|
Log-Analyse und Auswertung: Internetseiten oeffnen sich einfach, TrojanerWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
16.12.2008, 12:26 | #1 |
| Internetseiten oeffnen sich einfach, Trojaner Hallo! Immer wieder oeffnen sich neue Internetseiten,egal ob ich im Internet explorer bin oder im Mozilla. Sehr oft kommt folgende siete, die aber komplett weiss bleibt: h**p://sagipsul.com/go/rfe.php?cmp=vm_mg_fails_juan&uid=490DA4A2C98711DDAF87150044CFFFFF&guid=0F924E0627AE4EB8B7203B85158E5140&lid=&url=sich&affid=150044&b42=&b42=0.0020 Ausserdem kommt die Meldung: RUNDLL c:windows/system32/bnspvfwf.dll Wenn ich ein Update von avira antivir machen moechte, sagt es mir, dass ich eine verbindung mit dem internet herstellen soll, obwohl ich schon laengst im internet bin. Ich weiss nicht genau, was hier passiert ist, denn ich habe den pc fuer eine woche nicht benutzt, sondern meine mitbewohner, die behaupten auch keine ahnung zu haben.... Es waere nett wenn man mir hier, schritt fuer schritt wie einem kleinkind, erklaert was ich tun muss ich bin ledier kein pc-kenner! Hier habe ich schon mal die hijack file: (Benutze Windows XP) Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 12:14:44, on 2008-12-16 Platform: Windows XP Dodatek SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16674) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\system32\spoolsv.exe C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe C:\WINDOWS\System32\FTRTSVC.exe C:\WINDOWS\system32\nvsvc32.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\RUNDLL32.EXE C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe D:\Program Files\PowerISO\PWRISOVM.EXE C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe C:\PROGRA~1\NEOSTR~1\TaskBarIcon.exe C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe C:\Program Files\QuickTime\qttask.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe D:\Program Files\Picasa2\PicasaMediaDetector.exe C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe C:\Program Files\Hewlett-Packard\Toolbox2.0\Javasoft\JRE\1.3.1\bin\javaw.exe C:\WINDOWS\system32\wscntfy.exe C:\Program Files\Common Files\Teleca Shared\Generic.exe C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe C:\PROGRA~1\NEOSTR~1\neostradatp.exe C:\PROGRA~1\NEOSTR~1\ComComp.exe C:\PROGRA~1\NEOSTR~1\Toaster.exe C:\PROGRA~1\NEOSTR~1\Inactivity.exe C:\PROGRA~1\NEOSTR~1\PollingModule.exe C:\WINDOWS\System32\ALERTM~1\ALERTM~1.EXE C:\PROGRA~1\NEOSTR~1\Watch.exe D:\Program Files\Mozilla Firefox\firefox.exe D:\Program Files\Trend Micro\HijackThis\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://www.google.pl/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = h**p://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = h**p://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = h**p://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = neostrada tp R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza R3 - URLSearchHook: (no name) - {00A6FAF6-072E-44cf-8957-5838F569A31D} - C:\Program Files\MyWebSearch\SrchAstt\1.bin\MWSSRCAS.DLL R3 - URLSearchHook: Search Class - {08C06D61-F1F3-4799-86F8-BE1A89362C85} - C:\PROGRA~1\NEOSTR~1\SEARCH~1.DLL O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [StatusClient] C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe /auto O4 - HKLM\..\Run: [TomcatStartup] C:\Program Files\Hewlett-Packard\Toolbox2.0\hpbpsttp.exe O4 - HKLM\..\Run: [WOOWATCH] C:\PROGRA~1\NEOSTR~1\Watch.exe O4 - HKLM\..\Run: [WOOTASKBARICON] C:\PROGRA~1\NEOSTR~1\GestMaj.exe TaskBarIcon.exe O4 - HKLM\..\Run: [PWRISOVM.EXE] d:\Program Files\PowerISO\PWRISOVM.EXE O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "D:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe" O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [VoipDiscount] "D:\instalki\voipdiscount\voipdiscount.exe" -nosplash -minimized O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background O4 - HKCU\..\Run: [Picasa Media Detector] D:\Program Files\Picasa2\PicasaMediaDetector.exe O4 - HKCU\..\Run: [Octoshape Streaming Services] "C:\Documents and Settings\**\Ustawienia lokalne\Dane aplikacji\Octoshape\Octoshape Streaming Services\OctoshapeClient.exe" -inv:bootrun O4 - HKLM\..\Policies\Explorer\Run: [iTunesHelper Module] C:\Program Files\WebMediaViewer\itunes.exe O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'USŁUGA LOKALNA') O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'USŁUGA SIECIOWA') O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user') O4 - Global Startup: DSLMON.lnk = C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm O8 - Extra context menu item: E&ksport do programu Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000 O8 - Extra context menu item: Pobierz z &BitSpirit - D:\Program Files\BitSpirit\bsurl.htm O9 - Extra button: Badanie - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O17 - HKLM\System\CCS\Services\Tcpip\..\{984B8E35-5C07-43F7-A013-10358FEECE11}: NameServer = 85.255.113.149;85.255.112.218 O17 - HKLM\System\CCS\Services\Tcpip\..\{F988697C-6960-41E0-985F-D99BFE9132DB}: NameServer = 85.255.113.149;85.255.112.218 O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.113.149;85.255.112.218 O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.113.149;85.255.112.218 O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.113.149;85.255.112.218 O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL O20 - AppInit_DLLs: fopumn.dll O23 - Service: Avira AntiVir Personal - Free Antivirus Planer (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom - C:\WINDOWS\System32\FTRTSVC.exe O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe -- End of file - 7524 bytes Ich habe mit avira antivir folgendes herausbekommen: Die Datei 'C:\Documents and Settings\***\Ustawienia lokalne\Temporary Internet Files\Content.IE5\GFBYNAMN\freescan[1].htm' enthielt einen Virus oder unerwünschtes Programm 'JS/Agent.1366' [virus]. Durchgeführte Aktion(en): Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '49ac9285.qua' verschoben! vielen dank schon mal im voraus!!! Geändert von kathy-brown (16.12.2008 um 13:24 Uhr) |
16.12.2008, 14:54 | #2 |
| Internetseiten oeffnen sich einfach, Trojaner Jetzt habe ich das alles mal noch durch die Malwarebytes laufen lassen und geloescht:
__________________Malwarebytes' Anti-Malware 1.31 Datenbank Version: 1506 Windows 5.1.2600 Dodatek Service Pack 2 2008-12-16 14:07:57 mbam-log-2008-12-16 (14-07-57).txt Scan-Methode: Vollständiger Scan (C:\|D:\|) Durchsuchte Objekte: 124803 Laufzeit: 45 minute(s), 10 second(s) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 4 Infizierte Registrierungsschlüssel: 25 Infizierte Registrierungswerte: 2 Infizierte Dateiobjekte der Registrierung: 20 Infizierte Verzeichnisse: 10 Infizierte Dateien: 35 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: C:\WINDOWS\system32\cbXRIbBu.dll (Trojan.Vundo.H) -> Delete on reboot. C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948.x86 (Rootkit.Zlob) -> Delete on reboot. C:\WINDOWS\system32\mlJCVOhi.dll (Trojan.Vundo) -> Delete on reboot. C:\WINDOWS\system32\fopumn.dll (Trojan.Vundo.H) -> Delete on reboot. Infizierte Registrierungsschlüssel: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2c038891-1225-4730-b88d-d65c2535c3de} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{2c038891-1225-4730-b88d-d65c2535c3de} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mljcvohi (Trojan.Vundo.H) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e3021737-4057-4164-99b2-4a654b92fb3e} (Trojan.Vundo.H) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{e3021737-4057-4164-99b2-4a654b92fb3e} (Trojan.Vundo.H) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{00a6faf6-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{e3021737-4057-4164-99b2-4a654b92fb3e} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2c038891-1225-4730-b88d-d65c2535c3de} (Trojan.Vundo.H) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive (Adware.MyWebSearch) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{00a6faf6-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Delete on reboot. Infizierte Dateiobjekte der Registrierung: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\cbxribbu -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\cbxribbu -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully. Infizierte Verzeichnisse: C:\Program Files\MyWebSearch (Adware.MyWebSearch) -> Delete on reboot. C:\Program Files\MyWebSearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\MyWebSearch\bar\1.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\MyWebSearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\MyWebSearch\SrchAstt (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\MyWebSearch\SrchAstt\1.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\FunWebProducts\ScreenSaver (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\FunWebProducts\ScreenSaver\Images (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\resycled (Trojan.DNSChanger) -> Quarantined and deleted successfully. Infizierte Dateien: C:\WINDOWS\system32\fopumn.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\mlJCVOhi.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\cbXRIbBu.dll (Trojan.Vundo.H) -> Delete on reboot. C:\WINDOWS\system32\uBbIRXbc.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\uBbIRXbc.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\cabrvgwb.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\bwgvrbac.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948.x86 (Rootkit.Zlob) -> Delete on reboot. C:\Program Files\MyWebSearch\SrchAstt\1.bin\MWSSRCAS.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948 (Rootkit.Zlob) -> Quarantined and deleted successfully. C:\Documents and Settings\Bronek\Ustawienia lokalne\Temp\vmitla1.exe (Rootkit.Zlob) -> Quarantined and deleted successfully. C:\Documents and Settings\Bronek\Ustawienia lokalne\Temporary Internet Files\Content.IE5\4TNAZ1JC\kbp41256[1] (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Documents and Settings\Bronek\Ustawienia lokalne\Temporary Internet Files\Content.IE5\FJI6KRXV\index[2] (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\Documents and Settings\Bronek\Ustawienia lokalne\Temporary Internet Files\Content.IE5\GFBYNAMN\zc113432[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\Program Files\MyWebSearch\bar\1.bin\MWSOEMON.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\Internet Explorer\msimg32.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\Program Files\Mozilla Firefox\components\iamfamous.dll (Spyware.Passwords) -> Quarantined and deleted successfully. C:\WINDOWS\system32\f3PSSavr.scr (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\WINDOWS\system32\rvavkckw.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\lsktkgxx.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\qibvblgv.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully. C:\WINDOWS\system32\rkcagybn.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\sklfmq.dll (Trojan.Vundo) -> Quarantined and deleted successfully. D:\Program Files\Mozilla Firefox\components\iamfamous.dll (Spyware.Passwords) -> Quarantined and deleted successfully. C:\Program Files\MyWebSearch\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\resycled\boot.com (Trojan.DNSChanger) -> Quarantined and deleted successfully. C:\WINDOWS\system32\msqpdxosvdbrsr.dll (Trojan.Agent) -> Delete on reboot. C:\WINDOWS\system32\drivers\msqpdxpqltoiqh.sys (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\drivers\msqpdxserv.sys (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\Temp\tempo-FF.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully. C:\WINDOWS\Temp\tempo-31D.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully. C:\WINDOWS\Temp\tempo-3B9.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully. C:\WINDOWS\Temp\tempo-AEB.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully. C:\WINDOWS\Temp\tempo-BC9.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully. C:\WINDOWS\Temp\tempo-D6F.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully. |
16.12.2008, 14:55 | #3 |
| Internetseiten oeffnen sich einfach, Trojaner dannach nochmal im runscan:
__________________Runscanner logfile http://www.runscanner.net * = signed file - = file not found General info ------------ Computer name : *** Creation time : 2008-12-16 14:38:39 Hosts <> 127.0.0.1 : 0 Hosts file location : %SystemRoot%\System32\drivers\etc IE version : 7.0.5730.13 OS : Microsoft Windows XP OS Build : 2600 OS SP : Dodatek Service Pack 2 RunScanner Version : 1.7.0.0 User Language : Polski User rights : Administrator Windows folder : C:\WINDOWS Running processes ----------------- C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe * C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe (Adobe Systems Incorporated) C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe (Avira GmbH) C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe (Avira GmbH) C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe (Avira GmbH) * C:\WINDOWS\system32\winlogon.exe (Microsoft Corporation) C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe * C:\WINDOWS\System32\alg.exe (Microsoft Corporation) C:\WINDOWS\System32\ALERTM~1\ALERTM~1.EXE C:\PROGRA~1\NEOSTR~1\Inactivity.exe C:\PROGRA~1\NEOSTR~1\Toaster.exe (France Telecom R&D) C:\PROGRA~1\NEOSTR~1\PollingModule.exe C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe (Sony Ericsson Mobile Communications AB) * C:\WINDOWS\system32\csrss.exe (Microsoft Corporation) * D:\instalki\voipdiscount\voipdiscount.exe (VoipDiscount) * C:\WINDOWS\system32\ctfmon.exe (Microsoft Corporation) * C:\WINDOWS\Explorer.EXE (Microsoft Corporation) C:\PROGRA~1\NEOSTR~1\neostradatp.exe (France Télécom R&D) * D:\Program Files\Mozilla Firefox\firefox.exe (Mozilla Corporation) C:\WINDOWS\System32\FTRTSVC.exe (France Telecom) C:\Program Files\Common Files\Teleca Shared\Generic.exe (Teleca AB) * C:\WINDOWS\system32\svchost.exe (Microsoft Corporation) * C:\WINDOWS\system32\svchost.exe (Microsoft Corporation) * C:\WINDOWS\system32\svchost.exe (Microsoft Corporation) * C:\WINDOWS\System32\svchost.exe (Microsoft Corporation) * C:\WINDOWS\system32\svchost.exe (Microsoft Corporation) * C:\WINDOWS\system32\svchost.exe (Microsoft Corporation) C:\PROGRA~1\NEOSTR~1\TaskBarIcon.exe (France Télécom R&D) C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe (Hewlett-Packard) C:\Program Files\Hewlett-Packard\Toolbox2.0\Javasoft\JRE\1.3.1\bin\javaw.exe * C:\WINDOWS\system32\lsass.exe (Microsoft Corporation) * c:\windows\System32\smss.exe (Microsoft Corporation) C:\PROGRA~1\NEOSTR~1\ComComp.exe (France Télécom R&D) C:\WINDOWS\system32\nvsvc32.exe (NVIDIA Corporation) * D:\Program Files\Picasa2\PicasaMediaDetector.exe (Google Inc.) D:\Program Files\PowerISO\PWRISOVM.EXE (PowerISO Computing, Inc.) C:\Program Files\QuickTime\qttask.exe (Apple Computer, Inc.) * D:\RunScanner.exe (Runscanner.net) * C:\WINDOWS\system32\spoolsv.exe (Microsoft Corporation) C:\PROGRA~1\NEOSTR~1\Watch.exe (France Télécom R&D) * C:\WINDOWS\system32\RUNDLL32.EXE (Microsoft Corporation) * C:\WINDOWS\system32\services.exe (Microsoft Corporation) * C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe (Microsoft Corporation) * C:\WINDOWS\system32\wscntfy.exe (Microsoft Corporation) * C:\WINDOWS\system32\wdfmgr.exe (Microsoft Corporation) Unrated items ------------- 002 C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe (Avira GmbH) 002 C:\WINDOWS\system32\NvCpl.dll (NVIDIA Corporation) 002 C:\WINDOWS\system32\NvMcTray.dll (NVIDIA Corporation) 002 d:\Program Files\PowerISO\PWRISOVM.EXE (PowerISO Computing, Inc.) 002 C:\Program Files\QuickTime\qttask.exe (Apple Computer, Inc.) 002 C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe 002 C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe (Hewlett-Packard) 002 C:\Program Files\Hewlett-Packard\Toolbox2.0\hpbpsttp.exe (Hewlett-Packard) 002 C:\PROGRA~1\NEOSTR~1\GestMaj.exe (France Télécom R&D) 002 C:\PROGRA~1\NEOSTR~1\Watch.exe (France Télécom R&D) 003 * C:\Documents and Settings\***\Ustawienia lokalne\Dane aplikacji\Octoshape\Octoshape Streaming Services\OctoshapeClient.exe (Octoshape ApS) 003 * D:\instalki\voipdiscount\voipdiscount.exe (VoipDiscount) 005 C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe 010 C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe (Avira AntiVir Personal - Free Antivirus Guard) 010 C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe (Avira AntiVir Personal - Free Antivirus Planer) 010 C:\WINDOWS\System32\FTRTSVC.exe (France Telecom Routing Table Service) 010 C:\WINDOWS\system32\nvsvc32.exe (NVIDIA Display Driver Service) 011 * C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgio.sys (avgio) 011 * C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgntflt.sys (avgntflt) 011 * C:\WINDOWS\system32\DRIVERS\avipbb.sys (avipbb) 011 C:\WINDOWS\System32\Drivers\e4ldr.sys (General Purpose USB Driver (e4ldr.sys)) 011 C:\WINDOWS\system32\DRIVERS\nv4_mini.sys (nv) 011 * C:\WINDOWS\system32\drivers\pavboot.sys (pavboot) 011 C:\WINDOWS\system32\PCANDIS5.SYS (PCANDIS5 NDIS Protocol Driver) 011 * C:\WINDOWS\System32\Drivers\PxHelp20.sys (PxHelp20) 011 C:\WINDOWS\system32\drivers\SCDEmu.sys (SCDEmu) 011 * C:\WINDOWS\system32\DRIVERS\s816bus.sys (Sony Ericsson Device 816 driver (WDM)) 011 * C:\WINDOWS\system32\DRIVERS\s816nd5.sys (Sony Ericsson Device 816 USB Ethernet Emulation SEMCMR7 (NDIS)) 011 * C:\WINDOWS\system32\DRIVERS\s816unic.sys (Sony Ericsson Device 816 USB Ethernet Emulation SEMCMR7 (WDM)) 011 * C:\WINDOWS\system32\DRIVERS\s816mgmt.sys (Sony Ericsson Device 816 USB WMC Device Management Drivers (WDM)) 011 * C:\WINDOWS\system32\DRIVERS\s816mdm.sys (Sony Ericsson Device 816 USB WMC Modem Driver) 011 * C:\WINDOWS\system32\DRIVERS\s816mdfl.sys (Sony Ericsson Device 816 USB WMC Modem Filter) 011 * C:\WINDOWS\system32\DRIVERS\s816obex.sys (Sony Ericsson Device 816 USB WMC OBEX Interface) 011 C:\WINDOWS\System32\Drivers\sptd.sys (sptd) 011 C:\WINDOWS\system32\DRIVERS\ssmdrv.sys (ssmdrv) 011 C:\WINDOWS\system32\DRIVERS\e4usbaw.sys (USB ADSL2 WAN Adapter) 011 C:\WINDOWS\System32\Drivers\pcouffin.sys (VSO Software pcouffin) 040 C:\PROGRA~1\NEOSTR~1\SEARCH~1.DLL {08C06D61-F1F3-4799-86F8-BE1A89362C85} 061 C:\WINDOWS\system32\nvshell.dll {1CDB2949-8F65-4355-8456-263E7C208A5D} 061 C:\WINDOWS\system32\nvshell.dll {1E9B04FB-F9E5-4718-997B-B8DA88302A47} 061 d:\Program Files\Codec\Haali\mmfinfo.dll {0561EC90-CE54-4f0c-9C55-E226110A740C} 061 d:\Program Files\Codec\Haali\mmfinfo.dll {5574006C-28F5-4a65-A28C-74DE6BFBE0BB} 061 d:\Program Files\Codec\Haali\mmfinfo.dll {327669A0-59A7-4be9-B99E-1C9F3A57611A} 061 C:\Program Files\Sony Ericsson\Mobile2\File Manager\FM.dll (Popwire AB) {03DAACC5-10BA-4E3E-9D54-2A569F6B4B87} 061 C:\Program Files\Sony Ericsson\Mobile2\File Manager\FM.dll (Popwire AB) {738D66C6-0149-4D40-84E4-A7BB2D0CE949} 061 C:\WINDOWS\system32\nvcpl.dll (NVIDIA Corporation) {A70C977A-BF00-412C-90B7-034C51DA2439} 061 C:\WINDOWS\system32\nvshell.dll {1E9B04FB-F9E5-4718-997B-B8DA88302A48} 061 C:\WINDOWS\system32\nvcpl.dll (NVIDIA Corporation) {FFB699E0-306A-11d3-8BD1-00104B6F7516} 061 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 061 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A} 061 * C:\PROGRA~1\TUNEUP~1\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403} 061 * C:\WINDOWS\system32\uxtuneup.dll (TuneUp Software GmbH) {44440D00-FF19-4AFC-B765-9A0970567D97} 061 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 062 d:\Program Files\Codec\Haali\mmfinfo.dll {0561EC90-CE54-4f0c-9C55-E226110A740C} 100 Start Page HKCU : http://www.google.pl/ 104 GUID / CLSID not found {8FFBE65D-2C9C-4669-84BD-5829DC0B603C} 105 &Windows Live Search : res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm 105 E&ksport do programu Microsoft Excel : res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000 105 ÓñČĚŘľ«ÁéĎÂÔŘ(&B) : 105 Pobierz z &BitSpirit : D:\Program Files\BitSpirit\bsurl.htm 120 NameServer {F988697C-6960-41E0-985F-D99BFE9132DB} : 194.204.159.1 217.98.63.164 170 {1d060757-76f4-11db-a7b8-806d6172696f} : C:\WINDOWS\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL resycled\boot.com c: 170 {1d060758-76f4-11db-a7b8-806d6172696f} : C:\WINDOWS\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL resycled\boot.com d: 173 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 173 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A} 173 * C:\PROGRA~1\TUNEUP~1\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403} 173 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 221 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 221 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A} 221 * C:\PROGRA~1\TUNEUP~1\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403} 221 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 225 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 225 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 225 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A} 225 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A} 225 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 225 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 227 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE} 227 * C:\PROGRA~1\TUNEUP~1\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403} 227 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA} 229 C:\WINDOWS\system32\nvshell.dll {1E9B04FB-F9E5-4718-997B-B8DA88302A48} 229 C:\WINDOWS\system32\nvcpl.dll (NVIDIA Corporation) {A70C977A-BF00-412C-90B7-034C51DA2439} 231 d:\Program Files\Codec\Haali\mmfinfo.dll Haali Column Provider Missing files ------------- 011 C:\WINDOWS\system32\drivers\Abiosdsk.sys 011 C:\WINDOWS\system32\drivers\abp480n5.sys 011 C:\WINDOWS\system32\drivers\adpu160m.sys 011 C:\WINDOWS\system32\drivers\Aha154x.sys 011 C:\WINDOWS\system32\drivers\aic78u2.sys 011 C:\WINDOWS\system32\drivers\aic78xx.sys 011 C:\WINDOWS\system32\drivers\AliIde.sys 011 C:\WINDOWS\system32\drivers\amsint.sys 011 C:\WINDOWS\system32\drivers\asc.sys 011 C:\WINDOWS\system32\drivers\asc3350p.sys 011 C:\WINDOWS\system32\drivers\asc3550.sys 011 C:\WINDOWS\system32\drivers\Atdisk.sys 011 C:\WINDOWS\system32\drivers\cd20xrnt.sys 011 C:\WINDOWS\system32\drivers\Changer.sys 011 C:\WINDOWS\system32\drivers\CmdIde.sys 011 C:\WINDOWS\system32\drivers\Cpqarray.sys 011 C:\WINDOWS\system32\drivers\dac2w2k.sys 011 C:\WINDOWS\system32\drivers\dac960nt.sys 011 C:\WINDOWS\system32\drivers\dpti2o.sys 011 E:\INSTALL\GMSIPCI.SYS 011 C:\WINDOWS\system32\drivers\hpn.sys 011 C:\WINDOWS\system32\drivers\i2omgmt.sys 011 C:\WINDOWS\system32\drivers\i2omp.sys 011 C:\WINDOWS\system32\drivers\ini910u.sys 011 C:\WINDOWS\system32\drivers\IntelIde.sys 011 C:\WINDOWS\system32\drivers\lbrtfdc.sys 011 C:\WINDOWS\system32\drivers\mraid35x.sys 011 E:\NTACCESS.sys 011 c:\windows\system32\drivers\PalmUSBD.sys 011 C:\WINDOWS\system32\PCAMPR5.SYS 011 C:\WINDOWS\system32\drivers\PCIDump.sys 011 C:\WINDOWS\system32\drivers\PCIIde.sys 011 C:\WINDOWS\system32\drivers\PDCOMP.sys 011 C:\WINDOWS\system32\drivers\PDFRAME.sys 011 C:\WINDOWS\system32\drivers\PDRELI.sys 011 C:\WINDOWS\system32\drivers\PDRFRAME.sys 011 C:\WINDOWS\system32\drivers\perc2.sys 011 C:\WINDOWS\system32\drivers\perc2hib.sys 011 C:\WINDOWS\system32\drivers\ql1080.sys 011 C:\WINDOWS\system32\drivers\Ql10wnt.sys 011 C:\WINDOWS\system32\drivers\ql12160.sys 011 C:\WINDOWS\system32\drivers\ql1240.sys 011 C:\WINDOWS\system32\drivers\ql1280.sys 011 E:\NTGLM7X.sys 011 C:\WINDOWS\system32\drivers\Simbad.sys 011 C:\WINDOWS\system32\drivers\Sparrow.sys 011 C:\WINDOWS\system32\drivers\sym_hi.sys 011 C:\WINDOWS\system32\drivers\sym_u3.sys 011 C:\WINDOWS\system32\drivers\symc810.sys 011 C:\WINDOWS\system32\drivers\symc8xx.sys 011 C:\WINDOWS\system32\drivers\TosIde.sys 011 C:\WINDOWS\system32\drivers\ultra.sys 011 C:\WINDOWS\system32\drivers\WDICA.sys 061 deskpan.dll 121 fopumn.dll 167 C:\Program Files\WebMediaViewer\itunes.exe hoffe das bring euch weiter |
16.12.2008, 14:58 | #4 |
| Internetseiten oeffnen sich einfach, Trojaner SDFix für Windows 2000 und Windows XP Download link 1 SDFix zum Desktop Starte dein Recher in abgesicherten Modus SDFix.zip entpacken unter C:\ findet man nun den SDFix-Ordner Doppelklick RunThis.bat Schreibe: Y folge allen Anweisungen Dann wird der Rechner neustarten SDFix entfernt jetzt die gefundene Objekte Kopiere den Inhalt des Berichts SophosReport.txt in diesen Thread Und ein log von HJ |
16.12.2008, 16:36 | #5 |
| Internetseiten oeffnen sich einfach, Trojaner SDFix: Version 1.240 Run by *** on 2008-12-16 at 15:53 Microsoft Windows XP [Wersja 5.1.2600] Running From: C:\SDFix Checking Services : Restoring Default Security Values Restoring Default Hosts File Rebooting Checking Files : Trojan Files Found: C:\autorun.inf - Deleted C:\resycled\boot.com - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\tmp1.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\TMP10.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\tmp11.tmp - Deleted C:\DOCUME~1***\USTAWI~1\Temp\tmp12.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\TMP13.tmp - Deleted C:\DOCUME~1***\\USTAWI~1\Temp\TMP14.tmp - Deleted C:\DOCUME~1\***\\USTAWI~1\Temp\tmp15.tmp - Deleted C:\DOCUME~1**\USTAWI~1\Temp\tmp16.tmp - Deleted C:\DOCUME~1***\\USTAWI~1\Temp\TMP17.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\tmp18.tmp - Deleted C:\DOCUME~1\***\\USTAWI~1\Temp\tmp19.tmp - Deleted C:\DOCUME~1\***\\USTAWI~1\Temp\tmp2.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\tmp3.tmp - Deleted C:\DOCUME~1\***\\USTAWI~1\Temp\TMP3C.tmp - Deleted C:\DOCUME~1\***\\USTAWI~1\Temp\TMP3D.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\tmp4.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\tmp5.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\TMP6.tmp - Deleted C:\DOCUME~1\***\\USTAWI~1\Temp\tmp7.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\TMP8.tmp - Deleted C:\DOCUME~1\***\\USTAWI~1\Temp\TMP9.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\tmpA7.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\tmpA8.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\TMPE.tmp - Deleted C:\DOCUME~1\***\USTAWI~1\Temp\TMPF.tmp - Deleted Folder C:\resycled - Removed Removing Temp Files ADS Check : Final Check : catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2008-12-16 15:58:41 Windows 5.1.2600 Dodatek Service Pack 2 NTFS scanning hidden processes ... scanning hidden services & system hive ... [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\C5D31D3C0ABCB948] "Type"=dword:00000001 "Start"=dword:00000002 "ErrorControl"=dword:00000000 "ImagePath"=str(2):"\??\C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\C5D31D3C0ABCB948\Security] "Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,.. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msqpdxserv.sys] "start"=dword:00000001 "type"=dword:00000001 "imagepath"=str(2):"\systemroot\system32\drivers\msqpdxpqltoiqh.sys" "group"="file system" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msqpdxserv.sys\modules] "msqpdxserv"="\systemroot\system32\drivers\msqpdxpqltoiqh.sys" "msqpdxl"="\systemroot\system32\msqpdxosvdbrsr.dll" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg] "s1"=dword:2df9c43f "s2"=dword:110480d0 "h0"=dword:00000003 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04] "h0"=dword:00000000 "ujdew"=hex:ed,ca,34,06,ae,8a,15,ee,78,ea,96,c9,54,ac,a9,44,79,6d,2b,e0,71,.. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC] "h0"=dword:00000001 "hdf12"=hex:b7,78,c6,e0,49,b2,1b,59,51,9e,dc,82,11,aa,e3,fd,c1,35,2d,46,ae,.. [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] "h0"=dword:00000002 "khjeh"=hex:e5,02,82,bb,02,9e,af,b6,b5,4c,df,9f,78,48,e4,ed,d7,f9,19,3a,69,.. [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\C5D31D3C0ABCB948] "Type"=dword:00000001 "Start"=dword:00000002 "ErrorControl"=dword:00000000 "ImagePath"=str(2):"\??\C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948" [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\C5D31D3C0ABCB948\Security] "Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,.. [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\msqpdxserv.sys] "start"=dword:00000001 "type"=dword:00000001 "imagepath"=str(2):"\systemroot\system32\drivers\msqpdxpqltoiqh.sys" "group"="file system" [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\msqpdxserv.sys\modules] "msqpdxserv"="\systemroot\system32\drivers\msqpdxpqltoiqh.sys" "msqpdxl"="\systemroot\system32\msqpdxosvdbrsr.dll" [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04] "h0"=dword:00000000 "ujdew"=hex:ed,ca,34,06,ae,8a,15,ee,78,ea,96,c9,54,ac,a9,44,79,6d,2b,e0,71,.. [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC] "h0"=dword:00000001 "hdf12"=hex:b7,78,c6,e0,49,b2,1b,59,51,9e,dc,82,11,aa,e3,fd,c1,35,2d,46,ae,.. [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4] "h0"=dword:00000002 "khjeh"=hex:e5,02,82,bb,02,9e,af,b6,b5,4c,df,9f,78,48,e4,ed,d7,f9,19,3a,69,.. scanning hidden registry entries ... scanning hidden files ... scan completed successfully hidden processes: 0 hidden services: 0 hidden files: 0 Remaining Services : Authorized Application Key Export: [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list] "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019" "C:\\Program Files\\VoipDiscount.com\\VoipDiscount\\VoipDiscount.exe"="C:\\Program Files\\VoipDiscount.com\\VoipDiscount\\VoipDiscount.exe:*:Enabled:VoipDiscount" "D:\\instalki\\VoipDiscount\\VoipDiscount.exe"="D:\\instalki\\VoipDiscount\\VoipDiscount.exe:*:Enabled:VoipDiscount" "C:\\Program Files\\BitSpirit\\BitSpirit.exe"="C:\\Program Files\\BitSpirit\\BitSpirit.exe:*:Enabled:The powerful and easy-to-use BitTorrent Client" "C:\\Program Files\\Ares\\Ares.exe"="C:\\Program Files\\Ares\\Ares.exe:*:Enabled:Ares p2p for windows" "D:\\instalki\\Gadu-Gadu\\gg.exe"="D:\\instalki\\Gadu-Gadu\\gg.exe:*:Enabled:Gadu-Gadu - program gˆ˘wny" "C:\\Program Files\\Hewlett-Packard\\Toolbox2.0\\Javasoft\\JRE\\1.3.1\\bin\\javaw.exe"="C:\\Program Files\\Hewlett-Packard\\Toolbox2.0\\Javasoft\\JRE\\1.3.1\\bin\\javaw.exe:*isabled:javaw" "C:\\WINDOWS\\system32\\usmt\\migwiz.exe"="C:\\WINDOWS\\system32\\usmt\\migwiz.exe:*:Enabled:Kreator transferu plik˘w i ustawieä" "d:\\Program Files\\BitSpirit\\BitSpirit.exe"="D:\\Program Files\\BitSpirit\\BitSpirit.exe:*:Enabled:The powerful and easy-to-use BitTorrent Client" "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000" "C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger" "C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)" "C:\\Documents and Settings\\**\\Ustawienia lokalne\\Dane aplikacji\\Octoshape\\Octoshape Streaming Services\\OctoshapeClient.exe"="C:\\Documents and Settings\\Bronek\\Ustawienia lokalne\\Dane aplikacji\\Octoshape\\Octoshape Streaming Services\\OctoshapeClient.exe:*:Enabled:Main program for Octoshape client" "C:\\Program Files\\Skype\\Phone\\Skype.exe"="C:\\Program Files\\Skype\\Phone\\Skype.exe:*:Enabled:Skype" [HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list] "%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019" "%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000" "C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger" "C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)" Remaining Files : File Backups: - C:\SDFix\backups\backups.zip Files with Hidden Attributes : Sun 16 Dec 2007 4,348 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak" Sun 16 Dec 2007 401 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv17.bak" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\0c17680ecec6cda1c3c55287bcbfb340\BIT1F.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\1831cb0eb2edc94e4099a128e7774c8f\BIT1E.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\28fa3d552b86948b1c727cfe113ce6b9\BIT18.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\54924a4acd8227e4b644db54793d38f9\BIT1A.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\62e985536d679e5c72447be3ed1a4bfb\BIT20.tmp" Tue 16 Dec 2008 7,771,584 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\9de4903f01b4008e08b567e41ba8107e\BIT17.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\ac2b030bd2575b71a4dd058e8259226c\BIT1D.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\b15f12905daf2d5f4bb1d398773d75a0\BIT19.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\b1b2fa76f94f5a551abbbe9b97448e9d\BIT1C.tmp" Tue 16 Dec 2008 5,856,519 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\dcfb3f0fee0b76240a4ce7e93515b1e3\BIT12.tmp" Tue 16 Dec 2008 5,687,304 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\deb185b7c3743a27be869545db996079\BIT2.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\e79b7c1528f460c7b86498b0cee3d526\BIT14.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\fec979e1a8d79e0808a864efd8bed119\BIT1B.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\74527552c85695f6da4aaf4636e2cd44\download\BIT23.tmp" Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\d58864c012c0884f13f3aa870d1f644b\download\BIT26.tmp" Finished! Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 16:36:19, on 2008-12-16 Platform: Windows XP Dodatek SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16674) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\system32\spoolsv.exe C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe C:\WINDOWS\System32\FTRTSVC.exe C:\WINDOWS\system32\nvsvc32.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\RUNDLL32.EXE C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe D:\Program Files\PowerISO\PWRISOVM.EXE C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe C:\Program Files\QuickTime\qttask.exe C:\WINDOWS\SOUNDMAN.EXE C:\PROGRA~1\NEOSTR~1\TaskBarIcon.exe C:\WINDOWS\system32\ctfmon.exe C:\Program Files\Hewlett-Packard\Toolbox2.0\Javasoft\JRE\1.3.1\bin\javaw.exe D:\instalki\voipdiscount\voipdiscount.exe C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe D:\Program Files\Picasa2\PicasaMediaDetector.exe C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe C:\Program Files\Common Files\Teleca Shared\Generic.exe C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe C:\PROGRA~1\NEOSTR~1\neostradatp.exe C:\PROGRA~1\NEOSTR~1\ComComp.exe C:\PROGRA~1\NEOSTR~1\Toaster.exe C:\PROGRA~1\NEOSTR~1\Inactivity.exe C:\PROGRA~1\NEOSTR~1\PollingModule.exe C:\WINDOWS\System32\ALERTM~1\ALERTM~1.EXE C:\PROGRA~1\NEOSTR~1\Watch.exe D:\Program Files\Mozilla Firefox\firefox.exe D:\Program Files\Trend Micro\HijackThis\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = ht**p://www.google.pl/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = h**://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = ht**p://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = h**p://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = neostrada tp R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza R3 - URLSearchHook: Search Class - {08C06D61-F1F3-4799-86F8-BE1A89362C85} - C:\PROGRA~1\NEOSTR~1\SEARCH~1.DLL O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll O2 - BHO: Pomocnik rejestracji usługi Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [StatusClient] C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe /auto O4 - HKLM\..\Run: [TomcatStartup] C:\Program Files\Hewlett-Packard\Toolbox2.0\hpbpsttp.exe O4 - HKLM\..\Run: [WOOWATCH] C:\PROGRA~1\NEOSTR~1\Watch.exe O4 - HKLM\..\Run: [WOOTASKBARICON] C:\PROGRA~1\NEOSTR~1\GestMaj.exe TaskBarIcon.exe O4 - HKLM\..\Run: [PWRISOVM.EXE] d:\Program Files\PowerISO\PWRISOVM.EXE O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "D:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe" O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [VoipDiscount] "D:\instalki\voipdiscount\voipdiscount.exe" -nosplash -minimized O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background O4 - HKCU\..\Run: [Picasa Media Detector] D:\Program Files\Picasa2\PicasaMediaDetector.exe O4 - HKCU\..\Run: [Octoshape Streaming Services] "C:\Documents and Settings\Bronek\Ustawienia lokalne\Dane aplikacji\Octoshape\Octoshape Streaming Services\OctoshapeClient.exe" -inv:bootrun O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'USŁUGA LOKALNA') O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'USŁUGA SIECIOWA') O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user') O4 - Global Startup: DSLMON.lnk = C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm O8 - Extra context menu item: E&ksport do programu Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000 O8 - Extra context menu item: Pobierz z &BitSpirit - D:\Program Files\BitSpirit\bsurl.htm O9 - Extra button: Badanie - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O17 - HKLM\System\CCS\Services\Tcpip\..\{F988697C-6960-41E0-985F-D99BFE9132DB}: NameServer = 194.204.159.1 217.98.63.164 O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL O20 - AppInit_DLLs: fopumn.dll O23 - Service: Avira AntiVir Personal - Free Antivirus Planer (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom - C:\WINDOWS\System32\FTRTSVC.exe O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe -- End of file - 7543 bytes Geändert von kathy-brown (16.12.2008 um 16:43 Uhr) |
16.12.2008, 16:38 | #6 |
| Internetseiten oeffnen sich einfach, Trojaner die internetseiten kommen nicht mehr, alles funktioniert wieder schnell! danke!!! soll man noch etwas machen, oder ist jetzt alles wirklich endgueltig weg?? vielen, vielen dank! |
16.12.2008, 17:06 | #7 |
| Internetseiten oeffnen sich einfach, Trojaner Entferne auf C:\SDFix\ backups Papierkorb leeren Schliesse alle Fenster und starte Hijack This Klicke: Do a Systemscan only Setze ein Häckchen in das Kästchen vor den genannten Eintrag bei O20 - AppInit_DLLs: fopumn.dll klicke: Fix checked Um sicher zu gehen ComboFix(by sUBs) Download ComboFix und speichert es auf den Desktop! Schliesse alle Programme und Anwendungen mit Hintergrundwächtern inklusive der Firewall + Antivirusprogramme müssen deaktiviert sein Starte combofix.exe Note: Wenn ComboFix schon eher benutzt worden ist, kann es sein das eine Meldung kommt das es ein Update gibt Lass es zu das ComboFix ge-updatet wird Klicke OK im "NirCmd") Fenster klicke ja um Combofix zu starten Folge den Instruktionen in das Fenster Während Combofix lauft NICHT ins Fenster klicken sonst erfriert dein Rechner Wenn das Tool fertig ist,oeffnet sich ein logfile (C:\ combofix.txt) nun das KOMPLETTE Log mit rechtem Mausklick ab kopieren und ins Forum mit rechtem Mausklick "einfügen" Befolge diese Anleitung und installiere auch den Wiederherstellungskonsole |
17.12.2008, 20:43 | #8 |
| Internetseiten oeffnen sich einfach, Trojaner Hallo! Habe alles so gemacht wie hier beschrieben (hab natürlich dasselbe Problem) es gibt aber keine Änderungen...bzw. die Seiten öffnen sich immernoch Hat jemand nen Tipp? Danke im Voraus |
Themen zu Internetseiten oeffnen sich einfach, Trojaner |
adobe, antivir, antivirus, application, avira, content.ie5, downloader, excel, explorer, file, firefox, hijack, hijackthis, hkus\s-1-5-18, internet explorer, messenger, micro, microsoft, monitor, namen, neue, nvidia, photoshop, picasa, poweriso, programm, seiten, software, trojane, trojaner, windows xp |