Zurück   Trojaner-Board > Malware entfernen > Plagegeister aller Art und deren Bekämpfung

Plagegeister aller Art und deren Bekämpfung: Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?

Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen.

Antwort
Alt 19.12.2011, 20:00   #61
markusg
/// Malware-holic
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



hi, du hast aber noch nicht meine sicherheitshinweise durchgearbeitet oder?
die sind in post 47 auf der vorherigen seite.
__________________
-Verdächtige mails bitte an uns zur Analyse weiterleiten:
markusg.trojaner-board@web.de
Weiterleiten
Anleitung:
http://markusg.trojaner-board.de
Mails bitte vorerst nach obiger Anleitung an
markusg.trojaner-board@web.de
Weiterleiten
Wenn Ihr uns unterstützen möchtet

Alt 19.12.2011, 20:03   #62
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



ne .. sag ich ja grade .. wollte mich nur gleich mal melden, wenn ich wieder on bin .. das hat schon mal geklappt ..

und jetzt mach ich mal brav was du mir geschrieben hast ...
__________________


Alt 19.12.2011, 20:19   #63
markusg
/// Malware-holic
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



hi, das hatte ich übersehen, o da bekomme ich angst wenn jemand über mich her fällt :-)
wie gesagt als av würde ich zu emsisoft raten, 10 € halte ich auch für erschwinglich, wenn dir das programm dann zusagt :-) link zum shop sende ich dir dann wenn gewünscht
__________________
__________________

Alt 19.12.2011, 20:33   #64
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



ja - schick mir den link .. gerne!

ausserdem musst du keine angst vor mir haben, wenn, fall ich eh nur ganz sanft über dich her .. bist ja so was wie mein retter - und bist jetzt lebenslänglich für mich verantwortlich .. also rein pc-technisch (keine angst^^) .. alte chinesische überlieferung

Markus, ich bin so erleichtert, kanns dir gar nicht sagen .. soll ich nicht wirklich nochmal testen - meinste, alles ist gut?

Alt 19.12.2011, 20:38   #65
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



na

nu soll ich eine sicherung des systems machen, damit das service-pack installiert werden kann .. na klasse, wie mach ich das denn


Alt 19.12.2011, 20:42   #66
markusg
/// Malware-holic
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



instaliere dir erst mal emsisoft und gucke ob du damit zurecht kommst.
geb dir dann den link :-)
wir prüfen deine gesicherten daten am ende wenn das system abgesichert ist.
hmm ne sicherung machen, kann mich jetzt an die meldung nicht erinnern, ich glaub du musst einfach alle fenster schließen und dann auf ok klicken dann sollte es weiter gehen.
__________________
--> Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?

Alt 19.12.2011, 20:46   #67
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



na dann schliess ich mal die fensterläden und klicke auf ok

wenn ich mich nicht zurückmelde, gabs ein problem .. ^^

Alt 19.12.2011, 20:47   #68
markusg
/// Malware-holic
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



hehe.
sorry ich hatte übrigens nen falschen link drinn, dies ist die anleitung zu sandboxie
Sandbox*Einstellungen |
__________________
-Verdächtige mails bitte an uns zur Analyse weiterleiten:
markusg.trojaner-board@web.de
Weiterleiten
Anleitung:
http://markusg.trojaner-board.de
Mails bitte vorerst nach obiger Anleitung an
markusg.trojaner-board@web.de
Weiterleiten
Wenn Ihr uns unterstützen möchtet

Alt 19.12.2011, 21:02   #69
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



na so weit bin ich ja noch gar nicht .. aber danke für den neuen link

hat also geklappt, die systemsicherung hat das teil dann von sich aus gemacht

du sagst chrome ist gut ... findest du firefox nicht so prickelnd? .. war bisher immer mit firefox drin ..

Alt 19.12.2011, 21:07   #70
markusg
/// Malware-holic
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



chrome sollte auf jeden fall sicherer sein und auf den meisten pcs auch schneller.
erweiterungen gibts dafür auch genug, musst also nciht verzichten.
falls er dir dann doch nicht zu sagt kann man ja den ff instalieren, aber mach erst mal in ruhe die updates etc.
http://www.update.microsoft.com
updates suchen, driver, wichtige und optionale updates instalieren, so lange bis es keine mehr gibt
ja ich hab gemerkt das ich leider seit n paar tagen nen falschen link in der anleitung hab und den ausgewechselt.
__________________
-Verdächtige mails bitte an uns zur Analyse weiterleiten:
markusg.trojaner-board@web.de
Weiterleiten
Anleitung:
http://markusg.trojaner-board.de
Mails bitte vorerst nach obiger Anleitung an
markusg.trojaner-board@web.de
Weiterleiten
Wenn Ihr uns unterstützen möchtet

Alt 19.12.2011, 21:12   #71
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



hmmm
an der stelle noch eine winzige frage .... das servicepack 3 das du verlinkt hast, ist für IT-Profis und was weiss ich .. ich habs mal dir blind vertrauend geholt, stand dabei, dass es für "einzelne" computer ein anderes gibt .. na schaden wirds ja nicht .. ist mir nur grad so eingefallen

Alt 19.12.2011, 21:29   #72
markusg
/// Malware-holic
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



ne das passt schon so.
__________________
-Verdächtige mails bitte an uns zur Analyse weiterleiten:
markusg.trojaner-board@web.de
Weiterleiten
Anleitung:
http://markusg.trojaner-board.de
Mails bitte vorerst nach obiger Anleitung an
markusg.trojaner-board@web.de
Weiterleiten
Wenn Ihr uns unterstützen möchtet

Alt 19.12.2011, 21:42   #73
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



hm

habe gerade wieder so "störungen" gehabt, hab zonealarm installiert und wieder die gleiche meldung bekommen über eine netzwerk-ip

hab unhooker geholt .. das protokoll poste ich gleich ... ich bin im falschen film ........

Alt 19.12.2011, 21:44   #74
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



>SSDT State
NtConnectPort
Actual Address 0xBA2122F4
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtCreateFile
Actual Address 0xBA20C5CA
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtCreateKey
Actual Address 0xBA22B58A
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtCreatePort
Actual Address 0xBA212A80
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtCreateProcess
Actual Address 0xBA225E4E
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtCreateProcessEx
Actual Address 0xBA22623C
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtCreateSection
Actual Address 0xBA22F6F6
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtCreateWaitablePort
Actual Address 0xBA212BB6
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtDeleteFile
Actual Address 0xBA20D1E0
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtDeleteKey
Actual Address 0xBA22CE3C
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtDeleteValueKey
Actual Address 0xBA22C7B2
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtDuplicateObject
Actual Address 0xBA224D8A
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtLoadKey
Actual Address 0xBA22D794
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtLoadKey2
Actual Address 0xBA22D99C
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtOpenFile
Actual Address 0xBA20CDF2
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtOpenProcess
Actual Address 0xBA228160
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtOpenThread
Actual Address 0xBA227D8A
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtRenameKey
Actual Address 0xBA22E72A
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtReplaceKey
Actual Address 0xBA22E060
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtRequestWaitReplyPort
Actual Address 0xBA211EC4
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtRestoreKey
Actual Address 0xBA22F0FC
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtSecureConnectPort
Actual Address 0xBA21259C
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtSetInformationFile
Actual Address 0xBA20D5A4
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtSetSecurityObject
Actual Address 0xBA22EC6A
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtSetValueKey
Actual Address 0xBA22BF72
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtSystemDebugControl
Actual Address 0xBA226EA4
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtTerminateProcess
Actual Address 0xBA226C20
Hooked by: C:\WINDOWS\System32\vsdatant.sys

>Shadow
NtUserMessageCall
Actual Address 0xBA210D66
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtUserPostMessage
Actual Address 0xBA210EA8
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtUserPostThreadMessage
Actual Address 0xBA210FE0
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtUserRegisterRawInputDevices
Actual Address 0xBA20E97A
Hooked by: C:\WINDOWS\System32\vsdatant.sys

NtUserSendInput
Actual Address 0xBA2113D4
Hooked by: C:\WINDOWS\System32\vsdatant.sys

>Processes
>Drivers
>Stealth
>Files
>Hooks
tcpip.sys-->ndis.sys-->NdisCloseAdapter, Type: IAT modification at address 0xBA2FD3A8 hook handler located in [vsdatant.sys]
tcpip.sys-->ndis.sys-->NdisOpenAdapter, Type: IAT modification at address 0xBA2FD3D4 hook handler located in [vsdatant.sys]
tcpip.sys-->ndis.sys-->NdisRegisterProtocol, Type: IAT modification at address 0xBA2FD3E0 hook handler located in [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisCloseAdapter, Type: IAT modification at address 0xBAA3DB4C hook handler located in [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisDeregisterProtocol, Type: IAT modification at address 0xBAA3DB1C hook handler located in [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisOpenAdapter, Type: IAT modification at address 0xBAA3DB3C hook handler located in [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisRegisterProtocol, Type: IAT modification at address 0xBAA3DB28 hook handler located in [vsdatant.sys]
[1028]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->kernel32.dll-->GetProcAddress, Type: IAT modification at address 0x01001268 hook handler located in [shimeng.dll]
[1300]explorer.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->kernel32.dll-->SetUnhandledExceptionFilter, Type: Inline - RelativeJump at address 0x7C8449FD hook handler located in [ISWDMP.dll]
[140]ForceField.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->user32.dll+0x000142A8, Type: Inline - RelativeJump at address 0x7E3742A8 hook handler located in [ISWSHEX.dll]
[1508]ISWSVC.exe-->kernel32.dll+0x00002C2C, Type: Inline - SEH at address 0x7C802C2C hook handler located in [unknown_code_page]
[1508]ISWSVC.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1508]ISWSVC.exe-->user32.dll+0x000142A8, Type: Inline - RelativeJump at address 0x7E3742A8 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[640]services.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[640]services.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[640]services.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[640]services.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[640]services.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[640]services.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[640]services.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[640]services.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
!!POSSIBLE ROOTKIT ACTIVITY DETECTED!! =)

Alt 19.12.2011, 21:45   #75
markusg
/// Malware-holic
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



ich denke eher das ist ne fehlermeldung von zonealarm.
treten denn die andern probleme auf, endere mal alle passwörter und dann schauen obs noch erfolgreiche logins gibt von fremden.
ich persönlich würd auf zonealarm verzichten und die windows firewall nutzen
rootkit unhooker zeigt nur zonealarm driver und windows driver.
__________________
-Verdächtige mails bitte an uns zur Analyse weiterleiten:
markusg.trojaner-board@web.de
Weiterleiten
Anleitung:
http://markusg.trojaner-board.de
Mails bitte vorerst nach obiger Anleitung an
markusg.trojaner-board@web.de
Weiterleiten
Wenn Ihr uns unterstützen möchtet

Antwort

Themen zu Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?
andere, anderen, anderer, angemeldet, anmeldung, antwort, computer, interne, internet, internetstick, kein netzwerk, mail, melde, meldung, netzwerk, niemals, spanisch, stelle, stick, stimmen, suche, täglich, verändert, wirklich, überwachen, zonealarm, zugang




Ähnliche Themen: Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?


  1. Unbekannter Computername in Windows Netzwerk über Wlan
    Netzwerk und Hardware - 20.10.2015 (5)
  2. VIREN BEFALL? anderer PC im Netzwerk war befallen...
    Plagegeister aller Art und deren Bekämpfung - 31.08.2015 (2)
  3. Malware über Wlan Netzwerk
    Diskussionsforum - 20.08.2015 (18)
  4. Master Card Spam geöffnet - meldung: anderer pc hat dieselbe ip adresse!
    Plagegeister aller Art und deren Bekämpfung - 24.07.2014 (9)
  5. Über Lan mit W-Lan im Netzwerk ins Internet Windows XP
    Log-Analyse und Auswertung - 04.12.2013 (7)
  6. Meldung von ZoneAlarm: Trojan-Ransom.Win32.Foreign.fvto erkannt
    Plagegeister aller Art und deren Bekämpfung - 09.09.2013 (19)
  7. Weiterleitung über andere Adresse im Browser, gleiches Problem wie anderer Thread vom 10.3.2013
    Plagegeister aller Art und deren Bekämpfung - 21.04.2013 (9)
  8. Datensicherung bei Virenbefall über LAN-Netzwerk sicher?
    Plagegeister aller Art und deren Bekämpfung - 27.11.2012 (7)
  9. über eine lokales Netzwerk auf den Ordner Programme zugreifen
    Alles rund um Windows - 11.07.2011 (1)
  10. Fehler 815 bei Verbindung über DFÜ mit Netzwerk
    Netzwerk und Hardware - 12.09.2010 (0)
  11. Meldungen von ZoneAlarm über ausgehende Nachichten an Verschiedene Mailadressen.
    Plagegeister aller Art und deren Bekämpfung - 15.03.2008 (13)
  12. windows xp Netzwerk funktioniert nicht über NetBEUI
    Netzwerk und Hardware - 16.07.2007 (10)
  13. Seltsame Meldung von Zonealarm
    Antiviren-, Firewall- und andere Schutzprogramme - 28.05.2007 (4)
  14. Zonealarm läßt über Outlook keine Mails versenden
    Antiviren-, Firewall- und andere Schutzprogramme - 11.07.2003 (2)
  15. Zonealarm läßt über Outlook keine Mails versenden
    Antiviren-, Firewall- und andere Schutzprogramme - 11.07.2003 (1)
  16. ZONEALARM idiotische Meldung
    Antiviren-, Firewall- und andere Schutzprogramme - 30.04.2003 (5)
  17. privates Netzwerk-ZoneAlarm verbietet Client Zugang zum I-net
    Antiviren-, Firewall- und andere Schutzprogramme - 16.04.2003 (7)

Zum Thema Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - hi, du hast aber noch nicht meine sicherheitshinweise durchgearbeitet oder? die sind in post 47 auf der vorherigen seite. - Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?...
Archiv
Du betrachtest: Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.