Zurück   Trojaner-Board > Malware entfernen > Plagegeister aller Art und deren Bekämpfung

Plagegeister aller Art und deren Bekämpfung: Rootkits oder Trojaner im Computer?

Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen.

Antwort
Alt 16.11.2008, 11:03   #1
hfmei
 
Rootkits oder Trojaner im Computer? - Standard

Rootkits oder Trojaner im Computer?



Hallo,
Ich brauche Hilfe. In meinem LapTop ist Windows XP prof. (software und Tastatur in englisch) mit SP3 installiert.
Nach der installieren vom SP3 bzw. kurze Zeit spaeter wurde der Rechner immer langsamer. Darauf hin habe ich mit Gmer, Icesword, Rootkit Unhooker, Silent Runners und USEC Radix den Rechner gescant. Habe diverse Hooks in der SSDT gefunden die aber von Zonealarm (vsdatant.sys) und Rising Antivirus (hookhelp.sys) erstellt wurden.
Neu sind aber in der IAT diverse Code Hooks.
Drei neue [unknown_code_page] Code Hooks und diverse Codehooks durch die Datei: ShimEng.dll
Wenn ich die zwei letztgenannten Code Hooks alle mit Fixchecked zurueck setze, laeuft der Rechner wieder etwas besser.
Benutzt Microsoft Rootkit Techniken und fuer was sind die Code Hooks gut, wenn mein Rechner ohne diese besser laeuft.
Es ist natuerlich aeusserst umstaendlich nach jedem Bootvorgang diese Code Hooks zu beseitigen.
Habe dann mit Combofix einen Scan gemacht, werde aber dieses Programm nicht mehr verwenden, da trotz uninstall das Programm mir undokumentiert mindestens 10 *.exe dateien in das Verzeichnis C:\Windows gespeichert hat.
Das Programm Viruskeeper hat dieses festgestellt und sie wieder entfernt.
Hier nun die HJT log Datei
Code:
ATTFilter
 
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:25:19 AM, on 11/16/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16735)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\Rising\Rav\CCenter.exe
C:\WINDOWS\System32\svchost.exe
C:\PROGRAM FILES\RISING\RAV\ravmond.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\PROGRAM FILES\RISING\RAV\RavStub.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\svchost.exe
C:\Program Files\AxBx\VirusKeeper 2008 Pro\vk_service.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRAM FILES\RISING\RAV\RavMon.exe
C:\WINDOWS\system32\00THotkey.exe
C:\WINDOWS\system32\TPWRTRAY.EXE
C:\Program Files\TOSHIBA\TOSHIBA Controls\TFncKy.exe
C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I0L2.EXE
C:\Program Files\Rising\Rav\RavTask.exe
C:\Program Files\AxBx\VirusKeeper 2008 Pro\VirusKeeper.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\ntvdm.exe
C:\Down\actual\New\Antispy\hijackthis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://de.yahoo.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = 
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = 
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer
O2 - BHO: ZoneAlarm Spy Blocker BHO - {F0D4B231-DA4B-4daf-81E4-DFEE4931A4AA} - C:\Program Files\ZoneAlarmSB\bar\1.bin\SPYBLOCK.DLL
O3 - Toolbar: ZoneAlarm Spy Blocker - {F0D4B239-DA4B-4daf-81E4-DFEE4931A4AA} - C:\Program Files\ZoneAlarmSB\bar\1.bin\SPYBLOCK.DLL
O4 - HKLM\..\Run: [00THotkey] C:\WINDOWS\system32\00THotkey.exe
O4 - HKLM\..\Run: [Tpwrtray] TPWRTRAY.EXE
O4 - HKLM\..\Run: [TFncKy] TFncKy.exe /Type 10
O4 - HKLM\..\Run: [TosHKCW.exe] C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe
O4 - HKLM\..\Run: [ZoneAlarm Client] "C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"
O4 - HKLM\..\Run: [EM_EXEC] C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE
O4 - HKLM\..\Run: [EPSON Stylus CX6400] C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I0L2.EXE /P19 "EPSON Stylus CX6400" /O6 "USB001" /M "Stylus CX6400"
O4 - HKLM\..\Run: [RavTask] "C:\Program Files\Rising\Rav\RavTask.exe" -system
O4 - HKLM\..\Run: [VirusKeeper] C:\Program Files\AxBx\VirusKeeper 2008 Pro\VirusKeeper.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O23 - Service: COM+ System Application (COMSysApp) - Unknown owner - C:\WINDOWS\system32\dllhost.exe
O23 - Service: Rising Process Communication Center (RsCCenter) - Beijing Rising Information Technology Co., Ltd. - C:\Program Files\Rising\Rav\CCenter.exe
O23 - Service: Rising RealTime Monitor (RsRavMon) - Beijing Rising Information Technology Co., Ltd. - C:\PROGRAM FILES\RISING\RAV\Ravmond.exe
O23 - Service: MS Software Shadow Copy Provider (SwPrv) - Unknown owner - C:\WINDOWS\system32\dllhost.exe
O23 - Service: VirusKeeper antivirus/antispyware (vkservice) - AxBx - C:\Program Files\AxBx\VirusKeeper 2008 Pro\vk_service.exe
O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs, LLC - C:\WINDOWS\system32\ZoneLabs\vsmon.exe

--
End of file - 4433 bytes
         
Als Ergaenzung noch Silent Runner log Datei
Code:
ATTFilter
 
"Silent Runners.vbs", revision 58, http://www.silentrunners.org/
Operating System: Windows XP
Output limited to non-default values, except where indicated by "{++}"


Startup items buried in registry:
---------------------------------

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ {++}
"ctfmon.exe" = "C:\WINDOWS\system32\ctfmon.exe" [MS]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ {++}
"00THotkey" = "C:\WINDOWS\system32\00THotkey.exe" ["TOSHIBA Corp."]
"Tpwrtray" = "TPWRTRAY.EXE" ["TOSHIBA Corporation"]
"TFncKy" = "TFncKy.exe /Type 10" ["Toshiba Corporation"]
"TosHKCW.exe" = "C:\Program Files\TOSHIBA\Wireless Hotkey\TosHKCW.exe" ["TOSHIBA CORPORATION"]
"ZoneAlarm Client" = ""C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe"" ["Zone Labs, LLC"]
"EM_EXEC" = "C:\PROGRA~1\Logitech\MOUSEW~1\SYSTEM\EM_EXEC.EXE" ["Logitech Inc.                    "]
"EPSON Stylus CX6400" = "C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I0L2.EXE /P19 "EPSON Stylus CX6400" /O6 "USB001" /M "Stylus CX6400"" ["SEIKO EPSON CORPORATION"]
"RavTask" = ""C:\Program Files\Rising\Rav\RavTask.exe" -system" ["Beijing Rising Information Technology Co., Ltd."]
"VirusKeeper" = "C:\Program Files\AxBx\VirusKeeper 2008 Pro\VirusKeeper.exe" ["AxBx"]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
{F0D4B231-DA4B-4daf-81E4-DFEE4931A4AA}\(Default) = "ZoneAlarm Spy Blocker BHO"
  -> {HKLM...CLSID} = "ZoneAlarm Spy Blocker BHO"
                   \InProcServer32\(Default) = "C:\Program Files\ZoneAlarmSB\bar\1.bin\SPYBLOCK.DLL" ["ZoneAlarm"]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\
"{42071714-76d4-11d1-8b24-00a0c9068ff3}" = "Display Panning CPL Extension"
  -> {HKLM...CLSID} = "Display Panning CPL Extension"
                   \InProcServer32\(Default) = "deskpan.dll" [file not found]
"{88895560-9AA2-1069-930E-00AA0030EBC8}" = "HyperTerminal Icon Ext"
  -> {HKLM...CLSID} = "HyperTerminal Icon Ext"
                   \InProcServer32\(Default) = "C:\WINDOWS\system32\hticons.dll" ["Hilgraeve, Inc."]
"{E0D79304-84BE-11CE-9641-444553540000}" = "WinZip"
  -> {HKLM...CLSID} = "WinZip"
                   \InProcServer32\(Default) = "C:\PROGRA~1\WINZIP\WZSHLSTB.DLL" ["WinZip Computing, Inc."]
"{E0D79305-84BE-11CE-9641-444553540000}" = "WinZip"
  -> {HKLM...CLSID} = "WinZip"
                   \InProcServer32\(Default) = "C:\PROGRA~1\WINZIP\WZSHLSTB.DLL" ["WinZip Computing, Inc."]
"{E0D79306-84BE-11CE-9641-444553540000}" = "WinZip"
  -> {HKLM...CLSID} = "WinZip"
                   \InProcServer32\(Default) = "C:\PROGRA~1\WINZIP\WZSHLSTB.DLL" ["WinZip Computing, Inc."]
"{E0D79307-84BE-11CE-9641-444553540000}" = "WinZip"
  -> {HKLM...CLSID} = "WinZip"
                   \InProcServer32\(Default) = "C:\PROGRA~1\WINZIP\WZSHLSTB.DLL" ["WinZip Computing, Inc."]
"{23170F69-40C1-278A-1000-000100020000}" = "7-Zip Shell Extension"
  -> {HKLM...CLSID} = "7-Zip Shell Extension"
                   \InProcServer32\(Default) = "C:\Program Files\7-Zip\7-zip.dll" ["Igor Pavlov"]
"{00000000-0001-0001-0000-000000000000}" = "shredderse"
  -> {HKLM...CLSID} = "shredderse"
                   \InProcServer32\(Default) = "c:\program files\steganos trace destructor 6.5\shredderse.dll" [null data]
"{D9872D13-7651-4471-9EEE-F0A00218BEBB}" = "Multiscan"
  -> {HKLM...CLSID} = "ZLAVShExt Class"
                   \InProcServer32\(Default) = "C:\Program Files\Zone Labs\ZoneAlarm\zlavscan.dll" ["Zone Labs, LLC"]
"{0006F045-0000-0000-C000-000000000046}" = "Microsoft Outlook Custom Icon Handler"
  -> {HKLM...CLSID} = "Outlook File Icon Extension"
                   \InProcServer32\(Default) = "C:\MSOffice\Office\OLKFSTUB.DLL" [MS]
"{46E22146-59C0-4136-9233-52E412E2B428}" = "EzCddax extension"
  -> {HKLM...CLSID} = "EzCddax Class"
                   \InProcServer32\(Default) = "C:\Program Files\Easy CD-DA Extractor 7\ezcddax.dll" [null data]
"{1C7593CB-C1CC-4BA7-BE52-8EEA47F9CB1D}" = "RISING"
  -> {HKLM...CLSID} = "MenuShlExt Class"
                   \InProcServer32\(Default) = "C:\WINDOWS\system32\RavExt.dll" ["Beijing Rising Information Technology Co., Ltd."]
"{A155339D-CCCD-4714-85EB-3754B804C9DF}" = "a-squared Free Shell Extension"
  -> {HKLM...CLSID} = "a-squared Free Shell Extension"
                   \InProcServer32\(Default) = "C:\Program Files\a-squared Free\a2freecontmenu.dll" ["Emsi Software GmbH"]
"{DDE4BEEB-DDE6-48fd-8EB5-035C09923F83}" = "UnlockerShellExtension"
  -> {HKLM...CLSID} = "UnlockerShellExtension"
                   \InProcServer32\(Default) = "C:\Program Files\Unlocker\UnlockerCOM.dll" [null data]

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\
<<!>> "{32CD708B-60A7-4C00-9377-D73EAA495F0F}" = "Rising Execute File Exts hook"
  -> {HKLM...CLSID} = "ShlExecHack Class"
                   \InProcServer32\(Default) = "C:\WINDOWS\system32\RavExt.dll" ["Beijing Rising Information Technology Co., Ltd."]

HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\
<<!>> "BootExecute" = "autocheck autochk *"|"bsmain" ["Beijing Rising Information Technology Co., Ltd."]| [file not found]

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\
<<!>> dimsntfy\DLLName = "C:\WINDOWS\System32\dimsntfy.dll" [MS]

HKLM\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\
{F9DB5320-233E-11D1-9F84-707F02C10627}\(Default) = "PDF Column Info"
  -> {HKLM...CLSID} = "PDF Shell Extension"
                   \InProcServer32\(Default) = "C:\Program Files\Adobe\Acrobat 7.0\ActiveX\PDFShell.dll" ["Adobe Systems, Inc."]

HKLM\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\
7-Zip\(Default) = "{23170F69-40C1-278A-1000-000100020000}"
  -> {HKLM...CLSID} = "7-Zip Shell Extension"
                   \InProcServer32\(Default) = "C:\Program Files\7-Zip\7-zip.dll" ["Igor Pavlov"]
EzCddax\(Default) = "{46E22146-59C0-4136-9233-52E412E2B428}"
  -> {HKLM...CLSID} = "EzCddax Class"
                   \InProcServer32\(Default) = "C:\Program Files\Easy CD-DA Extractor 7\ezcddax.dll" [null data]
RisingRavExt\(Default) = "{1C7593CB-C1CC-4BA7-BE52-8EEA47F9CB1D}"
  -> {HKLM...CLSID} = "MenuShlExt Class"
                   \InProcServer32\(Default) = "C:\WINDOWS\system32\RavExt.dll" ["Beijing Rising Information Technology Co., Ltd."]
shredderse\(Default) = "{00000000-0001-0001-0000-000000000000}"
  -> {HKLM...CLSID} = "shredderse"
                   \InProcServer32\(Default) = "c:\program files\steganos trace destructor 6.5\shredderse.dll" [null data]
WinZip\(Default) = "{E0D79304-84BE-11CE-9641-444553540000}"
  -> {HKLM...CLSID} = "WinZip"
                   \InProcServer32\(Default) = "C:\PROGRA~1\WINZIP\WZSHLSTB.DLL" ["WinZip Computing, Inc."]
ZLAVShExt\(Default) = "{D9872D13-7651-4471-9EEE-F0A00218BEBB}"
  -> {HKLM...CLSID} = "ZLAVShExt Class"
                   \InProcServer32\(Default) = "C:\Program Files\Zone Labs\ZoneAlarm\zlavscan.dll" ["Zone Labs, LLC"]

HKLM\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\
7-Zip\(Default) = "{23170F69-40C1-278A-1000-000100020000}"
  -> {HKLM...CLSID} = "7-Zip Shell Extension"
                   \InProcServer32\(Default) = "C:\Program Files\7-Zip\7-zip.dll" ["Igor Pavlov"]
RisingRavExt\(Default) = "{1C7593CB-C1CC-4BA7-BE52-8EEA47F9CB1D}"
  -> {HKLM...CLSID} = "MenuShlExt Class"
                   \InProcServer32\(Default) = "C:\WINDOWS\system32\RavExt.dll" ["Beijing Rising Information Technology Co., Ltd."]
shredderse\(Default) = "{00000000-0001-0001-0000-000000000000}"
  -> {HKLM...CLSID} = "shredderse"
                   \InProcServer32\(Default) = "c:\program files\steganos trace destructor 6.5\shredderse.dll" [null data]
WinZip\(Default) = "{E0D79304-84BE-11CE-9641-444553540000}"
  -> {HKLM...CLSID} = "WinZip"
                   \InProcServer32\(Default) = "C:\PROGRA~1\WINZIP\WZSHLSTB.DLL" ["WinZip Computing, Inc."]

HKLM\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\
a-squared Free Shell Extension\(Default) = "{A155339D-CCCD-4714-85EB-3754B804C9DF}"
  -> {HKLM...CLSID} = "a-squared Free Shell Extension"
                   \InProcServer32\(Default) = "C:\Program Files\a-squared Free\a2freecontmenu.dll" ["Emsi Software GmbH"]
RisingRavExt\(Default) = "{1C7593CB-C1CC-4BA7-BE52-8EEA47F9CB1D}"
  -> {HKLM...CLSID} = "MenuShlExt Class"
                   \InProcServer32\(Default) = "C:\WINDOWS\system32\RavExt.dll" ["Beijing Rising Information Technology Co., Ltd."]
UnlockerShellExtension\(Default) = "{DDE4BEEB-DDE6-48fd-8EB5-035C09923F83}"
  -> {HKLM...CLSID} = "UnlockerShellExtension"
                   \InProcServer32\(Default) = "C:\Program Files\Unlocker\UnlockerCOM.dll" [null data]
WinZip\(Default) = "{E0D79304-84BE-11CE-9641-444553540000}"
  -> {HKLM...CLSID} = "WinZip"
                   \InProcServer32\(Default) = "C:\PROGRA~1\WINZIP\WZSHLSTB.DLL" ["WinZip Computing, Inc."]
ZLAVShExt\(Default) = "{D9872D13-7651-4471-9EEE-F0A00218BEBB}"
  -> {HKLM...CLSID} = "ZLAVShExt Class"
                   \InProcServer32\(Default) = "C:\Program Files\Zone Labs\ZoneAlarm\zlavscan.dll" ["Zone Labs, LLC"]

HKLM\SOFTWARE\Classes\AllFilesystemObjects\shellex\ContextMenuHandlers\
a-squared Free Shell Extension\(Default) = "{A155339D-CCCD-4714-85EB-3754B804C9DF}"
  -> {HKLM...CLSID} = "a-squared Free Shell Extension"
                   \InProcServer32\(Default) = "C:\Program Files\a-squared Free\a2freecontmenu.dll" ["Emsi Software GmbH"]
UnlockerShellExtension\(Default) = "{DDE4BEEB-DDE6-48fd-8EB5-035C09923F83}"
  -> {HKLM...CLSID} = "UnlockerShellExtension"
                   \InProcServer32\(Default) = "C:\Program Files\Unlocker\UnlockerCOM.dll" [null data]


Default executables:
--------------------

<<!>> HKLM\SOFTWARE\Classes\.scr\(Default) = "AutoCADScriptFile"
<<!>> HKLM\SOFTWARE\Classes\AutoCADScriptFile\shell\open\command\(Default) = "C:\WINDOWS\NOTEPAD.EXE "%1"" [MS]


Group Policies {GPedit.msc branch and setting}:
-----------------------------------------------

Note: detected settings may not have any effect.

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\

"NoDrives" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\

"NoDrives" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\

"HideLegacyLogonScripts" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

"HideLogoffScripts" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

"HideStartupScripts" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

"RunLogonScriptSync" = (REG_DWORD) dword:0x00000001
{unrecognized setting}

"RunStartupScriptSync" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

"disableregistrytools" = (REG_DWORD) dword:0x00000000
{User Configuration|Administrative Templates|System|
Prevent access to registry editing tools}

HKCU\Software\Policies\Microsoft\Windows\System\

"disablecmd" = (REG_DWORD) dword:0x00000000
{User Configuration|Administrative Templates|System|
Disable the command prompt}

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\

"shutdownwithoutlogon" = (REG_DWORD) dword:0x00000001
{Computer Configuration|Windows Settings|Security Settings|Local Policies|Security Options|
Shutdown: Allow system to be shut down without having to log on}

"undockwithoutlogon" = (REG_DWORD) dword:0x00000001
{Computer Configuration|Windows Settings|Security Settings|Local Policies|Security Options|
Devices: Allow undock without having to log on}

"DisableRegistryTools" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

"HideLegacyLogonScripts" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

"HideLogoffScripts" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

"RunLogonScriptSync" = (REG_DWORD) dword:0x00000001
{unrecognized setting}

"RunStartupScriptSync" = (REG_DWORD) dword:0x00000000
{unrecognized setting}

"HideStartupScripts" = (REG_DWORD) dword:0x00000000
{unrecognized setting}


Active Desktop and Wallpaper:
-----------------------------

Active Desktop may be disabled at this entry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellState

Displayed if Active Desktop enabled and wallpaper not set by Group Policy:
HKCU\Software\Microsoft\Internet Explorer\Desktop\General\
"Wallpaper" = "C:\WINDOWS\system32\config\systemprofile\Local Settings\Application Data\Microsoft\Wallpaper1.bmp"

Displayed if Active Desktop disabled and wallpaper not set by Group Policy:
HKCU\Control Panel\Desktop\
"Wallpaper" = "C:\Documents and Settings\hfmei\Local Settings\Application Data\Microsoft\Wallpaper1.bmp"


Enabled Screen Saver:
---------------------

HKCU\Control Panel\Desktop\
"SCRNSAVE.EXE" = "C:\WINDOWS\system32\logon.scr" [MS]


Windows Portable Device AutoPlay Handlers
-----------------------------------------

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\AutoplayHandlers\Handlers\

EZCDDAXAutoPlayAudioCD\
"Provider" = "Easy CD-DA Extractor 7"
"InvokeProgID" = "ezcddax.AutoPlay"
"InvokeVerb" = "AudioCD"
HKLM\SOFTWARE\Classes\ezcddax.AutoPlay\shell\AudioCD\command\(Default) = ""C:\Program Files\Easy CD-DA Extractor 7\ezcddax.exe" -nn" ["Jukka Poikolainen"]

EZCDDAXAutoPlayBlankCD\
"Provider" = "Easy CD-DA Extractor 7"
"InvokeProgID" = "ezcddax.AutoPlay"
"InvokeVerb" = "EmptyCD"
HKLM\SOFTWARE\Classes\ezcddax.AutoPlay\shell\EmptyCD\command\(Default) = ""C:\Program Files\Easy CD-DA Extractor 7\ezcddax.exe" -nn" ["Jukka Poikolainen"]

NeroAutoPlay2CDAudio\
"Provider" = "Nero Express"
"InvokeProgID" = "Nero.AutoPlay2"
"InvokeVerb" = "HandleCDBurningOnArrival_CDAudio"
HKLM\SOFTWARE\Classes\Nero.AutoPlay2\shell\HandleCDBurningOnArrival_CDAudio\command\(Default) = "C:\Program Files\Ahead\nero\nero.exe /w /New:AudioCD /Drive:%L" ["Ahead Software AG"]

NeroAutoPlay2CopyCD\
"Provider" = "Nero Express"
"InvokeProgID" = "Nero.AutoPlay2"
"InvokeVerb" = "PlayCDAudioOnArrival_CopyCD"
HKLM\SOFTWARE\Classes\Nero.AutoPlay2\shell\PlayCDAudioOnArrival_CopyCD\command\(Default) = "C:\Program Files\Ahead\nero\nero.exe /w /Dialog:DiscCopy /Drive:%L" ["Ahead Software AG"]

NeroAutoPlay2DataDisc\
"Provider" = "Nero Express"
"InvokeProgID" = "Nero.AutoPlay2"
"InvokeVerb" = "HandleCDBurningOnArrival_DataDisc"
HKLM\SOFTWARE\Classes\Nero.AutoPlay2\shell\HandleCDBurningOnArrival_DataDisc\command\(Default) = "C:\Program Files\Ahead\nero\nero.exe /w /New:ISODisc /Drive:%L" ["Ahead Software AG"]

NeroAutoPlay2LaunchNeroStartSmart\
"Provider" = "Nero StartSmart"
"InvokeProgID" = "Nero.AutoPlay2"
"InvokeVerb" = "HandleCDBurningOnArrival_LaunchNeroStartSmart"
HKLM\SOFTWARE\Classes\Nero.AutoPlay2\shell\HandleCDBurningOnArrival_LaunchNeroStartSmart\command\(Default) = "C:\Program Files\Ahead\Nero StartSmart\NeroStartSmart.exe /AutoPlay /Drive:%L" ["Ahead Software AG"]

Rising.Rav.20\
"Provider" = "Rising Antivirus"
"InvokeProgID" = "Rising.Rav.20"
"InvokeVerb" = "Ravopen"
HKLM\SOFTWARE\Classes\Rising.Rav.20\shell\Ravopen\command\(Default) = "C:\Program Files\Rising\Rav\Rav.exe %1" ["Beijing Rising Information Technology Co., Ltd."]


Winsock2 Service Provider DLLs:
-------------------------------

Namespace Service Providers

HKLM\SYSTEM\CurrentControlSet\Services\Winsock2\Parameters\NameSpace_Catalog5\Catalog_Entries\ {++}
000000000001\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]
000000000002\LibraryPath = "%SystemRoot%\System32\winrnr.dll" [MS]
000000000003\LibraryPath = "%SystemRoot%\System32\mswsock.dll" [MS]

Transport Service Providers

HKLM\SYSTEM\CurrentControlSet\Services\Winsock2\Parameters\Protocol_Catalog9\Catalog_Entries\ {++}
0000000000##\PackedCatalogItem (contains) DLL [Company Name], (at) ## range:
%SystemRoot%\system32\mswsock.dll [MS], 01 - 04, 07 - 12
%SystemRoot%\system32\rsvpsp.dll [MS], 05 - 06


Toolbars, Explorer Bars, Extensions:
------------------------------------

Toolbars

HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\
"{F0D4B239-DA4B-4DAF-81E4-DFEE4931A4AA}"
  -> {HKLM...CLSID} = "ZoneAlarm Spy Blocker"
                   \InProcServer32\(Default) = "C:\Program Files\ZoneAlarmSB\bar\1.bin\SPYBLOCK.DLL" ["ZoneAlarm"]

HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar\
"{F0D4B239-DA4B-4DAF-81E4-DFEE4931A4AA}" = (no title provided)
  -> {HKLM...CLSID} = "ZoneAlarm Spy Blocker"
                   \InProcServer32\(Default) = "C:\Program Files\ZoneAlarmSB\bar\1.bin\SPYBLOCK.DLL" ["ZoneAlarm"]

Explorer Bars

HKLM\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\

HKLM\SOFTWARE\Classes\CLSID\{916C1EF1-CA89-4F1B-AFDA-3CA85BD0F831}\(Default) = "ZoneAlarm PopBlocker"
Implemented Categories\{00021493-0000-0000-C000-000000000046}\ [vertical bar]
InProcServer32\(Default) = "C:\WINDOWS\system32\shdocvw.dll" [MS]

Extensions (Tools menu items, main toolbar menu buttons)

HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions\
{E2E2DD38-D088-4134-82B7-F2BA38496583}\
"MenuText" = "@xpsp3res.dll,-20001"
"Exec" = "%windir%\Network Diagnostic\xpnetdiag.exe" [MS]

{FB5F1910-F110-11D2-BB9E-00C04F795683}\
"ButtonText" = "Messenger"
"MenuText" = "Windows Messenger"
"Exec" = "C:\Program Files\Messenger\msmsgs.exe" [MS]


Running Services (Display Name, Service Name, Path {Service DLL}):
------------------------------------------------------------------

Rising Process Communication Center, RsCCenter, ""C:\Program Files\Rising\Rav\CCenter.exe"" ["Beijing Rising Information Technology Co., Ltd."]
TrueVector Internet Monitor, vsmon, "C:\WINDOWS\system32\ZoneLabs\vsmon.exe -service" ["Zone Labs, LLC"]
VirusKeeper antivirus/antispyware, vkservice, "C:\Program Files\AxBx\VirusKeeper 2008 Pro\vk_service.exe" ["AxBx"]


Keyboard Driver Filters:
------------------------

HKLM\SYSTEM\CurrentControlSet\Control\Class\{4D36E96B-E325-11CE-BFC1-08002BE10318}\
"UpperFilters" = <<!>> "Lkbdflt2" ["Logitech"]


Print Monitors:
---------------

HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors\
EPSON V6 2KMonitor\Driver = "EBPMON24.DLL" ["SEIKO EPSON CORPORATION"]
PDF-XChange\Driver = "pxc25pm.dll" ["Tracker Software"]


---------- (launch time: 2008-11-16 09:21:45)
<<!>>: Suspicious data at a malware launch point.

+ This report excludes default entries except where indicated.
+ To see *everywhere* the script checks and *everything* it finds,
  launch it from a command prompt or a shortcut with the -all parameter.
+ To search all directories of local fixed drives for DESKTOP.INI
  DLL launch points, use the -supp parameter or answer "No" at the
  first message box and "Yes" at the second message box.
---------- (total run time: 446 seconds, including 7 seconds for message boxes)
         
Gruesse
hfmei

Geändert von hfmei (16.11.2008 um 11:31 Uhr)

Alt 17.11.2008, 12:06   #2
hfmei
 
Rootkits oder Trojaner im Computer? - Standard

Rootkits oder Trojaner im Computer?



Hallo,
In der Zwischenzeit habe ich je einen kompletten Scan mit:
Rising Antivirus
Kaspersky Online Scan
und mit a-squared Free gemacht. Bei allen Scans wurde nichts gefunden.
Eine neue RootkitUnhooker log-Datei fuege ich bei.
Code:
ATTFilter
RkUnhooker report generator v0.7
==============================================
Rootkit Unhooker kernel version: 3.8.341.552
==============================================
Windows Major Version: 5
Windows Minor Version: 1
Windows Build Number: 2600
==============================================
>SSDT State
NtAssignProcessToJobObject
Actual Address 0xF799CEE8
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtConnectPort
Actual Address 0xF29F6040
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateFile
Actual Address 0xF29F2930
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateKey
Actual Address 0xF799CC77
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtCreatePort
Actual Address 0xF29F6510
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateProcess
Actual Address 0xF29FC870
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateProcessEx
Actual Address 0xF29FCAA0
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateSection
Actual Address 0xF29FFFD0
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateThread
Actual Address 0xF799CD71
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtCreateWaitablePort
Actual Address 0xF29F6600
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtDebugActiveProcess
Actual Address 0xF799CE84
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtDeleteFile
Actual Address 0xF29F2F20
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtDeleteKey
Actual Address 0xF799CCC2
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtDeleteValueKey
Actual Address 0xF799CCA9
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtDuplicateObject
Actual Address 0xF29FC580
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtLoadDriver
Actual Address 0xF799CD3F
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtLoadKey
Actual Address 0xF29FE8B0
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtLockVirtualMemory
Actual Address 0xF799CE52
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtOpenFile
Actual Address 0xF29F2D70
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtOpenProcess
Actual Address 0xF29FC350
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtOpenSection
Actual Address 0xF799CD8A
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtOpenThread
Actual Address 0xF29FC150
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtProtectVirtualMemory
Actual Address 0xF799CE39
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtQueryValueKey
Actual Address 0xF799CECF
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtQueueApcThread
Actual Address 0xF799CE07
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtReadVirtualMemory
Actual Address 0xF799CE20
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtRenameKey
Actual Address 0xF799CCDB
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtReplaceKey
Actual Address 0xF29FECB0
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtRequestWaitReplyPort
Actual Address 0xF29F5C00
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtRestoreKey
Actual Address 0xF799CD0D
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtSecureConnectPort
Actual Address 0xF29F6220
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtSetContextThread
Actual Address 0xF799CDD5
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtSetInformationFile
Actual Address 0xF29F3120
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtSetSecurityObject
Actual Address 0xF799CCF4
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtSetSystemInformation
Actual Address 0xF799CE6B
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtSetValueKey
Actual Address 0xF799CC90
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtSuspendProcess
Actual Address 0xF799CDEE
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtSuspendThread
Actual Address 0xF799CDBC
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtSystemDebugControl
Actual Address 0xF799CE9D
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtTerminateProcess
Actual Address 0xF29FCCD0
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtTerminateThread
Actual Address 0xF799CDA3
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtWriteVirtualMemory
Actual Address 0xF799CD58
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
==============================================
>Shadow
NtUserGetKeyboardState
Actual Address 0xF799D776
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtUserGetRawInputBuffer
Actual Address 0xF799D744
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtUserGetRawInputData
Actual Address 0xF799D75D
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
NtUserMessageCall
Actual Address 0xF29F4250
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtUserPostMessage
Actual Address 0xF29F42E0
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtUserPostThreadMessage
Actual Address 0xF29F4360
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtUserSendInput
Actual Address 0xF29F4520
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtUserSetWindowsHookEx
Actual Address 0xF799D6F9
Hooked by: C:\WINDOWS\system32\drivers\HOOKHELP.sys
==============================================
>Processes
Process: System
Process Id: 4
EPROCESS Address: 0x857CA830

Process: C:\WINDOWS\system32\smss.exe
Process Id: 608
EPROCESS Address: 0x854D0678

Process: C:\WINDOWS\system32\csrss.exe
Process Id: 672
EPROCESS Address: 0x854B5500

Process: C:\WINDOWS\system32\winlogon.exe
Process Id: 696
EPROCESS Address: 0x85490030

Process: C:\WINDOWS\system32\services.exe
Process Id: 740
EPROCESS Address: 0x8545E750

Process: C:\WINDOWS\system32\lsass.exe
Process Id: 752
EPROCESS Address: 0x8545A460

Process: C:\WINDOWS\system32\TPWRTRAY.EXE
Process Id: 808
EPROCESS Address: 0x852471B8

Process: C:\WINDOWS\system32\00THotkey.exe
Process Id: 884
EPROCESS Address: 0x852B2578

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 916
EPROCESS Address: 0x854667A0

Process: C:\Program Files\Toshiba\Wireless Hotkey\TosHKCW.exe
Process Id: 932
EPROCESS Address: 0x85231DA0

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 1016
EPROCESS Address: 0x85440BB8

Process: C:\Program Files\Rising\Rav\CCenter.exe
Process Id: 1048
EPROCESS Address: 0x8543F4D0

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 1064
EPROCESS Address: 0x854262C8

Process: C:\Program Files\Toshiba\Toshiba Controls\TFncKy.exe
Process Id: 1092
EPROCESS Address: 0x8522F030

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 1192
EPROCESS Address: 0x853C3030

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 1312
EPROCESS Address: 0x853ACDA0

Process: C:\Program Files\Rising\Rav\RavMonD.exe
Process Id: 1356
EPROCESS Address: 0x85412940

Process: C:\WINDOWS\explorer.exe
Process Id: 1376
EPROCESS Address: 0x85283C28

Process: C:\Program Files\Rising\Rav\RavStub.exe
Process Id: 1640
EPROCESS Address: 0x8538A418

Process: C:\WINDOWS\system32\spoolsv.exe
Process Id: 1744
EPROCESS Address: 0x85379B18

Process: C:\PROGRA~1\Logitech\MOUSEW~1\system\EM_EXEC.EXE
Process Id: 1852
EPROCESS Address: 0x8529A7E0

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 1892
EPROCESS Address: 0x85367030

Process: C:\Program Files\AxBx\VirusKeeper 2008 Pro\vk_service.exe
Process Id: 2004
EPROCESS Address: 0x853698F0

Process: C:\WINDOWS\system32\spool\drivers\w32x86\3\E_S4I0L2.EXE
Process Id: 2080
EPROCESS Address: 0x85294B80

Process: C:\Program Files\Rising\Rav\RavTask.exe
Process Id: 2136
EPROCESS Address: 0x85217BC0

Process: C:\Program Files\Rising\Rav\RavMon.exe
Process Id: 2224
EPROCESS Address: 0x85227DA0

Process: C:\Program Files\AxBx\VirusKeeper 2008 Pro\VirusKeeper.exe
Process Id: 2360
EPROCESS Address: 0x85201660

Process: C:\WINDOWS\system32\ctfmon.exe
Process Id: 2456
EPROCESS Address: 0x85229640

Process: C:\Program Files\Zone Labs\ZoneAlarm\zlclient.exe
Process Id: 1784
EPROCESS Address: 0x852544E8

Process: C:\WINDOWS\system32\ZoneLabs\vsmon.exe
Process Id: 3044
EPROCESS Address: 0x851ED7B0

Process: C:\RkUnhooker\hL67ePn557ok7G34G.exe
Process Id: 3628
EPROCESS Address: 0x851BBD18

==============================================
>Drivers
Driver: C:\WINDOWS\system32\ntoskrnl.exe
Address: 0x804D7000
Size: 2189184 bytes

Driver: PnpManager
Address: 0x804D7000
Size: 2189184 bytes

Driver: RAW
Address: 0x804D7000
Size: 2189184 bytes

Driver: WMIxWDM
Address: 0x804D7000
Size: 2189184 bytes

Driver: Win32k
Address: 0xBF800000
Size: 1847296 bytes

Driver: C:\WINDOWS\System32\win32k.sys
Address: 0xBF800000
Size: 1847296 bytes

Driver: C:\WINDOWS\system32\DRIVERS\LTSM.sys
Address: 0xF2B72000
Size: 802816 bytes

Driver: Ntfs.sys
Address: 0xF73E8000
Size: 577536 bytes

Driver: C:\WINDOWS\System32\tridxp.dll
Address: 0xBF9D5000
Size: 561152 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
Address: 0xF28B8000
Size: 458752 bytes

Driver: C:\WINDOWS\System32\vsdatant.sys
Address: 0xF29C3000
Size: 393216 bytes

Driver: C:\WINDOWS\system32\DRIVERS\update.sys
Address: 0xF709E000
Size: 385024 bytes

Driver: C:\WINDOWS\system32\DRIVERS\tcpip.sys
Address: 0xF2A23000
Size: 364544 bytes

Driver: C:\WINDOWS\system32\DRIVERS\srv.sys
Address: 0xF0ACC000
Size: 335872 bytes

Driver: C:\WINDOWS\system32\drivers\aliadwdm.sys
Address: 0xF7271000
Size: 274432 bytes

Driver: C:\WINDOWS\System32\Drivers\HTTP.sys
Address: 0xF06E0000
Size: 266240 bytes

Driver: C:\WINDOWS\system32\DRIVERS\tridxpm.sys
Address: 0xF730F000
Size: 221184 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rdpdr.sys
Address: 0xF70FC000
Size: 196608 bytes

Driver: ACPI.sys
Address: 0xF754A000
Size: 188416 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mrxdav.sys
Address: 0xF0B96000
Size: 184320 bytes

Driver: NDIS.sys
Address: 0xF73BB000
Size: 184320 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rdbss.sys
Address: 0xF2928000
Size: 176128 bytes

Driver: C:\WINDOWS\system32\DRIVERS\netbt.sys
Address: 0xF0E6B000
Size: 163840 bytes

Driver: C:\WINDOWS\system32\drivers\HookSys.sys
Address: 0xF2891000
Size: 159744 bytes

Driver: dmio.sys
Address: 0xF74D6000
Size: 155648 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ipnat.sys
Address: 0xF299D000
Size: 155648 bytes

Driver: C:\WINDOWS\system32\drivers\portcls.sys
Address: 0xF724D000
Size: 147456 bytes

Driver: C:\WINDOWS\system32\DRIVERS\USBPORT.SYS
Address: 0xF72D7000
Size: 147456 bytes

Driver: C:\WINDOWS\system32\DRIVERS\klif.sys
Address: 0xF2B4F000
Size: 143360 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ks.sys
Address: 0xF72B4000
Size: 143360 bytes

Driver: C:\WINDOWS\System32\drivers\afd.sys
Address: 0xF2953000
Size: 139264 bytes

Driver: fltmgr.sys
Address: 0xF749E000
Size: 131072 bytes

Driver: ftdisk.sys
Address: 0xF74FC000
Size: 126976 bytes

Driver: pcmcia.sys
Address: 0xF751B000
Size: 122880 bytes

Driver: C:\WINDOWS\system32\DRIVERS\e100b325.sys
Address: 0xF721C000
Size: 118784 bytes

Driver: Mup.sys
Address: 0xF738D000
Size: 106496 bytes

Driver: atapi.sys
Address: 0xF74BE000
Size: 98304 bytes

Driver: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xF2879000
Size: 98304 bytes

Driver: KSecDD.sys
Address: 0xF7475000
Size: 94208 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ndiswan.sys
Address: 0xF7205000
Size: 94208 bytes

Driver: C:\WINDOWS\system32\DRIVERS\irda.sys
Address: 0xF0E93000
Size: 90112 bytes

Driver: C:\WINDOWS\system32\drivers\wdmaud.sys
Address: 0xF08D7000
Size: 86016 bytes

Driver: C:\WINDOWS\system32\DRIVERS\parport.sys
Address: 0xF7239000
Size: 81920 bytes

Driver: srescan.sys
Address: 0xF73A7000
Size: 81920 bytes

Driver: C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS
Address: 0xF72FB000
Size: 81920 bytes

Driver: ACPI_HAL
Address: 0x806EE000
Size: 81152 bytes

Driver: C:\WINDOWS\system32\hal.dll
Address: 0x806EE000
Size: 81152 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ipsec.sys
Address: 0xF2A7C000
Size: 77824 bytes

Driver: C:\WINDOWS\System32\drivers\dxg.sys
Address: 0xBF9C3000
Size: 73728 bytes

Driver: sr.sys
Address: 0xF748C000
Size: 73728 bytes

Driver: pci.sys
Address: 0xF7539000
Size: 69632 bytes

Driver: C:\WINDOWS\system32\DRIVERS\psched.sys
Address: 0xF712C000
Size: 69632 bytes

Driver: C:\WINDOWS\System32\Drivers\Cdfs.SYS
Address: 0xF7809000
Size: 65536 bytes

Driver: C:\WINDOWS\system32\DRIVERS\cdrom.sys
Address: 0xF7639000
Size: 65536 bytes

Driver: C:\WINDOWS\system32\DRIVERS\serial.sys
Address: 0xF7699000
Size: 65536 bytes

Driver: C:\WINDOWS\system32\drivers\drmk.sys
Address: 0xF7659000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\DRIVERS\LMouFlt2.sys
Address: 0xF7689000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\DRIVERS\redbook.sys
Address: 0xF7649000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\drivers\sysaudio.sys
Address: 0xF0C03000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\DRIVERS\usbhub.sys
Address: 0xF7739000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\drivers\HookNtos.sys
Address: 0xF77B9000
Size: 57344 bytes

Driver: C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS
Address: 0xF75D9000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\i8042prt.sys
Address: 0xF7669000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
Address: 0xF76B9000
Size: 53248 bytes

Driver: VolSnap.sys
Address: 0xF75B9000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\L8042Pr2.sys
Address: 0xF7679000
Size: 49152 bytes

Driver: C:\WINDOWS\System32\Drivers\pcouffin.sys
Address: 0xF76F9000
Size: 49152 bytes

Driver: C:\WINDOWS\system32\DRIVERS\raspptp.sys
Address: 0xF76D9000
Size: 49152 bytes

Driver: alim1541.sys
Address: 0xF75E9000
Size: 45056 bytes

Driver: C:\WINDOWS\System32\Drivers\Fips.SYS
Address: 0xF77C9000
Size: 45056 bytes

Driver: C:\WINDOWS\system32\DRIVERS\imapi.sys
Address: 0xF7629000
Size: 45056 bytes

Driver: MountMgr.sys
Address: 0xF75A9000
Size: 45056 bytes

Driver: C:\WINDOWS\system32\DRIVERS\p3.sys
Address: 0xF7619000
Size: 45056 bytes

Driver: C:\WINDOWS\system32\DRIVERS\raspppoe.sys
Address: 0xF76C9000
Size: 45056 bytes

Driver: isapnp.sys
Address: 0xF7599000
Size: 40960 bytes

Driver: C:\WINDOWS\System32\Drivers\NDProxy.SYS
Address: 0xF7719000
Size: 40960 bytes

Driver: C:\WINDOWS\system32\DRIVERS\termdd.sys
Address: 0xF7709000
Size: 40960 bytes

Driver: disk.sys
Address: 0xF75C9000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\drivers\HIDCLASS.SYS
Address: 0xF7789000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\drivers\LHidUsb.Sys
Address: 0xF7769000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\msgpc.sys
Address: 0xF76E9000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\netbios.sys
Address: 0xF77A9000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\smcirda.sys
Address: 0xF76A9000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\wanarp.sys
Address: 0xF7799000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\drivers\HookReg.sys
Address: 0xF79A1000
Size: 32768 bytes

Driver: C:\WINDOWS\System32\Drivers\Modem.SYS
Address: 0xF7909000
Size: 32768 bytes

Driver: C:\WINDOWS\System32\Drivers\Npfs.SYS
Address: 0xF7961000
Size: 32768 bytes

Driver: C:\WINDOWS\system32\DRIVERS\fdc.sys
Address: 0xF7891000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\drivers\HIDPARSE.SYS
Address: 0xF7941000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS
Address: 0xF7819000
Size: 28672 bytes

Driver: C:\WINDOWS\System32\Drivers\sybex38.SYS
Address: 0xF7921000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\drivers\HOOKHELP.sys
Address: 0xF7999000
Size: 24576 bytes

Driver: C:\WINDOWS\system32\DRIVERS\kbdclass.sys
Address: 0xF7871000
Size: 24576 bytes

Driver: C:\WINDOWS\system32\DRIVERS\LHidFlt2.sys
Address: 0xF7971000
Size: 24576 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mouclass.sys
Address: 0xF7881000
Size: 24576 bytes

Driver: C:\WINDOWS\System32\drivers\vga.sys
Address: 0xF7931000
Size: 24576 bytes

Driver: C:\WINDOWS\system32\DRIVERS\flpydisk.sys
Address: 0xF7911000
Size: 20480 bytes

Driver: C:\WINDOWS\System32\Drivers\Msfs.SYS
Address: 0xF7951000
Size: 20480 bytes

Driver: PartMgr.sys
Address: 0xF7821000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ptilink.sys
Address: 0xF78D1000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rasirda.sys
Address: 0xF78A1000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\raspti.sys
Address: 0xF78E1000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\TDI.SYS
Address: 0xF78B1000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\usbohci.sys
Address: 0xF7851000
Size: 20480 bytes

Driver: C:\WINDOWS\System32\watchdog.sys
Address: 0xF78D9000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\BATTC.SYS
Address: 0xF79B1000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\CmBatt.sys
Address: 0xF7A59000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mssmbios.sys
Address: 0xF7A89000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ndisuio.sys
Address: 0xF0F89000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\serenum.sys
Address: 0xF7A45000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\BOOTVID.dll
Address: 0xF79A9000
Size: 12288 bytes

Driver: compbatt.sys
Address: 0xF79AD000
Size: 12288 bytes

Driver: C:\WINDOWS\System32\drivers\Dxapi.sys
Address: 0xF7349000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\irenum.sys
Address: 0xF7A49000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mouhid.sys
Address: 0xF71F9000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ndistapi.sys
Address: 0xF7A65000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rasacd.sys
Address: 0xF7A35000
Size: 12288 bytes

Driver: aliide.sys
Address: 0xF7A9D000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\Beep.SYS
Address: 0xF7ABD000
Size: 8192 bytes

Driver: dmload.sys
Address: 0xF7A9F000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7B25000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\Fs_Rec.SYS
Address: 0xF7AB9000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\drivers\HookCont.sys
Address: 0xF7ACF000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\KDCOM.DLL
Address: 0xF7A99000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\LKbdFlt2.sys
Address: 0xF7AA7000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\mnmdd.SYS
Address: 0xF7AC5000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\ParVdm.SYS
Address: 0xF7ACB000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\DRIVERS\RDPCDD.sys
Address: 0xF7AC9000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\swenum.sys
Address: 0xF7AAD000
Size: 8192 bytes

Driver: TVALD.SYS
Address: 0xF7AA1000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\USBD.SYS
Address: 0xF7AB3000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\WMILIB.SYS
Address: 0xF7A9B000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\audstub.sys
Address: 0xF7C34000
Size: 4096 bytes

Driver: C:\WINDOWS\System32\drivers\dxgthk.sys
Address: 0xF7B9F000
Size: 4096 bytes

Driver: C:\WINDOWS\System32\Drivers\Null.SYS
Address: 0xF7C70000
Size: 4096 bytes

Driver: C:\WINDOWS\system32\Drivers\RsNTGdi.sys
Address: 0xF7CBA000
Size: 4096 bytes

==============================================
>Stealth
==============================================
>Hooks

ntfs.sys-->ntoskrnl.exe-->IoCheckShareAccess, Type: IAT modification 0xF73FFD10 [HookSys.sys]
ntfs.sys-->ntoskrnl.exe-->MmFlushImageSection, Type: IAT modification 0xF73FFCD0 [HookSys.sys]
ntfs.sys-->ntoskrnl.exe-->SeAccessCheck, Type: IAT modification 0xF73FFE2C [HookSys.sys]
ntoskrnl.exe+0x00004AA2, Type: Inline - RelativeJump 0x804DBAA2 [ntoskrnl.exe]
ntoskrnl.exe+0x0000B74C, Type: Inline - RelativeJump 0x804E274C [ntoskrnl.exe]
ntoskrnl.exe+0x0000B760, Type: Inline - RelativeJump 0x804E2760 [ntoskrnl.exe]
ntoskrnl.exe+0x0000B77C, Type: Inline - RelativeJump 0x804E277C [ntoskrnl.exe]
ntoskrnl.exe+0x0000B7A0, Type: Inline - PushRet 0x804E27A0 [unknown_code_page]
ntoskrnl.exe+0x0000B7B8, Type: Inline - RelativeJump 0x804E27B8 [ntoskrnl.exe]
ntoskrnl.exe+0x0000B878, Type: Inline - RelativeJump 0x804E2878 [ntoskrnl.exe]
ntoskrnl.exe+0x0000B890, Type: Inline - PushRet 0x804E2890 [unknown_code_page]
ntoskrnl.exe+0x0000B96C, Type: Inline - PushRet 0x804E296C [unknown_code_page]
tcpip.sys-->ndis.sys-->NdisCloseAdapter, Type: IAT modification 0xF2A62428 [vsdatant.sys]
tcpip.sys-->ndis.sys-->NdisOpenAdapter, Type: IAT modification 0xF2A62454 [vsdatant.sys]
tcpip.sys-->ndis.sys-->NdisRegisterProtocol, Type: IAT modification 0xF2A62460 [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisCloseAdapter, Type: IAT modification 0xF779EB4C [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisDeregisterProtocol, Type: IAT modification 0xF779EB1C [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisOpenAdapter, Type: IAT modification 0xF779EB3C [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisRegisterProtocol, Type: IAT modification 0xF779EB28 [vsdatant.sys]
[1376]explorer.exe-->advapi32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x77DD1218 [shimeng.dll]
[1376]explorer.exe-->gdi32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x77F110B4 [shimeng.dll]
[1376]explorer.exe-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x01001268 [shimeng.dll]
[1376]explorer.exe-->shell32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x7C9C15A4 [shimeng.dll]
[1376]explorer.exe-->user32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x7E41133C [shimeng.dll]
[1376]explorer.exe-->wininet.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x78051488 [shimeng.dll]
[1376]explorer.exe-->ws2_32.dll-->kernel32.dll-->GetProcAddress, Type: IAT modification 0x71AB109C [shimeng.dll]
         
Hoffe ja das mir jemand helfen kann.
schon mal Danke
mfG
__________________


Alt 22.11.2008, 10:25   #3
hfmei
 
Rootkits oder Trojaner im Computer? - Standard

Rootkits oder Trojaner im Computer?



Hallo,
Danke, ein tolles Forum, nach einer Woche noch keine Antwort!
Ihr koennt mein Thema schliessen, da ich in einem anderen Forum schon nach einem Tag Hilfe bekommen habe.
mfG
hmei
__________________

Antwort

Themen zu Rootkits oder Trojaner im Computer?
7-zip, adobe, antivirus, application, bho, bootvorgang, browser, combofix, computer, desktop, down, finds, gpedit.msc, helper, hijack, hijackthis, internet, internet explorer, launch, log datei, malware, monitor, nero.exe, nodrives, notepad.exe, programm, registry, rootkit, saver, shortcut, shut down, software, system, tastatur, tracker, trojaner, usb, windows, windows xp, windows xp sp3, xp sp3




Ähnliche Themen: Rootkits oder Trojaner im Computer?


  1. Computer wird immer langsamer - Viren/Malware oder Trojaner?
    Plagegeister aller Art und deren Bekämpfung - 03.05.2015 (16)
  2. Befinden sich noch Trojaner (dropper.gen; win32.downloader.gen)auf meinem Computer oder nicht?
    Log-Analyse und Auswertung - 02.06.2014 (7)
  3. Trojaner - Achtung! Ihr Computer ist aus einem oder mehreren der unten aufgeführten Gründe gesperrt.
    Log-Analyse und Auswertung - 07.12.2013 (13)
  4. GVU Trojaner: Achtung! Ihr Computer ist aus einem oder mehreren der unten ausgeführten Gründen gesperrt.
    Log-Analyse und Auswertung - 17.08.2013 (7)
  5. Trojaner oder Virus blockiert Computer – und will Geld überweisen
    Plagegeister aller Art und deren Bekämpfung - 19.12.2012 (13)
  6. Virus oder Trojaner auf dem Computer führt zu Problemen, evtl. Conficker
    Plagegeister aller Art und deren Bekämpfung - 29.11.2012 (25)
  7. Laptop voller Trojaner! ATRAPS, Rootkits...
    Log-Analyse und Auswertung - 19.09.2012 (3)
  8. GVU Trojaner mit 100€ Zahlungsaufforderung "Ihr computer ist aus einem oder mehreren der unten aufgeführten Gründe gesperrt."
    Log-Analyse und Auswertung - 10.09.2012 (12)
  9. GVU-Trojaner: Ihr Computer wurde aus einem oder mehreren ... WIN XP
    Plagegeister aller Art und deren Bekämpfung - 06.09.2012 (10)
  10. (2x) GVU Trojaner mit 100€ Zahlungsaufforderung "Ihr computer ist aus einem oder mehreren der unten aufgeführten Gründe gesperrt."
    Mülltonne - 01.09.2012 (1)
  11. GVU Trojaner mit 100€ Zahlungsaufforderung "Ihr computer ist aus einem oder mehreren der unten aufgeführten Gründe gesperrt."
    Log-Analyse und Auswertung - 20.08.2012 (13)
  12. Trojaner TR/Atraps.gen2/TR, Crypt.ULPM.Gen, TR/Nedsym.G.400 und Rootkits
    Plagegeister aller Art und deren Bekämpfung - 06.08.2012 (44)
  13. Kann man Trojaner und Rootkits erst nach Wochen entdecken
    Alles rund um Windows - 05.07.2011 (4)
  14. Total verseucht: Rootkits, Trojaner und Viren auf Laptop, PC und ext. Festplatten
    Log-Analyse und Auswertung - 30.03.2009 (8)
  15. Downloader trojaner und rootkits!!!
    Plagegeister aller Art und deren Bekämpfung - 15.02.2009 (4)
  16. Trojaner, Rootkits,...bitte um Hilfe
    Log-Analyse und Auswertung - 02.02.2009 (2)
  17. Wieder Trojaner, Rootkits und anderes?
    Plagegeister aller Art und deren Bekämpfung - 16.09.2008 (6)

Zum Thema Rootkits oder Trojaner im Computer? - Hallo, Ich brauche Hilfe. In meinem LapTop ist Windows XP prof. (software und Tastatur in englisch) mit SP3 installiert. Nach der installieren vom SP3 bzw. kurze Zeit spaeter wurde der - Rootkits oder Trojaner im Computer?...
Archiv
Du betrachtest: Rootkits oder Trojaner im Computer? auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.