|
Log-Analyse und Auswertung: WinSpyWareProtect und Anhängsel - Bitte um HilfeWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
23.06.2008, 21:43 | #1 |
| WinSpyWareProtect und Anhängsel - Bitte um Hilfe Hallo zusammen, sitze gerade am PC meiner Schwester um nen Virenbefall in den Griff zu bekommen. Folgende Probleme bestehen: 1. Es gehen immer wieder Fenster auf die in Windows-Stil gehalten sind und anscheinend das Sicherheitscenter von Vista nachahmen sollen. Windows Security Alert-Windows has detected an Internet attack attempt...Somebody's trying to infect your PC with spyware or harmful viruses. Run full system scan now to protect your PC from Internet attacks, hijacking attempts and spyware! Click here to download spyware remover for total protection. Auch diese Meldung kommt zwischendurch: Security Warning! Worm.Win32.NetBooster detected on your machine. This virus is distributed via the Internet through e-mail and Active-X objects. The womr has its own SMTP engine which means it gathers e-mails form your local computer and re-distributes itself. In worst cases this worm can allow attackers to access your computer, stealing passwords and personal data. This process should be removed from your system. 2. Das normale Securitycenter lässt sich überhaupt nicht mehr öffnen (es bestehen "Probleme" Run32.dll 3. Desweiteren geht beim Öffnen der IE-Startseite (eigentlich default) eine Seite auf die mich zum Kauf einer AV-Software auffordert. 4. Ab und an gingen Taskleiste, Taskmanager, Explorer, etc... gar nicht mehr. Das letzte Problem ist mitterweile behoben, da ich bei jedem Neustart den Prozess von WinSpyWareProtect sofort beende. P.S. Habe bereits Malwarebytes'Anti-Maleware drüberlaufen lassen und schon mal alles Gefundene gelöscht. pps Logfile von HijackThis und Malwarebytes folgen im nächsten Posting Hier das HijackThis Logfile: Code:
ATTFilter Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 21:21:25, on 23.06.2008 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v7.00 (7.00.6001.18000) Boot mode: Normal Running processes: C:\Program Files\ASUS\GamerOSD\ATKFastUserSwitching.exe C:\Windows\system32\taskeng.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Program Files\Windows Defender\MSASCui.exe C:\Windows\RtHDVCpl.exe C:\Program Files\Corel\Corel Snapfire Plus\Corel Photo Downloader.exe C:\Program Files\ASUS\GamerOSD\GamerOSD.exe C:\Windows\System32\rundll32.exe C:\SysDE9D.exe C:\SysDF0A.exe C:\SysDF58.exe C:\Program Files\Windows Sidebar\sidebar.exe C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe C:\Windows\ehome\ehtray.exe C:\Program Files\Windows Media Player\wmpnscfg.exe C:\Program Files\Google\Google Updater\GoogleUpdater.exe C:\Windows\System32\rundll32.exe C:\Windows\ehome\ehmsas.exe C:\Program Files\Common Files\Ahead\Lib\NMIndexStoreSvr.exe C:\Windows\system32\taskmgr.exe C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe C:\Windows\system32\taskeng.exe C:\Program Files\Internet Explorer\ieuser.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Windows\system32\SearchFilterHost.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = h**p://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = h**p://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = h**p://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = h**p://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O1 - Hosts: ::1 localhost O2 - BHO: Download Manager Browser Helper Object - {19C8E43B-07B3-49CB-BFFC-6777B593E6F8} - C:\PROGRA~1\COMMON~1\fluxDVD\DOWNLO~1\XEBDLH~1.DLL O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar1.dll O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\2.1.1119.1736\swg.dll O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar1.dll O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe O4 - HKLM\..\Run: [Skytel] Skytel.exe O4 - HKLM\..\Run: [NeroFilterCheck] C:\Program Files\Common Files\Ahead\Lib\NeroCheck.exe O4 - HKLM\..\Run: [Corel Photo Downloader] C:\Program Files\Corel\Corel Snapfire Plus\Corel Photo Downloader.exe O4 - HKLM\..\Run: [ASUSGamerOSD] C:\Program Files\ASUS\GamerOSD\GamerOSD.exe O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [SysDE3F.exe] C:\SysDE3F.exe O4 - HKLM\..\Run: [SysDE9D.exe] C:\SysDE9D.exe O4 - HKLM\..\Run: [SysDF0A.exe] C:\SysDF0A.exe O4 - HKLM\..\Run: [SysDF58.exe] C:\SysDF58.exe O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe" O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe O4 - HKCU\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe O4 - HKCU\..\Run: [Antivirus] C:\Program Files\VAV\vav.exe O4 - HKCU\..\Run: [e] ˆexe O4 - HKCU\..\Run: [C:\ProgramData\Adsl Software Limited\WinSpywareProtect\WinSpywareProtect.exe] "C:\ProgramData\Adsl Software Limited\WinSpywareProtect\WinSpywareProtect.exe" /autorun O4 - HKCU\..\RunOnce: [FlashPlayerUpdate] C:\Windows\system32\Macromed\Flash\FlashUtil9e.exe O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOKALER DIENST') O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETZWERKDIENST') O4 - Global Startup: Google Updater.lnk = C:\Program Files\Google\Google Updater\GoogleUpdater.exe O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000 O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~1\MSOFFI~1\OFFICE11\EXCEL.EXE/3000 O9 - Extra button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MSOFFI~1\OFFICE11\REFIEBAR.DLL O13 - Gopher Prefix: O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab O23 - Service: Avira AntiVir Personal – Free Antivirus Planer (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe O23 - Service: Avira AntiVir Personal – Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe O23 - Service: Apple Mobile Device - Apple, Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe O23 - Service: ASDR - Unknown owner - C:\Windows\System32\ASDR.exe O23 - Service: ATK Fast User Switch Service (ATKFUSService) - ASUSTeK COMPUTER INC. - C:\Windows\system32\ATKFUSService.exe O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: NMIndexingService - Nero AG - C:\Program Files\Common Files\Ahead\Lib\NMIndexingService.exe O23 - Service: ProtexisLicensing - Unknown owner - C:\Windows\system32\PSIService.exe -- End of file - 6748 bytes Code:
ATTFilter Malwarebytes' Anti-Malware 1.18 Datenbank Version: 883 22:14:08 23.06.2008 mbam-log-6-23-2008 (22-14-08).txt Scan Art: Komplett Scan (C:\|) Objekte gescannt: 131872 Scan Dauer: 33 minute(s), 31 second(s) Infizierte Speicher Prozesse: 3 Infizierte Speicher Module: 0 Infizierte Registrierungsschlüssel: 3 Infizierte Registrierungswerte: 6 Infizierte Datei Objekte der Registrierung: 0 Infizierte Verzeichnisse: 6 Infizierte Dateien: 28 Infizierte Speicher Prozesse: C:\SysDE9D.exe (Trojan.Agent) -> Unloaded process successfully. C:\SysDF0A.exe (Trojan.Downloader) -> Unloaded process successfully. C:\SysDF58.exe (Trojan.Downloader) -> Unloaded process successfully. Infizierte Speicher Module: (Keine Malware Objekte gefunden) Infizierte Registrierungsschlüssel: HKEY_CURRENT_USER\Software\VAV (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Adsl Software Limited (Rogue.MalWarrior) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysDE9D.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\C:\ProgramData\Adsl Software Limited\WinSpywareProtect\WinSpywareProtect.exe (Rogue.Installer) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysDE3F.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysDF0A.exe (Trojan.Downloader) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SysDF58.exe (Trojan.Downloader) -> Quarantined and deleted successfully. Infizierte Datei Objekte der Registrierung: (Keine Malware Objekte gefunden) Infizierte Verzeichnisse: C:\ProgramData\Adsl Software Limited (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\BASE (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\DELETED (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\SAVED (Rogue.MalWarrior) -> Quarantined and deleted successfully. Infizierte Dateien: C:\SysDE9D.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\WinSpywareProtect.exe (Rogue.Installer) -> Quarantined and deleted successfully. C:\SysDE3F.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\Users\XXX\AppData\Local\VirtualStore\Windows\System32\ˆexe (Trojan.Agent) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080617123801677.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080617124851178.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080617125322218.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080617162010921.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080617164212176.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080617183020334.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080617214709060.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080617221619132.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080618194507985.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080618200513127.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080618225719774.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080618225859034.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080619142246728.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080619143519496.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\ProgramData\Adsl Software Limited\WinSpywareProtect\LOG\20080623203617309.log (Rogue.MalWarrior) -> Quarantined and deleted successfully. C:\Windows\System32\sex1.ico (Malware.Trace) -> Quarantined and deleted successfully. C:\Windows\System32\sex2.ico (Malware.Trace) -> Quarantined and deleted successfully. C:\Windows\System32\vav.cpl (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully. C:\SysDF0A.exe (Trojan.Downloader) -> Quarantined and deleted successfully. C:\SysDF58.exe (Trojan.Downloader) -> Quarantined and deleted successfully. C:\Users\XXX\Desktop\XXX.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Users\XXX\Desktop\Vista Antivirus 2008.lnk (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully. C:\Users\Gast\Desktop\Vista Antivirus 2008.lnk (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully. C:\Users\XXX\Desktop\UXXX.url (Malware.Trace) -> Quarantined and deleted successfully. |
24.06.2008, 11:01 | #2 |
/// AVZ-Toolkit Guru | WinSpyWareProtect und Anhängsel - Bitte um Hilfe Hallöle Nobrainer.
__________________First of all: SmitFraudFix laufen lassen und log posten.
__________________ |
Themen zu WinSpyWareProtect und Anhängsel - Bitte um Hilfe |
adware.zango, antivir, antivirus, av-software, avira, bho, browser, computer, desktop, e-mail, e-mails, excel, google, gservice, helper, hijackthis, hijackthis logfile, immer wieder, internet, internet explorer, logfile, malware.trace, nicht mehr öffnen, programdata, prozess, prozesse, quara, registrierungsschlüssel, rogue.link, rundll, scan, security, spyware, system, taskmanager, trojan.downloader, vista, windows defender, windows sidebar |