title image


Smiley Virus!!!!!!


Hallo



Danke für die Post.

Das hat es ausgelesen .











. .. ...: Rootkit Detector Profesional 2004 v0.62 :... .. .

Rootkit Detector Profesional 2004

Programmed by Andres Tarasco Acuna

Copyright (c) 2004 - 3wdesign Security

Url: http://www.3wdesign.es





-Gathering Service list Information... ( Found: 305 services )

-Gathering process List Information... ( Found: 27 process )

-Searching for Hidden process Handles. ( Found: 0 Hidden Process )

-Checking Visible Process.............

c:\windows\system32\cmd.exe

c:\windows\explorer.exe

c:\programme\gemeinsame dateien\real\update_ob\realsched.exe

c:\programme\1&1\1&1 easylogin\easylogin.exe

c:\windows\system32\smss.exe

c:\windows\system32\csrss.exe

c:\windows\system32\winlogon.exe

c:\windows\system32\services.exe

c:\windows\system32\lsass.exe

c:\programme\overnet\overnet.exe

c:\programme\microsoft activesync\wcescomm.exe

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe

c:\windows\system32\cmd.exe

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe

c:\windows\system32\spoolsv.exe

c:\programme\gemeinsame dateien\microsoft shared\vs7debug\mdm.exe

c:\windows\system32\svchost.exe

c:\programme\mozilla1.7.5\mozilla.exe

c:\dokumente und einstellungen\j³rgen\eigene dateien\neuer ordner (2)\rootkit d

etector\rootkit detector\rkdetector.exe

c:\dokumente und einstellungen\j³rgen\eigene dateien\neuer ordner (2)\rootkit d

etector\rootkit detector\rkdetector.exe

c:\progra~1\gemein~1\terratec\schedu~1\tttimer.exe

c:\dokumente und einstellungen\j³rgen\eigene dateien\neuer ordner (2)\rootkit d

etector\rootkit detector\rkdetector.exe

c:\programme\microsoft office\office10\outlook.exe

c:\programme\microsoft activesync\wcesmgr.exe

-Searching again for Hidden Services..

-Gathering Service list Information... ( Found: 0 Hidden Services)

-Searching for wrong Service Paths.... ( Found: 8 wrong Services )

-------------------------------------------------------------------------------

*SV: ADILOADER (General Purpose USB Driver (adildr.sys)) PATH: C:\WINDOWS\syste

m32\drivers\adildr.sys

-------------------------------------------------------------------------------

*SV: adiusbae (AT-AR215 USB ADSL LAN Adapter) PATH: C:\WINDOWS\system32\drivers

\adiusbae.sys

-------------------------------------------------------------------------------

*SV: adiusbaw (AT-AR215 USB ADSL WAN Adapter) PATH: C:\WINDOWS\system32\drivers

\adiusbaw.sys

-------------------------------------------------------------------------------

*SV: AMDPCI (AMDPCI) PATH: c:\dokume~1\jrgen~1\lokale~1\temp\amdpci.sys

-------------------------------------------------------------------------------

*SV: DS1410D (DS1410D) PATH: C:\WINDOWS\system32\drivers\ds1410d.sys

-------------------------------------------------------------------------------

*SV: ecure (FireDaemon Service: ecure) PATH: c:\windows\temp\firedaemon.exe

-------------------------------------------------------------------------------

*SV: svchost1 (FireDaemon Service: svchost1) PATH: c:\windows\temp\firedaemon.e

xe

-------------------------------------------------------------------------------

*SV: WksPatch (Security Manager Messaging) PATH: c:\windows\system32\drivers\sv

chost.exe

-------------------------------------------------------------------------------

-Searching for Rootkit Modules........

-------------------------------------------------------------------------------

*SUSPICIOUS MODULE!! c:\windows\system32\cdscsix3.dll

-------------------------------------------------------------------------------

*WARNING! MODULE c:\windows\system32\ole32.dll SEEMS TO BE HOOKED

-------------------------------------------------------------------------------

*SUSPICIOUS MODULE!! c:\windows\system32\shell32.dll

-------------------------------------------------------------------------------

*WARNING! MODULE c:\windows\system32\msvcrt.dll SEEMS TO BE HOOKED

-------------------------------------------------------------------------------

*SUSPICIOUS MODULE!! c:\windows\system32\shlwapi.dll

-------------------------------------------------------------------------------

*SUSPICIOUS MODULE!! c:\windows\system32\wininet.dll

-------------------------------------------------------------------------------

*SUSPICIOUS MODULE!! c:\windows\system32\crypt32.dll

-------------------------------------------------------------------------------

*SUSPICIOUS MODULE!! c:\windows\system32\msasn1.dll

-------------------------------------------------------------------------------

*WARNING! MODULE c:\windows\system32\oleaut32.dll SEEMS TO BE HOOKED

-------------------------------------------------------------------------------

*SUSPICIOUS MODULE!! c:\windows\system32\ws2_32.dll

-------------------------------------------------------------------------------

*SUSPICIOUS MODULE!! c:\windows\system32\ws2help.dll

-------------------------------------------------------------------------------

*SUSPICIOUS MODULE!! c:\windows\winsxs\x86_microsoft.windows.common-controls_65

95b64144ccf1df_6.0.10.0_x-ww_f7fb5805\comctl32.dll

-------------------------------------------------------------------------------

*WARNING! MODULE c:\windows\system32\comctl32.dll SEEMS TO BE HOOKED

-------------------------------------------------------------------------------

-Trying to detect hxdef with TCP data..( Found: 0 running rootkits)

-Searching for hxdef hooks............ ( Found: 0 running rootkits)

-Searching for other rootkits......... ( Found: 0 running rootkits)



C:\Dokumente und Einstellungen\Jürgen\Eigene Dateien\Neuer Ordner (2)\Rootkit De

tector\Rootkit Detector>



C:\Dokumente und Einstellungen\Jürgen\Eigene Dateien\Neuer Ordner (2)\Rootkit De

tector\Rootkit Detector>



C:\Dokumente und Einstellungen\Jürgen\Eigene Dateien\Neuer Ordner (2)\Rootkit De

tector\Rootkit Detector>

geschrieben von

Login

E-Mail:
  

Passwort:
  

Beitrag anfügen

Symbol:
 
 
 
 
 
 
 
 
 
 
 
 
 

Überschrift: