![]() |
|
Log-Analyse und Auswertung: XP abgesicherter Modus - Desktop bleibt leer -> dwwin.exe kann nicht gestartet werdenWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() | #1 |
| ![]() XP abgesicherter Modus - Desktop bleibt leer -> dwwin.exe kann nicht gestartet werden Hallo Zusammen! Ich dürfte einen Virus bzw. Trojaner auf meinem PC haben. Ich habe versucht im abgesicherten Modus mein Avira Antivirus Personal zu starten - Leider bekomme ich beim starten des abgesicherten Modus die selbeFehlermeldung wie im normalen Modus -> Die Anwendung dwwin.exe konnte nicht gestartet werden...... Ich habe dann über den Taskmanager, der sich starten lässt versucht die .exe Datei meines Avira direkt zu starten.... Da bekomm ich aber wieder ne Fehlermeldung das die Datei beschädigt wurde -> " The Application module c:\programme\avira\antivir personaledition classic\avgnt.exe cannot be found or has been modified or destroyed. Please check your Installation!" Glücklicherweise hat sich mit dem Befehl iexplore.exe ein IE Fenster öffnen lassen und ich hab versucht Avira neu zu installieren. Wenn ich das versuche kommt während der Installation folgende Fehlermeldung: Die Datei C:\DOKUME~1\veronika\lokale~1\temp\rarsfx0\basic\setup.exe wurde verändert. Setup kann nicht forgesetzt werden Damit war ich am Ende mit meiner Geduld und meinen Nerven und habe bissi gegoogelt wer mir helfen könnte und bin auf Euer Forum aufmerksam geworden. Ich habe den CCCleaner einmal durchlaufen lassen, hab mir die Malwarebytes heruntergeladen und gestartet und da wurden nach XX Minuten gleich mal XX infizierte Objekte gefunden. Hab diese alle gelöscht und den Report gezogen: Hier die Daten des Reports: Malwarebytes' Anti-Malware 1.40 Datenbank Version: 2551 Windows 5.1.2600 Service Pack 3 09.09.2009 22:50:02 mbam-log-2009-09-09 (22-50-02).txt Scan-Methode: Vollständiger Scan (C:\|F:\|) Durchsuchte Objekte: 281936 Laufzeit: 1 hour(s), 5 minute(s), 9 second(s) Infizierte Speicherprozesse: 1 Infizierte Speichermodule: 2 Infizierte Registrierungsschlüssel: 17 Infizierte Registrierungswerte: 13 Infizierte Dateiobjekte der Registrierung: 3 Infizierte Verzeichnisse: 5 Infizierte Dateien: 46 Infizierte Speicherprozesse: C:\WINDOWS\system32\reader_s.exe (Trojan.Agent) -> Unloaded process successfully. Infizierte Speichermodule: c:\WINDOWS\system32\evdoserver.dll (Backdoor.Bot) -> Delete on reboot. C:\WINDOWS\system32\msxml71.dll (Trojan.FakeAlert) -> Delete on reboot. Infizierte Registrierungsschlüssel: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\evdoserver (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\evdoserver (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\evdoserver (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\xml.xml (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{500bca15-57a7-4eaf-8143-8c619470b13d} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\xml.xml.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{19127ad2-394b-70f5-c650-b97867baa1f7} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6} (Backdoor.Bot) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\protect (Rootkit.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\protect (Rootkit.Agent) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\protect (Rootkit.Agent) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\AGprotect (Malware.Trace) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reader_s (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\UID (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\BuildW (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\FirstInstallFlag (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\guid (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\i (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mso (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\udso (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\uid (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Ulrn (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\Update (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\UpdateNew (Malware.Trace) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WBEM\mEv (Malware.Trace) -> Quarantined and deleted successfully. Infizierte Dateiobjekte der Registrierung: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Backdoor.Bot) -> Data: c:\windows\system32\twext.exe -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Backdoor.Bot) -> Data: system32\twext.exe -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.Userinit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\twext.exe,) Good: (Userinit.exe) -> Quarantined and deleted successfully. Infizierte Verzeichnisse: C:\WINDOWS\system32\twain_32 (Backdoor.Bot) -> Delete on reboot. C:\Programme\Protection System (Rogue.ProtectionSystem) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Anwendungsdaten\twain_32 (Spyware.Zbot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\NetworkService\Anwendungsdaten\twain_32 (Spyware.Zbot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\stefan\Anwendungsdaten\twain_32 (Spyware.Zbot) -> Quarantined and deleted successfully. Infizierte Dateien: c:\WINDOWS\system32\evdoserver.dll (Backdoor.Bot) -> Delete on reboot. C:\WINDOWS\system32\msxml71.dll (Trojan.FakeAlert) -> Delete on reboot. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\OD2WPYFS\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\OD2WPYFS\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\OD2WPYFS\w[3].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\TPJXSE24\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\TPJXSE24\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\YTCVN2VT\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\YTCVN2VT\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\Z8O1LGBC\w[1].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\Z8O1LGBC\w[2].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Lokale Einstellungen\Temporary Internet Files\Content.IE5\Z8O1LGBC\w[3].bin (Backdoor.Bot) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{B2697773-C989-44EF-B498-7C9CA2FB314A}\RP501\A0101934.exe (Backdoor.Bot) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{B2697773-C989-44EF-B498-7C9CA2FB314A}\RP501\A0101935.exe (Backdoor.Bot) -> Quarantined and deleted successfully. C:\WINDOWS\system32\dvdpaly.exe (Backdoor.Bot) -> Quarantined and deleted successfully. C:\WINDOWS\system32\wiwow64.exe (Backdoor.Bot) -> Quarantined and deleted successfully. C:\WINDOWS\system32\drivers\protect.sys (Rootkit.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\Temp\VRTC.tmp (Backdoor.Bot) -> Quarantined and deleted successfully. C:\WINDOWS\system32\twain_32\local.ds (Backdoor.Bot) -> Delete on reboot. C:\WINDOWS\system32\twain_32\user.ds (Backdoor.Bot) -> Delete on reboot. C:\Programme\Protection System\mal.db (Rogue.ProtectionSystem) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\LocalService\Anwendungsdaten\twain_32\user.ds (Spyware.Zbot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\NetworkService\Anwendungsdaten\twain_32\user.ds (Spyware.Zbot) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\stefan\Anwendungsdaten\twain_32\user.ds (Spyware.Zbot) -> Quarantined and deleted successfully. C:\WINDOWS\system32\reader_s.exe (Malware.Trace) -> Quarantined and deleted successfully. C:\WINDOWS\system32\2.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\3.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\4.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\5.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\6.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\7.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\8.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\9.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\A.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\B.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\C.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\D.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\E.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\F.tmp (Trojan.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\stefan\reader_s.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\FInstall.sys (Backdoor.Bot) -> Quarantined and deleted successfully. C:\WINDOWS\system32\twext.exe (Backdoor.Bot) -> Delete on reboot. C:\WINDOWS\Tasks\{BB65B0FB-5712-401b-B616-E69AC55E2757}.job (Trojan.Downloader) -> Quarantined and deleted successfully. C:\WINDOWS\system32\wiawow32.sys (Backdoor.Bot) -> Quarantined and deleted successfully. C:\WINDOWS\system32\msxm192z.dll (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\Tasks\{7B02EF0B-A410-4938-8480-9BA26420A627}.job (Trojan.Downloader) -> Quarantined and deleted successfully. ...... |
Themen zu XP abgesicherter Modus - Desktop bleibt leer -> dwwin.exe kann nicht gestartet werden |
.exe datei, 8.tmp, abgesicherten modus, antivirus, avg, avgnt.exe, avira, beim starten, browser, content.ie5, desktop, einstellungen, explorer, helper, ie fenster, iexplore.exe, infizierte, installation, internet, malware.trace, malwarebytes, malwarebytes' anti-malware, microsoft, neu, programme, rarsfx0, registrierungsschlüssel, rogue.protectionsystem, rootkit.agent, software, spyware.zbot, starten, system, system volume information, taskmanager, temp, trojan.downloader, trojaner, userinit.exe, virus, windows\temp |