![]() |
Mein Internet Explorer öffnet von alleine und zeigt mir ständig werbungen Hallo Zusammen, ich bitte um Hilfe , wie ich im forum gelesen habe , sollte ich hijackthis verwenden, habe ich gemacht, aber ich kenne mich dem programm garnicht aus hier die meine daten: Logfile of Trend Micro HijackThis v2.0.4 Scan saved at 23:37:49, on 24.10.2010 Platform: Windows Vista SP2 (WinNT 6.00.1906) MSIE: Internet Explorer v8.00 (8.00.6001.18975) Boot mode: Normal Running processes: C:\Windows\system32\Dwm.exe C:\Windows\system32\taskeng.exe C:\Windows\Explorer.EXE C:\Program Files\Windows Defender\MSASCui.exe D:\Program Files\Launch Manager\LManager.exe C:\Program Files\Avira\AntiVir Desktop\avgnt.exe C:\Program Files\Common Files\Java\Java Update\jusched.exe C:\Windows\Xwovia.exe C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe C:\Program Files\Windows Media Player\wmpnscfg.exe C:\Windows\system32\wbem\unsecapp.exe D:\Mozilla Firefox\firefox.exe D:\Mozilla Firefox\plugin-container.exe C:\Users\***\AppData\Local\Temp\Xtx.exe C:\Users\***\Desktop\HiJackThis204.exe C:\Windows\system32\SearchProtocolHost.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://homepage.acer.com/rdr.aspx?b=ACAW&l=0407&s=2&o=vp32&d=1008&m=aspire_6930g R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://homepage.acer.com/rdr.aspx?b=ACAW&l=0407&s=2&o=vp32&d=1008&m=aspire_6930g R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://homepage.acer.com/rdr.aspx?b=ACAW&l=0407&s=2&o=vp32&d=1008&m=aspire_6930g R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O1 - Hosts: ::1 localhost O2 - BHO: (no name) - {02478D38-C3F9-4efb-9B51-7695ECA05670} - (no file) O2 - BHO: Adobe PDF Reader Link Helper - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file) O2 - BHO: ShowBarObj Class - {83A2F9B1-01A2-4AA5-87D1-45B6B8505E96} - C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\ActiveToolBand.dll O2 - BHO: Windows Live Anmelde-Hilfsprogramm - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: AdblockIE - {90EFF544-3981-4d46-85C9-C0361D0931D6} - mscoree.dll (file missing) O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.6.5612.1312\swg.dll O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O3 - Toolbar: Acer eDataSecurity Management - {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDStoolbar.dll O3 - Toolbar: Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - HKLM\..\Run: [LManager] D:\Program Files\Launch Manager\LManager.exe O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe O4 - HKCU\..\Run: [KOO9RV9K4Z] C:\Users\Kerim\AppData\Local\Temp\Xtx.exe O4 - HKCU\..\Run: [X3EKEPXJP2] C:\Windows\Xwovia.exe O4 - HKCU\..\Run: [swg] "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" O8 - Extra context menu item: &Block This Image (ABP) - D:\Program Files\Adblock Pro\blockimg.html O8 - Extra context menu item: Google Sidewiki... - res://C:\Program Files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_89D8574934B26AC4.dll/cmsidewiki.html O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://D:\PROGRA~1\MICROS~1\OFFICE11\EXCEL.EXE/3000 O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000 O9 - Extra button: Quick-Launching Area - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\Acer\Acer Bio Protection\PwdBank.exe O9 - Extra 'Tools' menuitem: Quick-Launching Area - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files\Acer\Acer Bio Protection\PwdBank.exe O9 - Extra button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - D:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - D:\PROGRA~1\SPYBOT~1\SDHelper.dll O9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - d:ICQ6.5\ICQ.exe O9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - d:ICQ6.5\ICQ.exe O20 - AppInit_DLLs: C:\PROGRA~1\Google\GOOGLE~1\GOEC62~1.DLL O20 - Winlogon Notify: AWinNotifyVitaKey MC3000 - C:\Program Files\Acer\Acer Bio Protection\WinNotify.dll O20 - Winlogon Notify: spba - C:\Program Files\Common Files\SPBA\homefus2.dll O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll O23 - Service: Avira AntiVir Planer (AntiVirSchedulerService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\sched.exe O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir Desktop\avguard.exe O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe O23 - Service: Dienst "Bonjour" (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: NTI Backup Now 5 Agent Service (BUNAgentSvc) - NewTech Infosystems, Inc. - C:\Program Files\NewTech Infosystems\NTI Backup Now 5\Client\Agentsvc.exe O23 - Service: CLHNService - Unknown owner - C:\Program Files\Acer Arcade Deluxe\HomeMedia\Kernel\DMP\CLHNService.exe O23 - Service: eDataSecurity Service - Egis Incorporated - C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe O23 - Service: Empowering Technology Service (ETService) - Unknown owner - C:\Program Files\Acer\Empowering Technology\Service\ETService.exe O23 - Service: Google Desktop Manager 5.7.808.7150 (GoogleDesktopManager-080708-050100) - Google - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe O23 - Service: iGroupTec Service (IGBASVC) - Unknown owner - C:\Program Files\Acer\Acer Bio Protection\BASVC.exe O23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe O23 - Service: MobilityService - Unknown owner - C:\Acer\Mobility Center\MobilityService.exe O23 - Service: NTI Backup Now 5 Backup Service (NTIBackupSvc) - NewTech InfoSystems, Inc. - C:\Program Files\NewTech Infosystems\NTI Backup Now 5\BackupSvc.exe O23 - Service: NTI Backup Now 5 Scheduler Service (NTISchedulerSvc) - Unknown owner - C:\Program Files\NewTech Infosystems\NTI Backup Now 5\SchedulerSvc.exe O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe O23 - Service: Realtek11nSU - Realtek - C:\Program Files\Realtek\11n USB Wireless LAN Utility\RtlService.exe O23 - Service: Raw Socket Service (RS_Service) - Acer Incorporated - C:\Program Files\Acer\Acer VCM\RS_Service.exe O23 - Service: ServiceLayer - Nokia. - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - D:\Program Files\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe -- End of file - 9177 bytes |
Hallo und Herzlich Willkommen! :) Bevor wir unsere Zusammenarbeit beginnen, [Bitte Vollständig lesen]: Zitat:
Zitat:
1. - Lade dir RSIT - Random's System Information Tool (RSIT) von random/random herunter - an einen Ort deiner Wahl und führe die rsit.exe aus - wird "Hijackthis" auch von Rsit installiert und ausgeführt - RSIT erstellt 2 Logfiles (C:\rsit\log.txt und C:\rsit\info.txt) mit erweiterten Infos von deinem System - diese beide bitte komplett hier posten **Kannst Du das Log in Textdatei speichern und hier anhängen (auf "Erweitert" klicken) 2. Bitte Versteckte - und Systemdateien sichtbar machen den Link hier anklicken: System-Dateien und -Ordner unter XP und Vista sichtbar machen Am Ende unserer Arbeit, kannst wieder rückgängig machen! 3. → Lade Dir HJTscanlist.zip herunter → entpacke die Datei auf deinem Desktop → Bei WindowsXP Home musst vor dem Scan zusätzlich tasklist.zip installieren → per Doppelklick starten → Wähle dein Betriebsystem aus - bei Win7 wähle Vista → Wenn Du gefragt wirst, die Option "Einstellung" (1) - scanlist" wählen → Nach kurzer Zeit sollte sich Dein Editor öffnen und die Datei hjtscanlist.txt präsentieren → Bitte kopiere den Inhalt hier in Deinen Thread. 4. Ich würde gerne noch all deine installierten Programme sehen: Lade dir das Tool "Ccleaner" herunter installieren (Software-Lizenzvereinbarung lesen, falls angeboten wird "Füge CCleaner Yahoo! Toolbar hinzu" abwählen)→ starten→ falls nötig - unter Options settings-> "german" einstellen dann klick auf "Extra (um die installierten Programme auch anzuzeigen)→ weiter auf "Als Textdatei speichern..." wird eine Textdatei (*.txt) erstellt, kopiere dazu den Inhalt und füge ihn da ein 5. → besuche die Seite von virustotal und die Datei/en aus Codebox bitte prüfen lassen - nklusive Dateigröße und Name, MD5 und SHA1 auch mitkopieren: → Tipps für die Suche nach Dateien Code: C:\Windows\Xwovia.exe → Suche die Datei auf deinem Rechner→ Doppelklick auf die zu prüfende Datei (oder kopiere den Inhalt ab aus der Codebox) → "Senden der Datei" und Warte, bis der Scandurchlauf aller Virenscanner beendet ist → das Ergebnis wie Du es bekommst (NICHT AUSLASSEN!) da reinkoperen (inklusive <geprüfter Dateiname> + Dateigröße und Name, MD5 und SHA1) ** Beispiel - das zu postende Logfile von Virustotal soll so wie hier aussehen Also nicht auslassen, sondern wie Du es bekommst da reinkopieren!: Code: Datei File name: Zitat:
** Möglichst nicht ins internet gehen, kein Online-Banking, File-sharing, Chatprogramme usw grußCoverflow |
Hallo danke für deine Hilfe . Hier sind die folgenden logs reihe nach: C:\rsit\log.txt RSIT Logfile: Code: Logfile of random's system information tool 1.08 (written by random/random) C:\rsit\info.txt info.txtRSIT Logfile: Code: logfile of random's system information tool 1.08 2010-10-25 19:01:48 hjtscanlist.txt Code: INSTALL Acer Arcade Deluxe CyberLink Corp. 10.10.2008 83,0MB 2.0.5529 Acer Bio Protection AAU 6.0.00.17 10.10.2008 183,2MB Acer Crystal Eye Webcam 2.0.8 SuYin 10.10.2008 2,95MB 2.0.8 Acer eAudio Management CyberLink Corp. 10.10.2008 4,71MB 3.0.3008 Acer eDataSecurity Management Egis Inc. 29.07.2008 69,3MB 3.0.3062 Acer Empowering Technology Acer Incorporated 10.10.2008 147,8MB 3.0.3009 Acer ePower Management Acer Incorporated 10.10.2008 9,84MB 3.0.3014 Acer eRecovery Management Acer Incorporated 10.10.2008 27,6MB 3.0.3014 Acer eSettings Management Acer Incorporated 29.07.2008 27,4MB 3.0.3007 Acer GridVista 10.10.2008 1,51MB 2.72.317 Acer Mobility Center Plug-In Acer Inc. 29.07.2008 4,13MB 3.0.3000 Acer ScreenSaver Acer Incorporated 10.10.2008 1.11.0701 Acer VCM Acer Incorporated 10.10.2008 22,9MB 3.1.3000 AdblockIE af0.net 23.10.2010 9,46MB 1.2 Adobe Flash Player 10 Plugin Adobe Systems Incorporated 15.08.2010 10.1.82.76 Adobe Flash Player ActiveX Adobe Systems Incorporated 10.10.2008 9.0.124.0 Adobe Reader 8.1.0 Adobe Systems Incorporated 29.07.2008 87,9MB 8.1.0 Advanced Wheel Mouse 6.0.0.002 08.06.2010 0,46MB Apple Application Support Apple Inc. 16.06.2010 42,8MB 1.3.0 Apple Mobile Device Support Apple Inc. 16.06.2010 19,9MB 3.1.0.62 Apple Software Update Apple Inc. 05.12.2008 2,16MB 2.1.1.116 Atheros Communications Inc.(R) AR8121/AR8113/AR8114 Gigabit/Fast Ethernet Driver Atheros Communications Inc. 29.07.2008 2,93MB 1.0.0.30 Avira AntiVir Personal - Free Antivirus Avira GmbH 23.10.2010 122,7MB 10.0.0.567 Azureus 05.12.2008 15,9MB 2.5.0.4 Bluesoleil2.6.0.8 Release 070517 IVT Corporation 29.12.2008 11,4MB 2.6.0.8 Release 070517 Bonjour Apple Inc. 16.06.2010 0,76MB 2.0.2.0 CCleaner Piriform 22.10.2010 2,96MB 2.36 Cisco EAP-FAST Module Cisco Systems, Inc. 14.02.2010 2,98MB 2.0.26 Cisco LEAP Module Cisco Systems, Inc. 14.02.2010 1,04MB 1.0.11 Cisco PEAP Module Cisco Systems, Inc. 14.02.2010 0,84MB 1.0.12 concept/design onlineTV 5 concept/design GmbH 19.10.2010 8,13MB onlineTV 5 CyberLink PowerDVD 10 CyberLink Corp. 22.10.2010 237,7MB 10.0.2113 DivX Codec DivX, Inc. 05.12.2008 1,40MB 6.8.5 DivX Converter DivX, Inc. 05.12.2008 30,4MB 6.6.1 DivX Player 05.12.2008 15,4MB 6.8.2 DivX Web Player DivX,Inc. 05.12.2008 2,92MB 1.4.2 eMule 05.12.2008 10,6MB EVEREST Home Edition v2.20 Lavalys Inc 12.12.2008 6,58MB 2.20 FLV Player 2.0 (build 25) Martijn de Visser 24.05.2009 1,95MB 2.0 (build 25) Google Desktop Google 30.11.2008 30,2MB 5.7.0808.07150 Google Earth Google 12.12.2008 25,3MB 4.3.7284.3916 Google Toolbar for Internet Explorer Google Inc. 11.07.2010 34,9MB HDAUDIO Soft Data Fax Modem with SmartCP Conexant Systems 29.07.2008 0,98MB 7.73.00.52 ICQ6.5 ICQ 03.01.2009 48,0MB 6.5 Intel® Matrix Storage Manager Intel Corporation 10.10.2008 49,7MB iTunes Apple Inc. 03.08.2010 161,9MB 9.2.1.5 Java(TM) 6 Update 22 Oracle 23.10.2010 97,1MB 6.0.220 Launch Manager Acer Inc. 19.06.2010 2,66MB 2.0.02 LOGO!Soft Comfort V6.1 Siemens AG 05.12.2008 104,6MB 6.1.0.0 Messenger Plus! Live Patchou 12.08.2009 12,8MB 4.82.0.368 Microsoft .NET Framework 3.5 Language Pack SP1 - DEU Microsoft Corporation 07.08.2009 37,0MB Microsoft .NET Framework 3.5 SP1 Microsoft Corporation 20.05.2009 37,0MB Microsoft .NET Framework 4 Client Profile Microsoft Corporation 25.06.2010 120,3MB 4.0.30319 Microsoft Office Professional Edition 2003 Microsoft Corporation 23.10.2010 401,9MB 11.0.8173.0 Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 Microsoft Corporation 06.11.2009 0,25MB 8.0.50727.4053 Microsoft Visual C++ 2005 Redistributable Microsoft Corporation 29.07.2008 0,41MB 8.0.56336 Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148 Microsoft Corporation 12.11.2009 0,19MB 9.0.30729.4148 Microsoft Visual C++ 2008 Redistributable - x86 9.0.21022 Microsoft Corporation 10.11.2009 0,45MB 9.0.21022 Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 Microsoft Corporation 05.07.2010 0,58MB 9.0.30729 Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 Microsoft Corporation 23.10.2010 0,58MB 9.0.30729.4148 Microsoft Works Microsoft Corporation 09.12.2009 282,6MB 08.05.0822 Mozilla Firefox (3.0.4) Mozilla 05.12.2008 26,4MB 3.0.4 (de) Mozilla Firefox (3.6.11) Mozilla 19.10.2010 32,7MB 3.6.11 (de) MSXML 4.0 SP2 (KB954430) Microsoft Corporation 30.11.2008 1,28MB 4.20.9870.0 MSXML 4.0 SP2 (KB973688) Microsoft Corporation 25.11.2009 1,34MB 4.20.9876.0 Nero 8 Lite 8.2.8.0 Updatepack.nl 07.12.2008 55,5MB 8.2.8.0 NTI Backup Now 5 NewTech Infosystems 29.07.2008 28,6MB 5.1.2.606 NTI Media Maker 8 NewTech Infosystems 29.07.2008 187,0MB 8.0.2.6329 NVIDIA Drivers 16.01.2010 PC Connectivity Solution Nokia 10.11.2009 12,1MB 9.23.3.0 PDFCreator Frank Heindörfer, Philip Chinery 22.05.2010 21,1MB 0.9.9 QuickTime Apple Inc. 15.05.2010 73,8MB 7.66.71.0 REALTEK 11n USB Wireless LAN Driver and Utility REALTEK Semiconductor Corp. 14.02.2010 5,08MB 1.00.0106 Realtek High Definition Audio Driver Realtek Semiconductor Corp. 29.07.2008 21,6MB 6.0.1.5618 Realtek USB 2.0 Card Reader Realtek Semiconductor Corp. 29.07.2008 2,97MB SopCast 3.2.9 www.sopcast.com 22.10.2010 8,44MB 3.2.9 SPBA 5.8 UPEK Inc. 10.10.2008 20,1MB 5.8.2.4218 sPlan 6.0 (Demo) 04.12.2008 5,50MB Spybot - Search & Destroy Safer Networking Limited 22.10.2010 50,3MB 1.6.2 SUPER © Version 2009.bld.36 (June 10, 2009) eRightSoft 06.10.2009 27,2MB Version 2009.bld.36 (June 10, 2009) Synaptics Pointing Device Driver Synaptics 29.07.2008 14,4MB 11.1.4.0 TeamSpeak 2 RC2 Dominating Bytes Design 12.12.2008 2.0.32.60 TeamSpeak 3 Client TeamSpeak Systems GmbH 05.07.2010 30,3MB TubeBox! Jens Lorek 05.05.2010 14,4MB 3.3.10 TVUPlayer 2.5.2.1 TVU networks 13.03.2010 14,6MB 2.5.2.1 Veetle TV 0.9.18 Veetle, Inc 23.10.2010 36,3MB 0.9.18 VLC media player 1.0.5 VideoLAN Team 19.03.2010 60,0MB 1.0.5 Winamp Nullsoft, Inc 12.12.2008 29,2MB 5.541 Winbond CIR Device Drivers Winbond Electronics Corporation 29.07.2008 2,25MB 7.60.1012 Windows Live Anmelde-Assistent Microsoft Corporation 05.11.2009 1,93MB 5.000.818.5 Windows Live Essentials Microsoft Corporation 05.11.2009 44,0MB 14.0.8089.0726 Windows Live-Uploadtool Microsoft Corporation 05.11.2009 0,22MB 14.0.8014.1029 Windows Media Player Firefox Plugin Microsoft Corp 07.06.2010 0,29MB 1.0.0.8 WinRAR 04.12.2008 3,73MB World of Warcraft Blizzard Entertainment 14.10.2010 26.734,1MB 4.0.1.13164 [code] File name: Xwovia.exe Submission date: 2010-10-25 17:14:10 (UTC) Current status: queued (#10) queued (#10) analysing finished Result: 23/ 43 (53.5%) Antivirus Version Last Update Result AhnLab-V3 2010.10.25.00 2010.10.25 - AntiVir 7.10.13.35 2010.10.25 - Antiy-AVL 2.0.3.7 2010.10.25 - Authentium 5.2.0.5 2010.10.24 W32/Renos.A!Generic Avast 4.8.1351.0 2010.10.25 Win32:Malware-gen Avast5 5.0.594.0 2010.10.25 Win32:Malware-gen AVG 9.0.0.851 2010.10.25 Downloader.Generic10.AFTP BitDefender 7.2 2010.10.25 Gen:Variant.Kazy.2182 CAT-QuickHeal 11.00 2010.10.25 - ClamAV 0.96.2.0-git 2010.10.25 - Comodo 6504 2010.10.25 MalCrypt.Indus! DrWeb 5.0.2.03300 2010.10.25 Trojan.DownLoader1.28144 Emsisoft 5.0.0.50 2010.10.25 - eSafe 7.0.17.0 2010.10.25 - eTrust-Vet 36.1.7933 2010.10.25 Win32/Renos.D!generic F-Prot 4.6.2.117 2010.10.24 W32/Renos.A!Generic F-Secure 9.0.16160.0 2010.10.25 Gen:Variant.Kazy.2182 Fortinet 4.2.249.0 2010.10.25 - GData 21 2010.10.25 Gen:Variant.Kazy.2182 Ikarus T3.1.1.90.0 2010.10.25 - Jiangmin 13.0.900 2010.10.25 - K7AntiVirus 9.66.2830 2010.10.25 Virus Kaspersky 7.0.0.125 2010.10.25 - McAfee 5.400.0.1158 2010.10.25 Downloader-CEW.b McAfee-GW-Edition 2010.1C 2010.10.25 Heuristic.BehavesLike.Win32.Obfuscated.H Microsoft 1.6301 2010.10.25 TrojanDownloader:Win32/Renos.LX NOD32 5561 2010.10.25 a variant of Win32/Kryptik.HQN Norman 6.06.10 2010.10.25 - nProtect 2010-10-25.01 2010.10.25 Gen:Variant.Kazy.2182 Panda 10.0.2.7 2010.10.25 Suspicious file PCTools 7.0.3.5 2010.10.25 - Prevx 3.0 2010.10.25 Medium Risk Malware Rising 22.70.06.04 2010.10.25 - Sophos 4.58.0 2010.10.25 Mal/FakeAV-CX Sunbelt 7138 2010.10.25 VirTool.Win32.Obfuscator.hg!b1 (v) SUPERAntiSpyware 4.40.0.1006 2010.10.25 - Symantec 20101.2.0.161 2010.10.25 - TheHacker 6.7.0.1.066 2010.10.25 Trojan/Kryptik.hqn TrendMicro 9.120.0.1004 2010.10.25 - TrendMicro-HouseCall 9.120.0.1004 2010.10.25 - VBA32 3.12.14.1 2010.10.25 BScope.Trojan.MTA.01049 ViRobot 2010.10.25.4110 2010.10.25 - VirusBuster 12.70.4.0 2010.10.25 - Additional information MD5 : 3376afd9723e67e714e08a7f9abd56e4 SHA1 : c7c7064028faf36d1c5930da3ae647c20ac0e15d SHA256: 6aad83e0cdaf33b7665299ab9d89cded58e34995bc86dac926dce39d3df244de |
ssdeep: 6144:ZBK2I+i+Nzv5fxUqLO5+kgtH/jekcpiRNmi6:K2IM8qLUgs3pONo File size : 266240 bytes First seen: 2010-10-25 17:14:10 Last seen : 2010-10-25 17:14:10 TrID: Win32 Executable Generic (42.3%) Win32 Dynamic Link Library (generic) (37.6%) Generic Win/DOS Executable (9.9%) DOS Executable Generic (9.9%) Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%) sigcheck: publisher....: Trend Micro Inc. copyright....: CopyGolds product......: Golds description..: Golds original name: Golds.exe internal name: Golds file version.: 3.3.0.348 comments.....: n/a signers......: - signing date.: - verified.....: Unsigned PEInfo: PE structure information [[ basic data ]] entrypointaddress: 0x1000 timedatestamp....: 0x4A3828D9 (Tue Jun 16 23:20:57 2009) machinetype......: 0x14c (I386) [[ 6 section(s) ]] name, viradd, virsiz, rawdsiz, ntropy, md5 CODE, 0x1000, 0x16AFE, 0x17000, 4.98, 0b8958deb0cdafe0d326c7bf80521dd8 .rdata, 0x18000, 0x310C, 0x4000, 4.03, 91170cdc34e444e77f1a109fc745bfd1 .data, 0x1C000, 0x6C7, 0x1000, 0.00, 620f0b67a91f7f74151bc5be745b7110 .bss, 0x1D000, 0x16CF, 0x2000, 3.44, c406c45a20cd3c46df48975da192df89 .gdata, 0x1F000, 0x1F38F, 0x20000, 7.30, d9fd7e88823213969b4e8645e4bfe354 .rsrc, 0x3F000, 0x1EA4, 0x2000, 3.42, f017022343b7b9be4486be047c12052a [[ 18 import(s) ]] SHLWAPI.dll: SHGetValueA, PathIsDirectoryA, PathIsContentTypeA, SHQueryValueExA, PathFileExistsA, SHDeleteKeyA, SHStrDupA MSVCRT.dll: memcpy, wcsncmp, exit, sqrt, exp MSVCRT.dll: srand, asin, strlen OLEAUT32.dll: SysStringLen, VariantCopyInd, SysAllocStringLen, SafeArrayUnaccessData, VariantChangeType VERSION.dll: GetFileVersionInfoA, VerFindFileA COMCTL32.dll: ImageList_Write, ImageList_DrawEx SHELL32.dll: SHGetFolderPathA, SHGetSpecialFolderLocation, SHFileOperationA, Shell_NotifyIconA OLE32.dll: CreateBindCtx, StgCreateDocfileOnILockBytes, OleRegGetUserType, CoRegisterClassObject, StgOpenStorage, CoRevokeClassObject comdlg32.dll: GetFileTitleA gdi32.dll: GetClipBox version.dll: VerQueryValueA, GetFileVersionInfoSizeA user32.dll: RegisterWindowMessageA, IsIconic, RedrawWindow, MessageBoxA, GetParent, WaitMessage, SetScrollPos, GetScrollInfo, GetMenuItemID, GetWindow, SetClipboardData, PeekMessageW, KillTimer, GetActiveWindow, DestroyMenu, GetSysColor, GetClientRect, InsertMenuA, DispatchMessageW, GetKeyboardLayout, GetPropA, CharToOemA, GetMenuState, ScrollWindow, CharLowerBuffA, SetCapture, IsWindowEnabled gdi32.dll: CreateBitmap, SaveDC, SetPixel, CopyEnhMetaFileA, CreateCompatibleBitmap, CreateCompatibleDC, SelectPalette, CreateDIBSection, GetClipBox, GetBitmapBits kernel32.dll: GetFileAttributesA, CloseHandle, lstrlenA, DeleteCriticalSection, LocalReAlloc, lstrcatA, CompareStringA, WaitForSingleObject, GetFullPathNameA, VirtualAllocEx, HeapAlloc, GetFileType, SetEvent, DeleteFileA, GetLocaleInfoA, GetModuleFileNameA, GetCurrentProcessId, ExitThread, GetProcAddress, LoadLibraryExA, GetCommandLineW, CreateFileA, GetUserDefaultLCID, WideCharToMultiByte, GetSystemDefaultLangID, SetHandleCount, ExitProcess, VirtualQuery, LoadResource, HeapDestroy, GetStringTypeW, GetLocalTime, VirtualAlloc, GetOEMCP, GlobalAlloc, LockResource, GetCommandLineA, ResetEvent, GetACP, GlobalFindAtomA, GetProcessHeap, EnterCriticalSection, LocalAlloc, EnumCalendarInfoA, CreateEventA, SetFilePointer, GetCurrentProcess, lstrlenW, IsBadReadPtr, GetStdHandle, IsBadHugeReadPtr, GetModuleHandleA VERSION.dll: VerQueryValueA ADVAPI32.dll: GetLengthSid, RegQueryInfoKeyA, RegDeleteKeyA, RegCreateKeyA SHLWAPI.dll: SHStrDupA, PathFileExistsA, SHQueryInfoKeyA, SHDeleteValueA, SHQueryValueExA, PathIsContentTypeA, SHGetValueA, PathIsDirectoryA, SHSetValueA, PathGetCharTypeA gdi32.dll: GetObjectA, SaveDC, RestoreDC, CreateBitmap, CreateBrushIndirect, CreatePalette, SelectObject, SetTextColor Prevx Info: Prevx ExifTool: file metadata CharacterSet: Unicode CodeSize: 94208 CompanyName: Trend Micro Inc. EntryPoint: 0x1000 FileDescription: Golds FileFlagsMask: 0x003f FileOS: Win32 FileSize: 260 kB FileSubtype: 0 FileType: Win32 EXE FileVersion: 3.3.0.348 FileVersionNumber: 3.3.0.348 ImageVersion: 0.0 InitializedDataSize: 167936 InternalName: Golds LanguageCode: English (U.S.) LegalCopyright: CopyGolds LinkerVersion: 3.6 MIMEType: application/octet-stream MachineType: Intel 386 or later, and compatibles OSVersion: 4.0 ObjectFileType: Executable application OriginalFilename: Golds.exe PEType: PE32 ProductName: Golds ProductVersion: 3.3.0.348 ProductVersionNumber: 3.3.0.348 Subsystem: Windows GUI SubsystemVersion: 4.0 TimeStamp: 2009:06:17 01:20:57+02:00 UninitializedDataSize: 0 Symantec reputation:Suspicious.Insight |
1. Code: Azureus Zitat:
Ausserdem nicht nur trojanische Pferde oder andere Virentypen eine direkt Verbindung brauchen, sondern der Verwendung von diverse Filesharing-Programme & Co, "telefonieren auch nach Hause", wenn auch noch keine Beweise vorliegen und solchen Clients erlaubt, würde ich nicht empfehlen!http://www.world-of-smilies.com/wos_teufel/teu96.gif 2. Der Messenger Plus! Live enthält einige Komponenten (Sponsorprogramm), die deinen Rechner ausspionieren, deshalb wird von diesem Programm abgeraten. Immer die benutzerdefinierte Installation wählen, nicht die Standardinstallation, weil da oft Sachen mitinstalliert werden, die man nicht braucht oder nicht möchte. also deinstalliere Messenger Plus! Live unter `Start→ Systemsteuereung→ Ändern/Entfernen...` - ► achte aber darauf, ob da etwas beim Deinstallieren mit da steht, wie "Partner/Sponsorenprogramme entfernen"! - es ist besser ein Spy- und Adware freies Messenger Tool einzusetzen - wie z.B Trillian,kann man in der Basisversion von Trillian die Instant Messenger ICQ, AIM, Yahoo! Messenger, Windows Live Messenger (MSN) und IRC vereinen) oder Miranda wenn Du ihn doch nochmal installieren möchtest, Sponsorprogramm bitte abwählen! 3. Lade Dir Malwarebytes Anti-Malware von→ malwarebytes.org
4. poste erneut - nach der vorgenommenen Reinigungsaktion: TrendMicro™ HijackThis™ -Logfile - Keine offenen Fenster, solang bis HijackThis läuft!! hjtscanlist v2.0 - Dateiliste |
Malwarebytes' Anti-Malware 1.46 www.malwarebytes.org Datenbank Version: 4953 Windows 6.0.6002 Service Pack 2 Internet Explorer 8.0.6001.18975 26.10.2010 20:32:22 mbam-log-2010-10-26 (20-32-22).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|) Durchsuchte Objekte: 266025 Laufzeit: 1 Stunde(n), 16 Minute(n), 28 Sekunde(n) Infizierte Speicherprozesse: 1 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 5 Infizierte Registrierungswerte: 1 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 26 Infizierte Speicherprozesse: C:\Users\Kerim\AppData\Local\Temp\Xtx.exe (Rootkit.TDSS) -> Unloaded process successfully. Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: HKEY_CURRENT_USER\SOFTWARE\NtWqIVLZEWZU (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\KOO9RV9K4Z (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Handle (Malware.Trace) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\X3EKEPXJP2 (Trojan.FakeAlert) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\koo9rv9k4z (Rootkit.TDSS) -> Quarantined and deleted successfully. Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: C:\Users\Kerim\AppData\Local\Temp\Xtx.exe (Rootkit.TDSS) -> Delete on reboot. C:\Users\Kerim\AppData\Local\Temp\Xui.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt0.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt1.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt2.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt3.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt4.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt5.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt6.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt7.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt8.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xt9.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xtv.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xtw.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xty.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xtz.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xua.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xub.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xuc.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xud.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xue.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xuf.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xug.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Users\Kerim\AppData\Local\Temp\Xuh.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Windows\Xwovib.exe (Rootkit.TDSS) -> Quarantined and deleted successfully. C:\Windows\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job (Trojan.Downloader) -> Quarantined and deleted successfully. ----------------------------------------------------------------- HiJackthis Logfile: Code: Logfile of Trend Micro HijackThis v2.0.4 |
hjtscanlist v2.0 - Dateiliste - nicht vergessen!:) |
upps :-D Code: |
Systemreinigung und Prüfung: 1. läuft unter XP, Vista mit (32Bit) und Windows 7 (32Bit) Achtung!: WENN GMER NICHT AUSGEFÜHRT WERDEN KANN ODER PROBMLEME VERURSACHT, fahre mit dem nächsten Punkt fort!- Es ist NICHT sinnvoll einen zweiten Versuch zu starten! Um einen tieferen Einblick in dein System, um eine mögliche Infektion mit einem Rootkit/Info v.wikipedia.org) aufzuspüren, werden wir ein Tool - Gmer - einsetzen :
** keine Verbindung zu einem Netzwerk und Internet - WLAN nicht vergessen Wenn der Scan beendet ist, bitte alle Programme und Tools wieder aktivieren! 2. läuft unter XP, Vista mit (32Bit) und Windows 7 (32Bit) Lade und installiere das Tool RootRepeal herunter
3. Schliesse alle Programme einschliesslich Internet Explorer und fixe mit Hijackthis die Einträge aus der nachfolgenden Codebox (HijackThis starten→ Einträge auswählen→ Häckhen setzen→ "Fix checked"klicken→ PC neu aufstarten): Zitat:
Windows und die installierten Programme auf den neuesten Stand zu halten,sind Garanten für eine erhöhte Sicherheit! Java aktualisieren `Start→ Systemsteuereung→ Java→ Aktualisierung...(Update 22 schon fällig!) 5. den Java-Cache leeren - wie unter Punkt 7. u. 8. beschrieben *klick über Systemsteuerung -> Java... 6. um die neueste Version von Adobe zu erhalten klick hier: Adobe Reader - oder über das Programm selbst kannst auch die Updatefunktion aufrufen 7. alle Anwendungen schließen → Ordner für temporäre Dateien bitte leeren lösche nur den Inhalt der Ordner, nicht die Ordner selbst! - Dateien, die noch in Benutzung sind,nicht löschbar. c:\windows\temp - anschließend den Papierkorb leeren 8. reinige dein System mit Ccleaner:
9.
10. Auch auf USB-Sticks, selbstgebrannten Datenträgern, externen Festplatten und anderen Datenträgern können Viren transportiert werden. Man muss daher durch regelmäßige Prüfungen auf Schäden, die durch Malware ("Worm.Win32.Autorun") verursacht worden sein können, überwacht werden. Hierfür sind ser gut geegnet und empfohlen, die auf dem Speichermedium gesicherten Daten, mit Hilfe des kostenlosen Online Scanners zu prüfen. → Also alle vorhandenen externen Laufwerke inkl. evtl. vorhandener USB-Sticks an den Rechner anschließen, aber dabei die Shift-Taste gedrückt halten, damit die Autorun-Funktion nicht ausgeführt wird. Außerdem kann man die Autostarteigenschaft auch ausschalten: → Windows-Sicherheit: Datenträger-Autorun deaktivieren- bebilderte Anleitung v.Leonidas/3dcenter.org → Autorun/Autoplay gezielt für Laufwerkstypen oder -buchstaben abschalten/wintotal.de → Diese Silly -Beschreibung stützt die Annahme, dass er über einen USB-Stick kam. Die Ursache ist durch formatieren des Sticks aus der Welt geschafft, Du solltest darauf achten, dass dort keine Datei autorun.inf wieder auftaucht und etwas wählerisch sein, wo Du deinen Stick reinsteckst. Achtung!: >>Du sollst das Programm nicht installieren, sondern dein System nur online scannen<< → Den kompletten Rechner (also das ganze System) zu überprüfen (Systemprüfung ohne Säuberung) mit Kaspersky Online Scanner/klicke hier → um mit dem Vorgang fortzufahren klicke auf "Accept" → dann wähle "My computer" aus - Es dauert einige Zeit, bis ein Komplett-Scan durch gelaufen ist, also bitte um Geduld! Es kann einige Zeit dauern, bis der Scan abgeschlossen ist - je nach Größe der Festplatte eine oder mehrere Stunden - also Geduld... → Report angezeigt, klicke auf "Save as" - den bitte kopieren und in deinem Thread hier einfügen Vor dem Scan Einstellungen im Internet Explorer: → "Extras→ Internetoptionen→ Sicherheit": → alles auf Standardstufe stellen → Active X erlauben - damit die neue Virendefinitionen installiert werden können ** Gibt es weitere Auffälligkeiten/Probleme mit dem Rechner? |
Die Werbungen kommen nicht mehr ! Aber seid dem der Virus da war, kann ich manche programme nicht öffnen (nur als admin kann die öffnen), es wird gesagt, dass mir die berechtigung fehlt, zudem kann ich auch keine einstellungen ändern wie Z.B. die Bildschirmauflösung, da wird auch gesagt dass ich keine berechtigung habe, obwohl ich der einzige nutzer admin bin .... |
Gmer unterbricht während des scanvorgangs ROOTREPEAL (c) AD, 2007-2009 ================================================== Scan Start Time: 2010/10/27 20:29 Program Version: Version 1.3.5.0 Windows Version: Windows Vista SP2 ================================================== Drivers ------------------- Name: 000.fcl Image Path: D:\Program Files\CyberLink\PowerDVD10\PowerDVD10\NavFilter\000.fcl Address: 0xA1D99000 Size: 180224 File Visible: - Signed: - Status: - Name: 000.fcl Image Path: C:\Program Files\Acer Arcade Deluxe\PlayMovie\000.fcl Address: 0xA1DC5000 Size: 135168 File Visible: - Signed: - Status: - Name: abmm9jlt.SYS Image Path: C:\Windows\System32\Drivers\abmm9jlt.SYS Address: 0x8A3C4000 Size: 221184 File Visible: - Signed: - Status: - Name: acpi.sys Image Path: C:\Windows\system32\drivers\acpi.sys Address: 0x807AF000 Size: 286720 File Visible: - Signed: - Status: - Name: ACPI_HAL Image Path: \Driver\ACPI_HAL Address: 0x82242000 Size: 3903488 File Visible: - Signed: - Status: - Name: afd.sys Image Path: C:\Windows\system32\drivers\afd.sys Address: 0x9195B000 Size: 294912 File Visible: - Signed: - Status: - Name: AlfaFF.sys Image Path: C:\Windows\system32\Drivers\AlfaFF.sys Address: 0x8A3BB000 Size: 35968 File Visible: - Signed: - Status: - Name: atapi.sys Image Path: C:\Windows\system32\drivers\atapi.sys Address: 0x8A34A000 Size: 32768 File Visible: - Signed: - Status: - Name: ataport.SYS Image Path: C:\Windows\system32\drivers\ataport.SYS Address: 0x8A352000 Size: 122880 File Visible: - Signed: - Status: - Name: aufuys0f.SYS Image Path: C:\Windows\System32\Drivers\aufuys0f.SYS Address: 0x8F60A000 Size: 233472 File Visible: - Signed: - Status: - Name: avgntflt.sys Image Path: C:\Windows\system32\DRIVERS\avgntflt.sys Address: 0x91D70000 Size: 86016 File Visible: - Signed: - Status: - Name: avipbb.sys Image Path: C:\Windows\system32\DRIVERS\avipbb.sys Address: 0x91D0D000 Size: 139264 File Visible: - Signed: - Status: - Name: BATTC.SYS Image Path: C:\Windows\system32\DRIVERS\BATTC.SYS Address: 0x805ED000 Size: 40960 File Visible: - Signed: - Status: - Name: Beep.SYS Image Path: C:\Windows\System32\Drivers\Beep.SYS Address: 0x8FD30000 Size: 28672 File Visible: - Signed: - Status: - Name: BOOTVID.dll Image Path: C:\Windows\system32\BOOTVID.dll Address: 0x8048E000 Size: 32768 File Visible: - Signed: - Status: - Name: bowser.sys Image Path: C:\Windows\system32\DRIVERS\bowser.sys Address: 0xA05A7000 Size: 102400 File Visible: - Signed: - Status: - Name: cdd.dll Image Path: C:\Windows\System32\cdd.dll Address: 0x9B480000 Size: 57344 File Visible: - Signed: - Status: - Name: cdfs.sys Image Path: C:\Windows\system32\DRIVERS\cdfs.sys Address: 0xA1DE6000 Size: 90112 File Visible: - Signed: - Status: - Name: cdrom.sys Image Path: C:\Windows\system32\DRIVERS\cdrom.sys Address: 0x8EFE4000 Size: 98304 File Visible: - Signed: - Status: - Name: CI.dll Image Path: C:\Windows\system32\CI.dll Address: 0x804D7000 Size: 917504 File Visible: - Signed: - Status: - Name: circlass.sys Image Path: C:\Windows\system32\DRIVERS\circlass.sys Address: 0x8F786000 Size: 57344 File Visible: - Signed: - Status: - Name: CLASSPNP.SYS Image Path: C:\Windows\system32\drivers\CLASSPNP.SYS Address: 0x8A7A3000 Size: 135168 File Visible: - Signed: - Status: - Name: CLFS.SYS Image Path: C:\Windows\system32\CLFS.SYS Address: 0x80496000 Size: 266240 File Visible: - Signed: - Status: - Name: CmBatt.sys Image Path: C:\Windows\system32\DRIVERS\CmBatt.sys Address: 0x8DEEF000 Size: 14208 File Visible: - Signed: - Status: - Name: compbatt.sys Image Path: C:\Windows\system32\DRIVERS\compbatt.sys Address: 0x807FD000 Size: 10496 File Visible: - Signed: - Status: - Name: crashdmp.sys Image Path: C:\Windows\System32\Drivers\crashdmp.sys Address: 0x91D2F000 Size: 53248 File Visible: - Signed: - Status: - Name: crcdisk.sys Image Path: C:\Windows\system32\drivers\crcdisk.sys Address: 0x8A7C4000 Size: 36864 File Visible: - Signed: - Status: - Name: dfsc.sys Image Path: C:\Windows\System32\Drivers\dfsc.sys Address: 0x91CF6000 Size: 94208 File Visible: - Signed: - Status: - Name: disk.sys Image Path: C:\Windows\system32\drivers\disk.sys Address: 0x8A792000 Size: 69632 File Visible: - Signed: - Status: - Name: DKbFltr.sys Image Path: C:\Windows\system32\DRIVERS\DKbFltr.sys Address: 0x8EFC2000 Size: 40960 File Visible: - Signed: - Status: - Name: drmk.sys Image Path: C:\Windows\system32\drivers\drmk.sys Address: 0x8FA3A000 Size: 151552 File Visible: - Signed: - Status: - Name: dump_iaStor.sys Image Path: C:\Windows\System32\Drivers\dump_iaStor.sys Address: 0x8DE00000 Size: 888832 File Visible: No Signed: - Status: - Name: Dxapi.sys Image Path: C:\Windows\System32\drivers\Dxapi.sys Address: 0x91D3C000 Size: 40960 File Visible: - Signed: - Status: - Name: dxgkrnl.sys Image Path: C:\Windows\System32\drivers\dxgkrnl.sys Address: 0x8E737000 Size: 659456 File Visible: - Signed: - Status: - Name: ecache.sys Image Path: C:\Windows\System32\drivers\ecache.sys Address: 0x8A76B000 Size: 159744 File Visible: - Signed: - Status: - Name: fileinfo.sys Image Path: C:\Windows\system32\drivers\fileinfo.sys Address: 0x8A3A2000 Size: 65536 File Visible: - Signed: - Status: - Name: fltmgr.sys Image Path: C:\Windows\system32\drivers\fltmgr.sys Address: 0x8A370000 Size: 204800 File Visible: - Signed: - Status: - Name: Fs_Rec.SYS Image Path: C:\Windows\System32\Drivers\Fs_Rec.SYS Address: 0x8FD20000 Size: 36864 File Visible: - Signed: - Status: - Name: fwpkclnt.sys Image Path: C:\Windows\System32\drivers\fwpkclnt.sys Address: 0x918F4000 Size: 110592 File Visible: - Signed: - Status: - Name: GEARAspiWDM.sys Image Path: C:\Windows\system32\DRIVERS\GEARAspiWDM.sys Address: 0x8A7DA000 Size: 21120 File Visible: - Signed: - Status: - Name: hal.dll Image Path: C:\Windows\system32\hal.dll Address: 0x8220F000 Size: 208896 File Visible: - Signed: - Status: - Name: HDAudBus.sys Image Path: C:\Windows\system32\DRIVERS\HDAudBus.sys Address: 0x8DF3A000 Size: 577536 File Visible: - Signed: - Status: - Name: HIDCLASS.SYS Image Path: C:\Windows\system32\DRIVERS\HIDCLASS.SYS Address: 0x8FCE5000 Size: 65536 File Visible: - Signed: - Status: - Name: hidir.sys Image Path: C:\Windows\system32\DRIVERS\hidir.sys Address: 0x8FCDA000 Size: 45056 File Visible: - Signed: - Status: - Name: HIDPARSE.SYS Image Path: C:\Windows\system32\DRIVERS\HIDPARSE.SYS Address: 0x8FCF5000 Size: 28672 File Visible: - Signed: - Status: - Name: hidusb.sys Image Path: C:\Windows\system32\DRIVERS\hidusb.sys Address: 0x8FD64000 Size: 36864 File Visible: - Signed: - Status: - Name: HSX_CNXT.sys Image Path: C:\Windows\system32\DRIVERS\HSX_CNXT.sys Address: 0x8FC0A000 Size: 741376 File Visible: - Signed: - Status: - Name: HSX_DPV.sys Image Path: C:\Windows\system32\DRIVERS\HSX_DPV.sys Address: 0x8FA9C000 Size: 1056768 File Visible: - Signed: - Status: - Name: HSXHWAZL.sys Image Path: C:\Windows\system32\DRIVERS\HSXHWAZL.sys Address: 0x8FA5F000 Size: 249856 File Visible: - Signed: - Status: - Name: HTTP.sys Image Path: C:\Windows\system32\drivers\HTTP.sys Address: 0xA051D000 Size: 446464 File Visible: - Signed: - Status: - Name: i8042prt.sys Image Path: C:\Windows\system32\DRIVERS\i8042prt.sys Address: 0x8EFAF000 Size: 77824 File Visible: - Signed: - Status: - Name: iaStor.sys Image Path: C:\Windows\system32\DRIVERS\iaStor.sys Address: 0x8A271000 Size: 888832 File Visible: - Signed: - Status: - Name: iaStor.sys Image Path: C:\Windows\system32\DRIVERS\iaStor.sys Address: 0x00000000 Size: 0 File Visible: - Signed: - Status: - Name: int15.sys Image Path: C:\Windows\system32\drivers\int15.sys Address: 0xA1C4F000 Size: 69632 File Visible: - Signed: - Status: - Name: intelppm.sys Image Path: C:\Windows\system32\DRIVERS\intelppm.sys Address: 0x8F643000 Size: 61440 File Visible: - Signed: - Status: - Name: ipfltdrv.sys Image Path: C:\Windows\system32\DRIVERS\ipfltdrv.sys Address: 0xA04B4000 Size: 73728 File Visible: - Signed: - Status: - Name: kbdclass.sys Image Path: C:\Windows\system32\DRIVERS\kbdclass.sys Address: 0x8EFCC000 Size: 45056 File Visible: - Signed: - Status: - Name: kbdhid.sys Image Path: C:\Windows\system32\DRIVERS\kbdhid.sys Address: 0x8FCFC000 Size: 36864 File Visible: - Signed: - Status: - Name: kdcom.dll Image Path: C:\Windows\system32\kdcom.dll Address: 0x80406000 Size: 28672 File Visible: - Signed: - Status: - Name: ks.sys Image Path: C:\Windows\system32\DRIVERS\ks.sys Address: 0x8F75C000 Size: 172032 File Visible: - Signed: - Status: - Name: ksecdd.sys Image Path: C:\Windows\system32\Drivers\ksecdd.sys Address: 0x8A405000 Size: 462848 File Visible: - Signed: - Status: - Name: L1E60x86.sys Image Path: C:\Windows\system32\DRIVERS\L1E60x86.sys Address: 0x8EF8A000 Size: 65536 File Visible: - Signed: - Status: - Name: lltdio.sys Image Path: C:\Windows\system32\DRIVERS\lltdio.sys Address: 0xA04C6000 Size: 65536 File Visible: - Signed: - Status: - Name: luafv.sys Image Path: C:\Windows\system32\drivers\luafv.sys Address: 0x91D55000 Size: 110592 File Visible: - Signed: - Status: - Name: mcupdate_GenuineIntel.dll Image Path: C:\Windows\system32\mcupdate_GenuineIntel.dll Address: 0x8040D000 Size: 458752 File Visible: - Signed: - Status: - Name: mdmxsdk.sys Image Path: C:\Windows\system32\DRIVERS\mdmxsdk.sys Address: 0xA1C60000 Size: 12672 File Visible: - Signed: - Status: - Name: modem.sys Image Path: C:\Windows\system32\drivers\modem.sys Address: 0x8FCBF000 Size: 53248 File Visible: - Signed: - Status: - Name: monitor.sys Image Path: C:\Windows\system32\DRIVERS\monitor.sys Address: 0x91D46000 Size: 61440 File Visible: - Signed: - Status: - Name: mouclass.sys Image Path: C:\Windows\system32\DRIVERS\mouclass.sys Address: 0x8EFD9000 Size: 45056 File Visible: - Signed: - Status: - Name: mouhid.sys Image Path: C:\Windows\system32\DRIVERS\mouhid.sys Address: 0x8FD05000 Size: 32768 File Visible: - Signed: - Status: - Name: mountmgr.sys Image Path: C:\Windows\System32\drivers\mountmgr.sys Address: 0x8A259000 Size: 65536 File Visible: - Signed: - Status: - Name: mpsdrv.sys Image Path: C:\Windows\System32\drivers\mpsdrv.sys Address: 0xA05C0000 Size: 86016 File Visible: - Signed: - Status: - Name: mrxdav.sys Image Path: C:\Windows\system32\drivers\mrxdav.sys Address: 0xA05D5000 Size: 135168 File Visible: - Signed: - Status: - Name: mrxsmb.sys Image Path: C:\Windows\system32\DRIVERS\mrxsmb.sys Address: 0x91D85000 Size: 126976 File Visible: - Signed: - Status: - Name: mrxsmb10.sys Image Path: C:\Windows\system32\DRIVERS\mrxsmb10.sys Address: 0x91DA4000 Size: 233472 File Visible: - Signed: - Status: - Name: mrxsmb20.sys Image Path: C:\Windows\system32\DRIVERS\mrxsmb20.sys Address: 0x91DDD000 Size: 98304 File Visible: - Signed: - Status: - Name: Msfs.SYS Image Path: C:\Windows\System32\Drivers\Msfs.SYS Address: 0x8FD7F000 Size: 45056 File Visible: - Signed: - Status: - Name: msisadrv.sys Image Path: C:\Windows\system32\drivers\msisadrv.sys Address: 0x807F5000 Size: 32768 File Visible: - Signed: - Status: - Name: msiscsi.sys Image Path: C:\Windows\system32\DRIVERS\msiscsi.sys Address: 0x8F652000 Size: 192512 File Visible: - Signed: - Status: - Name: msrpc.sys Image Path: C:\Windows\system32\drivers\msrpc.sys Address: 0x8A581000 Size: 176128 File Visible: - Signed: - Status: - Name: mssmbios.sys Image Path: C:\Windows\system32\DRIVERS\mssmbios.sys Address: 0x8F794000 Size: 40960 File Visible: - Signed: - Status: - Name: mup.sys Image Path: C:\Windows\System32\Drivers\mup.sys Address: 0x8A75C000 Size: 61440 File Visible: - Signed: - Status: - Name: ndis.sys Image Path: C:\Windows\system32\drivers\ndis.sys Address: 0x8A476000 Size: 1093632 File Visible: - Signed: - Status: - Name: ndistapi.sys Image Path: C:\Windows\system32\DRIVERS\ndistapi.sys Address: 0x8F6E4000 Size: 45056 File Visible: - Signed: - Status: - Name: ndisuio.sys Image Path: C:\Windows\system32\DRIVERS\ndisuio.sys Address: 0xA0500000 Size: 40960 File Visible: - Signed: - Status: - Name: ndiswan.sys Image Path: C:\Windows\system32\DRIVERS\ndiswan.sys Address: 0x8F6EF000 Size: 143360 File Visible: - Signed: - Status: - Name: NDProxy.SYS Image Path: C:\Windows\System32\Drivers\NDProxy.SYS Address: 0x8F7E0000 Size: 69632 File Visible: - Signed: - Status: - Name: netbios.sys Image Path: C:\Windows\system32\DRIVERS\netbios.sys Address: 0x8FDB7000 Size: 57344 File Visible: - Signed: - Status: - Name: netbt.sys Image Path: C:\Windows\System32\DRIVERS\netbt.sys Address: 0x919A3000 Size: 204800 File Visible: - Signed: - Status: - Name: NETIO.SYS Image Path: C:\Windows\system32\drivers\NETIO.SYS Address: 0x8A5AC000 Size: 241664 File Visible: - Signed: - Status: - Name: NETw5v32.sys Image Path: C:\Windows\system32\DRIVERS\NETw5v32.sys Address: 0x8EC03000 Size: 3698688 File Visible: - Signed: - Status: - Name: Npfs.SYS Image Path: C:\Windows\System32\Drivers\Npfs.SYS Address: 0x8FD8A000 Size: 57344 File Visible: - Signed: - Status: - Name: nsiproxy.sys Image Path: C:\Windows\system32\drivers\nsiproxy.sys Address: 0x91CEC000 Size: 40960 File Visible: - Signed: - Status: - Name: Ntfs.sys Image Path: C:\Windows\System32\Drivers\Ntfs.sys Address: 0x8A60B000 Size: 1114112 File Visible: - Signed: - Status: - Name: NTIDrvr.sys Image Path: C:\Windows\system32\DRIVERS\NTIDrvr.sys Address: 0x8DFF7000 Size: 32768 File Visible: - Signed: - Status: - Name: NTIPPKernel.sys Image Path: C:\Program Files\Acer Arcade Deluxe\HomeMedia\Kernel\DMP\NTIPPKernel.sys Address: 0xA1C64000 Size: 122368 File Visible: - Signed: - Status: - Name: ntkrnlpa.exe Image Path: C:\Windows\system32\ntkrnlpa.exe Address: 0x82242000 Size: 3903488 File Visible: - Signed: - Status: - Name: Null.SYS Image Path: C:\Windows\System32\Drivers\Null.SYS Address: 0x8FD29000 Size: 28672 File Visible: - Signed: - Status: - Name: nvhda32v.sys Image Path: C:\Windows\system32\drivers\nvhda32v.sys Address: 0x8FCCC000 Size: 57344 File Visible: - Signed: - Status: - Name: nvlddmkm.sys Image Path: C:\Windows\system32\DRIVERS\nvlddmkm.sys Address: 0x8E004000 Size: 7545824 File Visible: - Signed: - Status: - Name: nwifi.sys Image Path: C:\Windows\system32\DRIVERS\nwifi.sys Address: 0xA04D6000 Size: 172032 File Visible: - Signed: - Status: - Name: pacer.sys Image Path: C:\Windows\system32\DRIVERS\pacer.sys Address: 0x8FDA1000 Size: 90112 File Visible: - Signed: - Status: - Name: partmgr.sys Image Path: C:\Windows\System32\drivers\partmgr.sys Address: 0x805DE000 Size: 61440 File Visible: - Signed: - Status: - Name: pci.sys Image Path: C:\Windows\system32\drivers\pci.sys Address: 0x805B7000 Size: 159744 File Visible: - Signed: - Status: - Name: peauth.sys Image Path: C:\Windows\system32\drivers\peauth.sys Address: 0xA1C82000 Size: 909312 File Visible: - Signed: - Status: - Name: PnpManager Image Path: \Driver\PnpManager Address: 0x82242000 Size: 3903488 File Visible: - Signed: - Status: - Name: portcls.sys Image Path: C:\Windows\system32\drivers\portcls.sys Address: 0x8FA0D000 Size: 184320 File Visible: - Signed: - Status: - Name: psdfilter.sys Image Path: C:\Windows\system32\DRIVERS\psdfilter.sys Address: 0x8A3B2000 Size: 36864 File Visible: - Signed: - Status: - Name: PSDNServ.sys Image Path: C:\Windows\system32\DRIVERS\PSDNServ.sys Address: 0xA1D60000 Size: 36864 File Visible: - Signed: - Status: - Name: PSDVdisk.sys Image Path: C:\Windows\system32\DRIVERS\PSDVdisk.sys Address: 0xA1D69000 Size: 73728 File Visible: - Signed: - Status: - Name: PSHED.dll Image Path: C:\Windows\system32\PSHED.dll Address: 0x8047D000 Size: 69632 File Visible: - Signed: - Status: - Name: rasacd.sys Image Path: C:\Windows\System32\DRIVERS\rasacd.sys Address: 0x8FD98000 Size: 36864 File Visible: - Signed: - Status: - Name: rasl2tp.sys Image Path: C:\Windows\system32\DRIVERS\rasl2tp.sys Address: 0x8F6CD000 Size: 94208 File Visible: - Signed: - Status: - Name: raspppoe.sys Image Path: C:\Windows\system32\DRIVERS\raspppoe.sys Address: 0x8F712000 Size: 61440 File Visible: - Signed: - Status: - Name: raspptp.sys Image Path: C:\Windows\system32\DRIVERS\raspptp.sys Address: 0x8F721000 Size: 81920 File Visible: - Signed: - Status: - Name: rassstp.sys Image Path: C:\Windows\system32\DRIVERS\rassstp.sys Address: 0x8F735000 Size: 86016 File Visible: - Signed: - Status: - Name: RAW Image Path: \FileSystem\RAW Address: 0x82242000 Size: 3903488 File Visible: - Signed: - Status: - Name: rdbss.sys Image Path: C:\Windows\system32\DRIVERS\rdbss.sys Address: 0x91CB0000 Size: 245760 File Visible: - Signed: - Status: - Name: RDPCDD.sys Image Path: C:\Windows\System32\DRIVERS\RDPCDD.sys Address: 0x8FD6F000 Size: 32768 File Visible: - Signed: - Status: - Name: rdpencdd.sys Image Path: C:\Windows\system32\drivers\rdpencdd.sys Address: 0x8FD77000 Size: 32768 File Visible: - Signed: - Status: - Name: rootrepeal.sys Image Path: C:\Windows\system32\drivers\rootrepeal.sys Address: 0x91C00000 Size: 49152 File Visible: No Signed: - Status: - Name: rspndr.sys Image Path: C:\Windows\system32\DRIVERS\rspndr.sys Address: 0xA050A000 Size: 77824 File Visible: - Signed: - Status: - Name: RTKVHDA.sys Image Path: C:\Windows\system32\drivers\RTKVHDA.sys Address: 0x8F805000 Size: 2129024 File Visible: - Signed: - Status: - Name: RTL8192su.sys Image Path: C:\Windows\system32\DRIVERS\RTL8192su.sys Address: 0x91C0F000 Size: 634880 File Visible: - Signed: - Status: - Name: RTSTOR.SYS Image Path: C:\Windows\system32\drivers\RTSTOR.SYS Address: 0x8FD0D000 Size: 77824 File Visible: - Signed: - Status: - Name: SASDIFSV.SYS Image Path: C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS Address: 0x91CAA000 Size: 24576 File Visible: - Signed: - Status: - Name: SASKUTIL.SYS Image Path: C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS Address: 0x8FDD8000 Size: 139264 File Visible: - Signed: - Status: - Name: SCSIPORT.SYS Image Path: C:\Windows\System32\Drivers\SCSIPORT.SYS Address: 0x80789000 Size: 155648 File Visible: - Signed: - Status: - Name: secdrv.SYS Image Path: C:\Windows\System32\Drivers\secdrv.SYS Address: 0xA1D7B000 Size: 40960 File Visible: - Signed: - Status: - Name: smb.sys Image Path: C:\Windows\system32\DRIVERS\smb.sys Address: 0x91947000 Size: 81920 File Visible: - Signed: - Status: - Name: spjf.sys Image Path: C:\Windows\System32\Drivers\spjf.sys Address: 0x8068D000 Size: 995328 File Visible: No Signed: - Status: - Name: spldr.sys Image Path: C:\Windows\System32\Drivers\spldr.sys Address: 0x8A754000 Size: 32768 File Visible: - Signed: - Status: - Name: spsys.sys Image Path: C:\Windows\system32\drivers\spsys.sys Address: 0xA0404000 Size: 720896 File Visible: - Signed: - Status: - Name: sptd Image Path: \Driver\sptd Address: 0x00000000 Size: 0 File Visible: No Signed: - Status: - Name: srv.sys Image Path: C:\Windows\System32\DRIVERS\srv.sys Address: 0xA1C01000 Size: 319488 File Visible: - Signed: - Status: - Name: srv2.sys Image Path: C:\Windows\System32\DRIVERS\srv2.sys Address: 0x8FB9E000 Size: 163840 File Visible: - Signed: - Status: - Name: srvnet.sys Image Path: C:\Windows\System32\DRIVERS\srvnet.sys Address: 0xA058A000 Size: 118784 File Visible: - Signed: - Status: - Name: ssmdrv.sys Image Path: C:\Windows\system32\DRIVERS\ssmdrv.sys Address: 0x919F6000 Size: 23040 File Visible: - Signed: - Status: - Name: storport.sys Image Path: C:\Windows\system32\DRIVERS\storport.sys Address: 0x8F681000 Size: 266240 File Visible: - Signed: - Status: - Name: swenum.sys Image Path: C:\Windows\system32\DRIVERS\swenum.sys Address: 0x8F75A000 Size: 4992 File Visible: - Signed: - Status: - Name: SynTP.sys Image Path: C:\Windows\system32\DRIVERS\SynTP.sys Address: 0x8DFC7000 Size: 192768 File Visible: - Signed: - Status: - Name: tcpip.sys Image Path: C:\Windows\System32\drivers\tcpip.sys Address: 0x9180A000 Size: 958464 File Visible: - Signed: - Status: - Name: tcpipreg.sys Image Path: C:\Windows\System32\drivers\tcpipreg.sys Address: 0xA1D85000 Size: 49152 File Visible: - Signed: - Status: - Name: tcusb.sys Image Path: C:\Windows\System32\Drivers\tcusb.sys Address: 0x9190F000 Size: 43904 File Visible: - Signed: - Status: - Name: TDI.SYS Image Path: C:\Windows\system32\DRIVERS\TDI.SYS Address: 0x8F6C2000 Size: 45056 File Visible: - Signed: - Status: - Name: tdx.sys Image Path: C:\Windows\system32\DRIVERS\tdx.sys Address: 0x9191A000 Size: 90112 File Visible: - Signed: - Status: - Name: termdd.sys Image Path: C:\Windows\system32\DRIVERS\termdd.sys Address: 0x8F74A000 Size: 65536 File Visible: - Signed: - Status: - Name: TSDDD.dll Image Path: C:\Windows\System32\TSDDD.dll Address: 0x9B460000 Size: 36864 File Visible: - Signed: - Status: - Name: tunmp.sys Image Path: C:\Windows\system32\DRIVERS\tunmp.sys Address: 0x8DEE6000 Size: 36864 File Visible: - Signed: - Status: - Name: tunnel.sys Image Path: C:\Windows\system32\DRIVERS\tunnel.sys Address: 0x8DEDB000 Size: 45056 File Visible: - Signed: - Status: - Name: UBHelper.sys Image Path: C:\Windows\System32\Drivers\UBHelper.sys Address: 0x8A269000 Size: 32768 File Visible: - Signed: - Status: - Name: umbus.sys Image Path: C:\Windows\system32\DRIVERS\umbus.sys Address: 0x8F79E000 Size: 53248 File Visible: - Signed: - Status: - Name: usbccgp.sys Image Path: C:\Windows\system32\DRIVERS\usbccgp.sys Address: 0x91930000 Size: 94208 File Visible: - Signed: - Status: - Name: USBD.SYS Image Path: C:\Windows\system32\DRIVERS\USBD.SYS Address: 0x8EFD7000 Size: 8192 File Visible: - Signed: - Status: - Name: usbehci.sys Image Path: C:\Windows\system32\DRIVERS\usbehci.sys Address: 0x8E7EF000 Size: 61440 File Visible: - Signed: - Status: - Name: usbhub.sys Image Path: C:\Windows\system32\DRIVERS\usbhub.sys Address: 0x8F7AB000 Size: 217088 File Visible: - Signed: - Status: - Name: USBPORT.SYS Image Path: C:\Windows\system32\DRIVERS\USBPORT.SYS Address: 0x8DEFC000 Size: 253952 File Visible: - Signed: - Status: - Name: usbuhci.sys Image Path: C:\Windows\system32\DRIVERS\usbuhci.sys Address: 0x8E7E4000 Size: 45056 File Visible: - Signed: - Status: - Name: usbvideo.sys Image Path: C:\Windows\System32\Drivers\usbvideo.sys Address: 0x919D5000 Size: 134016 File Visible: - Signed: - Status: - Name: vga.sys Image Path: C:\Windows\System32\drivers\vga.sys Address: 0x8FD37000 Size: 49152 File Visible: - Signed: - Status: - Name: VIDEOPRT.SYS Image Path: C:\Windows\System32\drivers\VIDEOPRT.SYS Address: 0x8FD43000 Size: 135168 File Visible: - Signed: - Status: - Name: volmgr.sys Image Path: C:\Windows\system32\drivers\volmgr.sys Address: 0x8A200000 Size: 61440 File Visible: - Signed: - Status: - Name: volmgrx.sys Image Path: C:\Windows\System32\drivers\volmgrx.sys Address: 0x8A20F000 Size: 303104 File Visible: - Signed: - Status: - Name: volsnap.sys Image Path: C:\Windows\system32\drivers\volsnap.sys Address: 0x8A71B000 Size: 233472 File Visible: - Signed: - Status: - Name: wanarp.sys Image Path: C:\Windows\system32\DRIVERS\wanarp.sys Address: 0x8FDC5000 Size: 77824 File Visible: - Signed: - Status: - Name: watchdog.sys Image Path: C:\Windows\System32\drivers\watchdog.sys Address: 0x8E7D8000 Size: 49152 File Visible: - Signed: - Status: - Name: Wdf01000.sys Image Path: C:\Windows\system32\drivers\Wdf01000.sys Address: 0x80604000 Size: 507904 File Visible: - Signed: - Status: - Name: WDFLDR.SYS Image Path: C:\Windows\system32\drivers\WDFLDR.SYS Address: 0x80680000 Size: 53248 File Visible: - Signed: - Status: - Name: whfltr2k.sys Image Path: C:\Windows\system32\DRIVERS\whfltr2k.sys Address: 0x8FD6D000 Size: 6784 File Visible: - Signed: - Status: - Name: Win32k Image Path: \Driver\Win32k Address: 0x9B240000 Size: 2109440 File Visible: - Signed: - Status: - Name: win32k.sys Image Path: C:\Windows\System32\win32k.sys Address: 0x9B240000 Size: 2109440 File Visible: - Signed: - Status: - Name: winbondcir.sys Image Path: C:\Windows\system32\DRIVERS\winbondcir.sys Address: 0x8EF9A000 Size: 86016 File Visible: - Signed: - Status: - Name: wmiacpi.sys Image Path: C:\Windows\system32\DRIVERS\wmiacpi.sys Address: 0x8DEF3000 Size: 36864 File Visible: - Signed: - Status: - Name: WMILIB.SYS Image Path: C:\Windows\System32\Drivers\WMILIB.SYS Address: 0x80780000 Size: 36864 File Visible: - Signed: - Status: - Name: WMIxWDM Image Path: \Driver\WMIxWDM Address: 0x82242000 Size: 3903488 File Visible: - Signed: - Status: - Name: xaudio.sys Image Path: C:\Windows\system32\DRIVERS\xaudio.sys Address: 0xA1D91000 Size: 32768 File Visible: - Signed: - Status: - --------------------------------------------------------------------- ROOTREPEAL (c) AD, 2007-2009 ================================================== Scan Start Time: 2010/10/27 20:30 Program Version: Version 1.3.5.0 Windows Version: Windows Vista SP2 ================================================== Stealth Objects ------------------- Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP] Process: System Address: 0x855231f8 Size: 121 Object: Hidden Code [Driver: aufuys0fІ癅, IRP_MJ_CREATE] Process: System Address: 0x873ee1f8 Size: 121 Object: Hidden Code [Driver: aufuys0fІ癅, IRP_MJ_CLOSE] Process: System Address: 0x873ee1f8 Size: 121 Object: Hidden Code [Driver: aufuys0fІ癅, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x873ee1f8 Size: 121 Object: Hidden Code [Driver: aufuys0fІ癅, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x873ee1f8 Size: 121 Object: Hidden Code [Driver: aufuys0fІ癅, IRP_MJ_POWER] Process: System Address: 0x873ee1f8 Size: 121 Object: Hidden Code [Driver: aufuys0fІ癅, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x873ee1f8 Size: 121 Object: Hidden Code [Driver: aufuys0fІ癅, IRP_MJ_PNP] Process: System Address: 0x873ee1f8 Size: 121 Object: Hidden Code [Driver: abmm9jltІ癅, IRP_MJ_CREATE] Process: System Address: 0x873da1f8 Size: 121 Object: Hidden Code [Driver: abmm9jltІ癅, IRP_MJ_CLOSE] Process: System Address: 0x873da1f8 Size: 121 Object: Hidden Code [Driver: abmm9jltІ癅, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x873da1f8 Size: 121 Object: Hidden Code [Driver: abmm9jltІ癅, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x873da1f8 Size: 121 Object: Hidden Code [Driver: abmm9jltІ癅, IRP_MJ_POWER] Process: System Address: 0x873da1f8 Size: 121 Object: Hidden Code [Driver: abmm9jltІ癅, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x873da1f8 Size: 121 Object: Hidden Code [Driver: abmm9jltІ癅, IRP_MJ_PNP] Process: System Address: 0x873da1f8 Size: 121 Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE] Process: System Address: 0x855221f8 Size: 121 Object: Hidden Code [Driver: atapi, IRP_MJ_CLOSE] Process: System Address: 0x855221f8 Size: 121 Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x855221f8 Size: 121 Object: Hidden Code [Driver: atapi, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x855221f8 Size: 121 Object: Hidden Code [Driver: atapi, IRP_MJ_POWER] Process: System Address: 0x855221f8 Size: 121 Object: Hidden Code [Driver: atapi, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x855221f8 Size: 121 Object: Hidden Code [Driver: atapi, IRP_MJ_PNP] Process: System Address: 0x855221f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE] Process: System Address: 0x872c91f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE] Process: System Address: 0x872c91f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x872c91f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x872c91f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER] Process: System Address: 0x872c91f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x872c91f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP] Process: System Address: 0x872c91f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_CREATE] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_CLOSE] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_READ] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_WRITE] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_FLUSH_BUFFERS] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_SHUTDOWN] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_POWER] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: cdrom, IRP_MJ_PNP] Process: System Address: 0x874651f8 Size: 121 Object: Hidden Code [Driver: Smb, IRP_MJ_CREATE] Process: System Address: 0x913de500 Size: 121 Object: Hidden Code [Driver: Smb, IRP_MJ_CLOSE] Process: System Address: 0x913de500 Size: 121 Object: Hidden Code [Driver: Smb, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x913de500 Size: 121 Object: Hidden Code [Driver: Smb, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x913de500 Size: 121 Object: Hidden Code [Driver: Smb, IRP_MJ_CLEANUP] Process: System Address: 0x913de500 Size: 121 Object: Hidden Code [Driver: Smb, IRP_MJ_PNP] Process: System Address: 0x913de500 Size: 121 Object: Hidden Code [Driver: netbtdeoЇ华牉偸ꔹ襠ꊠ᪠鄏, IRP_MJ_CREATE] Process: System Address: 0x91452500 Size: 121 Object: Hidden Code [Driver: netbtdeoЇ华牉偸ꔹ襠ꊠ᪠鄏, IRP_MJ_CLOSE] Process: System Address: 0x91452500 Size: 121 Object: Hidden Code [Driver: netbtdeoЇ华牉偸ꔹ襠ꊠ᪠鄏, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x91452500 Size: 121 Object: Hidden Code [Driver: netbtdeoЇ华牉偸ꔹ襠ꊠ᪠鄏, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x91452500 Size: 121 Object: Hidden Code [Driver: netbtdeoЇ华牉偸ꔹ襠ꊠ᪠鄏, IRP_MJ_CLEANUP] Process: System Address: 0x91452500 Size: 121 Object: Hidden Code [Driver: netbtdeoЇ华牉偸ꔹ襠ꊠ᪠鄏, IRP_MJ_PNP] Process: System Address: 0x91452500 Size: 121 Object: Hidden Code [Driver: iScsiPrtЂ穁摗, IRP_MJ_CREATE] Process: System Address: 0x8741d1f8 Size: 121 Object: Hidden Code [Driver: iScsiPrtЂ穁摗, IRP_MJ_CLOSE] Process: System Address: 0x8741d1f8 Size: 121 Object: Hidden Code [Driver: iScsiPrtЂ穁摗, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x8741d1f8 Size: 121 Object: Hidden Code [Driver: iScsiPrtЂ穁摗, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x8741d1f8 Size: 121 Object: Hidden Code [Driver: iScsiPrtЂ穁摗, IRP_MJ_POWER] Process: System Address: 0x8741d1f8 Size: 121 Object: Hidden Code [Driver: iScsiPrtЂ穁摗, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x8741d1f8 Size: 121 Object: Hidden Code [Driver: iScsiPrtЂ穁摗, IRP_MJ_PNP] Process: System Address: 0x8741d1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_CREATE] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_READ] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_WRITE] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_FLUSH_BUFFERS] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_SHUTDOWN] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_CLEANUP] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_POWER] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: volmgr, IRP_MJ_PNP] Process: System Address: 0x84b8f1f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE] Process: System Address: 0x872661f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE] Process: System Address: 0x872661f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x872661f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x872661f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER] Process: System Address: 0x872661f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x872661f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP] Process: System Address: 0x872661f8 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_CREATE] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_CREATE_NAMED_PIPE] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_CLOSE] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_READ] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_WRITE] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_QUERY_INFORMATION] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_SET_INFORMATION] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_QUERY_EA] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_SET_EA] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_FLUSH_BUFFERS] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_QUERY_VOLUME_INFORMATION] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_SET_VOLUME_INFORMATION] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_DIRECTORY_CONTROL] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_FILE_SYSTEM_CONTROL] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_SHUTDOWN] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_LOCK_CONTROL] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_CLEANUP] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_CREATE_MAILSLOT] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_QUERY_SECURITY] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_SET_SECURITY] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_POWER] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_DEVICE_CHANGE] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_QUERY_QUOTA] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_SET_QUOTA] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: mrxsmb, IRP_MJ_PNP] Process: System Address: 0x872af500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_CREATE] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_CLOSE] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_READ] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_WRITE] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_QUERY_INFORMATION] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_SET_INFORMATION] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_QUERY_VOLUME_INFORMATION] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_DIRECTORY_CONTROL] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_FILE_SYSTEM_CONTROL] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_SHUTDOWN] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_LOCK_CONTROL] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_CLEANUP] Process: System Address: 0x89e1a500 Size: 121 Object: Hidden Code [Driver: cdfsЈ敓摔ઐꧥ쟠蜋, IRP_MJ_PNP] Process: System Address: 0x89e1a500 Size: 121 --------------------------------------------------------------- java , adobe kann ich nicht updaten, es kommt eine Fehler meldung keine berechtigung, ich weiß es auch nicht |
arbeite bitte noch die weitere Punkte ab:-> http://www.trojaner-board.de/92181-m...tml#post582672 |
Hi, schritt 1 funktioniert nicht, 2)Hidden Services gibt es nicht, 3) fix funktioniert irgendwie nicht, datei ist immer noch da, obwohl ich es fixiert habe, nach dem ich 2 mal gescannt habe, 4-8) erledigt schritt 9) es waren 24 meldungen, den gespeicherten log datei kann ich nicht öffnen, habe jetzt nochmal begonnen zu suchen, 10) bin noch dabei zu suchen |
|
ne leider , ich wusste , dass man die log dateien bei präferenzem findet, aber das programm öffnet die nicht, keine reaktion |
Alle Zeitangaben in WEZ +1. Es ist jetzt 18:41 Uhr. |
Copyright ©2000-2025, Trojaner-Board