|
Log-Analyse und Auswertung: Mein Trojan.Generic 3580153Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
18.04.2010, 11:29 | #16 |
| Mein Trojan.Generic 3580153 Hehe, hast Recht, war zu früh heute... 1. Hol dir RootRepeal . Starte RootRepeal. Beende alle anderen Programme, schalte AV-Wächter ab. Gehe auf Report. Klicke auf Scan. Setze alle Häkchen. Bestätige mit OK. Poste das Log. |
18.04.2010, 11:58 | #17 |
| Mein Trojan.Generic 3580153Code:
ATTFilter ROOTREPEAL (c) AD, 2007-2009 ================================================== Scan Start Time: 2010/04/18 12:41 Program Version: Version 1.3.5.0 Windows Version: Windows XP Media Center Edition SP3 ================================================== Drivers ------------------- Name: klmdb.sys Image Path: klmdb.sys Address: 0xF7707000 Size: 31104 File Visible: No Signed: - Status: - Name: PCI_PNP0260 Image Path: \Driver\PCI_PNP0260 Address: 0x00000000 Size: 0 File Visible: No Signed: - Status: - Name: rootrepeal.sys Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys Address: 0xA5D8A000 Size: 49152 File Visible: No Signed: - Status: - Name: spgf.sys Image Path: spgf.sys Address: 0xF7293000 Size: 995328 File Visible: No Signed: - Status: - Name: sptd Image Path: \Driver\sptd Address: 0x00000000 Size: 0 File Visible: No Signed: - Status: - Name: tsk8F.tmp Image Path: tsk8F.tmp Address: 0xF71DE000 Size: 96512 File Visible: No Signed: - Status: - Hidden/Locked Files ------------------- Path: C:\WINDOWS\system32\cfqrufu.dll.bak Status: Locked to the Windows API! Path: c:\dokumente und einstellungen\sascha\anwendungsdaten\mozilla\firefox\profiles\kkokuipl.default\sessionstore.js Status: Size mismatch (API: 100357, Raw: 100699) Path: c:\dokumente und einstellungen\sascha\lokale einstellungen\anwendungsdaten\mozilla\firefox\profiles\kkokuipl.default\cache\_cache_001_ Status: Size mismatch (API: 2065923, Raw: 2065332) SSDT ------------------- #: 041 Function Name: NtCreateKey Status: Hooked by "Lbd.sys" at address 0xf74f787e #: 071 Function Name: NtEnumerateKey Status: Hooked by "spgf.sys" at address 0xf72acda4 #: 073 Function Name: NtEnumerateValueKey Status: Hooked by "spgf.sys" at address 0xf72ad132 #: 119 Function Name: NtOpenKey Status: Hooked by "spgf.sys" at address 0xf72940c0 #: 122 Function Name: NtOpenProcess Status: Hooked by "C:\Programme\BitDefender\BitDefender 2009\bdselfpr.sys" at address 0xa6ec4c90 #: 128 Function Name: NtOpenThread Status: Hooked by "C:\Programme\BitDefender\BitDefender 2009\bdselfpr.sys" at address 0xa6ec4d7e #: 160 Function Name: NtQueryKey Status: Hooked by "spgf.sys" at address 0xf72ad20a #: 177 Function Name: NtQueryValueKey Status: Hooked by "spgf.sys" at address 0xf72ad08a #: 247 Function Name: NtSetValueKey Status: Hooked by "Lbd.sys" at address 0xf74f7bfe #: 257 Function Name: NtTerminateProcess Status: Hooked by "C:\Programme\BitDefender\BitDefender 2009\bdselfpr.sys" at address 0xa6ec4bf4 #: 258 Function Name: NtTerminateThread Status: Hooked by "C:\Programme\BitDefender\BitDefender 2009\bdselfpr.sys" at address 0xa6ec4ec4 Stealth Objects ------------------- Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP] Process: System Address: 0x8a6031f8 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_CREATE] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_CLOSE] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_READ] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_WRITE] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_QUERY_INFORMATION] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_SET_INFORMATION] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_QUERY_VOLUME_INFORMATION] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_DIRECTORY_CONTROL] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_FILE_SYSTEM_CONTROL] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_LOCK_CONTROL] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_CLEANUP] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_PNP] Process: System Address: 0x8a34e500 Size: 121 Object: Hidden Code [Driver: sys, IRP_MJ_CREATE] Process: System Address: 0x89f381f8 Size: 121 Object: Hidden Code [Driver: sys, IRP_MJ_CLOSE] Process: System Address: 0x89f381f8 Size: 121 Object: Hidden Code [Driver: sys, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x89f381f8 Size: 121 Object: Hidden Code [Driver: sys, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x89f381f8 Size: 121 Object: Hidden Code [Driver: sys, IRP_MJ_POWER] Process: System Address: 0x89f381f8 Size: 121 Object: Hidden Code [Driver: sys, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x89f381f8 Size: 121 Object: Hidden Code [Driver: sys, IRP_MJ_PNP] Process: System Address: 0x89f381f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP] Process: System Address: 0x89f5e1f8 Size: 121 Object: Hidden Code [Driver: USBSTOR, IRP_MJ_CREATE] Process: System Address: 0x89f311f8 Size: 121 Object: Hidden Code [Driver: USBSTOR, IRP_MJ_CLOSE] Process: System Address: 0x89f311f8 Size: 121 Object: Hidden Code [Driver: USBSTOR, IRP_MJ_READ] Process: System Address: 0x89f311f8 Size: 121 Object: Hidden Code [Driver: USBSTOR, IRP_MJ_WRITE] Process: System Address: 0x89f311f8 Size: 121 Object: Hidden Code [Driver: USBSTOR, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x89f311f8 Size: 121 Object: Hidden Code [Driver: USBSTOR, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x89f311f8 Size: 121 Object: Hidden Code [Driver: USBSTOR, IRP_MJ_POWER] Process: System Address: 0x89f311f8 Size: 121 Object: Hidden Code [Driver: USBSTOR, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x89f311f8 Size: 121 Object: Hidden Code [Driver: USBSTOR, IRP_MJ_PNP] Process: System Address: 0x89f311f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_CREATE] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_CLOSE] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_READ] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_WRITE] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_FLUSH_BUFFERS] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_SHUTDOWN] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_POWER] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: dmio, IRP_MJ_PNP] Process: System Address: 0x8a6041f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE] Process: System Address: 0x8a3891f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE] Process: System Address: 0x8a3891f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x8a3891f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x8a3891f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER] Process: System Address: 0x8a3891f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x8a3891f8 Size: 121 Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP] Process: System Address: 0x8a3891f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP] Process: System Address: 0x8a6751f8 Size: 121 Object: Hidden Code [Driver: NetBT, IRP_MJ_CREATE] Process: System Address: 0x89ec3500 Size: 121 Object: Hidden Code [Driver: NetBT, IRP_MJ_CLOSE] Process: System Address: 0x89ec3500 Size: 121 Object: Hidden Code [Driver: NetBT, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x89ec3500 Size: 121 Object: Hidden Code [Driver: NetBT, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x89ec3500 Size: 121 Object: Hidden Code [Driver: NetBT, IRP_MJ_CLEANUP] Process: System Address: 0x89ec3500 Size: 121 Object: Hidden Code [Driver: NetBT, IRP_MJ_PNP] Process: System Address: 0x89ec3500 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE] Process: System Address: 0x89f431f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE] Process: System Address: 0x89f431f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x89f431f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x89f431f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER] Process: System Address: 0x89f431f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x89f431f8 Size: 121 Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP] Process: System Address: 0x89f431f8 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_NAMED_PIPE] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLOSE] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_READ] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_WRITE] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_INFORMATION] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_INFORMATION] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_EA] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_EA] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FLUSH_BUFFERS] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_VOLUME_INFORMATION] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_VOLUME_INFORMATION] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DIRECTORY_CONTROL] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FILE_SYSTEM_CONTROL] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CONTROL] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_INTERNAL_DEVICE_CONTROL] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SHUTDOWN] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_LOCK_CONTROL] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLEANUP] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_MAILSLOT] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_SECURITY] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_SECURITY] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_POWER] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SYSTEM_CONTROL] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CHANGE] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_QUOTA] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_QUOTA] Process: System Address: 0x89f2f500 Size: 121 Object: Hidden Code [Driver: MRxSmb, IRP_MJ_PNP] Process: System Address: 0x89f2f500 Size: 121 ==EOF== |
18.04.2010, 15:11 | #18 | |
| Mein Trojan.Generic 3580153 1. Hol dir Avenger
__________________Entpacke Avenger auf den Desktop. Starte Avenger. Setze unten beide Häkchen. Kopiere in das Skript-Feld rein: Zitat:
Neustart zulassen. Nach dem Neustart sollte ein Log eingeblendet werden, poste es. |
18.04.2010, 15:33 | #19 |
| Mein Trojan.Generic 3580153Code:
ATTFilter Logfile of The Avenger Version 2.0, (c) by Swandog46 hxxp://swandog46.geekstogo.com Platform: Windows XP ******************* Script file opened successfully. Script file read successfully. Backups directory opened successfully at C:\Avenger ******************* Beginning to process script file: Rootkit scan active. No rootkits found! Error: could not open file "C:\WINDOWS\system32\cfqrufu.dll.bak" Deletion of file "C:\WINDOWS\system32\cfqrufu.dll.bak" failed! Status: 0xc0000022 (STATUS_ACCESS_DENIED) Error: registry key "\Registry\Machine\System\CurrentControlSet\Services\klmdb" not found! Deletion of driver "klmdb" failed! Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND) --> the object does not exist Error: registry key "\Registry\Machine\System\CurrentControlSet\Services\tsk8F" not found! Deletion of driver "tsk8F" failed! Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND) --> the object does not exist Completed script processing. ******************* Finished! Terminate. |
18.04.2010, 16:17 | #20 |
| Mein Trojan.Generic 3580153 Heftiges Teil hast du dir da eingefangen... Hilft wohl nichts, Combofix muss ran. Ein Leitfaden und Tutorium zur Nutzung von ComboFix Den Leitfaden genau beachten und befolgen, ComboFix versteht kein Spaß. Poste anschließend das ComboFix-Log. |
18.04.2010, 18:18 | #21 |
| Mein Trojan.Generic 3580153Code:
ATTFilter ComboFix 10-04-17.07 - sascha 18.04.2010 18:38:30.1.2 - x86 Microsoft Windows XP Professional 5.1.2600.3.1252.49.1031.18.2046.1263 [GMT 2:00] ausgeführt von:: c:\dokumente und einstellungen\sascha\Desktop\ComboFix.exe AV: BitDefender Antivirus *On-access scanning disabled* (Updated) {6C4BB89C-B0ED-4F41-A29C-4373888923BB} FW: BitDefender Firewall *disabled* {4055920F-2E99-48A8-A270-4243D2B8F242} . (((((((((((((((((((((((((((((((((((( Weitere Löschungen )))))))))))))))))))))))))))))))))))))))))))))))) . c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\FTFDHFHP\StartService.exe c:\windows\eSellerateEngine.dll c:\windows\system32\ActNAV_cltDynam.dat c:\windows\system32\atiptaxx .exe c:\windows\system32\cfqrufu.dll c:\windows\system32\drivers\xliadnqr.sys c:\windows\system32\drivers\zkstwsub.sys c:\windows\system32\icdqctv.dll c:\windows\system32\zcmpqciq.dll D:\AUTORUN.INF Infizierte Kopie von c:\windows\system32\drivers\ftdisk.sys wurde gefunden und desinfiziert Kopie von - Kitty had a snack :p wurde wiederhergestellt . ((((((((((((((((((((((((((((((((((((((( Treiber/Dienste ))))))))))))))))))))))))))))))))))))))))))))))))) . -------\Legacy_JXHBWAMG -------\Legacy_SSHNAS -------\Legacy_ZKSTWSUB -------\Service_jxhbwamg -------\Service_zkstwsub ((((((((((((((((((((((( Dateien erstellt von 2010-03-18 bis 2010-04-18 )))))))))))))))))))))))))))))) . 2010-04-15 21:33 . 2010-04-15 21:33 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Malwarebytes 2010-04-15 21:32 . 2010-03-29 13:24 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys 2010-04-15 21:32 . 2010-04-15 21:32 -------- d-----w- c:\programme\Malwarebytes' Anti-Malware 2010-04-15 21:32 . 2010-04-15 21:32 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Malwarebytes 2010-04-15 21:32 . 2010-03-29 13:24 20824 ----a-w- c:\windows\system32\drivers\mbam.sys 2010-04-15 17:30 . 2010-04-15 17:30 -------- d-----w- c:\programme\Trend Micro 2010-04-14 20:55 . 2010-04-14 17:14 15880 ----a-w- c:\windows\system32\lsdelete.exe 2010-04-14 17:15 . 2010-02-04 15:53 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys 2010-04-14 17:14 . 2010-04-14 17:14 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys 2010-04-14 17:10 . 2010-04-14 17:10 -------- dc-h--w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6} 2010-04-14 17:10 . 2010-04-14 17:14 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Lavasoft 2010-04-14 17:10 . 2010-04-14 17:10 -------- d-----w- c:\programme\Lavasoft 2010-04-14 13:19 . 2010-04-14 13:19 -------- d-----w- c:\programme\Enigma Software Group 2010-04-14 13:17 . 2010-04-15 17:20 -------- d-----w- c:\windows\61D3AAE1D5214CD7939B37813DE8F955.TMP 2010-04-14 13:16 . 2010-04-14 13:16 -------- d-----w- c:\programme\Gemeinsame Dateien\Wise Installation Wizard 2010-04-14 12:53 . 2010-04-18 16:56 -------- d-----w- c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\FTFDHFHP 2010-04-12 16:46 . 2010-04-12 16:46 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\BitDefender 2010-04-11 17:44 . 2010-04-11 17:44 -------- d-----w- c:\dokumente und einstellungen\NetworkService\Tracing 2010-04-11 17:36 . 2010-04-11 17:36 -------- d-----w- c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\Symantec 2010-04-11 16:47 . 2010-04-11 21:10 -------- d-----w- c:\programme\DAEMON Tools Pro 2010-04-11 16:47 . 2010-04-11 17:33 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\DAEMON Tools Pro 2010-04-11 16:47 . 2010-04-11 16:47 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\DAEMON Tools Pro 2010-04-11 13:55 . 2010-04-11 13:55 -------- d-----r- c:\dokumente und einstellungen\NetworkService\Favoriten 2010-04-11 07:33 . 2010-04-11 17:05 654 ----a-w- c:\windows\eReg.dat 2010-04-10 18:49 . 2010-04-10 18:49 -------- d-----w- c:\programme\Intelore 2010-04-08 18:42 . 2010-04-08 18:42 -------- d-----w- c:\programme\Ulead Systems 2010-04-07 15:41 . 2010-04-07 15:41 -------- d-----w- c:\programme\Lavalys 2010-04-01 15:36 . 2010-04-01 15:36 -------- d-----w- c:\programme\Microsoft WSE 2010-03-26 16:29 . 2010-03-29 18:08 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Command and Conquer 4 2010-03-26 16:29 . 2010-03-26 16:29 -------- d-----w- c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\Electronic_Arts_Inc 2010-03-26 14:15 . 2010-04-03 18:17 708624 ----a-w- c:\dokumente und einstellungen\LocalService\Lokale Einstellungen\Anwendungsdaten\FontCache3.0.0.0.dat 2010-03-26 14:14 . 2010-03-26 14:17 -------- d-----w- c:\windows\system32\XPSViewer 2010-03-26 14:13 . 2010-03-26 14:13 -------- d-----w- c:\programme\Reference Assemblies 2010-03-21 08:55 . 2010-03-21 08:55 -------- d-----w- c:\programme\ARM Software . (((((((((((((((((((((((((((((((((((( Find3M Bericht )))))))))))))))))))))))))))))))))))))))))))))))))))))) . 2010-04-18 16:54 . 2008-11-09 16:21 81984 ----a-w- c:\windows\system32\bdod.bin 2010-04-17 21:51 . 2004-08-10 19:00 96512 ----a-w- c:\windows\system32\drivers\atapi.sys 2010-04-15 22:02 . 2009-07-28 22:59 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\vlc 2010-04-15 16:38 . 2008-12-24 09:54 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Google Updater 2010-04-13 22:21 . 2010-01-23 16:25 -------- d-----w- c:\programme\QuickTime 2010-04-13 05:20 . 2009-07-21 22:44 -------- d-----w- c:\programme\iTunes 2010-04-12 21:55 . 2008-08-12 16:40 242184 ----a-w- c:\windows\system32\drivers\bdfsfltr.sys 2010-04-12 21:55 . 2008-04-23 16:34 192512 ----a-w- c:\windows\system32\txmlutil.dll 2010-04-12 21:55 . 2008-08-14 16:54 104456 ----a-w- c:\windows\system32\drivers\bdfndisf.sys 2010-04-12 21:55 . 2008-08-12 16:40 111112 ----a-w- c:\windows\system32\drivers\bdfm.sys 2010-04-12 21:55 . 2008-07-02 11:07 82696 ----a-w- c:\windows\system32\drivers\BDVEDISK.sys 2010-04-12 21:26 . 2010-04-11 13:54 112 ----a-w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\vx1266MA.dat 2010-04-12 16:46 . 2009-01-14 14:19 -------- d-----w- c:\programme\BitDefender 2010-04-12 16:45 . 2009-01-14 14:18 -------- d-----w- c:\programme\Gemeinsame Dateien\BitDefender 2010-04-12 16:39 . 2010-02-04 19:06 -------- d-----w- c:\programme\NortonInstaller 2010-04-12 16:39 . 2009-10-25 10:49 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Norton 2010-04-12 16:35 . 2008-11-27 21:35 -------- d-----w- c:\programme\Gemeinsame Dateien\Symantec Shared 2010-04-11 20:27 . 2009-10-06 15:14 -------- d-----w- c:\programme\Stylish Profile 2010-04-11 17:04 . 2008-11-16 20:40 -------- d-----w- c:\programme\EA Sports 2010-04-11 16:47 . 2009-07-14 08:55 691696 ----a-w- c:\windows\system32\drivers\sptd.sys 2010-04-08 21:26 . 2010-04-08 21:26 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Ulead Systems 2010-04-08 21:26 . 2010-04-08 18:42 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Ulead Systems 2010-04-08 20:23 . 2008-11-09 13:01 85240 ----a-w- c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\GDIPFONTCACHEV1.DAT 2010-04-08 19:22 . 2009-06-16 22:18 -------- d-----w- c:\programme\Gemeinsame Dateien\DVDVideoSoft 2010-04-08 19:22 . 2009-06-16 22:18 -------- d-----w- c:\programme\DVDVideoSoft 2010-04-08 18:49 . 2010-04-08 18:49 -------- d-----w- c:\programme\Gemeinsame Dateien\SONY Digital Images 2010-04-08 18:49 . 2010-04-08 18:42 -------- d-----w- c:\programme\Gemeinsame Dateien\Ulead Systems 2010-04-08 18:47 . 2008-11-09 13:03 -------- d--h--w- c:\programme\InstallShield Installation Information 2010-04-08 18:47 . 2010-04-08 18:47 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\SmartSound Software Inc 2010-04-08 18:47 . 2010-04-08 18:47 -------- d-----w- c:\programme\SmartSound Software 2010-04-08 18:45 . 2010-04-08 18:45 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\QuickTime 2010-04-08 18:44 . 2010-04-08 18:44 -------- d-----w- c:\programme\Windows Media-Komponenten 2010-04-01 15:08 . 2008-11-16 21:13 -------- d-----w- c:\programme\Electronic Arts 2010-03-28 07:14 . 2004-08-10 19:00 85836 ----a-w- c:\windows\system32\perfc007.dat 2010-03-28 07:14 . 2004-08-10 19:00 462938 ----a-w- c:\windows\system32\perfh007.dat 2010-03-26 14:14 . 2008-11-09 13:18 -------- d-----w- c:\programme\MSBuild 2010-03-19 19:41 . 2009-06-23 08:09 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\gtk-2.0 2010-03-18 22:56 . 2009-07-07 20:09 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Skype 2010-03-18 15:06 . 2009-07-07 20:18 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\skypePM 2010-03-15 11:28 . 2010-03-15 11:28 -------- d-----w- c:\programme\dehmer 2010-03-13 20:40 . 2010-01-30 21:22 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Facebook 2010-02-25 13:05 . 2010-02-25 13:05 58204 ---ha-w- c:\windows\system32\mlfcache.dat 2010-02-24 15:38 . 2009-03-28 12:18 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Move Networks 2010-02-18 18:13 . 2008-11-27 21:35 -------- d-----w- c:\programme\Norton Security Scan 2010-02-18 18:12 . 2010-02-18 18:12 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Symantec 2010-01-24 13:57 . 2010-01-24 13:47 132 ----a-w- c:\windows\system32\rezumatenoi.dat 2010-04-12 21:55 . 2008-08-13 17:02 65536 ----a-w- c:\programme\mozilla firefox\components\FFComm.dll . |
18.04.2010, 19:24 | #22 |
| Mein Trojan.Generic 3580153 Auf Kitty ist Verlass. 1. Mach einen erneuten Suchlauf mit Malwarebytes. Denk ans Updaten. 2. Versuche einen erneuten Suchlauf mit Gmer. Sollte jetzt gehen. Lösche aber erst die alte Gmer-Datei und hol dir eine "frische". |
19.04.2010, 17:35 | #23 |
| Mein Trojan.Generic 3580153 Kann man das irgendwie einstellen dass GMER nicht automatisch nach dem Scan neustartet? Hab jetzt schon mehrfach mit GMER gescannt aber nicht alle ~3 Stunden abwarten können um wirklich den kompletten Log zu kopieren. Hier mal Malware Log von gestern Abend: Code:
ATTFilter Malwarebytes' Anti-Malware 1.45 www.malwarebytes.org Datenbank Version: 4005 Windows 5.1.2600 Service Pack 3 Internet Explorer 7.0.5730.13 18.04.2010 22:10:25 ambam-log-2010-04-18 (22-10-25).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|) Durchsuchte Objekte: 292436 Laufzeit: 1 Stunde(n), 28 Minute(n), 20 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 0 Infizierte Registrierungswerte: 0 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 6 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: C:\Dokumente und Einstellungen\sascha\Eigene Dateien\TigerWoods PGA08\tw08\kaplan.odun\Tiger Woods PGA Tour 08\CRACK&SERIAL\keygen.exe (Trojan.Downloader) -> No action taken. C:\Dokumente und Einstellungen\sascha\Eigene Dateien\E2004\UEFA EURO 2004\crack\EA Keygen.exe (Trojan.Orsam) -> No action taken. C:\Dokumente und Einstellungen\sascha\Eigene Dateien\KW.DotNXT\KW\EA Games Generic Keygen 190.exe (Trojan.Orsam) -> No action taken. C:\Programme\Gemeinsame Dateien\DVDVideoSoft\unins000.exe (Rogue.Installer) -> No action taken. C:\Programme\DVDVideoSoft\Free YouTube Download\unins000.exe (Rogue.Installer) -> No action taken. C:\System Volume Information\_restore{8E7F6492-B30F-4E74-BE00-F624172B868A}\RP6\A0012028.sys (Rootkit.Agent) -> No action taken. |
19.04.2010, 18:48 | #24 | |
| Mein Trojan.Generic 3580153Zitat:
http://www.trojaner-board.de/51262-a...sicherung.html Du solltest in der Zukunft von der Benutzung solcher Sachen absehen - die sind nicht nur illegal, sondern auch in den meisten Fällen verseucht. Ich bin weg. |
19.04.2010, 19:06 | #25 |
| Mein Trojan.Generic 3580153 ok danke dennoch. |
Themen zu Mein Trojan.Generic 3580153 |
ad-aware, bho, browser, defender, desktop, dringend, einstellungen, enigma, firefox, google, gupdate, hijack, hijackthis, hkus\s-1-5-18, internet, internet explorer, jusched.exe, mozilla, neu aufsetzen, plug-in, programm, security, security suite, senden, software, spyhunter 4, system, system 32, trojaner, uleadburninghelper, viren, virus, windows, windows xp |