Hittade ett program, McAfee Rootkit Detective och scannade med:
Här är loggen, tror du det finns nått mer skumt?
Citat:
McAfee(R) Rootkit Detective 1.1 scan report
On 21-01-2008 at 02:36:26
OS-Version 5.2.3790
Service Pack 2.0
====================================
Object-Type: SSDT-hook
Object-Name: ZwClose
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwCreateKey
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwCreateProcess
Object-Path: C:\WINDOWS\system32\drivers\iksysflt.sys
Object-Type: SSDT-hook
Object-Name: ZwCreateProcessEx
Object-Path: C:\WINDOWS\system32\drivers\iksysflt.sys
Object-Type: SSDT-hook
Object-Name: ZwDeleteKey
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwDeleteValueKey
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwLoadKey2
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwOpenKey
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwOpenProcess
Object-Path: C:\Program\Grisoft\AVG Anti-Spyware 7.5\guard.sys
Object-Type: SSDT-hook
Object-Name: ZwQueryValueKey
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwRenameKey
Object-Path: C:\WINDOWS\system32\drivers\iksysflt.sys
Object-Type: SSDT-hook
Object-Name: ZwReplaceKey
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwRestoreKey
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwSetValueKey
Object-Path: (NULL)
Object-Type: SSDT-hook
Object-Name: ZwTerminateProcess
Object-Path: C:\Program\Grisoft\AVG Anti-Spyware 7.5\guard.sys
Object-Type: SSDT-hook
Object-Name: ZwWriteVirtualMemory
Object-Path: C:\WINDOWS\system32\drivers\iksysflt.sys
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_SYSTEM_CONTROL
Object-Path:
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_POWER
Object-Path:
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_CLEANUP
Object-Path:
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_SHUTDOWN
Object-Path:
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_INTERNAL_DEVICE_CONTROL
Object-Path:
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_DEVICE_CONTROL
Object-Path:
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_FLUSH_BUFFERS
Object-Path:
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_WRITE
Object-Path:
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_READ
Object-Path:
Object-Type: IRP-hook
Object-Name: \Driver\Ftdisk->IRP_MJ_CREATE
Object-Path:
Object-Type: Registry-key
Object-Name: 19659239224E364682FA4BAF72C53EA4sflt.sys
Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\s ptd\Cfg\19659239224E364682FA4BAF72C53EA4
Status: Hidden
Object-Type: Registry-key
Object-Name: 00000001ontrolSet002\Services\sptd\Cfg\19659239224 E364682FA4BAF72C53EA4
Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\s ptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001
Status: Hidden
Object-Type: Registry-key
Object-Name: 0Jf40M\ControlSet002\Services\sptd\Cfg\19659239224 E364682FA4BAF72C53EA4\00000001
Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\s ptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\ 0Jf40
Status: Hidden
Object-Type: Registry-key
Object-Name: 0Jf41M\ControlSet002\Services\sptd\Cfg\19659239224 E364682FA4BAF72C53EA4\00000001\0Jf40
Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\s ptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\ 0Jf41
Status: Hidden
Object-Type: Registry-key
Object-Name: 0Jf42M\ControlSet002\Services\sptd\Cfg\19659239224 E364682FA4BAF72C53EA4\00000001\0Jf41
Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\s ptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\ 0Jf42
Status: Hidden
Object-Type: Registry-key
Object-Name: 0Jf43M\ControlSet002\Services\sptd\Cfg\19659239224 E364682FA4BAF72C53EA4\00000001\0Jf42
Object-Path: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\s ptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\ 0Jf43
Status: Hidden
Object-Type: Registry-value
Object-Name: ThreadingModel
Object-Path: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5645C8C 2-E277-11CF-8FDA-00AA00A14F93}\InprocServer32
Status: Registy value-data mismatch
Object-Type: IAT/EAT-hook
PID: 2168
Details: Export : Function : USER32.dll!SetWindowsHookExW =>
Object-Path:
Status: Hooked
Object-Type: IAT/EAT-hook
PID: 2168
Details: Export : Function : USER32.dll!SetWindowsHookExA =>
Object-Path:
Status: Hooked
Object-Type: Process
Object-Name: nSvcLog.exe
Pid: 1332
Object-Path: C:\Program\NVIDIA Corporation\NetworkAccessManager\bin\nSvcLog.exe
Status: Visible
Object-Type: Process
Object-Name: System Idle Process
Pid: 0
Object-Path:
Status: Visible
Object-Type: Process
Object-Name: nTuneService.ex
Pid: 1396
Object-Path: C:\Program\NVIDIA Corporation\nTune\nTuneService.exe
Status: Visible
Object-Type: Process
Object-Name: firefox.exe
Pid: 404
Object-Path: C:\Program\Mozilla Firefox\firefox.exe
Status: Visible
Object-Type: Process
Object-Name: msnmsgr.exe
Pid: 3568
Object-Path: C:\Program\Windows Live\Messenger\msnmsgr.exe
Status: Visible
Object-Type: Process
Object-Name: System
Pid: 4
Object-Path:
Status: Visible
Object-Type: Process
Object-Name: Apache.exe
Pid: 1616
Object-Path: C:\Program\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\bin\apache.exe
Status: Visible
Object-Type: Process
Object-Name: daemon.exe
Pid: 2360
Object-Path: C:\Program\DAEMON Tools\daemon.exe
Status: Visible
Object-Type: Process
Object-Name: svchost.exe
Pid: 904
Object-Path: C:\WINDOWS\system32\svchost.exe
Status: Visible
Object-Type: Process
Object-Name: svchost.exe
Pid: 688
Object-Path: C:\WINDOWS\system32\svchost.exe
Status: Visible
Object-Type: Process
Object-Name: svchost.exe
Pid: 812
Object-Path: C:\WINDOWS\System32\svchost.exe
Status: Visible
Object-Type: Process
Object-Name: nvsvc32.exe
Pid: 1464
Object-Path: C:\WINDOWS\system32\nvsvc32.exe
Status: Visible
Object-Type: Process
Object-Name: egui.exe
Pid: 2332
Object-Path: C:\Program\ESET\ESET Smart Security\egui.exe
Status: Visible
Object-Type: Process
Object-Name: SimpPro.exe
Pid: 2704
Object-Path: C:\Program\Secway\SimpPro 2.2\SimpPro.exe
Status: Visible
Object-Type: Process
Object-Name: wmiprvse.exe
Pid: 3200
Object-Path: C:\WINDOWS\system32\wbem\wmiprvse.exe
Status: Visible
Object-Type: Process
Object-Name: lsass.exe
Pid: 504
Object-Path: C:\WINDOWS\system32\lsass.exe
Status: Visible
Object-Type: Process
Object-Name: svchost.exe
Pid: 2984
Object-Path: C:\WINDOWS\System32\svchost.exe
Status: Visible
Object-Type: Process
Object-Name: Rootkit_Detecti
Pid: 2736
Object-Path: H:\#Appz\Säkerhet\McafeeRootkitDetective\Rootkit_D etective.exe
Status: Visible
Object-Type: Process
Object-Name: csrss.exe
Pid: 412
Object-Path: C:\WINDOWS\system32\csrss.exe
Status: Visible
Object-Type: Process
Object-Name: winlogon.exe
Pid: 444
Object-Path: C:\WINDOWS\system32\winlogon.exe
Status: Visible
Object-Type: Process
Object-Name: pctsAuxs.exe
Pid: 1560
Object-Path: C:\Program\Spyware Doctor\pctsAuxs.exe
Status: Visible
Object-Type: Process
Object-Name: usnsvc.exe
Pid: 2304
Object-Path: C:\Program\Windows Live\Messenger\usnsvc.exe
Status: Visible
Object-Type: Process
Object-Name: Apache.exe
Pid: 1252
Object-Path: C:\Program\NVIDIA Corporation\NetworkAccessManager\Apache Group\Apache2\bin\apache.exe
Status: Visible
Object-Type: Process
Object-Name: svchost.exe
Pid: 1224
Object-Path: C:\WINDOWS\System32\svchost.exe
Status: Visible
Object-Type: Process
Object-Name: pctsTray.exe
Pid: 2340
Object-Path: C:\Program\Spyware Doctor\pctsTray.exe
Status: Visible
Object-Type: Process
Object-Name: ctfmon.exe
Pid: 2372
Object-Path: C:\WINDOWS\system32\ctfmon.exe
Status: Visible
Object-Type: Process
Object-Name: alg.exe
Pid: 3116
Object-Path: C:\WINDOWS\System32\alg.exe
Status: Visible
Object-Type: Process
Object-Name: svchost.exe
Pid: 3024
Object-Path: C:\WINDOWS\System32\svchost.exe
Status: Visible
Object-Type: Process
Object-Name: Ventrilo.exe
Pid: 4080
Object-Path: C:\Program\Ventrilo\Ventrilo.exe
Status: Visible
Object-Type: Process
Object-Name: msdtc.exe
Pid: 1044
Object-Path: C:\WINDOWS\system32\msdtc.exe
Status: Visible
Object-Type: Process
Object-Name: uTorrent.exe
Pid: 424
Object-Path: C:\Program\uTorrent\uTorrent.exe
Status: Visible
Object-Type: Process
Object-Name: ekrn.exe
Pid: 1200
Object-Path: C:\Program\ESET\ESET Smart Security\ekrn.exe
Status: Visible
Object-Type: Process
Object-Name: hamachi.exe
Pid: 4052
Object-Path: C:\Program\Hamachi\hamachi.exe
Status: Visible
Object-Type: Process
Object-Name: smss.exe
Pid: 364
Object-Path: C:\WINDOWS\System32\smss.exe
Status: Visible
Object-Type: Process
Object-Name: svchost.exe
Pid: 860
Object-Path: C:\WINDOWS\system32\svchost.exe
Status: Visible
Object-Type: Process
Object-Name: pctsSvc.exe
Pid: 1604
Object-Path: C:\Program\Spyware Doctor\pctsSvc.exe
Status: Visible
Object-Type: Process
Object-Name: svchost.exe
Pid: 768
Object-Path: C:\WINDOWS\system32\svchost.exe
Status: Visible
Object-Type: Process
Object-Name: nSvcIp.exe
Pid: 1884
Object-Path: C:\Program\NVIDIA Corporation\NetworkAccessManager\bin\nSvcIp.exe
Status: Visible
Object-Type: Process
Object-Name: svchost.exe
Pid: 1544
Object-Path: C:\WINDOWS\system32\svchost.exe
Status: Visible
Object-Type: Process
Object-Name: rundll32.exe
Pid: 2320
Object-Path: C:\WINDOWS\system32\RUNDLL32.EXE
Status: Visible
Object-Type: Process
Object-Name: services.exe
Pid: 492
Object-Path: C:\WINDOWS\system32\services.exe
Status: Visible
Object-Type: Process
Object-Name: spoolsv.exe
Pid: 1020
Object-Path: C:\WINDOWS\system32\spoolsv.exe
Status: Visible
Object-Type: Process
Object-Name: guard.exe
Pid: 1176
Object-Path: C:\Program\Grisoft\AVG Anti-Spyware 7.5\guard.exe
Status: Visible
Object-Type: Process
Object-Name: explorer.exe
Pid: 2168
Object-Path: C:\WINDOWS\Explorer.EXE
Status: Visible
Scan complete. Hidden registry keys/values: 7