevx 3.0 2010.08.02 -
Rising 22.59.00.04 2010.08.02 -
Sophos 4.56.0 2010.08.02 -
Sunbelt 6674 2010.08.02 -
SUPERAntiSpyware 4.40.0.1006 2010.08.02 -
Symantec 20101.1.1.7 2010.08.02 -
TheHacker 6.5.2.1.328 2010.07.30 -
TrendMicro 9.120.0.1004 2010.08.02 -
TrendMicro-HouseCall 9.120.0.1004 2010.08.02 -
VBA32 3.12.12.7 2010.08.02 -
ViRobot 2010.7.31.3965 2010.08.02 -
VirusBuster 5.0.27.0 2010.08.02 -
weitere Informationen
File size: 16896 bytes
MD5...: e9a0a4d07e53d8fea2bb8387a3293c58
SHA1..: 5e1d618a19f93e1b5c71f6248189034fad879928
SHA256: 690cad6c4e35ecc1172a2e1fd3933df73158b3bf42cb21244269612a53de4d7a
ssdeep: 192:g1rJACF05FDWmonOqdZhXm6J1afZOOQCc7H6FgoXp+Cr9Tuw+nmWPsUWT:yV
GnWzOyZ5afZw7addrVjWPsUWT
PEiD..: -
PEInfo: PE Structure information
( base data )
entrypointaddress.: 0x7071
timedatestamp.....: 0x4a5bbf48 (Mon Jul 13 23:12:08 2009)
machinetype.......: 0x14c (I386)
( 7 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x254e 0x2600 6.27 f41e2cca9095702df2de9110ab2f9038
.rdata 0x4000 0x274 0x400 2.57 b6b73719f6a3eb4eda976143d7c74beb
.data 0x5000 0x48 0x200 0.24 312651a6f76490d97aff95c683a68247
PAGE 0x6000 0x22 0x200 0.45 32f7522e0b18964af7d21fdc59c8a5ab
INIT 0x7000 0x570 0x600 5.07 d6c50bc8a6fdbe6e991c15c66ccfc19b
.rsrc 0x8000 0x5b0 0x600 3.20 1463c13d11bb7248c95921d1d6fdfcb6
.reloc 0x9000 0x22e 0x400 3.57 5eca58d1f88318ec34fa262431d7c5dc
( 3 imports )
> ntoskrnl.exe: RtlInitUnicodeString, IoQueueWorkItem, IofCompleteRequest, IoAllocateWorkItem, IoReleaseCancelSpinLock, KefReleaseSpinLockFromDpcLevel, IoDeleteSymbolicLink, IoAcquireCancelSpinLock, IoCreateSymbolicLink, IoCreateDevice, KeTickCount, RtlUnwind, IoDeleteDevice, _allmul, memset, ExAllocatePoolWithQuotaTag, memcpy, MmUserProbeAddress, ExRaiseAccessViolation, ProbeForWrite, ExRaiseDatatypeMisalignment, IoFreeWorkItem, ExFreePoolWithTag, KeWaitForSingleObject, KeInitializeEvent, KefAcquireSpinLockAtDpcLevel, KeSetEvent, KeBugCheckEx
> HAL.dll: KfReleaseSpinLock, KfAcquireSpinLock
> NETIO.SYS: NsiSetAllParametersEx, NsiEnumerateObjectsAllPersistentParametersWithMask, NsiEnumerateObjectsAllParametersEx, NsiRegisterChangeNotificationEx, NsiSetParameterEx, NsiGetParameterEx, NsiDeregisterChangeNotificationEx, NsiGetModuleHandle, NsiGetAllPersistentParametersWithMask, NsiGetAllParametersEx, NsiSetAllPersistentParametersWithMask
( 0 exports )
RDS...: NSRL Reference Data Set
-
trid..: Win64 Executable Generic (95.5%)
Generic Win/DOS Executable (2.2%)
DOS Executable Generic (2.2%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
pdfid.: -
sigcheck:
publisher....: Microsoft Corporation
copyright....: (c) Microsoft Corporation. All rights reserved.
product......: Microsoft_ Windows_ Operating System
description..: NSI Proxy
original name: nsiproxy.sys
internal name: nsiproxy.sys
file version.: 6.1.7600.16385 (win7_rtm.090713-1255)
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned Was mich wundert ist, dass der original Name nsiproxy.sys ist. :confused:
Wie gehts jetzt weiter?
Gruß Torge |