|
Log-Analyse und Auswertung: Pc wird langsam und unbekannte .exe VIRUS?!?Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
10.05.2009, 14:32 | #1 |
| Pc wird langsam und unbekannte .exe VIRUS?!? Hallo Leute, seit ca 3 Tagen ist mein Pc sehr langsam geworden und mein Firefox braucht manchmal 500 Mb Ram speicher woran kann das liegen? Ich hoffe ihr könnt mir helfen. Meinen HijackThis poste ich natürlich auch. Mfg Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 15:23:37, on 10.05.2009 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16791) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\spoolsv.exe C:\Programme\Google\Update\GoogleUpdate.exe C:\WINDOWS\RTHDCPL.EXE C:\Programme\Java\jre1.6.0_03\bin\jusched.exe C:\Programme\Winamp\winampa.exe C:\WINDOWS\system32\RUNDLL32.EXE C:\Programme\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe C:\Programme\Xfire\xfiremusic.exe C:\Programme\Microsoft Office\Office12\GrooveMonitor.exe C:\WINDOWS\system32\ctfmon.exe C:\Programme\Windows Live\Messenger\MsnMsgr.Exe C:\Programme\Messenger\msmsgs.exe C:\Programme\Yahoo!\Messenger\YahooMessenger.exe C:\Programme\Xfire\xfire.exe C:\Programme\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe C:\WINDOWS\system32\nvsvc32.exe C:\WINDOWS\system32\PnkBstrA.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\TUProgSt.exe C:\WINDOWS\system32\wbem\wmiapsrv.exe C:\WINDOWS\System32\svchost.exe C:\Programme\Windows Live\Messenger\usnsvc.exe C:\WINDOWS\system32\wuauclt.exe C:\Programme\Winamp\winamp.exe C:\PROGRAMME\STREAMRIPPER\wstreamripper.exe C:\Programme\Mozilla Firefox\firefox.exe C:\WINDOWS\explorer.exe C:\Programme\Skype\Phone\Skype.exe C:\Programme\Skype\Plugin Manager\skypePM.exe C:\WINDOWS\system32\PnkBstrB.exe C:\Dokumente und Einstellungen\User\Desktop\HiJackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = h*tp://w*w.arcor.de R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = h*tp://google.daemonsearch.com/intl/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = h*tp://www.arcor.de R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = h*tp://www.arcor.de R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = h*tp://www.arcor.de R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = ht*p://www.arcor.de R1 - HKLM\Software\Microsoft\Internet Explorer\Main,First Home Page = h*tp://www.arcor.de R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Arcor AG & Co. KG R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R3 - URLSearchHook: ICQ Toolbar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - (no file) O2 - BHO: XTTBPos00 - {055FD26D-3A88-4e15-963D-DC8493744B1D} - (no file) O2 - BHO: Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\AcroIEHelper.dll O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Programme\Microsoft Office\Office12\GrooveShellExtensions.dll O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre1.6.0_03\bin\ssv.dll O2 - BHO: Windows Live Anmelde-Hilfsprogramm - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O3 - Toolbar: ICQ Toolbar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - (no file) O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE O4 - HKLM\..\Run: [JMB36X IDE Setup] C:\WINDOWS\JM\JMInsIDE.exe O4 - HKLM\..\Run: [36X Raid Configurer] C:\WINDOWS\system32\JMRaidSetup.exe boot O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [nwiz] nwiz.exe /install O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Programme\Java\jre1.6.0_03\bin\jusched.exe" O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [WinampAgent] C:\Programme\Winamp\winampa.exe O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [AVP] "C:\Programme\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe" O4 - HKLM\..\Run: [Xfire Music] "C:\Programme\Xfire\xfiremusic.exe" O4 - HKLM\..\Run: [GrooveMonitor] "C:\Programme\Microsoft Office\Office12\GrooveMonitor.exe" O4 - HKLM\..\Run: [KernelFaultCheck] %systemroot%\system32\dumprep 0 -k O4 - HKLM\..\Run: [QuickTime Task] "C:\Programme\QuickTime\qttask.exe" -atboottime O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [MsnMsgr] "C:\Programme\Windows Live\Messenger\MsnMsgr.Exe" /background O4 - HKCU\..\Run: [MSMSGS] "C:\Programme\Messenger\msmsgs.exe" /background O4 - HKCU\..\Run: [Messenger (Yahoo!)] "C:\Programme\Yahoo!\Messenger\YahooMessenger.exe" -quiet O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETZWERKDIENST') O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM') O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user') O4 - Startup: WISO Bewerbung-Reminder.lnk = C:\Programme\Buhl\Bewerbung 2008\KCReminder.exe O4 - Startup: Xfire.lnk = C:\Programme\Xfire\xfire.exe O8 - Extra context menu item: Hinzufügen zu Kaspersky Anti-Banner - C:\Programme\Kaspersky Lab\Kaspersky Internet Security 7.0\ie_banner_deny.htm O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000 O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_03\bin\ssv.dll O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_03\bin\ssv.dll O9 - Extra button: Statistik für Web-Anti-Virus - {1F460357-8A94-4D71-9CA3-AA4ACF32ED8E} - C:\Programme\Kaspersky Lab\Kaspersky Internet Security 7.0\SCIEPlgn.dll O9 - Extra button: An OneNote senden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll O9 - Extra 'Tools' menuitem: An OneNote s&enden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6.5\ICQ.exe O9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6.5\ICQ.exe O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O16 - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} (QuickTime Object) - h*tp://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab O16 - DPF: {0CCA191D-13A6-4E29-B746-314DEE697D83} (Facebook Photo Uploader 5) - h*tp://upload.facebook.com/controls/FacebookPhotoUploader5.cab O16 - DPF: {1E54D648-B804-468d-BC78-4AFFED8E262E} (System Requirements Lab) - h*tp://www.srtest.com/srl_bin/sysreqlab_srl.cab O16 - DPF: {39B0684F-D7BF-4743-B050-FDC3F48F7E3B} - http://www.fileplanet.com/fpdlmgr/cabs/FPDC_2.3.7.109.cab O16 - DPF: {5C051655-FCD5-4969-9182-770EA5AA5565} (Solitaire Showdown Class) - ht*p://messenger.zone.msn.com/binary/SolitaireShowdown.cab56986.cab O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} (UnoCtrl Class) - ht*p://messenger.zone.msn.com/FR-FR/a-UNO1/GAME_UNO1.cab O16 - DPF: {67A5F8DC-1A4B-4D66-9F24-A704AD929EEE} (System Requirements Lab) - h*tp://www.nvidia.com/content/DriverDownload/srl/2.0.0.1/sysreqlab2.cab O16 - DPF: {B8BE5E93-A60C-4D26-A2DC-220313175592} (MSN Games - Installer) - ht*p://messenger.zone.msn.com/binary/ZIntro.cab56649.cab O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - h*tp://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab O16 - DPF: {D0C0F75C-683A-4390-A791-1ACFD5599AB8} (Oberon Flash Game Host) - h*tp://icq.oberon-media.com/Gameshell/GameHost/1.0/OberonGameHost.cab O16 - DPF: {E55FD215-A32E-43FE-A777-A7E8F165F551} (Flatcast Viewer 4.15) - ht*p://www.flatcast.info/objects/NpFv415.dll O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Programme\Microsoft Office\Office12\GrooveSystemServices.dll O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\GEMEIN~1\Skype\SKYPE4~1.DLL O20 - AppInit_DLLs: C:\PROGRA~1\KASPER~1\KASPER~1.0\adialhk.dll O23 - Service: Application Driver Auto Removal Service (01) (appdrvrem01) - Protection Technology - C:\WINDOWS\System32\appdrvrem01.exe O23 - Service: Kaspersky Internet Security 7.0 (AVP) - Kaspersky Lab - C:\Programme\Kaspersky Lab\Kaspersky Internet Security 7.0\avp.exe O23 - Service: Google Update Service (gupdate1c996baa9067168) (gupdate1c996baa9067168) - Google Inc. - C:\Programme\Google\Update\GoogleUpdate.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe O23 - Service: ServiceLayer - Nokia. - C:\Programme\Gemeinsame Dateien\PCSuite\Services\ServiceLayer.exe O23 - Service: TuneUp Drive Defrag-Dienst (TuneUp.Defrag) - TuneUp Software - C:\WINDOWS\System32\TuneUpDefragService.exe O23 - Service: TuneUp Program Statistics Service (TuneUp.ProgramStatisticsSvc) - TuneUp Software - C:\WINDOWS\System32\TUProgSt.exe -- End of file - 10193 bytes |
11.05.2009, 05:44 | #2 | |
/// AVZ-Toolkit Guru | Pc wird langsam und unbekannte .exe VIRUS?!? Hallöle.
__________________Bei dir läuft was übles! Ändere umgehend alle deine Passwörter und Zugans Accounts von einem definitiv sauberen PC aus! Dateien Online überprüfen lassen: * Lasse dir auch die versteckten Dateien anzeigen! * Rufe die Seite Virustotal auf. * Dort suche über den "Durchsuchen"-Button folgende Datei raus und lade sie durch Druck auf den "Senden der Datei"-Button hoch. Zitat:
* Sollte die Datei bereits analysiert worden sein so lasse sie unbedingt trotzdem nocheinmal analysieren! * Poste im Anschluss das Ergebnis der Auswertung, alles abkopieren und in einen Beitrag einfügen. Systembereinigung
Systemanalyse
__________________ |
11.05.2009, 09:18 | #3 |
| Pc wird langsam und unbekannte .exe VIRUS?!? Hallo, ich habe die von dir genannte Datei hochgeladen. Jedenfalls hat diese Datei bei Virustotal 0/40. Hier die Analyse
__________________Virustotal. MD5: 3f56e9e6f01d014a70718f3986566481 Aber ich habe im system32 einen Ordner entdeckt, der heisst Catroot. Was ist das? Lieben Gruß |
11.05.2009, 10:58 | #4 |
| Pc wird langsam und unbekannte .exe VIRUS?!? Soll ich diese EXE trotzdem entfernen? Was ist das für eine EXE?? Ist die gefährlich für meinen Pc? |
11.05.2009, 13:12 | #5 |
| Pc wird langsam und unbekannte .exe VIRUS?!? Hier sind die 2 logs. AVZ Antiviral Toolkit log; AVZ version is 4.30 Scanning started at 11.05.2009 13:38:13 Database loaded: signatures - 222634, NN profile(s) - 2, microprograms of healing - 56, signature database released 10.05.2009 23:24 Heuristic microprograms loaded: 372 SPV microprograms loaded: 9 Digital signatures of system files loaded: 111004 Heuristic analyzer mode: Maximum heuristics level Healing mode: enabled Windows version: 5.1.2600, Service Pack 3 ; AVZ is launched with administrator rights System Restore: enabled 1. Searching for Rootkits and programs intercepting API functions 1.1 Searching for user-mode API hooks Analysis: kernel32.dll, export table found in section .text Function kernel32.dll:GetProcAddress (409) intercepted, method ProcAddressHijack.GetProcAddress ->7C80AE30->7C884FEC Function kernel32.dll:LoadLibraryA (581) intercepted, method ProcAddressHijack.GetProcAddress ->7C801D7B->7C884F9C Function kernel32.dll:LoadLibraryExA (582) intercepted, method ProcAddressHijack.GetProcAddress ->7C801D53->7C884FB0 Function kernel32.dll:LoadLibraryExW (583) intercepted, method ProcAddressHijack.GetProcAddress ->7C801AF5->7C884FD8 Function kernel32.dll:LoadLibraryW (584) intercepted, method ProcAddressHijack.GetProcAddress ->7C80AEDB->7C884FC4 IAT modification detected: LoadLibraryA - 7C884F9C<>7C801D7B IAT modification detected: GetProcAddress - 7C884FEC<>7C80AE30 Analysis: ntdll.dll, export table found in section .text Analysis: user32.dll, export table found in section .text Function user32.dll:RegisterRawInputDevices (546) intercepted, method ProcAddressHijack.GetProcAddress ->7E3BCE0E->7EEA0080 Analysis: advapi32.dll, export table found in section .text Analysis: ws2_32.dll, export table found in section .text Analysis: wininet.dll, export table found in section .text Analysis: rasapi32.dll, export table found in section .text Analysis: urlmon.dll, export table found in section .text Analysis: netapi32.dll, export table found in section .text 1.2 Searching for kernel-mode API hooks Driver loaded successfully SDT found (RVA=085700) Kernel ntkrnlpa.exe found in memory at address 804D7000 SDT = 8055C700 KiST = 80504460 (284) Function NtClose (19) intercepted (805BC4F8->B654C1E0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtConnectPort (1F) intercepted (805A45B4->B654A2F0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtCreateKey (29) intercepted (80623792->B653D750), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtCreateProcess (2F) intercepted (805D11F8->B654BF10), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtCreateProcessEx (30) intercepted (805D1142->B654C080), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtCreateSection (32) intercepted (805AB3AE->B654CD00), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtCreateSymbolicLinkObject (34) intercepted (805C39C2->B654C7B0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtCreateThread (35) intercepted (805D0FE0->B654D600), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtDeleteKey (3F) intercepted (80623C22->B653D860), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtDeleteValueKey (41) intercepted (80623DF2->B653D8E0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtDuplicateObject (44) intercepted (805BDFD0->B654C380), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtEnumerateKey (47) intercepted (80623FD2->B653D990), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtEnumerateValueKey (49) intercepted (8062423C->B653DA40), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtFlushKey (4F) intercepted (806244A6->B653DAF0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtInitializeRegistry (5C) intercepted (806218E8->B653DB70), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtLoadDriver (61) intercepted (8058413A->B6549E50), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtLoadKey (62) intercepted (8062598E->B653E590), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtLoadKey2 (63) intercepted (8062559A->B653DB90), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtNotifyChangeKey (6F) intercepted (80625958->B653DC70), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtOpenFile (74) intercepted (8057A182->BA492030), hook C:\WINDOWS\system32\Drivers\kl1.sys, driver recognized as trusted Function NtOpenKey (77) intercepted (80624B64->B653DD50), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtOpenProcess (7A) intercepted (805CB408->B654BD00), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtOpenSection (7D) intercepted (805AA3D2->B654CB20), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtQueryKey (A0) intercepted (80624E8A->B653DE30), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtQueryMultipleValueKey (A1) intercepted (806228E0->B653DEE0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtQuerySystemInformation (AD) intercepted (80611098->B654D2B0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtQueryValueKey (B1) intercepted (806219CA->B653DF90), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtReplaceKey (C1) intercepted (8062583E->B653E070), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtRequestWaitReplyPort (C8) intercepted (805A2D5A->B654A900), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtRestoreKey (CC) intercepted (8062514A->B653E100), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtResumeThread (CE) intercepted (805D4982->B654D5B0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtSaveKey (CF) intercepted (80625246->B653E300), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtSetContextThread (D5) intercepted (805D1702->B654D940), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtSetInformationFile (E0) intercepted (8057B010->B654DF60), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtSetInformationKey (E2) intercepted (806224AC->B653E390), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtSetSecurityObject (ED) intercepted (805C05F6->B6548A10), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtSetSystemInformation (F0) intercepted (8060F3C6->B654C9A0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtSetValueKey (F7) intercepted (80621D18->B653E430), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtSuspendThread (FE) intercepted (805D48BC->B654D560), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtSystemDebugControl (FF) intercepted (8061777A->B654A1B0), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtTerminateProcess (101) intercepted (805D29AA->B654D150), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtUnloadKey (107) intercepted (80622042->B653E550), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function NtWriteVirtualMemory (115) intercepted (805B4394->B654C240), hook C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function FsRtlCheckLockForReadAccess (804EAF84) - machine code modification Method of JmpTo. jmp B654E380 \??\C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Function IoIsOperationSynchronous (804EF912) - machine code modification Method of JmpTo. jmp B654E880 \??\C:\WINDOWS\system32\drivers\klif.sys, driver recognized as trusted Functions checked: 284, intercepted: 43, restored: 0 1.3 Checking IDT and SYSENTER Analysis for CPU 1 Analysis for CPU 2 Checking IDT and SYSENTER - complete 1.4 Searching for masking processes and drivers Checking not performed: extended monitoring driver (AVZPM) is not installed Driver loaded successfully 1.5 Checking of IRP handlers \FileSystem\ntfs[IRP_MJ_CREATE] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_CLOSE] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_WRITE] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_QUERY_INFORMATION] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_SET_INFORMATION] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_QUERY_EA] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_SET_EA] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_QUERY_VOLUME_INFORMATION] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_SET_VOLUME_INFORMATION] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_DIRECTORY_CONTROL] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_FILE_SYSTEM_CONTROL] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_DEVICE_CONTROL] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_LOCK_CONTROL] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_QUERY_SECURITY] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_SET_SECURITY] = 8A8E21F8 -> hook not defined \FileSystem\ntfs[IRP_MJ_PNP] = 8A8E21F8 -> hook not defined \FileSystem\FastFat[IRP_MJ_CREATE] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_CLOSE] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_WRITE] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_QUERY_INFORMATION] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_SET_INFORMATION] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_QUERY_EA] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_SET_EA] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_QUERY_VOLUME_INFORMATION] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_SET_VOLUME_INFORMATION] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_DIRECTORY_CONTROL] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_FILE_SYSTEM_CONTROL] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_DEVICE_CONTROL] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_LOCK_CONTROL] = 8A49C500 -> hook not defined \FileSystem\FastFat[IRP_MJ_PNP] = 8A49C500 -> hook not defined Checking - complete 2. Scanning memory Number of processes found: 35 Analyzer: process under analysis is 848 C:\Programme\Xfire\xfiremusic.exe [ES]:Contains network functionality [ES]:Application has no visible windows [ES]:EXE runtime packer ? [ES]:Registered in autoruns !! Analyzer: process under analysis is 1988 C:\WINDOWS\system32\PnkBstrA.exe [ES]:Contains network functionality [ES]:Capable of sending mail ?! [ES]:Application has no visible windows [ES]:Located in system folder Analyzer: process under analysis is 3804 C:\WINDOWS\system32\PnkBstrB.exe [ES]:Contains network functionality [ES]:Capable of sending mail ?! [ES]:Application has no visible windows [ES]:Located in system folder Number of modules loaded: 503 Scanning memory - complete 3. Scanning disks C:\Dokumente und Einstellungen\User\Desktop\Tools\keyfinder.exe/{RAR-SFX}/officekey.exe >>>>> not-a-virus:PSWTool.Win32.RAS.a Direct reading C:\Dokumente und Einstellungen\User\Lokale Einstellungen\Temp\flaD.tmp Direct reading C:\Dokumente und Einstellungen\User\Lokale Einstellungen\Temp\~DF26A4.tmp Direct reading C:\Dokumente und Einstellungen\User\Lokale Einstellungen\Temp\~DF922.tmp C:\Programme\mIRC\mirc.exe.BAK - PE file with non-standard extension(dangerousness level is 5%) Direct reading C:\WINDOWS\system32\drivers\sptd.sys 4. Checking Winsock Layered Service Provider (SPI/LSP) LSP settings checked. No errors detected 5. Searching for keyboard/mouse/windows events hooks (Keyloggers, Trojan DLLs) C:\Programme\Xfire\xfire_toucan_36913.dll --> Suspicion for Keylogger or Trojan DLL C:\Programme\Xfire\xfire_toucan_36913.dll>>> Behavioural analysis 1. Reacts to events: keyboard, all events C:\Programme\Xfire\xfire_toucan_36913.dll>>> Neural net: file with probability 0.39% like a typical keyboard/mouse events interceptor Note: Do NOT delete suspicious files, send them for analysis (see FAQ for more details), because there are lots of useful hooking DLLs 6. Searching for opened TCP/UDP ports used by malicious programs Checking disabled by user 7. Heuristic system check Latent loading of libraries through AppInit_DLLs suspected: "C:\PROGRA~1\KASPER~1\KASPER~1.0\adialhk.dll" Checking - complete 8. Searching for vulnerabilities >> Services: potentially dangerous service allowed: TermService (Terminaldienste) >> Services: potentially dangerous service allowed: SSDPSRV (SSDP-Suchdienst) >> Services: potentially dangerous service allowed: Schedule (Taskplaner) >> Services: potentially dangerous service allowed: mnmsrvc (NetMeeting-Remotedesktop-Freigabe) >> Services: potentially dangerous service allowed: RDSessMgr (Sitzungs-Manager für Remotedesktophilfe) > Services: please bear in mind that the set of services depends on the use of the PC (home PC, office PC connected to corporate network, etc)! >> Security: disk drives' autorun is enabled >> Security: administrative shares (C$, D$ ...) are enabled >> Security: anonymous user access is enabled >> Security: sending Remote Assistant queries is enabled Checking - complete 9. Troubleshooting wizard Checking - complete Files scanned: 111875, extracted from archives: 84189, malicious software found 1, suspicions - 0 Scanning finished at 11.05.2009 13:43:34 Time of scanning: 00:05:21 If you have a suspicion on presence of viruses or questions on the suspected objects, you can address http://virusinfo.info conference C:\WINDOWS\system32\drivers\klif.sys 4 Kernel-mode hook C:\WINDOWS\system32\Drivers\kl1.sys 4 Kernel-mode hook C:\Dokumente und Einstellungen\User\Desktop\Tools\keyfinder.exe 1 not-a-virus:PSWTool.Win32.RAS.a C:\Programme\mIRC\mirc.exe.BAK 3 PE file with non-standard extension(dangerousness level is 5%) C:\Programme\Xfire\xfire_toucan_36913.dll 5 Suspicion for Keylogger or Trojan DLL |
12.05.2009, 11:31 | #6 | |
/// AVZ-Toolkit Guru | Pc wird langsam und unbekannte .exe VIRUS?!? Wofür brauchst du den keyfinder? Office Docs knacken? Warum? Schicke die fragliche Datei bitte an Kaspersky: http://forum.kaspersky.com/index.php?showtopic=42428 Zitat:
__________________ --> Pc wird langsam und unbekannte .exe VIRUS?!? |
12.05.2009, 13:55 | #7 |
| Pc wird langsam und unbekannte .exe VIRUS?!? Hallo, danke für deine Antwort. Den keyfinder habe ich weil ich so doof war und mein altes gehäuse mit meinem Xp schlüssel drauf weggeworfen habe. Dann habe ich den bekommen und mir so meinen Key aus dem Pc gesucht. Damit ich den Key weiter nutzen kann wenn ich Windows mal neu drauf mache. |
12.05.2009, 18:16 | #8 |
/// AVZ-Toolkit Guru | Pc wird langsam und unbekannte .exe VIRUS?!? Eine keyfinder.exe würde ich im Leben nicht ausführen! Wo hast du die Datei herbekommen? Den Windows Schlüssel kannst du auch mit AIDA auslesen.
__________________ - Sämtliche Hilfestellungen im Forum werden ohne Gewährleistung oder Haftung gegeben - |
Themen zu Pc wird langsam und unbekannte .exe VIRUS?!? |
adobe, bho, browser, desktop, einstellungen, firefox, google, google update, gupdate, hijack, hijackthis, hkus\s-1-5-18, home, internet, internet explorer, internet security, kaspersky, langsam, mozilla, object, rundll, security, sehr langsam, senden, software, system, tuneup.defrag, virus, virus?!, windows, windows xp, wiso |