Vor 2 tagen hat sich TR/Dldr.FraudLoa.NC auf meinem Rechner eingeschlichen und alle typischen Symthome mit sich gebracht (blauer Hintergrund mit Fehlerwarnung; Antivir XP 2008 war plötzlich da und hat sich selbstständig gemacht; gesamte Windowsoberfläche wurde abgeändert). Habe dann gleich MBAM durchgeführt, alles gelöscht und folgendes Log-file erhalten:
PHP-Code:
Malwarebytes' Anti-Malware 1.24
Datenbank Version: 1049
Windows 5.1.2600 Service Pack 2
23:13:37 13.08.2008
mbam-log-8-13-2008 (23-13-37).txt
Scan-Methode: Vollständiger Scan (C:\|D:\|)
Durchsuchte Objekte: 110594
Laufzeit: 1 hour(s), 6 minute(s), 7 second(s)
Infizierte Speicherprozesse: 3
Infizierte Speichermodule: 4
Infizierte Registrierungsschlüssel: 11
Infizierte Registrierungswerte: 9
Infizierte Dateiobjekte der Registrierung: 3
Infizierte Verzeichnisse: 15
Infizierte Dateien: 35
Infizierte Speicherprozesse:
C:\Programme\rhc7f8j0eaaa\rhc7f8j0eaaa.exe (Rogue.Multiple) -> Failed to unload process.
C:\WINDOWS\system32\lphc3f8j0eaaa.exe (Trojan.FakeAlert) -> Unloaded process successfully.
C:\WINDOWS\system32\drivers\svchost.exe (Heuristics.Reserved.Word.Exploit) -> Unloaded process successfully.
Infizierte Speichermodule:
C:\Programme\rhc7f8j0eaaa\MFC71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\msvcp71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\msvcr71.dll (Rogue.Multiple) -> Delete on reboot.
C:\WINDOWS\system32\blphc3f8j0eaaa.scr (Trojan.FakeAlert) -> Delete on reboot.
Infizierte Registrierungsschlüssel:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1394fd4b-14dc-1f56-ab3d-1ce34f99a9e9} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1394fd4b-14dc-1f56-ab3d-1ce34f99a9e9} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{28252909-1be7-4236-bd77-b59cff2ae6c4} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{1e5dd896-fd9b-4d31-831a-2427216a0a02} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{39d37d53-eab9-4e04-9ac2-1d72f051590c} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e0e86956-ee02-43ab-b410-fd690c490adb} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{f13554a0-047e-4d0e-836f-1cbf1e265c28} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{39d37d53-eab9-4e04-9ac2-1d72f051590c} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\rhc7f8j0eaaa (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\rhc7f8j0eaaa (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.
Infizierte Registrierungswerte:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.SoftMate) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smrhc7f8j0eaaa (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lphc3f8j0eaaa (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.starsdoor.com (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\Desktop\wallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\Desktop\originalwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\Desktop\convertedwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\Desktop\scrnsave.exe (Hijack.Wallpaper) -> Quarantined and deleted successfully.
Infizierte Dateiobjekte der Registrierung:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System (Rootkit.DNSChanger) -> Data: kduxj.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Infizierte Verzeichnisse:
C:\Programme\Outerinfo (Adware.Outerinfo) -> Quarantined and deleted successfully.
C:\Programme\PeDevice (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\tmp (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa (Rogue.Multiple) -> Delete on reboot.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\HKCU (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\HKCU\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\HKLM (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\HKLM\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\StartMenuAllUsers (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\StartMenuCurrentUser (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\BrowserObjects (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Packages (Rogue.Multiple) -> Quarantined and deleted successfully.
Infizierte Dateien:
C:\WINDOWS\system32\kduxj.exe (Rootkit.DNSChanger) -> Delete on reboot.
C:\WINDOWS\system32\aakvhyv.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\Programme\Outerinfo\outerinfo.ico (Adware.Outerinfo) -> Quarantined and deleted successfully.
C:\Programme\Outerinfo\Terms.rtf (Adware.Outerinfo) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\communication.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\Domain.Watchlist.txt (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\pae-options.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\pae_url.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\PeDev.dll (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\PeDev.exe (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\pedevPS.dll (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\search.watchlist.txt (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\statistic.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\watchlist.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\tmp\tmp.html (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\database.dat (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\license.txt (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\MFC71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\MFC71ENU.DLL (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\msvcp71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\msvcr71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\rhc7f8j0eaaa.exe (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\rhc7f8j0eaaa.exe.local (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\Uninstall.exe (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\blphc3f8j0eaaa.scr (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lphc3f8j0eaaa.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\phc3f8j0eaaa.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pphc3f8j0eaaa.exe (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\ClickToFindandFixErrors_RON.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ClickToFindandFixErrors_RON_Intl.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\Microsoft\Internet Explorer\Quick Launch\Antivirus XP 2008.lnk (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Lokale Einstellungen\Temp\.tt1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Lokale Einstellungen\Temp\.tt4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Lokale Einstellungen\Temp\.ttE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.