![]() |
|
Plagegeister aller Art und deren Bekämpfung: Trojaner/ Maleware/ falscher DNS Server EintragWindows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
![]() | #1 |
![]() | ![]() Trojaner/ Maleware/ falscher DNS Server Eintrag Guten Morgen, bin ganz neu hier und ich habe ein riesiges problem ![]() Mein PC ist absolut verseucht und ich weiß nichtmal warum, da keine spammails geöffnet werden keine komischen downloads getätigt und nur ganz normal gesurft wird. Chatten über windowslife o.a auch nur mit engen bekannten o. Arbeitskollegen und ohne dateien oder sonstiges zu öffnen. 1. Da ich vorgestern Abend schon veränderungen am PC bemerkt habe, habe ich natürlich gleich alles gescannt, mit Erfolg dachte ich. Aber die Malware hat sich immer wieder selbst reproduziert. Sogar beim Windows starten wurde ich dann mit Fehlermedungen überhäuft, bis hin zu einem komischen Anmelde-Verfahren. ![]() 2. Dann habe ich das komplette System neu aufgesetzt (u formatiert), ging erstmal gut, bis ich das Internetkabel wieder rein gesteckt habe um diverse WindowsUpdates zu machen. Der PC war wieder voll mit der gleichen Malware. DNS Server Adresse wurde geändert. Jetzt kann ich nur im abgesicherten Modus etwas am PC machen. Hijackthis kann ich nicht downloaden sonst würde ich die Log hier anhängen ![]() Combofix (auch mit Namensänderung der exe/ exe bekam ich vom Support meines Virenprogramms zugesendet per mail/ mit combofix aus diese Forum gleiche Meldung) lässt sich nicht öffnen. Auch nicht wenn von einem anderen PC gedownloadet und per USB Stick angewendet wird. Fehlermeldung: Datei wurde verändert und muss neu gedownloadet werden. RootRepeal Log und Bullguard. Log unten kann die logs nicht hochladen Kann es sein das die schädlinge im modem sitzen? Da sie nach kurzer zeit nach der Neuinstallation wieder da waren ![]() Ganz vielen Dank schonmal ![]() Code:
ATTFilter ROOTREPEAL (c) AD, 2007-2009 ================================================== Scan Start Time: 2009/12/02 00:51 Program Version: Version 1.3.5.0 Windows Version: Windows XP SP3 ================================================== Drivers ------------------- Name: dump_atapi.sys Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys Address: 0xB80BA000 Size: 98304 File Visible: No Signed: - Status: - Name: dump_WMILIB.SYS Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS Address: 0xF79A9000 Size: 8192 File Visible: No Signed: - Status: - Name: rootrepeal.sys Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys Address: 0xB7648000 Size: 49152 File Visible: No Signed: - Status: - Hidden/Locked Files ------------------- Path: Volume C:\ Status: MBR Rootkit Detected! Path: C:\WINDOWS\system32\config Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\curslib.dll Status: Invisible to the Windows API! Path: C:\WINDOWS\system32\wincert.dll Status: Invisible to the Windows API! Path: c:\dokumente und einstellungen\****\lokale einstellungen\temp\~df668.tmp Status: Allocation size mismatch (API: 393216, Raw: 16384) Path: c:\dokumente und einstellungen\****\lokale einstellungen\temp\~df6bf7.tmp Status: Allocation size mismatch (API: 32768, Raw: 16384) Path: C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temporary Internet Files\Content.IE5\BTP11IAN\bind[2].htm Status: Invisible to the Windows API! Path: C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temporary Internet Files\Content.IE5\M626NEIE\bind[1].htm Status: Visible to the Windows API, but not on disk. Path: C:\Programme\Gemeinsame Dateien\Adobe\TypeSpt\Unicode\Mappings\win Status: Invisible to the Windows API! Path: c:\dokumente und einstellungen\****\lokale einstellungen\anwendungsdaten\microsoft\internet explorer\recovery\active\{01aab35a-ded2-11de-bf37-001966e65649}.dat Status: Size mismatch (API: 61440, Raw: 39936) Path: Volume D:\ Status: MBR Rootkit Detected! Path: Volume E:\ Status: MBR Rootkit Detected! Path: E:\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\win Status: Invisible to the Windows API! Stealth Objects ------------------- Object: Hidden Code [Driver: ACPI, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x88c24020 Size: 4068 ==EOF== Code:
ATTFilter 2009/12/01 06:59:30 | C:\WINDOWS\Temp\VRT16C.tmp [QUARANTINED] [process: 1104.\??\C:\WINDOWS\system32\winlogon.exe] [user: ****] [virus: Gen:Trojan.Heur.hmGfvzS7O4eix] [op: CLOSE] 2009/12/01 06:59:50 | C:\WINDOWS\Temp\VRT16F.tmp [QUARANTINED] [process: 1104.\??\C:\WINDOWS\system32\winlogon.exe] [user: ****] [virus: Trojan.Generic.2498148] [op: CLOSE] 2009/12/01 07:00:03 | C:\WINDOWS\Temp\VRT173.tmp [QUARANTINED] [process: 1104.\??\C:\WINDOWS\system32\winlogon.exe] [user: ****] [virus: Trojan.Agent.ANWO] [op: CLOSE] 2009/12/01 07:00:31 | C:\WINDOWS\system32\verclsid.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.cm0@5CHd@Idi] [op: CLOSE] 2009/12/01 07:01:58 | C:\WINDOWS\ALCMTR.EXE [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: GenPack:Generic.Malware.YV!Wk!g.FE42AF70] [op: CLOSE] 2009/12/01 07:01:58 | C:\WINDOWS\slrundll.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: GenPack:Generic.Malware.YV!g.E79BBF2A] [op: CLOSE] 2009/12/01 07:02:26 | C:\WINDOWS\system32\eventvwr.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.bm0@5aOnq7B] [op: CLOSE] 2009/12/01 07:02:28 | C:\WINDOWS\system32\mrinfo.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.cm0@5S21qxr] [op: CLOSE] 2009/12/01 07:02:28 | C:\WINDOWS\system32\mpnotify.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user:****] [virus: Gen:Trojan.Heur.cm0@5SkOAKdi] [op: CLOSE] 2009/12/01 07:02:28 | C:\WINDOWS\system32\nbtstat.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user:****] [virus: Gen:Trojan.Heur.cm0@5aIAV2F] [op: CLOSE] 2009/12/01 07:02:28 | C:\WINDOWS\system32\pentnt.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: *****] [virus: Gen:Trojan.Heur.cm0@5WGN6Jii] [op: CLOSE] 2009/12/01 07:02:30 | C:\WINDOWS\system32\qappsrv.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user:****] [virus: Gen:Trojan.Heur.cm0@5aX4EAF] [op: CLOSE] 2009/12/01 07:02:33 | C:\WINDOWS\system32\spupdwxp.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.cm0@5WH!fYii] [op: CLOSE] 2009/12/01 07:02:33 | C:\WINDOWS\system32\spdwnwxp.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.bm0@5uo02Fbi] [op: CLOSE] 2009/12/01 07:02:34 | C:\WINDOWS\system32\slrundll.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: *****] [virus: GenPack:Generic.Malware.YV!g.E79BBF2A] [op: CLOSE] 2009/12/01 07:02:37 | C:\WINDOWS\system32\ssmarque.scr [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.cm0@5Wic6AB] [op: CLOSE] 2009/12/01 07:02:38 | C:\WINDOWS\system32\ssbezier.scr [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.cm0@5SS7kGv] [op: CLOSE] 2009/12/01 07:02:38 | C:\WINDOWS\system32\scrnsave.scr [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: *****] [virus: Gen:Trojan.Heur.bm0@5iLIebs] [op: CLOSE] 2009/12/01 07:02:39 | C:\WINDOWS\system32\ssstars.scr [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: *****] [virus: Gen:Trojan.Heur.cm0@5a50H3s] [op: CLOSE] 2009/12/01 07:02:40 | C:\WINDOWS\system32\ssmyst.scr [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.cm0@58ypQEB] [op: CLOSE] 2009/12/01 07:02:40 | C:\WINDOWS\system32\sc.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user:****] [virus: Gen:Trojan.Heur.dm0@5uP3HLdi] [op: CLOSE] 2009/12/01 07:02:41 | C:\WINDOWS\system32\MSFEEDSSYNC.EXE [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user:****] [virus: Gen:Trojan.Heur.cq0@50QQCGoi] [op: CLOSE] 2009/12/01 07:02:42 | C:\WINDOWS\system32\nvcolor.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****a] [virus: DeepScan:Generic.Malware.YV!Wk!g.5EEE466A] [op: CLOSE] 2009/12/01 07:02:42 | C:\WINDOWS\system32\tzchange.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.em0@50NMc1gi] [op: CLOSE] 2009/12/01 07:03:42 | C:\WINDOWS\system32\reg.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.em0@5eRJ9rF] [op: CLOSE] 2009/12/01 07:03:46 | C:\WINDOWS\system32\ping.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.cm0@5qjaK9E] [op: CLOSE] 2009/12/01 07:03:47 | C:\WINDOWS\system32\odbcconf.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.fm0@5yHAf8oi] [op: CLOSE] 2009/12/01 07:03:49 | C:\WINDOWS\system32\net.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: *****] [virus: Gen:Trojan.Heur.dm0@58XQipli] [op: CLOSE] 2009/12/01 07:03:49 | C:\WINDOWS\system32\mstinit.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.bm0@5SqA4gB] [op: CLOSE] 2009/12/01 07:03:56 | C:\WINDOWS\system32\dpnsvr.exe [QUARANTINED] [process: 496.C:\WINDOWS\Explorer.EXE] [user: ****] [virus: Gen:Trojan.Heur.cm0@5qyWTLA] [op: CLOSE] 2009/12/01 19:50:01 | C:\WINDOWS\SOFTWAREDISTRIBUTION\Download\F6503B051821133D1C33AB39A9055D28\tzchange.exe [BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [virus: Gen:Trojan.Heur.em0@5ySejbdi] [op: OPEN] 2009/12/01 19:50:02 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:02 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:02 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:02 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:02 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:02 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:02 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:02 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:03 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:04 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:04 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:04 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:04 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:04 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:04 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:04 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:04 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:05 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SOFTWAREDISTRIBUTION\DOWNLOAD\F6503B051821133D1C33AB39A9055D28\TZCHANGE.EXE [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 19:50:06 | C:\WINDOWS\SoftwareDistribution\Download\f6503b051821133d1c33ab39a9055d28\tzchange.exe [AUTO BLOCKED] [process: 1604.C:\WINDOWS\System32\svchost.exe] [user: N/A] [op: OPEN] 2009/12/01 20:02:39 | C:\Programme\MSN\MSNCoreFiles\msn6.exe [QUARANTINED] [process: 3648.C:\WINDOWS\explorer.exe] [user: *****] [virus: DeepScan:Generic.Malware.SYV!dWk!g.E8393919] [op: OPEN] 2009/12/01 20:02:42 | C:\Programme\MSN Gaming Zone\Windows\bckgzm.exe [QUARANTINED] [process: 3648.C:\WINDOWS\explorer.exe] [user: ****] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:02:42 | C:\Programme\MSN Gaming Zone\Windows\chkrzm.exe [QUARANTINED] [process: 3648.C:\WINDOWS\explorer.exe] [user: *****] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:02:42 | C:\Programme\MSN Gaming Zone\Windows\hrtzzm.exe [QUARANTINED] [process: 3648.C:\WINDOWS\explorer.exe] [user: ****] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:02:43 | C:\Programme\MSN Gaming Zone\Windows\Rvsezm.exe [QUARANTINED] [process: 3648.C:\WINDOWS\explorer.exe] [user: ****] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:02:43 | C:\Programme\MSN Gaming Zone\Windows\shvlzm.exe [QUARANTINED] [process: 3648.C:\WINDOWS\explorer.exe] [user: *****] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:02:51 | C:\WINDOWS\system32\dllcache\bckgzm.exe [QUARANTINED] [process: 1100.\??\C:\WINDOWS\system32\winlogon.exe] [user: *****] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:02:54 | C:\WINDOWS\system32\dllcache\chkrzm.exe [QUARANTINED] [process: 1100.\??\C:\WINDOWS\system32\winlogon.exe] [user: *****] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:02:55 | C:\WINDOWS\system32\dllcache\hrtzzm.exe [QUARANTINED] [process: 1100.\??\C:\WINDOWS\system32\winlogon.exe] [user: ****] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:02:55 | C:\WINDOWS\system32\dllcache\rvsezm.exe [QUARANTINED] [process: 1100.\??\C:\WINDOWS\system32\winlogon.exe] [user: ****\***] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:02:56 | C:\WINDOWS\system32\dllcache\shvlzm.exe [QUARANTINED] [process: 1100.\??\C:\WINDOWS\system32\winlogon.exe] [user: ****] [virus: GenPack:Generic.Malware.YV!g.66ADF059] [op: OPEN] - suspected only 2009/12/01 20:09:34 | C:\Programme\Internet Explorer\Connection Wizard\icwtutor.exe [QUARANTINED] [process: 3648.C:\WINDOWS\explorer.exe] [user:*****] [virus: Gen:Trojan.Heur.fm0@5aZGHXz] [op: OPEN] 2009/12/01 20:15:53 | C:\Programme\MSN Gaming Zone\Windows\zClientm.exe [QUARANTINED] [process: 1308.E:\CCleaner\CCleaner.exe] [user: ****] [virus: GenPack:Generic.Malware.YV!g.0A89B008] [op: OPEN] - suspected only 2009/12/01 20:15:55 | C:\programme\windows media player\wmlaunch.exe [QUARANTINED] [process: 1308.E:\CCleaner\CCleaner.exe] [user: ****] [virus: Gen:Trojan.Heur.pq0@5CpVMCoi] [op: OPEN] 2009/12/01 20:15:57 | C:\programme\windows media player\wmpenc.exe [QUARANTINED] [process: 1308.E:\CCleaner\CCleaner.exe] [user: ****] [virus: Gen:Trojan.Heur.cq0@5SQyOObi] [op: OPEN] 2009/12/01 20:18:44 | C:\WINDOWS\system32\dllcache\bootok.exe [QUARANTINED] [process: 1308.E:\CCleaner\CCleaner.exe] [user: ****] [virus: Gen:Trojan.Heur.bm0@5y0kBfai] [op: OPEN] 2009/12/01 20:18:44 | C:\WINDOWS\system32\dllcache\bootvrfy.exe [QUARANTINED] [process: 1308.E:\CCleaner\CCleaner.exe] [user:****] [virus: Gen:Trojan.Heur.bm0@5G9snyei] [op: OPEN] 2009/12/01 20:18:46 | C:\WINDOWS\system32\dllcache\chgport.exe [QUARANTINED] [process: 1308.E:\CCleaner\CCleaner.exe] [user: ****] [virus: Gen:Trojan.Heur.cm0@5eBAMIz] [op: OPEN] 2009/12/01 20:18:46 | C:\WINDOWS\system32\dllcache\chgusr.exe [QUARANTINED] [process: 1308.E:\CCleaner\CCleaner.exe] [user: ****] [virus: Gen:Trojan.Heur.cm0@5WAnSnz] [op: OPEN] 2009/12/01 20:19:02 | C:\WINDOWS\system32\usrmlnka.exe [QUARANTINED] [process: 1308.E:\CCleaner\CCleaner.exe] [user: *****] [virus: GenPack:Generic.Malware.SYV!g.95DA66EE] [op: OPEN] - suspected only 2009/12/01 20:19:02 | C:\WINDOWS\system32\usrprbda.exe [QUARANTINED] [process: 1308.E:\CCleaner\CCleaner.exe] [user: ****] [virus: GenPack:Generic.Malware.YV!g.1F392117] [op: OPEN] - suspected only 2009/12/01 20:43:05 | G:\autorun.inf [QUARANTINED] [process: 1100.\??\C:\WINDOWS\system32\winlogon.exe] [user: ****] [virus: Trojan.Autorun.ALK] [op: OPEN] 2009/12/01 20:43:39 | C:\32788R22FWJFW\dosdev.exe [QUARANTINED] [process: 2156.G:\aaaa.exe] [user: ****] [virus: DeepScan:Generic.Malware.YV!dg.44E248DA] [op: CLOSE] 2009/12/01 20:43:40 | C:\32788R22FWJFW\iexplore.exe [QUARANTINED] [process: 2156.G:\aaaa.exe] [***] [virus: GenPack:Generic.Malware.YV!dg.95086F99] [op: CLOSE] - suspected only 2009/12/01 20:44:00 | C:\32788R22FWJFW\NircmdB.exe [QUARANTINED] [process: 3060.C:\WINDOWS\system32\cmd.execf] [user:+++\julefrenya] [virus: GenPack:Generic.Malware.YV!dg.95086F99] [op: CLOSE] - suspected only |
Themen zu Trojaner/ Maleware/ falscher DNS Server Eintrag |
abgesicherten modus, adobe, c:\windows\temp, combofix, content.ie5, einstellungen, explorer, hijack, hijackthis, hängen, iexplore.exe, internet explorer, log, logon.exe, malware, mbr rootkit, microsoft, net.exe, neu, neu aufgesetzt, nt.exe, ping.exe, problem, programme, rootkit, server, starten, stick, svchost.exe, system, system neu, temp, trojan.generic., usb, virus, warum, windows\temp, winlogon.exe |