![]() |
|
Log-Analyse und Auswertung: Windows 7: Interpol-Trojaner ohne SperrschirmWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() | #1 |
| ![]() Windows 7: Interpol-Trojaner ohne Sperrschirm Hallo allerseits, ich hab mir heute leider einen Interpol-Trojaner eingefangen, kann aber ganz normal booten. Ich wäre euch wahnsinnig dankbar, wenn ihr mir helfen könntet! Nachfolgend die gewünschten Logs, allerdings ohne FRST, weil Folgendes erscheint, wenn ich es starten will: "Nicht genug Systemressorucen, um den angeforderten Dienst auszuführen." Was hat das zu bedeuten? defogger: Code:
ATTFilter defogger_disable by jpshortstuff (23.02.10.1) Log created at 14:11 on 18/11/2015 (Neagu) Checking for autostart values... HKCU\~\Run values retrieved. HKLM\~\Run values retrieved. Checking for services/drivers... -=E.O.F=- Code:
ATTFilter GMER 2.1.19357 - hxxp://www.gmer.net Rootkit scan 2015-11-18 14:31:48 Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\00000056 WDC_WD25 rev.15.0 232,89GB Running: Gmer-19357.exe; Driver: C:\Users\Neagu\AppData\Local\Temp\pgdoqpod.sys ---- User code sections - GMER 2.1 ---- .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077361401 2 bytes JMP 76cbb21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077361419 2 bytes JMP 76cbb346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077361431 2 bytes JMP 76d38fd1 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007736144a 2 bytes CALL 76c9489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000773614dd 2 bytes JMP 76d388c4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000773614f5 2 bytes JMP 76d38aa0 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007736150d 2 bytes JMP 76d387ba C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077361525 2 bytes JMP 76d38b8a C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007736153d 2 bytes JMP 76cafca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077361555 2 bytes JMP 76cb68ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007736156d 2 bytes JMP 76d39089 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077361585 2 bytes JMP 76d38bea C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007736159d 2 bytes JMP 76d3877e C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000773615b5 2 bytes JMP 76cafd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000773615cd 2 bytes JMP 76cbb2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000773616b2 2 bytes JMP 76d38f4c C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\PSIA.exe[132] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000773616bd 2 bytes JMP 76d38713 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077361401 2 bytes JMP 76cbb21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077361419 2 bytes JMP 76cbb346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077361431 2 bytes JMP 76d38fd1 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007736144a 2 bytes CALL 76c9489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000773614dd 2 bytes JMP 76d388c4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000773614f5 2 bytes JMP 76d38aa0 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007736150d 2 bytes JMP 76d387ba C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077361525 2 bytes JMP 76d38b8a C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007736153d 2 bytes JMP 76cafca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077361555 2 bytes JMP 76cb68ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007736156d 2 bytes JMP 76d39089 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077361585 2 bytes JMP 76d38bea C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007736159d 2 bytes JMP 76d3877e C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000773615b5 2 bytes JMP 76cafd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000773615cd 2 bytes JMP 76cbb2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000773616b2 2 bytes JMP 76d38f4c C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Ruiware\WinPatrol\WinPatrol.exe[2800] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000773616bd 2 bytes JMP 76d38713 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077361401 2 bytes JMP 76cbb21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077361419 2 bytes JMP 76cbb346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077361431 2 bytes JMP 76d38fd1 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007736144a 2 bytes CALL 76c9489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000773614dd 2 bytes JMP 76d388c4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000773614f5 2 bytes JMP 76d38aa0 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007736150d 2 bytes JMP 76d387ba C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077361525 2 bytes JMP 76d38b8a C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007736153d 2 bytes JMP 76cafca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077361555 2 bytes JMP 76cb68ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007736156d 2 bytes JMP 76d39089 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077361585 2 bytes JMP 76d38bea C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007736159d 2 bytes JMP 76d3877e C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000773615b5 2 bytes JMP 76cafd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000773615cd 2 bytes JMP 76cbb2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000773616b2 2 bytes JMP 76d38f4c C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\psi_tray.exe[2888] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000773616bd 2 bytes JMP 76d38713 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077361401 2 bytes JMP 76cbb21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077361419 2 bytes JMP 76cbb346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077361431 2 bytes JMP 76d38fd1 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007736144a 2 bytes CALL 76c9489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000773614dd 2 bytes JMP 76d388c4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000773614f5 2 bytes JMP 76d38aa0 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007736150d 2 bytes JMP 76d387ba C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077361525 2 bytes JMP 76d38b8a C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007736153d 2 bytes JMP 76cafca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077361555 2 bytes JMP 76cb68ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007736156d 2 bytes JMP 76d39089 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077361585 2 bytes JMP 76d38bea C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007736159d 2 bytes JMP 76d3877e C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000773615b5 2 bytes JMP 76cafd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000773615cd 2 bytes JMP 76cbb2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000773616b2 2 bytes JMP 76d38f4c C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Packard Bell\Hotkey Utility\HotkeyUtility.exe[2984] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000773616bd 2 bytes JMP 76d38713 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077361401 2 bytes JMP 76cbb21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077361419 2 bytes JMP 76cbb346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077361431 2 bytes JMP 76d38fd1 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007736144a 2 bytes CALL 76c9489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000773614dd 2 bytes JMP 76d388c4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000773614f5 2 bytes JMP 76d38aa0 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007736150d 2 bytes JMP 76d387ba C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077361525 2 bytes JMP 76d38b8a C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007736153d 2 bytes JMP 76cafca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077361555 2 bytes JMP 76cb68ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007736156d 2 bytes JMP 76d39089 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077361585 2 bytes JMP 76d38bea C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007736159d 2 bytes JMP 76d3877e C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000773615b5 2 bytes JMP 76cafd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000773615cd 2 bytes JMP 76cbb2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000773616b2 2 bytes JMP 76d38f4c C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Secunia\PSI\sua.exe[3848] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000773616bd 2 bytes JMP 76d38713 C:\Windows\syswow64\kernel32.dll ---- Threads - GMER 2.1 ---- Thread C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3452:3064] 0000000076427587 Thread C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3452:4732] 00000000671b8aa6 Thread C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3452:4992] 000000007796c557 Thread C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3452:2548] 00000000779827c1 Thread C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3452:6016] 00000000779827c1 Thread C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [3452:3480] 00000000779827c1 ---- Registry - GMER 2.1 ---- Reg HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Epoch@Epoch 49563 Reg HKLM\SYSTEM\CurrentControlSet\services\SharedAccess\Epoch2@Epoch 42451 Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters@DhcpNameServer 192.168.2.1 Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters@DhcpDomain Speedport_W_303V_Typ_A Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{80667AD8-0D14-484D-A38D-134BE91BA980}@DhcpIPAddress 192.168.2.101 Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{80667AD8-0D14-484D-A38D-134BE91BA980}@DhcpSubnetMask 255.255.255.0 Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{80667AD8-0D14-484D-A38D-134BE91BA980}@DhcpServer 192.168.2.1 Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{80667AD8-0D14-484D-A38D-134BE91BA980}@DhcpNameServer 192.168.2.1 Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{80667AD8-0D14-484D-A38D-134BE91BA980}@DhcpDomain Speedport_W_303V_Typ_A Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{80667AD8-0D14-484D-A38D-134BE91BA980}@DhcpDefaultGateway 192.168.2.1? Reg HKLM\SYSTEM\CurrentControlSet\services\Tcpip\Parameters\Interfaces\{80667AD8-0D14-484D-A38D-134BE91BA980}@DhcpSubnetMaskOpt 255.255.255.0? ---- EOF - GMER 2.1 ---- Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Suchlaufdatum: 18.11.2015 Suchlaufzeit: 14:37 Protokolldatei: MBAM.txt Administrator: Ja Version: 2.2.0.1024 Malware-Datenbank: v2015.11.18.04 Rootkit-Datenbank: v2015.11.14.01 Lizenz: Kostenlose Version Malware-Schutz: Deaktiviert Schutz vor bösartigen Websites: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 7 Service Pack 1 CPU: x64 Dateisystem: NTFS Benutzer: Neagu Suchlauftyp: Bedrohungssuchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 358632 Abgelaufene Zeit: 29 Min., 25 Sek. Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 0 (keine bösartigen Elemente erkannt) Module: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 0 (keine bösartigen Elemente erkannt) Registrierungswerte: 0 (keine bösartigen Elemente erkannt) Registrierungsdaten: 0 (keine bösartigen Elemente erkannt) Ordner: 0 (keine bösartigen Elemente erkannt) Dateien: 0 (keine bösartigen Elemente erkannt) Physische Sektoren: 0 (keine bösartigen Elemente erkannt) (end) |
Themen zu Windows 7: Interpol-Trojaner ohne Sperrschirm |
appdata, autostart, bytes, c:\windows, code, device, dienst, eingefangen, erkannt, files, gen, harddisk, hilfe!, hotkey, kostenlose, malwarebytes, registry, scan, starten, system, temp, websites, windows, windows 7, winpatrol |