|
Plagegeister aller Art und deren Bekämpfung: Vundo Trojaner und CoWindows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
18.09.2008, 20:40 | #1 |
| Vundo Trojaner und Co schönen guten Abend Vor ein paar Tagen wurde mein PC infiziert. Kaspersky hat die Malwares als den Trojanar Vundo identifiziert, schafft es aber nicht diese zu löschen, da der Schädling sich ins Windows/system 32 eingenistet hat. Das Ende vom Lied war natürlich kein Hintergrundbild mehr ( bzw. wurde ersetzt), Abschalten des Taskmanagers, Unterjubeln von zweifelhaften Verknüpfungen, mein Internetbrowser bekomt seinen eigenen Willen, Selbstaktivierung des MS Antivir in der Taskleiste , fordert registrierung und lässt sich nicht abschalten, Rechnerüberlastung usw.., das ganze Leid eben. Nun bin ich folgendermaßen vorgegangen und habe zuerst Malwarebytes auf den Angreifer losgelassen: Malwarebytes log Code:
ATTFilter Malwarebytes' Anti-Malware 1.28 Datenbank Version: 1165 Windows 5.1.2600 Service Pack 2 18.09.2008 18:45:40 mbam-log-2008-09-18 (18-45-40).txt Scan-Methode: Vollständiger Scan (C:\|) Durchsuchte Objekte: 97587 Laufzeit: 15 minute(s), 59 second(s) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 3 Infizierte Registrierungsschlüssel: 40 Infizierte Registrierungswerte: 33 Infizierte Dateiobjekte der Registrierung: 14 Infizierte Verzeichnisse: 9 Infizierte Dateien: 60 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: C:\WINDOWS\system32\hgGxWmnK.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\hgGyxVMC.dll (Trojan.Vundo) -> Delete on reboot. C:\WINDOWS\system32\iddber.dll (Trojan.Vundo) -> Delete on reboot. Infizierte Registrierungsschlüssel: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{23145895-4404-4858-a827-43dedd4f0cec} (Trojan.Vundo.H) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{23145895-4404-4858-a827-43dedd4f0cec} (Trojan.Vundo.H) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{74633f37-cf9d-4efd-b548-d847566866fc} (Trojan.Vundo.H) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\hggyxvmc (Trojan.Vundo.H) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{74633f37-cf9d-4efd-b548-d847566866fc} (Trojan.Vundo.H) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{833a7bc6-1083-4a1d-9299-1d0045a2e4ee} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{833a7bc6-1083-4a1d-9299-1d0045a2e4ee} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\toolband.xttbpos00 (Adware.BHO) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\toolband.xttbpos00.1 (Adware.BHO) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{8ad9ad05-36be-4e40-ba62-5422eb0d02fb} (Adware.Shopping.Report) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{aebf09e2-0c15-43c8-99bf-928c645d98a0} (Adware.Shopping.Report) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{d8560ac2-21b5-4c1a-bdd4-bd12bc83b082} (Adware.Shopping.Report) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Typelib\{cdca70d8-c6a6-49ee-9bed-7429d6c477a2} (Adware.Shopping.Report) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Typelib\{d136987f-e1c4-4ccc-a220-893df03ec5df} (Adware.Shopping.Report) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{a7cddcdc-beeb-4685-a062-978f5e07ceee} (Adware.Shopping.Report) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c5428486-50a0-4a02-9d20-520b59a9f9b2} (Adware.Shopping.Report) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{c5428486-50a0-4a02-9d20-520b59a9f9b3} (Adware.Shopping.Report) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\webvideo (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\tdssdata (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\tdss (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Outerinfo (Adware.ClickSpring) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{f355eb66-aa5c-45eb-8d3e-985f816d9a4a} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{a21ea590-9f50-4200-99e9-f10973716ac0} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{c5822ede-acad-4fc2-ba40-079c03bb77e8} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{a144b380-ebbb-42ba-b34a-45722e31948e} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{02d99f20-ded5-4b1e-8824-453988cd87a2} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{920918d3-e78a-466c-91f3-0ca5b1340823} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{1530ca4c-149b-4801-8dd4-5cd093b45d63} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1530ca4c-149b-4801-8dd4-5cd093b45d63} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\fqbewlna.bxml (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\fqbewlna.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\MicroAV (Rogue.MicroAntivirus) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{74633f37-cf9d-4efd-b548-d847566866fc} (Trojan.Vundo) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yure.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yurf.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur10.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur14.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur16.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur1a.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur3.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur40.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur29.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur107a.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur107d.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur107e.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur107f.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur1346.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur2.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yure.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yurf.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur10.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur14.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur16.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur1a.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur3.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur40.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur29.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur107a.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur107d.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur107e.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur107f.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur1346.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\yur2.exe (Trojan.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\Components\0\source (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{c5822ede-acad-4fc2-ba40-079c03bb77e8} (Trojan.FakeAlert) -> Quarantined and deleted successfully. Infizierte Dateiobjekte der Registrierung: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\hggxwmnk -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo) -> Data: c:\windows\system32\hggxwmnk -> Delete on reboot. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page (Hijack.Homepage) -> Bad: (http://softwarereferral.com/jump.php?wmid=6010&mid=MjI6Ojg5&lid=2) Good: (http://www.google.com/) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (55274-640-0000356-23137) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (HH:mm:ss) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoStartMenuMorePrograms (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoToolbarCustomize (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. Infizierte Verzeichnisse: C:\Programme\Outerinfo (Adware.Outerinfo) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\MicroAV (Rogue.MicroAntivirus) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\db (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\dwld (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\report (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\res2 (Adware.Shopping.Report) -> Quarantined and deleted successfully. Infizierte Dateien: C:\WINDOWS\system32\hgGxWmnK.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\KnmWxGgh.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\KnmWxGgh.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\hgGyxVMC.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\iddber.dll (Trojan.Vundo.H) -> Delete on reboot. C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temporary Internet Files\Content.IE5\2DRVTSL8\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temporary Internet Files\Content.IE5\H9P1OLVK\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temporary Internet Files\Content.IE5\RPWZUYXU\nd82m0[1] (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\5.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Programme\MicroAV\MicroAV.cpl (Rogue.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\mqgldfvo.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\system32\costwure.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\edjtyjiq.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\jbqoyisq.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\jpnlcjjt.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\jyfonhrw.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\mvtfdg.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\snkryi.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\crbllghe.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\bwkacj.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\lvemaj.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\sgvpiopi.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\ydvezd.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\YUR1210.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\system32\rlbrpw.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Programme\Outerinfo\outerinfo.ico (Adware.Outerinfo) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\0.gif (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\1.gif (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\1.ico (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\2.gif (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\2.ico (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\3.gif (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\sc.html (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\MicroAV\MicroAV.exe (Rogue.MicroAntivirus) -> Quarantined and deleted successfully. C:\Programme\MicroAV\MicroAV.ooo (Rogue.MicroAntivirus) -> Quarantined and deleted successfully. C:\Programme\MicroAV\MicroAV0.dat (Rogue.MicroAntivirus) -> Quarantined and deleted successfully. C:\Programme\MicroAV\MicroAV1.dat (Rogue.MicroAntivirus) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\Config.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\db\Aliases.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\db\Sites.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\dwld\WhiteList.xip (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\report\aggr_storage.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\report\send_storage.xml (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Anwendungsdaten\ShoppingReport\cs\res2\WhiteList.dbs (Adware.Shopping.Report) -> Quarantined and deleted successfully. C:\WINDOWS\system32\mcrh.tmp (Malware.Trace) -> Quarantined and deleted successfully. C:\WINDOWS\system32\1.ico (Malware.Trace) -> Quarantined and deleted successfully. C:\WINDOWS\system32\2.ico (Malware.Trace) -> Quarantined and deleted successfully. C:\WINDOWS\system32\tdssl.dll (Trojan.Agent) -> Delete on reboot. C:\WINDOWS\system32\tdssservers.dat (Trojan.Agent) -> Delete on reboot. C:\WINDOWS\system32\drivers\tdssserv.sys (Trojan.Agent) -> Delete on reboot. C:\WINDOWS\dtseqrxk.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\fqbewlna.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\mgxfebsq.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\vmgspntbgbw.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temp\smchk.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temp\lwpwer.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temp\sfsrv.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Favoriten\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Favoriten\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\****\Favoriten\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully. log2 Code:
ATTFilter Malwarebytes' Anti-Malware 1.28 Datenbank Version: 1165 Windows 5.1.2600 Service Pack 2 18.09.2008 19:19:03 mbam-log-2008-09-18 (19-19-03).txt Scan-Methode: Vollständiger Scan (C:\|) Durchsuchte Objekte: 97913 Laufzeit: 21 minute(s), 56 second(s) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 0 Infizierte Registrierungswerte: 0 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 0 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: (Keine bösartigen Objekte gefunden) |
18.09.2008, 20:41 | #2 |
| Vundo Trojaner und Co Wie es sich hier im Forum gehört, danach gleich ein HijackThis logfile hinterher:
__________________Hijackthis Logfile: Code:
ATTFilter Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 19:22:06, on 18.09.2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\spoolsv.exe C:\WINDOWS\system32\ctfmon.exe C:\Programme\VIAudioi\SBADeck\ADeck.exe C:\Programme\PowerISO\PWRISOVM.EXE C:\Programme\Lexmark 4300 Series\lxcemon.exe C:\Programme\Lexmark 4300 Series\ezprint.exe C:\WINDOWS\system32\oodtray.exe C:\Programme\avmwlanstick\FRITZWLANMini.exe C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe C:\Programme\DAEMON Tools\daemon.exe C:\programme\freenetiphone\iPhoneStarter.exe C:\Programme\Veoh Networks\Veoh\VeohClient.exe C:\Programme\ICQ6\ICQ.exe C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe C:\WINDOWS\System32\cisvc.exe C:\Programme\ICQ6Toolbar\ICQ Service.exe C:\Programme\FRITZ!DSL\IGDCTRL.EXE C:\Programme\Gemeinsame Dateien\Microsoft Shared\VS7DEBUG\MDM.EXE C:\WINDOWS\System32\nvsvc32.exe C:\WINDOWS\system32\oodag.exe C:\WINDOWS\System32\lxcecoms.exe C:\WINDOWS\System32\svchost.exe C:\PROGRA~1\FRNDSL\FRNDSL.exe C:\Programme\FRITZ!DSL\StCenter.exe C:\Programme\Logitech\SetPoint\SetPoint.exe C:\Programme\VIA\RAID\raid_tool.exe C:\Programme\Gemeinsame Dateien\Logitech\KhalShared\KHALMNPR.EXE C:\WINDOWS\system32\cidaemon.exe C:\WINDOWS\explorer.exe J:\downloads\HiJackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://de.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://de.search.yahoo.com R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://de.yahoo.com R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://de.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://de.search.yahoo.com R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://de.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://de.search.yahoo.com R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://de.yahoo.com R1 - HKCU\Software\Microsoft\Internet Explorer\SearchURL,(Default) = http://de.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://de.search.yahoo.com R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = fritz.box;192.168.178.1 R3 - URLSearchHook: ICQToolBar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - C:\Programme\ICQ6Toolbar\ICQToolBar.dll R3 - URLSearchHook: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Programme\Yahoo!\Companion\Installs\cpn\yt.dll R3 - URLSearchHook: (no name) - - (no file) O1 - Hosts: 78.46.51.79 L2authd.lineage2.com O1 - Hosts: 78.46.51.79 L2testauthd.lineage2.com O1 - Hosts: 216.107.250.194 nprotect.lineage2.com O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Programme\Yahoo!\Companion\Installs\cpn\yt.dll O3 - Toolbar: ICQToolBar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - C:\Programme\ICQ6Toolbar\ICQToolBar.dll O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Programme\Yahoo!\Companion\Installs\cpn\yt.dll O3 - Toolbar: (no name) - {3C6301ED-0F78-4AF2-8150-D9C052361A8E} - (no file) O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Programme\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll O4 - HKLM\..\Run: [AudioDeck] C:\Programme\VIAudioi\SBADeck\ADeck.exe 1 O4 - HKLM\..\Run: [PWRISOVM.EXE] C:\Programme\PowerISO\PWRISOVM.EXE O4 - HKLM\..\Run: [PHIME2002ASync] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /SYNC O4 - HKLM\..\Run: [PHIME2002A] C:\WINDOWS\system32\IME\TINTLGNT\TINTSETP.EXE /IMEName O4 - HKLM\..\Run: [NeroFilterCheck] C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroCheck.exe O4 - HKLM\..\Run: [MSPY2002] C:\WINDOWS\system32\IME\PINTLGNT\ImScInst.exe /SYNC O4 - HKLM\..\Run: [lxcemon.exe] "C:\Programme\Lexmark 4300 Series\lxcemon.exe" O4 - HKLM\..\Run: [Logitech Hardware Abstraction Layer] KHALMNPR.EXE O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k O4 - HKLM\..\Run: [EzPrint] "C:\Programme\Lexmark 4300 Series\ezprint.exe" O4 - HKLM\..\Run: [OODefragTray] C:\WINDOWS\system32\oodtray.exe O4 - HKLM\..\Run: [IMJPMIG8.1] "C:\WINDOWS\IME\imjp8_1\IMJPMIG.EXE" /Spoil /RemAdvDef /Migration32 O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [AVMWlanClient] C:\Programme\avmwlanstick\FRITZWLANMini.exe O4 - HKLM\..\Run: [AVP] "C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe" O4 - HKCU\..\Run: [DAEMON Tools] "C:\Programme\DAEMON Tools\daemon.exe" -lang 1033 O4 - HKCU\..\Run: [freenetiPhone] c:\programme\freenetiphone\iPhoneStarter.exe -minimized O4 - HKCU\..\Run: [Yahoo! Pager] "C:\Programme\Yahoo!\Messenger\YahooMessenger.exe" -quiet O4 - HKCU\..\Run: [Veoh] "C:\Programme\Veoh Networks\Veoh\VeohClient.exe" /VeohHide O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [ICQ] "C:\Programme\ICQ6\ICQ.exe" silent O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\CTFMON.EXE (User 'NETZWERKDIENST') O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\System32\ctfmon.exe (User 'Default user') O4 - Global Startup: FRITZ!DSL Startcenter.lnk = ? O4 - Global Startup: Logitech SetPoint.lnk = C:\Programme\Logitech\SetPoint\SetPoint.exe O4 - Global Startup: VIA RAID TOOL.lnk = C:\Programme\VIA\RAID\raid_tool.exe O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present O8 - Extra context menu item: &ICQ Toolbar Search - res://C:\Programme\ICQToolbar\toolbaru.dll/SEARCH.HTML O8 - Extra context menu item: &Translate with ATLAS - C:\Programme\ATLAS V13\Atlscript.html O8 - Extra context menu item: ATLAS Translation &Editor - C:\Programme\ATLAS V13\AtlscriptEdit.html O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000 O9 - Extra button: Web traffic protection statistics - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\SCIEPlgn.dll O9 - Extra button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL O9 - Extra button: ATLAS Translation - {B7707A72-4355-11D4-82BD-00000EBBEF8D} - C:\Programme\ATLAS V13\Atlscript.html O9 - Extra button: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Programme\ICQLite\ICQLite.exe (file missing) O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Programme\ICQLite\ICQLite.exe (file missing) O9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6\ICQ.exe O9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6\ICQ.exe O9 - Extra button: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Programme\Yahoo!\Messenger\YahooMessenger.exe O9 - Extra 'Tools' menuitem: Yahoo! Messenger - {E5D12C4E-7B4F-11D3-B5C9-0050045C3C96} - C:\Programme\Yahoo!\Messenger\YahooMessenger.exe O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Programme\Yahoo!\Common\yinsthelper.dll O16 - DPF: {6414512B-B978-451D-A0D8-FCFDF33E833C} (WUWebControl Class) - http://update.microsoft.com/windowsupdate/v6/V5Controls/en/x86/client/wuweb_site.cab?1164905947482 O20 - AppInit_DLLs: C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd.dll,C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd3.dll iddber.dll O23 - Service: Kaspersky Anti-Virus (AVP) - Kaspersky Lab - C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe O23 - Service: ICQ Service - Unknown owner - C:\Programme\ICQ6Toolbar\ICQ Service.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: AVM IGD CTRL Service (IGDCTRL) - AVM Berlin - C:\Programme\FRITZ!DSL\IGDCTRL.EXE O23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Programme\iPod\bin\iPodService.exe O23 - Service: lxce_device - Lexmark International, Inc. - C:\WINDOWS\System32\lxcecoms.exe O23 - Service: NBService - Nero AG - C:\Programme\Nero\Nero 7\Nero BackItUp\NBService.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\System32\nvsvc32.exe O23 - Service: O&O Defrag - O&O Software GmbH - C:\WINDOWS\system32\oodag.exe O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Programme\WinPcap\rpcapd.exe O23 - Service: TuneUp Drive Defrag-Dienst (TuneUp.Defrag) - TuneUp Software GmbH - C:\WINDOWS\System32\TuneUpDefragService.exe O24 - Desktop Component 0: Privacy Protection - (no file) -- End of file - 9103 bytes |
18.09.2008, 20:42 | #3 |
| Vundo Trojaner und Co Um sicher zu gehen gleich noch ein RunScanner logfile :
__________________Code:
ATTFilter Runscanner logfile http://www.runscanner.net * = signed file - = file not found General info ------------ Computer name : ***** Creation time : 18.09.2008 19:27:15 Hosts <> 127.0.0.1 : 3 Hosts file location : %SystemRoot%\System32\drivers\etc IE version : 6.0.2900.2180 OS : Microsoft Windows XP OS Build : 2600 OS SP : Service Pack 2 RunScanner Version : 1.7.0.0 User Language : Deutsch (Deutschland) User rights : Administrator Windows folder : C:\WINDOWS Running processes ----------------- * C:\WINDOWS\system32\services.exe (Microsoft Corporation) * C:\WINDOWS\System32\alg.exe (Microsoft Corporation) * C:\Programme\FRITZ!DSL\IGDCTRL.EXE (AVM Berlin) * C:\WINDOWS\system32\csrss.exe (Microsoft Corporation) * C:\WINDOWS\System32\cisvc.exe (Microsoft Corporation) * C:\WINDOWS\system32\ctfmon.exe (Microsoft Corporation) * C:\WINDOWS\system32\NOTEPAD.EXE (Microsoft Corporation) * C:\Programme\Mozilla Firefox\firefox.exe (Mozilla Corporation) * C:\Programme\FRITZ!DSL\StCenter.exe (AVM Berlin) C:\Programme\avmwlanstick\FRITZWLANMini.exe (AVM Berlin) * C:\WINDOWS\System32\svchost.exe (Microsoft Corporation) * C:\WINDOWS\System32\svchost.exe (Microsoft Corporation) * C:\WINDOWS\System32\svchost.exe (Microsoft Corporation) * C:\WINDOWS\system32\svchost.exe (Microsoft Corporation) * C:\WINDOWS\system32\svchost.exe (Microsoft Corporation) * C:\Programme\ICQ6\ICQ.exe (ICQ, Inc.) * C:\Programme\ICQ6Toolbar\ICQ Service.exe * C:\WINDOWS\system32\cidaemon.exe (Microsoft Corporation) * C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe (Kaspersky Lab) * C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe (Kaspersky Lab) C:\WINDOWS\System32\lxcecoms.exe (Lexmark International, Inc.) C:\Programme\Lexmark 4300 Series\lxcemon.exe (Lexmark International, Inc.) C:\Programme\Lexmark 4300 Series\ezprint.exe (Lexmark International Inc.) * C:\Programme\Gemeinsame Dateien\Logitech\KhalShared\KHALMNPR.EXE (Logitech Inc.) C:\Programme\Logitech\SetPoint\SetPoint.exe (Logitech Inc.) * C:\WINDOWS\system32\lsass.exe (Microsoft Corporation) * C:\Programme\Gemeinsame Dateien\Microsoft Shared\VS7DEBUG\MDM.EXE (Microsoft Corporation) * C:\WINDOWS\System32\nvsvc32.exe (NVIDIA Corporation) * C:\WINDOWS\system32\oodag.exe (O&O Software GmbH) * C:\WINDOWS\system32\oodtray.exe (O&O Software GmbH) C:\Programme\PowerISO\PWRISOVM.EXE (PowerISO Computing, Inc.) * J:\downloads\runscanner\RunScanner.exe (Runscanner.net) * C:\WINDOWS\system32\spoolsv.exe (Microsoft Corporation) C:\Programme\Veoh Networks\Veoh\VeohClient.exe (Veoh Networks) C:\Programme\VIAudioi\SBADeck\ADeck.exe (VIA Technologies, Inc.) C:\Programme\VIA\RAID\raid_tool.exe (VIA Technologies) * C:\Programme\DAEMON Tools\daemon.exe (DT Soft Ltd.) * C:\WINDOWS\explorer.exe (Microsoft Corporation) * C:\WINDOWS\system32\winlogon.exe (Microsoft Corporation) * c:\windows\System32\smss.exe (Microsoft Corporation) C:\PROGRA~1\FRNDSL\FRNDSL.exe (WisDev GmbH) Unrated items ------------- 002 C:\Programme\VIAudioi\SBADeck\ADeck.exe (VIA Technologies, Inc.) 002 C:\Programme\avmwlanstick\FRITZWLANMini.exe (AVM Berlin) 002 * C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe (Kaspersky Lab) 002 C:\Programme\Lexmark 4300 Series\ezprint.exe (Lexmark International Inc.) 002 * C:\WINDOWS\KHALMNPR.EXE (Logitech Inc.) 002 C:\Programme\Lexmark 4300 Series\lxcemon.exe (Lexmark International, Inc.) 002 C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroCheck.exe (Nero AG) 002 * C:\WINDOWS\system32\oodtray.exe (O&O Software GmbH) 002 C:\Programme\PowerISO\PWRISOVM.EXE (PowerISO Computing, Inc.) 003 * C:\Programme\DAEMON Tools\daemon.exe (DT Soft Ltd.) 003 c:\programme\freenetiphone\iPhoneStarter.exe 003 C:\Programme\Veoh Networks\Veoh\VeohClient.exe (Veoh Networks) 005 C:\WINDOWS\Installer\{2457326B-C110-40C3-89B0-889CC913871A}\Icon2457326B4.exe 005 C:\Programme\Logitech\SetPoint\SetPoint.exe (Logitech Inc.) 005 C:\Programme\VIA\RAID\raid_tool.exe (VIA Technologies) 010 * C:\Programme\FRITZ!DSL\IGDCTRL.EXE (AVM IGD CTRL Service) 010 C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe (InstallDriver Table Manager) 010 * C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\avp.exe (Kaspersky Anti-Virus) 010 C:\WINDOWS\System32\lxcecoms.exe (lxce_device) 010 C:\Programme\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlservr.exe (MSSQL$SONY_MEDIAMGR) 010 C:\Programme\Microsoft SQL Server\80\Tools\Binn\sqladhlp.exe (MSSQLServerADHelper) 010 C:\Programme\Nero\Nero 7\Nero BackItUp\NBService.exe (NBService) 010 * C:\WINDOWS\system32\oodag.exe (O&O Defrag) 010 C:\Programme\WinPcap\rpcapd.exe (Remote Packet Capture Protocol v.0 (experimental)) 010 C:\Programme\Sony\Shared Plug-Ins\Media Manager\MSSQL$SONY_MEDIAMGR\Binn\sqlagent.EXE (SQLAgent$SONY_MEDIAMGR) 010 * C:\WINDOWS\System32\TuneUpDefragService.exe (TuneUp Drive Defrag-Dienst) 011 C:\WINDOWS\system32\drivers\avmeject.sys (AVM Eject) 011 * C:\WINDOWS\System32\DRIVERS\hamachi.sys (Hamachi Network Interface) 011 C:\Programme\UltraISO\drivers\ISODrive.sys (ISO CD-ROM Device Driver) 011 * C:\WINDOWS\system32\DRIVERS\klim5.sys (Kaspersky Anti-Virus NDIS Filter) 011 * C:\WINDOWS\system32\drivers\klbg.sys (Kaspersky Lab Boot Guard Driver) 011 * C:\WINDOWS\system32\DRIVERS\klif.sys (Kaspersky Lab Driver) 011 * C:\WINDOWS\system32\drivers\kl1.sys (Kl1) 011 * C:\WINDOWS\system32\DRIVERS\L8042Kbd.sys (Logitech SetPoint Keyboard Driver) 011 C:\WINDOWS\system32\drivers\npf.sys (NetGroup Packet Filter Driver) 011 C:\Programme\Lineage II\system\npkcrypt.sys (npkcrypt) 011 C:\WINDOWS\system32\npptNT2.sys (NPPTNT2) 011 C:\WINDOWS\system32\drivers\SCDEmu.sys (SCDEmu) 011 * C:\WINDOWS\system32\DRIVERS\LMouKE.Sys (SetPoint Mouse Filter Driver) 011 * C:\WINDOWS\system32\DRIVERS\L8042mou.Sys (SetPoint PS/2 Mouse Filter Driver) 011 C:\WINDOWS\System32\Drivers\sptd.sys (sptd) 011 C:\WINDOWS\System32\STEC3.sys (STEC3) 011 c:\windows\System32\Drivers\vulfnth.sys (VIA USB Host Controller Lower Filter) 011 c:\windows\System32\Drivers\vulfntr.sys (VIA USB Roothub Lower Filter) 011 C:\WINDOWS\System32\Drivers\pcouffin.sys (VSO Software pcouffin) 031 C:\Programme\Gemeinsame Dateien\Microsoft Shared\Information Retrieval\MSITSS.DLL (Microsoft Corporation) {0A9007C0-4076-11D3-8789-0000F8105754} 041 C:\Programme\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll (Veoh Networks Inc) {D0943516-5076-4020-A3B5-AEFAF26AB263} 061 C:\Programme\7-Zip\7-zip.dll (Igor Pavlov) {23170F69-40C1-278A-1000-000100020000} 061 C:\WINDOWS\System32\nvshell.dll (NVIDIA Corporation) {1CDB2949-8F65-4355-8456-263E7C208A5D} 061 C:\WINDOWS\System32\nvshell.dll (NVIDIA Corporation) {1E9B04FB-F9E5-4718-997B-B8DA88302A47} 061 C:\Programme\Haali\MatroskaSplitter\mmfinfo.dll {0561EC90-CE54-4f0c-9C55-E226110A740C} 061 C:\Programme\Haali\MatroskaSplitter\mmfinfo.dll {5574006C-28F5-4a65-A28C-74DE6BFBE0BB} 061 C:\Programme\Haali\MatroskaSplitter\mmfinfo.dll {327669A0-59A7-4be9-B99E-1C9F3A57611A} 061 C:\Programme\Logitech\SetPoint\mcplext.dll (Logitech Inc.) {B9B9F083-2B04-452A-8691-83694AC1037B} 061 C:\Programme\Logitech\SetPoint\kbcplext.dll (Logitech Inc.) {DC70C4A5-2044-4c59-B806-DEFB9AE0DF7C} 061 C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroDigitalExt.dll (Nero AG) {B327765E-D724-4347-8B16-78AE18552FC3} 061 C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroDigitalExt.dll (Nero AG) {7F1CF152-04F8-453A-B34C-E609530A9DC8} 061 C:\WINDOWS\System32\nvshell.dll (NVIDIA Corporation) {1E9B04FB-F9E5-4718-997B-B8DA88302A48} 061 C:\Programme\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 061 C:\Programme\Real\RealPlayer\rpshell.dll (RealNetworks, Inc.) {F0CB00CD-5A07-4D91-97F5-A8C92CDA93E4} 061 * C:\Programme\TuneUp Utilities 2008\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403} 061 * C:\WINDOWS\System32\uxtuneup.dll (TuneUp Software GmbH) {44440D00-FF19-4AFC-B765-9A0970567D97} 061 C:\Programme\UltraISO\isoshell.dll (EZB Systems, Inc.) {AD392E40-428C-459F-961E-9B147782D099} 061 * C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\SCIEPlgn.dll (Kaspersky Lab) {85E0B171-04FA-11D1-B7DA-00A0C90348D6} 061 C:\Programme\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 062 C:\Programme\Haali\MatroskaSplitter\mmfinfo.dll {0561EC90-CE54-4f0c-9C55-E226110A740C} 062 C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroDigitalExt.dll (Nero AG) {7D4D6379-F301-4311-BEBA-E26EB0561882} 062 C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\PDFShell.dll (Adobe Systems, Inc.) {F9DB5320-233E-11D1-9F84-707F02C10627} 063 * C:\WINDOWS\system32\OODBS.exe (O&O Software GmbH) 067 * C:\WINDOWS\system32\klogon.dll (Kaspersky Lab) 069 C:\WINDOWS\system32\lxcelmpm.DLL (Lexmark International, Inc.) 069 C:\WINDOWS\system32\avmprmon.dll (AVM Berlin GmbH) 069 C:\WINDOWS\system32\mdimon.dll (Microsoft Corporation) 073 1-Klick-Wartung.job : C:\Programme\TuneUp Utilities 2008\OneClickStarter.exe (TuneUp Software GmbH) 100 Default_Page_URL HKLM : http://de.yahoo.com 100 Default_Search_URL HKLM : http://de.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://de.search.yahoo.com 100 Search Page HKCU : http://de.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://de.search.yahoo.com 100 Search Page HKLM : http://de.rd.yahoo.com/customize/ie/defaults/sp/msgr8/*http://de.search.yahoo.com 100 SearchUrl HKCU : http://de.rd.yahoo.com/customize/ie/defaults/su/msgr8/*http://de.search.yahoo.com 100 Start Page HKLM : http://de.yahoo.com 102 GUID / CLSID not found {32683183-48a0-441b-a342-7c2a440a9478} 105 &ICQ Toolbar Search : res://C:\Programme\ICQToolbar\toolbaru.dll/SEARCH.HTML 105 &Translate with ATLAS : C:\Programme\ATLAS V13\Atlscript.html 105 ATLAS Translation &Editor : C:\Programme\ATLAS V13\AtlscriptEdit.html 105 E&xport to Microsoft Excel : res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000 120 NameServer {CAF4F85D-7AA4-45BB-A744-0F0340E9E810} : 194.97.173.124 194.97.173.125 121 * C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd.dll (Kaspersky Lab) 121 * C:\PROGRA~1\KASPER~1\KASPER~1\mzvkbd3.dll (Kaspersky Lab) 170 {2037cc12-8269-11dd-9528-001109faa8ff} : K:\pushinst.exe 173 GUID / CLSID not found {73B24247-042E-4EF5-ADC2-42F62E6FD654} 173 GUID / CLSID not found {b5eedee0-c06e-11cf-8c56-444553540000} 173 C:\Programme\7-Zip\7-zip.dll (Igor Pavlov) {23170F69-40C1-278A-1000-000100020000} 173 * C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\ShellEx.dll (Kaspersky Lab) {dd230880-495a-11d1-b064-008048ec2fc5} 173 C:\Programme\Nero\Nero 7\Nero BackItUp\NBShell.dll (Nero AG) 173 C:\Programme\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 173 * C:\Programme\TuneUp Utilities 2008\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403} 173 C:\Programme\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 220 GUID / CLSID not found {b5eedee0-c06e-11cf-8c56-444553540000} 221 GUID / CLSID not found {73B24247-042E-4EF5-ADC2-42F62E6FD654} 221 C:\Programme\7-Zip\7-zip.dll (Igor Pavlov) {23170F69-40C1-278A-1000-000100020000} 221 * C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\ShellEx.dll (Kaspersky Lab) {dd230880-495a-11d1-b064-008048ec2fc5} 221 C:\Programme\Nero\Nero 7\Nero BackItUp\NBShell.dll (Nero AG) 221 C:\Programme\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 221 * C:\Programme\TuneUp Utilities 2008\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403} 221 C:\Programme\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 225 * C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\ShellEx.dll (Kaspersky Lab) {dd230880-495a-11d1-b064-008048ec2fc5} 225 * C:\Programme\Kaspersky Lab\Kaspersky Anti-Virus 2009\ShellEx.dll (Kaspersky Lab) {dd230880-495a-11d1-b064-008048ec2fc5} 225 C:\Programme\Nero\Nero 7\Nero BackItUp\NBShell.dll (Nero AG) 225 C:\Programme\Nero\Nero 7\Nero BackItUp\NBShell.dll (Nero AG) 225 C:\Programme\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 225 C:\Programme\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 225 C:\Programme\UltraISO\isoshell.dll (EZB Systems, Inc.) {AD392E40-428C-459F-961E-9B147782D099} 225 C:\Programme\UltraISO\isoshell.dll (EZB Systems, Inc.) {AD392E40-428C-459F-961E-9B147782D099} 225 C:\Programme\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 225 C:\Programme\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 227 GUID / CLSID not found {73B24247-042E-4EF5-ADC2-42F62E6FD654} 227 GUID / CLSID not found {D39D9960-20CA-40CE-A802-8C64817BE518} 227 C:\Programme\7-Zip\7-zip.dll (Igor Pavlov) {23170F69-40C1-278A-1000-000100020000} 227 C:\Programme\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 227 * C:\Programme\TuneUp Utilities 2008\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403} 227 C:\Programme\UltraISO\isoshell.dll (EZB Systems, Inc.) {AD392E40-428C-459F-961E-9B147782D099} 227 C:\Programme\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 229 C:\WINDOWS\System32\nvshell.dll (NVIDIA Corporation) {1E9B04FB-F9E5-4718-997B-B8DA88302A48} 231 C:\Programme\Haali\MatroskaSplitter\mmfinfo.dll Haali Column Provider 231 C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroDigitalExt.dll (Nero AG) NeroDigitalExt.NeroDigitalColumnHandler 231 C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\PDFShell.dll (Adobe Systems, Inc.) PDF Column Info Missing files ------------- 011 C:\WINDOWS\system32\drivers\Abiosdsk.sys 011 C:\WINDOWS\system32\drivers\abp480n5.sys 011 C:\WINDOWS\system32\drivers\adpu160m.sys 011 C:\WINDOWS\system32\drivers\Aha154x.sys 011 C:\WINDOWS\system32\drivers\aic78u2.sys 011 C:\WINDOWS\system32\drivers\aic78xx.sys 011 C:\WINDOWS\system32\drivers\akru5dac.sys 011 C:\WINDOWS\system32\drivers\AliIde.sys 011 C:\WINDOWS\system32\drivers\amsint.sys 011 C:\WINDOWS\system32\drivers\asc.sys 011 C:\WINDOWS\system32\drivers\asc3350p.sys 011 C:\WINDOWS\system32\drivers\asc3550.sys 011 C:\WINDOWS\system32\drivers\Atdisk.sys 011 C:\WINDOWS\system32\drivers\cd20xrnt.sys 011 C:\WINDOWS\system32\drivers\Changer.sys 011 C:\WINDOWS\system32\drivers\CmdIde.sys 011 C:\WINDOWS\system32\drivers\Cpqarray.sys 011 C:\WINDOWS\system32\drivers\dac2w2k.sys 011 C:\WINDOWS\system32\drivers\dac960nt.sys 011 C:\WINDOWS\system32\drivers\dpti2o.sys 011 C:\Programme\Lineage II\system\GameGuard\dump_wmimmc.sys 011 E:\INSTALL\GMSIPCI.SYS 011 C:\WINDOWS\system32\drivers\hpn.sys 011 C:\WINDOWS\system32\drivers\hpt3xx.sys 011 C:\WINDOWS\system32\drivers\i2omgmt.sys 011 C:\WINDOWS\system32\drivers\i2omp.sys 011 C:\WINDOWS\system32\drivers\ini910u.sys 011 C:\WINDOWS\system32\drivers\IntelIde.sys 011 C:\WINDOWS\system32\drivers\lbrtfdc.sys 011 C:\WINDOWS\system32\drivers\mraid35x.sys 011 C:\WINDOWS\system32\drivers\PCIDump.sys 011 C:\WINDOWS\system32\drivers\PCIIde.sys 011 C:\WINDOWS\system32\drivers\PDCOMP.sys 011 C:\WINDOWS\system32\drivers\PDFRAME.sys 011 C:\WINDOWS\system32\drivers\PDRELI.sys 011 C:\WINDOWS\system32\drivers\PDRFRAME.sys 011 C:\WINDOWS\system32\drivers\perc2.sys 011 C:\WINDOWS\system32\drivers\perc2hib.sys 011 C:\WINDOWS\system32\drivers\ql1080.sys 011 C:\WINDOWS\system32\drivers\Ql10wnt.sys 011 C:\WINDOWS\system32\drivers\ql12160.sys 011 C:\WINDOWS\system32\drivers\ql1240.sys 011 C:\WINDOWS\system32\drivers\ql1280.sys 011 C:\WINDOWS\system32\drivers\Simbad.sys 011 C:\WINDOWS\system32\drivers\Sparrow.sys 011 C:\WINDOWS\system32\drivers\sym_hi.sys 011 C:\WINDOWS\system32\drivers\sym_u3.sys 011 C:\WINDOWS\system32\drivers\symc810.sys 011 C:\WINDOWS\system32\drivers\symc8xx.sys 011 C:\WINDOWS\system32\drivers\TosIde.sys 011 C:\WINDOWS\system32\drivers\ultra.sys 011 C:\Programme\McAfee\VirusScan Enterprise\mferkdk.sys 011 C:\WINDOWS\system32\drivers\WDICA.sys 036 042 C:\Programme\ICQLite\ICQLite.exe 061 deskpan.dll 067 Und wenn nicht wie soll ich weiter vorgehen, hab Ihr weitere Tipps? Bin für jede antwort dankbar. Gruss PS: Tut mir leid wegen multiple Posts, hat aber nicht alles in ein posting gepasst^^ |
19.09.2008, 20:22 | #4 |
| Vundo Trojaner und Co keine Antwort? schade über eine kurze Nachricht a la " du bist es richtig angegangen" hätt ich mich schon gefreut ... |