Hello,
is my PC infected? THANK YOU!
RogueKiller V8.8.9 [Feb 24 2014] durch Tigzy
mail: tigzyRK<at>gmail<dot>com
mail : tigzyRK<at>gmail<dot>com
Kommentare :
http://forum.adlice.comWebseite :
http://www.adlice.com/softwares/roguekiller/Blog :
http://www.adlice.comBetriebssystem : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
Gestartet in : Normaler Modus
Benutzer : User [Admin Rechte]
Funktion : Scannen -- Datum : 02/28/2014 12:09:20
| ARK || FAK || MBR |
¤¤¤ Böswillige Prozesse : 0 ¤¤¤
¤¤¤ Registry-Einträge : 2 ¤¤¤
[DNS][PUM] HKLM\[...]\CCSet\[...]\{526B48FD-6490-41F6-8300-59C5E1917D81} : NameServer (62.109.121.1 62.109.121.2 [GERMANY (DE) - GERMANY (DE)]) -> GEFUNDEN
[DNS][PUM] HKLM\[...]\CS001\[...]\{526B48FD-6490-41F6-8300-59C5E1917D81} : NameServer (62.109.121.1 62.109.121.2 [GERMANY (DE) - GERMANY (DE)]) -> GEFUNDEN
¤¤¤ Geplante Tasks : 0 ¤¤¤
¤¤¤ Autostart-Einträge : 0 ¤¤¤
¤¤¤ Web-Browsern : 0 ¤¤¤
¤¤¤ Browser Addons : 0 ¤¤¤
¤¤¤ Bestimmte Dateien / Ordner: ¤¤¤
¤¤¤ Treiber : [GELADEN] ¤¤¤
[Address] SSDT[22] : NtAlpcConnectPort @ 0x82EBE59E -> HOOKED (Unknown @ 0x86C77008)
[Address] SSDT[155] : NtLoadDriver @ 0x82E0EC40 -> HOOKED (Unknown @ 0x86C77F90)
[Address] Shadow SSDT[318] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x86B07A68)
[Address] Shadow SSDT[402] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x884BC0D0)
[Address] Shadow SSDT[434] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x88208DD8)
[Address] Shadow SSDT[436] : NtUserGetKeyState -> HOOKED (Unknown @ 0x875BB5C8)
[Address] Shadow SSDT[448] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x885762D0)
[Address] Shadow SSDT[490] : NtUserMessageCall -> HOOKED (Unknown @ 0x875BA5F8)
[Address] Shadow SSDT[508] : NtUserPostMessage -> HOOKED (Unknown @ 0x88576D20)
[Address] Shadow SSDT[509] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x88371890)
[Address] Shadow SSDT[585] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x884F20B0)
[Address] Shadow SSDT[588] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x884BF0B0)
¤¤¤ Externe Hives: ¤¤¤
¤¤¤ Infektion : ¤¤¤
¤¤¤ Hosts-Datei: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
127.0.0.1 localhost
¤¤¤ MBR überprüfen: ¤¤¤
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) WDC WD5000AZRX-00A8LB0 ATA Device +++++
--- User ---
[MBR] b74539dd89053693484dc2e42fa8c912
[BSP] ede3d597197f644a295c29636bf380d8 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 476938 Mo
User = LL1 ... OK!
User = LL2 ... OK!
Abgeschlossen : << RKreport[0]_S_02282014_120920.txt >>
RKreport[0]_D_02272014_151117.txt;RKreport[0]_S_02272014_150650.txt