Erster Malware Scan (heuristic) Malwarebytes' Anti-Malware 1.44 Datenbank Version: 3910 Windows 6.0.6002 Service Pack 2 Internet Explorer 7.0.6002.18005 25.03.2010 09:12:47 mbam-log-2010-03-25 (09-12-47).txt Scan-Methode: Quick-Scan Durchsuchte Objekte: 114960 Laufzeit: 20 minute(s), 21 second(s) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 2 Infizierte Registrierungsschlüssel: 6 Infizierte Registrierungswerte: 1 Infizierte Dateiobjekte der Registrierung: 2 Infizierte Verzeichnisse: 6 Infizierte Dateien: 39 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: C:\Windows\System32\catsrvut32.dll (Trojan.Tracur) -> Delete on reboot. C:\Users\Matthias\AppData\Roaming\8853.tmp (Trojan.Tracur) -> Delete on reboot. Infizierte Registrierungsschlüssel: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{005f1b52-1a6c-41c5-9f91-9efb7dfe72a0} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{005f1b52-1a6c-41c5-9f91-9efb7dfe72a0} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0083d194-7676-486d-b776-94a688ca449a} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{0083d194-7676-486d-b776-94a688ca449a} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{0083d194-7676-486d-b776-94a688ca449a} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\.fsharproj (Trojan.Tracur) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rthdbpl (Trojan.Tracur) -> Quarantined and deleted successfully. Infizierte Dateiobjekte der Registrierung: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Tracur) -> Data: c:\windows\system32\catsrvut32.dll -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs (Trojan.Tracur) -> Data: system32\catsrvut32.dll -> Delete on reboot. Infizierte Verzeichnisse: C:\ProgramData\1389030752 (Rogue.SecurityTool) -> Quarantined and deleted successfully. C:\Users\Administrator\AppData\Roaming\SystemProc (Trojan.Agent) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Roaming\SystemProc (Trojan.Agent) -> Quarantined and deleted successfully. C:\Program Files\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D} (Worm.Prolaco.M) -> Quarantined and deleted successfully. C:\Program Files\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome (Worm.Prolaco.M) -> Quarantined and deleted successfully. C:\Program Files\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome\content (Worm.Prolaco.M) -> Quarantined and deleted successfully. Infizierte Dateien: C:\Windows\System32\crtdll32.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\Windows\System32\catsrvut32.dll (Trojan.Tracur) -> Delete on reboot. C:\Users\Matthias\AppData\Roaming\8853.tmp (Trojan.Tracur) -> Delete on reboot. C:\Users\Matthias\AppData\Local\Temp\7638.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Administrator\AppData\Roaming\ADCB.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Roaming\1F06.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Roaming\28A8.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Roaming\479A.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Roaming\DE61.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\cscapi32.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\davclnt32.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\DDACLSys32.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\dinput32.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\dinput832.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\dmvdsitf32.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\dot3api32.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\fde32.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\fdProxy32.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Windows\System32\findnetprinters32.dll (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Administrator\AppData\Local\Temp\B5A9.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Administrator\AppData\Local\Temp\CA81.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\194F.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\3A86.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\48F6.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\4D21.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\67E9.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\6C1D.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\80F7.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\8144.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\934C.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\A8E0.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Local\Temp\AEB9.tmp (Trojan.Tracur) -> Quarantined and deleted successfully. C:\Users\Administrator\AppData\Roaming\SystemProc\lsass.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\Users\Matthias\AppData\Roaming\SystemProc\lsass.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\Program Files\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome.manifest (Worm.Prolaco.M) -> Quarantined and deleted successfully. C:\Program Files\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\install.rdf (Worm.Prolaco.M) -> Quarantined and deleted successfully. C:\Program Files\Mozilla Firefox\extensions\{9CE11043-9A15-4207-A565-0C94C42D590D}\chrome\content\timer.xul (Worm.Prolaco.M) -> Quarantined and deleted successfully. C:\Windows\System32\CONSOLE32.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\Windows\GnuHashes.ini (Malware.Trace) -> Quarantined and deleted successfully. ------------------------------------------------------------------------------- Zweiter Malware Scan (total scan) Malwarebytes' Anti-Malware 1.44 Datenbank Version: 3910 Windows 6.0.6002 Service Pack 2 Internet Explorer 7.0.6002.18005 26.03.2010 08:06:28 mbam-log-2010-03-26 (08-04-19) Laptop (Total Scan) Scan-Methode: Vollständiger Scan (C:\|) Durchsuchte Objekte: 231397 Laufzeit: 2 hour(s), 39 minute(s), 36 second(s) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 0 Infizierte Registrierungswerte: 0 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 2 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: C:\System Volume Data\S-1-5-21-e0f88a07-cf50b68a-99f16edf\Microsoft\Profiles\{929f4779-c9c9-27e6-1e17-d6e31015}\track002\play_mp3_setup.exe (Trojan.Tracur) -> No action taken. C:\System Volume Data\S-1-5-21-e0f88a07-cf50b68a-99f16edf\Microsoft\Profiles\{929f4779-c9c9-27e6-1e17-d6e31017}\setup\setup.exe (Trojan.Tracur) -> No action taken. -------------------------------------------------------------------------- Gmer Bericht GMER 1.0.15.15281 - http://www.gmer.net Rootkit quick scan 2010-03-26 08:46:34 Windows 6.0.6002 Service Pack 2 Running: tcmu1z46.exe; Driver: C:\Users\Matthias\AppData\Local\Temp\ugdiipod.sys ---- Devices - GMER 1.0.15 ---- AttachedDevice \Driver\tdx \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.) AttachedDevice \Driver\tdx \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.) AttachedDevice \Driver\tdx \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.) AttachedDevice \Driver\tdx \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.) AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation) AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation) ---- EOF - GMER 1.0.15 ---- ------------------------------------------------------------------------------- Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 11:27:55, on 26.03.2010 Platform: Windows Vista SP2 (WinNT 6.00.1906) MSIE: Internet Explorer v7.00 (7.00.6002.18005) Boot mode: Normal Running processes: C:\Windows\system32\taskeng.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Program Files\Windows Defender\MSASCui.exe C:\Windows\System32\igfxtray.exe C:\Windows\System32\hkcmd.exe C:\Windows\System32\PersistenceThread.exe C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe C:\Program Files\Launch Manager\LManager.exe C:\Program Files\Synaptics\SynTP\SynTPEnh.exe C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe C:\Windows\System32\IgfxExt.exe C:\Program Files\AVG\AVG8\avgtray.exe C:\Program Files\pdf24\pdf24.exe C:\Program Files\Common Files\Java\Java Update\jusched.exe C:\Program Files\Windows Media Player\wmpnscfg.exe C:\Program Files\Acer\Acer VCM\AcerVCM.exe C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe C:\Windows\system32\igfxsrvc.exe C:\Program Files\Synaptics\SynTP\SynTPHelper.exe C:\Program Files\Vokabeltrainer 5\Vokabeltrainer.exe C:\Windows\system32\conime.exe C:\Program Files\Cisco Systems\VPN Client\vpngui.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://homepage.acer.com/rdr.aspx?b=ACAW&l=0807&s=2&o=vb32&d=0909&m=ao751h R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://homepage.acer.com/rdr.aspx?b=ACAW&l=0807&s=2&o=vb32&d=0909&m=ao751h R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://homepage.acer.com/rdr.aspx?b=ACAW&l=0807&s=2&o=vb32&d=0909&m=ao751h R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://homepage.acer.com/rdr.aspx?b=ACAW&l=0807&s=2&o=vb32&d=0909&m=ao751h R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O1 - Hosts: ::1 localhost O2 - BHO: HelperObject Class - {00C6482D-C502-44C8-8409-FCE54AD9C208} - C:\Program Files\TechSmith\SnagIt 7\SnagItBHO.dll O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Program Files\AVG\AVG8\avgssie.dll O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - (no file) O2 - BHO: Windows Live Anmelde-Hilfsprogramm - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O3 - Toolbar: SnagIt - {8FF5E183-ABDE-46EB-B09E-D2AAB95CABE3} - C:\Program Files\TechSmith\SnagIt 7\SnagItIEAddin.dll O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe O4 - HKLM\..\Run: [IgfxExt] C:\Windows\system32\IgfxExt.exe /RegServer O4 - HKLM\..\Run: [PersistenceThread] C:\Windows\system32\PersistenceThread.exe O4 - HKLM\..\Run: [RtHDVCpl] C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe O4 - HKLM\..\Run: [LManager] C:\Program Files\Launch Manager\LManager.exe O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [SynTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe O4 - HKLM\..\Run: [PLFSetI] C:\Windows\PLFSetI.exe O4 - HKLM\..\Run: [RemoteControl8] "C:\Program Files\CyberLink\PowerDVD8\PDVD8Serv.exe" O4 - HKLM\..\Run: [PDVD8LanguageShortcut] "C:\Program Files\CyberLink\PowerDVD8\Language\Language.exe" O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe O4 - HKLM\..\Run: [PDFPrint] C:\Program Files\pdf24\pdf24.exe O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" O4 - HKLM\..\Run: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOKALER DIENST') O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETZWERKDIENST') O4 - Global Startup: Acer VCM.lnk = ? O4 - Global Startup: Bluetooth.lnk = ? O4 - Global Startup: VPN Client.lnk = ? O8 - Extra context menu item: Bild an &Bluetooth-Gerät senden... - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000 O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000 O8 - Extra context menu item: Seite an &Bluetooth-Gerät senden... - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm O9 - Extra button: In Blog veröffentlichen - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll O9 - Extra 'Tools' menuitem: In Windows Live Writer in Blog veröffentliche&n - {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll O9 - Extra button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL O9 - Extra button: @C:\Program Files\WIDCOMM\Bluetooth Software\btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm O9 - Extra 'Tools' menuitem: @C:\Program Files\WIDCOMM\Bluetooth Software\btrez.dll,-12650 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm O13 - Gopher Prefix: O15 - ProtocolDefaults: '@ivt' protocol is in My Computer Zone, should be Intranet Zone O15 - ProtocolDefaults: 'file' protocol is in My Computer Zone, should be Internet Zone O15 - ProtocolDefaults: 'ftp' protocol is in My Computer Zone, should be Internet Zone O15 - ProtocolDefaults: 'http' protocol is in My Computer Zone, should be Internet Zone O15 - ProtocolDefaults: 'https' protocol is in My Computer Zone, should be Internet Zone O17 - HKLM\System\CCS\Services\Tcpip\..\{2572C7BC-04F5-492E-A284-4B15BB09196B}: Domain = unizh.ch O17 - HKLM\System\CCS\Services\Tcpip\..\{2572C7BC-04F5-492E-A284-4B15BB09196B}: NameServer = 130.60.128.3,130.60.64.51 O17 - HKLM\System\CCS\Services\Tcpip\..\{A6F9BD6C-A4EC-4469-853E-DFD6B53FE16F}: Domain = unizh.ch O17 - HKLM\System\CCS\Services\Tcpip\..\{A6F9BD6C-A4EC-4469-853E-DFD6B53FE16F}: NameServer = 130.60.128.3,130.60.64.51 O17 - HKLM\System\CS1\Services\Tcpip\Parameters: SearchList = unizh.ch O17 - HKLM\System\CS1\Services\Tcpip\..\{2572C7BC-04F5-492E-A284-4B15BB09196B}: Domain = unizh.ch O17 - HKLM\System\CS1\Services\Tcpip\..\{2572C7BC-04F5-492E-A284-4B15BB09196B}: NameServer = 130.60.128.3,130.60.64.51 O17 - HKLM\System\CS2\Services\Tcpip\..\{2572C7BC-04F5-492E-A284-4B15BB09196B}: Domain = unizh.ch O17 - HKLM\System\CS2\Services\Tcpip\..\{2572C7BC-04F5-492E-A284-4B15BB09196B}: NameServer = 130.60.128.3,130.60.64.51 O17 - HKLM\System\CCS\Services\Tcpip\Parameters: SearchList = unizh.ch O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Program Files\AVG\AVG8\avgpp.dll O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL O20 - AppInit_DLLs: avgrsstx.dll,C:\Windows\System32\catsrvut32.dll O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe O23 - Service: Bluetooth Service (btwdins) - Broadcom Corporation. - C:\Program Files\WIDCOMM\Bluetooth Software\btwdins.exe O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe O23 - Service: ShrewSoft DNS Proxy Daemon (dtpd) - Unknown owner - C:\Program Files\ShrewSoft\VPN Client\dtpd.exe O23 - Service: ShrewSoft IKE Daemon (iked) - Unknown owner - C:\Program Files\ShrewSoft\VPN Client\iked.exe O23 - Service: ShrewSoft IPSEC Daemon (ipsecd) - Unknown owner - C:\Program Files\ShrewSoft\VPN Client\ipsecd.exe O23 - Service: Raw Socket Service (RS_Service) - Acer Incorporated - C:\Program Files\Acer\Acer VCM\RS_Service.exe -- End of file - 9147 bytes