Trojaner-Board

Trojaner-Board (https://www.trojaner-board.de/)
-   Plagegeister aller Art und deren Bekämpfung (https://www.trojaner-board.de/plagegeister-aller-art-deren-bekaempfung/)
-   -   DR/Autoit.TC.115 und TR/FraudPack.ajcp (https://www.trojaner-board.de/80928-dr-autoit-tc-115-tr-fraudpack-ajcp.html)

kall9r 28.12.2009 17:14

DR/Autoit.TC.115 und TR/FraudPack.ajcp
 
Hi,

bei meiner Freundin kamen kürzlich immer wieder WerbePopups, also die Browserfenster öffneten sich selbstständig. Das Problem hatte ich hier bereits geschildert. Ich habe dann mittels mbam einige infizierte Dateien entfernen können, jedoch bestand das Problem weiterhin.

Nun kamen nach dem Einschalten des PC mehrere Virenmeldungen von Avira Antivir:

DR/Autoit.TC.115 und TR/FraudPack.ajcp wurden erkannt.

Kann jemand helfen?

Zitat:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 17:08:53, on 28.12.2009
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
c:\programme\gemeinsame dateien\logitech\lvmvfm\LVPrcSrv.exe
C:\WINDOWS\Explorer.exe
C:\Programme\Avira\AntiVir Desktop\sched.exe
C:\Programme\Avira\AntiVir Desktop\avguard.exe
C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\bmwebcfg.exe
C:\Programme\Bonjour\mDNSResponder.exe
C:\Programme\ICQ6Toolbar\ICQ Service.exe
C:\WINDOWS\system32\csrcs.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Programme\CyberLink\Shared Files\RichVideo.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe
C:\Programme\Gemeinsame Dateien\Logitech\LComMgr\Communications_Helper.exe
C:\Programme\Gemeinsame Dateien\Logitech\LComMgr\LVComSX.exe
C:\Programme\Tools\Player\Quicktime\QTTask.exe
C:\Programme\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Programme\Avira\AntiVir Desktop\avgnt.exe
C:\Programme\ICQ6.5\ICQ.exe
C:\DOKUME~1\***\LOKALE~1\Temp\c.exe
C:\Programme\NETGEAR\MA111 Configuration Utility\wlancfg4.exe
C:\Programme\iPod\bin\iPodService.exe
C:\Programme\Lexmark 2300 Series\lxcgmon.exe
C:\WINDOWS\system32\lxcgcoms.exe
C:\Programme\Tools\Internet\Browser\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\cmd.exe
C:\WINDOWS\system32\net.exe
E:\Downloads\Antivirus_kram\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = http://google.icq.com/search/search_frame.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://google.icq.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.sat1.de/index.php?icqpath=icq
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: ICQToolBar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - C:\Programme\ICQ6Toolbar\ICQToolBar.dll
R3 - URLSearchHook: (no name) - - (no file)
F2 - REG:system.ini: Shell=Explorer.exe csrcs.exe
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Hilfsobjekt für Encarta Web-Begleiter - {955BE0B8-BC85-4CAF-856E-8E0D8B610560} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Encarta Web Companion\2007\ENCWCBAR.DLL
O3 - Toolbar: ICQToolBar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - C:\Programme\ICQ6Toolbar\ICQToolBar.dll
O3 - Toolbar: Encarta Web-Begleiter - {147D6308-0614-4112-89B1-31402F9B82C4} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Encarta Web Companion\2007\ENCWCBAR.DLL
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Programme\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll (file missing)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [LXCGCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll,_RunDLLEntry@16
O4 - HKLM\..\Run: [TkBellExe] "C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [LogitechCommunicationsManager] "C:\Programme\Gemeinsame Dateien\Logitech\LComMgr\Communications_Helper.exe"
O4 - HKLM\..\Run: [LVCOMSX] "C:\Programme\Gemeinsame Dateien\Logitech\LComMgr\LVComSX.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Programme\Tools\Player\Quicktime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Programme\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [avgnt] "C:\Programme\Avira\AntiVir Desktop\avgnt.exe" /min
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Programme\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\RunServices: [csrcs] C:\WINDOWS\system32\csrcs.exe
O4 - HKCU\..\Run: [Veoh] "C:\Programme\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
O4 - HKCU\..\Run: [ICQ] "C:\Programme\ICQ6.5\ICQ.exe" silent
O4 - HKCU\..\Run: [J8RPLTROBQ] C:\DOKUME~1\Lauri\LOKALE~1\Temp\c.exe
O4 - HKLM\..\Policies\Explorer\Run: [csrcs] C:\WINDOWS\system32\csrcs.exe
O4 - Global Startup: MA111 Configuration Utility.lnk = ?
O8 - Extra context menu item: &ICQ Toolbar Search - res://C:\Programme\Tools\Internet\Messenger\icq\ICQToolbar\toolbaru.dll/SEARCH.HTML
O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Encarta Suchleiste - {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Encarta Search Bar\ENCSBAR.DLL
O9 - Extra button: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Programme\Tools\Internet\Messenger\icq\ICQLite\ICQLite.exe (file missing)
O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Programme\Tools\Internet\Messenger\icq\ICQLite\ICQLite.exe (file missing)
O9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6.5\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6.5\ICQ.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: bmnet.dll
O10 - Unknown file in Winsock LSP: bmnet.dll
O10 - Unknown file in Winsock LSP: bmnet.dll
O23 - Service: Avira AntiVir Planer (AntiVirSchedulerService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\sched.exe
O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\avguard.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bytemobile Web Configurator (bmwebcfg) - Bytemobile, Inc. - C:\WINDOWS\system32\bmwebcfg.exe
O23 - Service: Bonjour-Dienst (Bonjour Service) - Apple Inc. - C:\Programme\Bonjour\mDNSResponder.exe
O23 - Service: ICQ Service - Unknown owner - C:\Programme\ICQ6Toolbar\ICQ Service.exe
O23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Programme\iPod\bin\iPodService.exe
O23 - Service: Logitech Process Monitor (LVPrcSrv) - Logitech Inc. - c:\programme\gemeinsame dateien\logitech\lvmvfm\LVPrcSrv.exe
O23 - Service: LVSrvLauncher - Logitech Inc. - C:\Programme\Gemeinsame Dateien\Logitech\SrvLnch\SrvLnch.exe
O23 - Service: lxcg_device - Unknown owner - C:\WINDOWS\system32\lxcgcoms.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Programme\CyberLink\Shared Files\RichVideo.exe

--
End of file - 7904 bytes

kira 29.12.2009 11:50

Hallo und Herzlich Willkommen! :)

Was bereits auf dem Rechner passiert:
Zitat:

Backdoors öffnen eine Hintertür zum infizierten Rechner. So kann der Rechner von einem Angreifer fern gesteuert werden. Meist kann weitere Software installiert werden und der Rechner wird mit anderen Zombie-PCs in ein Botnetz integriert. Diese Zombies werden dann verwendet, um Spam zu verschicken, Daten zu stehlen, und verteilte Angriffe (distributed denial of service attacks) durchzuführen.
Also einer Infektion mit einem Backdoor, man kann nie sicher sein, dass er zu 100 % weg ist und wo/wann er als nächstes auftaucht
Wichtig ist, dass du selbst bestimmst, welches Risiko du eingehen willst...besonders wenn du z.B Online-Banking machst usw
Zitat:

Wenn ein System kompromittiert wurde, ist das System nicht mehr vertrauenswürdig
Eine Neuinstallation garantiert die rückstandsfreie Entfernung der Infektion - Sicherheitskonzept v. SETI@home/Punkt 1.
Falls du doch für die Systemreinigung entscheidest - Ein System zu bereinigen kann ein paar Tage dauern (je nach Art der Infektion), kann aber sogar so stark kompromittiert sein, so dass eine wirkungsvolle technische Säuberung ist nicht mehr möglich bzw Du es neu installieren musst::

- Die Anweisungen bitte gründlich lesen und immer streng einhalten, da ich die Reihenfolge nach bestimmten Kriterien vorbereitet habe:

1.
ich brauche mehr `Übersicht` bzw Daten über einen längeren Zeitraum - dazu bitte Versteckte - und Systemdateien sichtbar machen::
→ Klicke unter Start auf Arbeitsplatz.
→ Klicke im Menü Extras auf Ordneroptionen.
→ Dateien und Ordner/Erweiterungen bei bekannten Dateitypen ausblenden → Haken entfernen
→ Geschützte und Systemdateien ausblenden → Haken entfernen
→ Versteckte Dateien und Ordner/Alle Dateien und Ordner anzeigen → Haken setzen.
→ Bei "Geschützte Systemdateien ausblenden" darf kein Häkchen sein und "Alle Dateien und Ordner anzeigen" muss aktiviert sein.

2.
Für XP und Win2000 (ansonsten auslassen)
→ lade Dir das filelist.zip auf deinen Desktop herunter
→ entpacke die Zip-Datei auf deinen Desktop
→ starte nun mit einem Doppelklick auf die Datei "filelist.bat" - Dein Editor (Textverarbeitungsprogramm) wird sich öffnen
→ kopiere aus die erzeugten Logfile alle 7 Verzeichnisse ("C\...") usw - aber nur die Einträge der letzten 6 Monate - hier in deinem Thread
** vor jedem Eintrag steht ein Datum, also Einträge, die älter als 6 Monate sind bitte herauslöschen!

3.
Ich würde gerne noch all deine installierten Programme sehen:
Lade dir das Tool ccleaner herunter
installieren ("Füge CCleaner Yahoo! Toolbar hinzu" abwählen)→ starten→ unter Options settings-> "german" einstellen
dann klick auf "Extra (um die installierten Programme auch anzuzeigen)→ weiter auf "Als Textdatei speichern..."
wird eine Textdatei (*.txt) erstellt, kopiere dazu den Inhalt und füge ihn da ein

4.
  • lade F-Secure Blacklight in einen neuen Ordner C:\programme\blacklight.
  • schließe alle Programme, ausserdem Antiviren und andere Schutzprogramme usw müssen deaktiviert sein, keine Verbindung zum Internet, WLAN auch trennen)
  • nichts am Pc machen während der Scan läuft![/b]
  • starte in diesem Ordner fsbl.exe
  • klicke auf "I accept the agreement" → "next" → "Scan"
  • wenn der Scan beendet ist, wähle Close.
  • der Bericht ist fsbl-XXX.log und befindet sich im Blacklight Verzeichnis. (anstelle der XXX stehen Zahlen, die Datum und Uhrzeit enthalten). Den Inhalt dieser Datei bitte posten.
Wenn der Scan beendet ist, bitte alle Programme und Tools wieder aktivieren!

5.
Um einen tieferen Einblick in dein System, um eine mögliche Infektion mit einem Rootkit/Info v.wikipedia.org) aufzuspüren, werden wir ein Tool - Gmer - einsetzen :
  • - also lade Dir Gmer herunter und entpacke es auf deinen Desktop
    - starte gmer.exe
    - [b]schließe alle Programme, ausserdem Antiviren und andere Schutzprogramme usw müssen deaktiviert sein, keine Verbindung zum Internet, WLAN auch trennen)
    - bitte nichts am Pc machen während der Scan läuft!
    - "Show all" soll nicht angehakt sein! dann klicke auf "Scan", um das Tool zu starten
    - wenn der Scan fertig ist klicke auf "Copy" (das Log wird automatisch in die Zwischenablage kopiert) und mit STRG + V musst Du gleich da einfügen
    - mit "Ok" wird Gmer beendet.
    - das Log aus der Zwischenablage hier in Deinem Thread vollständig hineinkopieren

** keine Verbindung zu einem Netzwerk und Internet - WLAN nicht vergessen
Wenn der Scan beendet ist, bitte alle Programme und Tools wieder aktivieren!
** kannst Du das Log bei File-Upload.net/kostenlos hochladen und den Link mir hier posten.

Zitat:

Damit dein Thread übersichtlicher und schön lesbar bleibt, am besten nutze den Code-Tags für deinen Post:
→ vor dein Log schreibst Du:[code]
hier kommt dein Logfile rein
→ dahinter:[/code]

** Möglichst nicht ins internet gehen, kein Online-Banking, File-sharing, Chatprogramme usw
gruß
Coverflow

kall9r 29.12.2009 13:35

Ok, also hier erstmal das filelist-Log

Code:

----- Root -----------------------------
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\

29.12.2009  13:20                43 filelist.txt
29.12.2009  12:16    2.147.061.760 hiberfil.sys
29.12.2009  12:16      805.306.368 pagefile.sys
26.12.2009  13:08                0 khw

 
----- Windows --------------------------
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\WINDOWS

29.12.2009  12:17                0 0.log
29.12.2009  12:17              159 wiadebug.log
29.12.2009  12:17              313 wiaservc.log
29.12.2009  12:16            2.048 bootstat.dat
28.12.2009  18:22            5.073 WindowsUpdate.log
26.12.2009  18:19          164.352 msa.exe
26.12.2009  17:17            22.316 setupapi.log
29.11.2009  13:24              116 NeroDigital.ini
27.11.2009  15:43              526 eReg.dat
13.11.2009  19:23                24 SELINGUA.INI
30.08.2009  10:05              169 RtlRack.ini
 
 
----- System 32 (Achtung: Zeitfenster beachten!) ---
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\WINDOWS\system32

29.12.2009  12:17          204.100 nvapps.xml
26.12.2009  15:03            2.206 wpa.dbl
26.12.2009  13:07          (1.579) autorun.i
26.12.2009  13:07            (833) autorun.in
19.12.2009  11:46            12.524 KGyGaAvL.sys
29.10.2009  18:14          392.296 perfh009.dat
29.10.2009  18:14            58.596 perfc009.dat
29.10.2009  18:14          405.118 perfh007.dat
29.10.2009  18:14            70.580 perfc007.dat
29.10.2009  18:14          938.224 PerfStringBackup.INI
 
 
----- Tasks ----------------------------
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\WINDOWS\tasks

29.12.2009  13:09              278 {66BA574B-1E11-49b8-909C-8CC9E0E8E015}.job
26.12.2009  18:19              240 {35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job

 
----- Windows/Temp -----------------------
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\WINDOWS\Temp

14.11.2009  22:52            7.168 etilqs_faNciDRYIZjbHVXABWw9
14.11.2009  22:52            1.028 etilqs_R3RphEOkT7tm0VLwLPfm
14.11.2009  22:52              512 etilqs_qa9sclhamg2f6L0mCjuQ

 
----- Temp -----------------------------
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\DOKUME~1\***\LOKALE~1\Temp

29.12.2009  13:19              549 t853zogh.zip
29.12.2009  12:17                0 JET2F48.tmp
29.12.2009  12:17            11.097 LVCOMSX.LOG
26.12.2009  19:27            39.532 a.dat
26.12.2009  18:19          168.960 c.exe
26.12.2009  18:19          164.352 b.exe
26.12.2009  18:19          349.696 a.exe
26.12.2009  16:51          311.296 ~DF9098.tmp
25.12.2009  17:50            16.384 ~DF1AA0.tmp
25.12.2009  17:49            16.384 ~DF5F3F.tmp
11.12.2009  10:00        1.166.464 55b8nihn.rar
27.11.2009  16:07            24.516 SIntfNT.dll
27.11.2009  16:07            19.924 SIntf32.dll
27.11.2009  16:07            12.067 SIntf16.dll
15.11.2009  14:52        36.526.028 ubi54.tmp.exe
15.11.2009  14:08            36.864 CmdLineExt02.dll
14.11.2009  10:23          212.992 3_-_Straftaten_gegen_die_k__rperliche_Unversehrtheit.ppt
01.11.2009  13:47          288.768 1_-_Einleitung__Straftaten_gegen_das_Leben.ppt
30.10.2009  16:11        1.734.274 newn46rn.rar
19.10.2009  10:56        1.392.805 LastScan.jpg
08.10.2009  22:35          100.293 coredmp
05.10.2009  16:18              252 r2h68.tmp
05.10.2009  12:03            27.648 18-taeterschaft04.doc
24.08.2009  12:07            39.424 at10910 Folien 040609.doc
26.07.2009  09:04          358.912 e62iavbc.rar
23.07.2009  14:35        16.825.216 718631~1.exe
10.07.2009  14:09              823 {AC76BA86-7AD7-1031-7B44-A81300000003}.ini
12.06.2009  07:54        2.196.934 g0rtfkqy.exe
05.06.2009  14:26          167.936 schuldrecht.ppt
05.06.2009  12:55            26.112 Hinweise zum Gutachten-und Urteilsstil.doc
05.06.2009  12:52            22.528 Fall Kopierpapier.doc

Ccleaner-Log installierte Programme

Code:

                                            1.9.2.1705
ABBYY FineReader 6.0 Sprint        ABBYY Software House        6.00.1395.41612
Adobe Flash Player 10 Plugin        Adobe Systems Incorporated        10.0.12.36
Adobe Flash Player 9 ActiveX        Adobe Systems        9
Adobe Reader 9.1 - Deutsch        Adobe Systems Incorporated        9.1.0
Advanced IM Password Recovery (remove only)               
AGEIA PhysX v7.11.13        AGEIA Technologies, Inc.        7.11.13
Apple Mobile Device Support        Apple Inc.        2.1.1.13
Apple Software Update        Apple Inc.        2.1.1.116
Avance AC'97 Audio               
Avira AntiVir Personal - Free Antivirus        Avira GmbH       
Bonjour        Apple Inc.        1.0.105
CCleaner        Piriform        2.27
Connection Manager deinstallieren               
DivX        DivXNetworks, Inc.        5.2
DivX Player        DivXNetworks, Inc.        2.5.4
DivX Web Player        DivX,Inc.        1.4.2
DVD Shrink 3.2        DVD Shrink       
EVEREST Home Edition v2.20        Lavalys Inc        2.20
ffdshow [rev 1723] [2007-12-24]                1.0
Harry Potter TM               
HijackThis 2.0.2        TrendMicro        2.0.2
ICQ Toolbar        ICQ        3.0.0
ICQ6.5        ICQ        6.5
IL-2 Sturmovik: Forgotten Battles        Ubi Soft        1.00.0000
iTunes        Apple Inc.        8.0.1.11
J2SE Runtime Environment 5.0 Update 6        Sun Microsystems, Inc.        1.5.0.60
Lexmark 2300 Series               
Lexmark Fax-Lösungen        Lexmark International, Inc.       
Logitech Audio Echo Cancellation Component               
Logitech QuickCam        Logitech Inc.        10.00.1439
Logitech Video Enumerator               
Logitech® Camera-Treiber               
MA111 Configuration Utility               
Malwarebytes' Anti-Malware        Malwarebytes Corporation       
Microsoft .NET Framework 2.0        Microsoft Corporation       
Microsoft .NET Framework 2.0 Language Pack - DEU        Microsoft Corporation       
Microsoft Encarta 2007 - Enzyklopädie               
Microsoft Office Professional Edition 2003        Microsoft Corporation        11.0.5614.0
Microsoft Visual C++ 2005 Redistributable        Microsoft Corporation        8.0.56336
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17        Microsoft Corporation        9.0.30729
MobileMe Control Panel        Apple Inc.        2.1.1.13
Mozilla Firefox (2.0.0.20)        Mozilla        2.0.0.20 (de)
MSN               
MSXML 6.0 Parser        Microsoft Corporation        6.00.3883.8
Nero 7 Demo        Nero AG        7.00.1466
NVIDIA Drivers        NVIDIA Corporation        1.3
PC-Bibliothek               
PowerDVD        CyberLink Corporation        7.0.2211.0
Proteinbiosynthese        Schroedel        1.0
QuickTime        Apple Inc.        7.55.90.70
RealPlayer               
Sacred 2 Demo        Ascaron Entertainment        1.0.0.0
Sacred Underworld        Ascaron Entertainment GmbH       
SCHLECKER Foto Digital Service               
Selingua               
Sony Ericsson PC Suite        Sony Ericsson        1.30.82
System Requirements Lab               
THE SETTLERS - Rise of an Empire        Ubisoft        1.00.0000
ubi.com               
UMVPLStandalone               
VeohTV BETA        Veoh Networks, Inc.        3.9.1
VideoLAN VLC media player 0.8.6f        VideoLAN Team        0.8.6f
Winamp (remove only)               
WinRAR Archivierer               
Xfire (remove only)               
XnView 1.97        Gougelet Pierre-e        1.97
Xvid 1.1.3 final uninstall        Xvid team (Koepi)        1.1
µTorrent                1.8.0

Danke schonmal, ich mach nun den Scan mit F-Secure

EDIT

Hier nun das F-Secure-Log, jedoch wurde hierbei kein Fund angezeigt

Code:

12/29/09 13:33:09 [Info]: BlackLight Engine 2.2.1092 initialized
12/29/09 13:33:09 [Info]: OS: 5.1 build 2600 (Service Pack 2)
12/29/09 13:33:10 [Note]: 7019 4
12/29/09 13:33:10 [Note]: 7005 0
12/29/09 13:33:24 [Note]: 7006 0
12/29/09 13:33:24 [Note]: 7011 1776
12/29/09 13:33:24 [Note]: 7035 0
12/29/09 13:33:25 [Note]: 7026 0
12/29/09 13:33:25 [Note]: 7026 0
12/29/09 13:33:27 [Note]: FSRAW library version 1.7.1024
12/29/09 13:36:44 [Note]: 2000 1012
12/29/09 13:36:44 [Note]: 2000 1012
12/29/09 13:37:00 [Note]: 7007 0

Problem! Gmer lässt sich nicht ausführen. Nach dem Start läuft da ein Standardscan, den kann ich weder deaktivieren noch umgehen, jedes mal schmiert mir das Programm dabei schon ab

Code:

gmer.exe hat ein Problem festgestellt und muss beendet werden.


Problemsignatur

AppName: gmer.exe        AppVer: 1.0.15.15281        ModName: gmer.exe
ModVer: 1.0.15.15281        Offset: 0005c887


kall9r 29.12.2009 16:40

Ich habe nun mehrfach den Rechner komplett gescannt mit Antivir und dazu die agressiven Einstellungen angewandt.

Die im Titel erwähnten Viren/Trojaner tauchten hierbei nichtmehr auf, jedoch 2 neue.

In der Datei "aimpr.exe" befand sich offenbar "SPR/PSW.AdvancedPR.N"

Und in der "config.exe" vom DivX-Player das hier "PCk/Asprotect" (="Programm mit ungewöhnlichem Laufzeitpacker komprimiert").

Wie soll ich weiter verfahren und wie kann ich Gmer zum laufen kriegen? Bricht wie gesagt direkt nach dem Starten während des obligatorischen Standardscans schon ab. Gibt es eine Alternative?

kira 29.12.2009 19:07

hi

Zitat:

WENN DIR GEHOLFEN WERDEN SOLL, tue bitte NUR das, was man dir vorschlägt! So lange die Reinigungsarbeiten noch nicht abgeschlossen ist, alle Eigenaktion (= Ausführung/Installation von Scans/Removals außer zur Nutzung die von mir empfohlenen Programme/Tools etc) untersagt.→ Bei Probleme nochmal nachfragen!
ansonsten kommen wir da durcheinander!;)

Ok, wenn Gmer nicht will...
1.
Lade und installiere das Tool RootRepeal herunter

- setze einen Hacken bei: "Drivers", "Stealth Objects" und "Hidden Services" dann klick auf "OK"
- nach der Scan, klick auf "Save Report"
- speichere das Logfile als RootRepeal.txt auf dem Desktop und Kopiere den Inhalt hier in den Thread

2.
Bitte unbedingt alle vorhandenen externen Laufwerke inkl. evtl. vorhandener USB-Sticks an den Rechner anschließen, aber dabei die Shift-Taste gedrückt halten, damit die Autorun-Funktion nicht ausgeführt wird.
Lade Dir Malwarebytes Anti-Malware von→ malwarebytes.org
  • Installieren und per Doppelklick starten.
  • Deutsch einstellen und gleich mal die Datenbanken zu aktualisieren - online updaten
  • "Komplett Scan durchführen" wählen (überall Haken setzen)
  • wenn der Scanvorgang beendet ist, klicke auf "Zeige Resultate"
  • alle Funde markieren und auf "Löschen" - "Ausgewähltes entfernen") klicken.
  • Poste das Ergebnis hier in den Thread - den Bericht findest Du unter "Scan-Berichte"
eine bebilderte Anleitung findest Du hier: Malwarebytes Anti-Malware

3.
poste erneut:
Trend Micro HijackThis-Logfile - Keine offenen Fenster, solang bis HijackThis läuft!!
filelist.bat - den letzten sechs Monaten!

kall9r 01.01.2010 18:07

Ok, also ich hoffe ich hab das mit RootRepeal richtig gemacht, konnte mir nämlich nur die einzelnen Reports speichern und habe die nicht zusammen geklatscht, damit es nicht zu unübersichtlich wird. "hidden services" wurden gar keine gefunden.

Drivers:

Code:

ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time:                2010/01/01 17:28
Program Version:                Version 1.3.5.0
Windows Version:                Windows XP SP2
==================================================

Drivers
-------------------
Name:         
Image Path:         
Address: 0xF7A37000        Size: 98304        File Visible: No        Signed: No
Status: -

Name:         
Image Path:         
Address: 0x00000000        Size: 0        File Visible: No        Signed: No
Status: -

Name: 1394BUS.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\1394BUS.SYS
Address: 0xF7627000        Size: 53248        File Visible: -        Signed: Yes
Status: -

Name: a2z6qbkw.SYS
Image Path: C:\WINDOWS\System32\Drivers\a2z6qbkw.SYS
Address: 0xB9CE5000        Size: 421888        File Visible: No        Signed: No
Status: -

Name: a347bus.sys
Image Path: a347bus.sys
Address: 0xF740C000        Size: 160640        File Visible: -        Signed: No
Status: -

Name: ACEDRV05.sys
Image Path: C:\WINDOWS\system32\drivers\ACEDRV05.sys
Address: 0xB7AA9000        Size: 389120        File Visible: -        Signed: No
Status: -

Name: ACPI.sys
Image Path: ACPI.sys
Address: 0xF7868000        Size: 188800        File Visible: -        Signed: Yes
Status: -

Name: ACPI_HAL
Image Path: \Driver\ACPI_HAL
Address: 0x804D7000        Size: 2181632        File Visible: -        Signed: Yes
Status: -

Name: afd.sys
Image Path: C:\WINDOWS\System32\drivers\afd.sys
Address: 0xB7878000        Size: 138496        File Visible: -        Signed: Yes
Status: -

Name: agp440.sys
Image Path: agp440.sys
Address: 0xF7687000        Size: 42368        File Visible: -        Signed: Yes
Status: -

Name: ALCXWDM.SYS
Image Path: C:\WINDOWS\system32\drivers\ALCXWDM.SYS
Address: 0xB9D4C000        Size: 653920        File Visible: -        Signed: Yes
Status: -

Name: arp1394.sys
Image Path: C:\WINDOWS\system32\DRIVERS\arp1394.sys
Address: 0xF7596000        Size: 60800        File Visible: -        Signed: Yes
Status: -

Name: atksgt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\atksgt.sys
Address: 0xB6D2A000        Size: 271360        File Visible: -        Signed: Yes
Status: -

Name: audstub.sys
Image Path: C:\WINDOWS\system32\DRIVERS\audstub.sys
Address: 0xBA575000        Size: 3072        File Visible: -        Signed: Yes
Status: -

Name: avgio.sys
Image Path: C:\Programme\Avira\AntiVir Desktop\avgio.sys
Address: 0xF79FF000        Size: 6144        File Visible: -        Signed: Yes
Status: -

Name: avgntflt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\avgntflt.sys
Address: 0xB72FF000        Size: 81920        File Visible: -        Signed: Yes
Status: -

Name: avipbb.sys
Image Path: C:\WINDOWS\system32\DRIVERS\avipbb.sys
Address: 0xB7772000        Size: 114688        File Visible: -        Signed: Yes
Status: -

Name: Beep.SYS
Image Path: C:\WINDOWS\System32\Drivers\Beep.SYS
Address: 0xF79F5000        Size: 4224        File Visible: -        Signed: Yes
Status: -

Name: BOOTVID.dll
Image Path: C:\WINDOWS\system32\BOOTVID.dll
Address: 0xF7897000        Size: 12288        File Visible: -        Signed: Yes
Status: -

Name: Cdfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Cdfs.SYS
Address: 0xB9E84000        Size: 63744        File Visible: -        Signed: Yes
Status: -

Name: cdrom.sys
Image Path: C:\WINDOWS\system32\DRIVERS\cdrom.sys
Address: 0xF7576000        Size: 49536        File Visible: -        Signed: Yes
Status: -

Name: CLASSPNP.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS
Address: 0xF7667000        Size: 53248        File Visible: -        Signed: Yes
Status: -

Name: disk.sys
Image Path: disk.sys
Address: 0xF7657000        Size: 36352        File Visible: -        Signed: Yes
Status: -

Name: dmio.sys
Image Path: dmio.sys
Address: 0xF7961000        Size: 154112        File Visible: -        Signed: Yes
Status: -

Name: dmload.sys
Image Path: dmload.sys
Address: 0xF798D000        Size: 5888        File Visible: -        Signed: Yes
Status: -

Name: drmk.sys
Image Path: C:\WINDOWS\system32\drivers\drmk.sys
Address: 0xF75A6000        Size: 61440        File Visible: -        Signed: Yes
Status: -

Name: dump_atapi.sys
Image Path: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xB7688000        Size: 98304        File Visible: No        Signed: No
Status: -

Name: dump_WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xF7A07000        Size: 8192        File Visible: No        Signed: No
Status: -

Name: Dxapi.sys
Image Path: C:\WINDOWS\System32\drivers\Dxapi.sys
Address: 0xB7860000        Size: 12288        File Visible: -        Signed: Yes
Status: -

Name: dxg.sys
Image Path: C:\WINDOWS\System32\drivers\dxg.sys
Address: 0xBF000000        Size: 73728        File Visible: -        Signed: Yes
Status: -

Name: dxgthk.sys
Image Path: C:\WINDOWS\System32\drivers\dxgthk.sys
Address: 0xF7AA9000        Size: 4096        File Visible: -        Signed: Yes
Status: -

Name: Fastfat.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fastfat.SYS
Address: 0xB6EB2000        Size: 143360        File Visible: -        Signed: Yes
Status: -

Name: fdc.sys
Image Path: C:\WINDOWS\system32\DRIVERS\fdc.sys
Address: 0xF775F000        Size: 27392        File Visible: -        Signed: Yes
Status: -

Name: Fips.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fips.SYS
Address: 0xB9EA4000        Size: 35072        File Visible: -        Signed: Yes
Status: -

Name: flpydisk.sys
Image Path: C:\WINDOWS\system32\DRIVERS\flpydisk.sys
Address: 0xF77EF000        Size: 20480        File Visible: -        Signed: Yes
Status: -

Name: fltMgr.sys
Image Path: fltMgr.sys
Address: 0xBA7E1000        Size: 124800        File Visible: -        Signed: Yes
Status: -

Name: Fs_Rec.SYS
Image Path: C:\WINDOWS\System32\Drivers\Fs_Rec.SYS
Address: 0xF79F3000        Size: 7936        File Visible: -        Signed: Yes
Status: -

Name: ftdisk.sys
Image Path: ftdisk.sys
Address: 0xF7838000        Size: 126336        File Visible: -        Signed: Yes
Status: -

Name: gameenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\gameenum.sys
Address: 0xBA5FB000        Size: 10624        File Visible: -        Signed: Yes
Status: -

Name: GEARAspiWDM.sys
Image Path: C:\WINDOWS\System32\Drivers\GEARAspiWDM.sys
Address: 0xBA5F3000        Size: 9984        File Visible: -        Signed: Yes
Status: -

Name: hal.dll
Image Path: C:\WINDOWS\system32\hal.dll
Address: 0x806EC000        Size: 131968        File Visible: -        Signed: Yes
Status: -

Name: HIDCLASS.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\HIDCLASS.SYS
Address: 0xB9E64000        Size: 36864        File Visible: -        Signed: Yes
Status: -

Name: HIDPARSE.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\HIDPARSE.SYS
Address: 0xF77FF000        Size: 28672        File Visible: -        Signed: Yes
Status: -

Name: hidusb.sys
Image Path: C:\WINDOWS\system32\DRIVERS\hidusb.sys
Address: 0xB9DFC000        Size: 9600        File Visible: -        Signed: Yes
Status: -

Name: HTTP.sys
Image Path: C:\WINDOWS\System32\Drivers\HTTP.sys
Address: 0xB5E45000        Size: 263040        File Visible: -        Signed: Yes
Status: -

Name: hyvlbhp.sys
Image Path: hyvlbhp.sys
Address: 0xF75F7000        Size: 54016        File Visible: No        Signed: No
Status: -

Name: i8042prt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\i8042prt.sys
Address: 0xF76C7000        Size: 53248        File Visible: -        Signed: Yes
Status: -

Name: imapi.sys
Image Path: C:\WINDOWS\system32\DRIVERS\imapi.sys
Address: 0xF7586000        Size: 41856        File Visible: -        Signed: Yes
Status: -

Name: intelide.sys
Image Path: intelide.sys
Address: 0xF798B000        Size: 5504        File Visible: -        Signed: Yes
Status: -

Name: intelppm.sys
Image Path: C:\WINDOWS\system32\DRIVERS\intelppm.sys
Address: 0xF76E7000        Size: 40192        File Visible: -        Signed: Yes
Status: -

Name: ipnat.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ipnat.sys
Address: 0xB793A000        Size: 134912        File Visible: -        Signed: Yes
Status: -

Name: ipsec.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ipsec.sys
Address: 0xB79DB000        Size: 74752        File Visible: -        Signed: Yes
Status: -

Name: isapnp.sys
Image Path: isapnp.sys
Address: 0xF7607000        Size: 36224        File Visible: -        Signed: Yes
Status: -

Name: kbdclass.sys
Image Path: C:\WINDOWS\system32\DRIVERS\kbdclass.sys
Address: 0xF7767000        Size: 25216        File Visible: -        Signed: Yes
Status: -

Name: kbdhid.sys
Image Path: C:\WINDOWS\system32\DRIVERS\kbdhid.sys
Address: 0xB786C000        Size: 14848        File Visible: -        Signed: Yes
Status: -

Name: KDCOM.DLL
Image Path: C:\WINDOWS\system32\KDCOM.DLL
Address: 0xF7987000        Size: 8192        File Visible: -        Signed: Yes
Status: -

Name: ks.sys
Image Path: C:\WINDOWS\system32\drivers\ks.sys
Address: 0xB9EB4000        Size: 143360        File Visible: -        Signed: Yes
Status: -

Name: KSecDD.sys
Image Path: KSecDD.sys
Address: 0xBA718000        Size: 92032        File Visible: -        Signed: Yes
Status: -

Name: lirsgt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\lirsgt.sys
Address: 0xB79F6000        Size: 18048        File Visible: -        Signed: Yes
Status: -

Name: LVPr2Mon.sys
Image Path: C:\WINDOWS\system32\drivers\LVPr2Mon.sys
Address: 0xF773F000        Size: 17792        File Visible: -        Signed: Yes
Status: -

Name: lvusbsta.sys
Image Path: C:\WINDOWS\system32\drivers\lvusbsta.sys
Address: 0xB9E54000        Size: 33280        File Visible: -        Signed: Yes
Status: -

Name: MA111nd5.sys
Image Path: C:\WINDOWS\system32\DRIVERS\MA111nd5.sys
Address: 0xB76A0000        Size: 696320        File Visible: -        Signed: No
Status: -

Name: mbamswissarmy.sys
Image Path: C:\WINDOWS\system32\drivers\mbamswissarmy.sys
Address: 0xF77BF000        Size: 32768        File Visible: -        Signed: Yes
Status: -

Name: mnmdd.SYS
Image Path: C:\WINDOWS\System32\Drivers\mnmdd.SYS
Address: 0xF79F9000        Size: 4224        File Visible: -        Signed: Yes
Status: -

Name: mouclass.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mouclass.sys
Address: 0xF77DF000        Size: 23552        File Visible: -        Signed: Yes
Status: -

Name: mouhid.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mouhid.sys
Address: 0xB9DF8000        Size: 12288        File Visible: -        Signed: Yes
Status: -

Name: MountMgr.sys
Image Path: MountMgr.sys
Address: 0xF7637000        Size: 42240        File Visible: -        Signed: Yes
Status: -

Name: mrxdav.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mrxdav.sys
Address: 0xB6E5D000        Size: 181248        File Visible: -        Signed: Yes
Status: -

Name: mrxsmb.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
Address: 0xB77B6000        Size: 453120        File Visible: -        Signed: Yes
Status: -

Name: Msfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Msfs.SYS
Address: 0xF780F000        Size: 19072        File Visible: -        Signed: Yes
Status: -

Name: msgpc.sys
Image Path: C:\WINDOWS\system32\DRIVERS\msgpc.sys
Address: 0xBA75F000        Size: 35072        File Visible: -        Signed: Yes
Status: -

Name: msmpu401.sys
Image Path: C:\WINDOWS\system32\drivers\msmpu401.sys
Address: 0xF7A99000        Size: 2944        File Visible: -        Signed: Yes
Status: -

Name: mssmbios.sys
Image Path: C:\WINDOWS\system32\DRIVERS\mssmbios.sys
Address: 0xBA58D000        Size: 15488        File Visible: -        Signed: Yes
Status: -

Name: Mup.sys
Image Path: Mup.sys
Address: 0xBA643000        Size: 107904        File Visible: -        Signed: Yes
Status: -

Name: NDIS.sys
Image Path: NDIS.sys
Address: 0xBA65E000        Size: 182912        File Visible: -        Signed: Yes
Status: -

Name: ndistapi.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ndistapi.sys
Address: 0xBA5B3000        Size: 9600        File Visible: -        Signed: Yes
Status: -

Name: ndisuio.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ndisuio.sys
Address: 0xB9C48000        Size: 12928        File Visible: -        Signed: Yes
Status: -

Name: ndiswan.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ndiswan.sys
Address: 0xB9CCE000        Size: 91776        File Visible: -        Signed: Yes
Status: -

Name: NDProxy.SYS
Image Path: C:\WINDOWS\System32\Drivers\NDProxy.SYS
Address: 0xBA73F000        Size: 38016        File Visible: -        Signed: Yes
Status: -

Name: netbios.sys
Image Path: C:\WINDOWS\system32\DRIVERS\netbios.sys
Address: 0xF75B6000        Size: 34560        File Visible: -        Signed: Yes
Status: -

Name: netbt.sys
Image Path: C:\WINDOWS\system32\DRIVERS\netbt.sys
Address: 0xB795B000        Size: 162816        File Visible: -        Signed: Yes
Status: -

Name: nic1394.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nic1394.sys
Address: 0xF76F7000        Size: 61824        File Visible: -        Signed: Yes
Status: -

Name: Npfs.SYS
Image Path: C:\WINDOWS\System32\Drivers\Npfs.SYS
Address: 0xF7817000        Size: 30848        File Visible: -        Signed: Yes
Status: -

Name: Ntfs.sys
Image Path: Ntfs.sys
Address: 0xBA68B000        Size: 574592        File Visible: -        Signed: Yes
Status: -

Name: ntoskrnl.exe
Image Path: C:\WINDOWS\system32\ntoskrnl.exe
Address: 0x804D7000        Size: 2181632        File Visible: -        Signed: Yes
Status: -

Name: Null.SYS
Image Path: C:\WINDOWS\System32\Drivers\Null.SYS
Address: 0xF7A7E000        Size: 2944        File Visible: -        Signed: Yes
Status: -

Name: nv4_disp.dll
Image Path: C:\WINDOWS\System32\nv4_disp.dll
Address: 0xBF012000        Size: 6189056        File Visible: -        Signed: Yes
Status: -

Name: nv4_mini.sys
Image Path: C:\WINDOWS\system32\DRIVERS\nv4_mini.sys
Address: 0xB9F57000        Size: 6307328        File Visible: -        Signed: Yes
Status: -

Name: ohci1394.sys
Image Path: ohci1394.sys
Address: 0xF7617000        Size: 61056        File Visible: -        Signed: Yes
Status: -

Name: parport.sys
Image Path: C:\WINDOWS\system32\DRIVERS\parport.sys
Address: 0xB9F0C000        Size: 80384        File Visible: -        Signed: Yes
Status: -

Name: PartMgr.sys
Image Path: PartMgr.sys
Address: 0xF770F000        Size: 18688        File Visible: -        Signed: Yes
Status: -

Name: ParVdm.SYS
Image Path: C:\WINDOWS\System32\Drivers\ParVdm.SYS
Address: 0xF79D9000        Size: 7040        File Visible: -        Signed: Yes
Status: -

Name: PCANDIS5.SYS
Image Path: C:\WINDOWS\system32\PCANDIS5.SYS
Address: 0xB5F84000        Size: 14976        File Visible: -        Signed: No
Status: -

Name: pci.sys
Image Path: pci.sys
Address: 0xF7857000        Size: 68224        File Visible: -        Signed: Yes
Status: -

Name: PCI_NTPNP6826
Image Path: \Driver\PCI_NTPNP6826
Address: 0x00000000        Size: 0        File Visible: No        Signed: No
Status: -

Name: PCIIDEX.SYS
Image Path: C:\WINDOWS\System32\Drivers\PCIIDEX.SYS
Address: 0xF7707000        Size: 28672        File Visible: -        Signed: Yes
Status: -

Name: PnpManager
Image Path: \Driver\PnpManager
Address: 0x804D7000        Size: 2181632        File Visible: -        Signed: Yes
Status: -

Name: portcls.sys
Image Path: C:\WINDOWS\system32\drivers\portcls.sys
Address: 0xB9ED7000        Size: 147456        File Visible: -        Signed: Yes
Status: -

Name: psched.sys
Image Path: C:\WINDOWS\system32\DRIVERS\psched.sys
Address: 0xB9CBD000        Size: 69120        File Visible: -        Signed: Yes
Status: -

Name: ptilink.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ptilink.sys
Address: 0xF77CF000        Size: 17792        File Visible: -        Signed: Yes
Status: -

Name: PxHelp20.sys
Image Path: PxHelp20.sys
Address: 0xF7677000        Size: 35648        File Visible: -        Signed: No
Status: -

Name: rasacd.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rasacd.sys
Address: 0xB9DF4000        Size: 8832        File Visible: -        Signed: Yes
Status: -

Name: rasl2tp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
Address: 0xBA78F000        Size: 51328        File Visible: -        Signed: Yes
Status: -

Name: raspppoe.sys
Image Path: C:\WINDOWS\system32\DRIVERS\raspppoe.sys
Address: 0xBA77F000        Size: 41472        File Visible: -        Signed: Yes
Status: -

Name: raspptp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\raspptp.sys
Address: 0xBA76F000        Size: 48384        File Visible: -        Signed: Yes
Status: -

Name: raspti.sys
Image Path: C:\WINDOWS\system32\DRIVERS\raspti.sys
Address: 0xF77D7000        Size: 16512        File Visible: -        Signed: Yes
Status: -

Name: RAW
Image Path: \FileSystem\RAW
Address: 0x804D7000        Size: 2181632        File Visible: -        Signed: Yes
Status: -

Name: rdbss.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rdbss.sys
Address: 0xB7825000        Size: 174592        File Visible: -        Signed: Yes
Status: -

Name: RDPCDD.sys
Image Path: C:\WINDOWS\System32\DRIVERS\RDPCDD.sys
Address: 0xF79FB000        Size: 4224        File Visible: -        Signed: Yes
Status: -

Name: rdpdr.sys
Image Path: C:\WINDOWS\system32\DRIVERS\rdpdr.sys
Address: 0xB9C8C000        Size: 196864        File Visible: -        Signed: Yes
Status: -

Name: redbook.sys
Image Path: C:\WINDOWS\system32\DRIVERS\redbook.sys
Address: 0xF7566000        Size: 57600        File Visible: -        Signed: Yes
Status: -

Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xB5F30000        Size: 49152        File Visible: No        Signed: No
Status: -

Name: SCSIPORT.SYS
Image Path: C:\WINDOWS\System32\Drivers\SCSIPORT.SYS
Address: 0xF7434000        Size: 98304        File Visible: -        Signed: Yes
Status: -

Name: secdrv.sys
Image Path: C:\WINDOWS\system32\DRIVERS\secdrv.sys
Address: 0xB6E39000        Size: 11200        File Visible: -        Signed: No
Status: -

Name: serenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\serenum.sys
Address: 0xBA5FF000        Size: 15488        File Visible: -        Signed: Yes
Status: -

Name: serial.sys
Image Path: C:\WINDOWS\system32\DRIVERS\serial.sys
Address: 0xB9EFB000        Size: 65920        File Visible: -        Signed: Yes
Status: -

Name: sptd.sys
Image Path: sptd.sys
Address: 0xF744C000        Size: 958464        File Visible: -        Signed: No
Status: -

Name: sr.sys
Image Path: sr.sys
Address: 0xBA7CF000        Size: 73472        File Visible: -        Signed: Yes
Status: -

Name: SSHDRV85.sys
Image Path: C:\WINDOWS\system32\drivers\SSHDRV85.sys
Address: 0xB7A5E000        Size: 307200        File Visible: -        Signed: No
Status: -

Name: ssmdrv.sys
Image Path: C:\WINDOWS\system32\DRIVERS\ssmdrv.sys
Address: 0xF7727000        Size: 23040        File Visible: -        Signed: Yes
Status: -

Name: swenum.sys
Image Path: C:\WINDOWS\system32\DRIVERS\swenum.sys
Address: 0xF79C3000        Size: 4352        File Visible: -        Signed: Yes
Status: -

Name: sysaudio.sys
Image Path: C:\WINDOWS\system32\drivers\sysaudio.sys
Address: 0xB73E7000        Size: 60800        File Visible: -        Signed: Yes
Status: -

Name: tcpip.sys
Image Path: C:\WINDOWS\system32\DRIVERS\tcpip.sys
Address: 0xB7983000        Size: 359808        File Visible: -        Signed: Yes
Status: -

Name: TDI.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\TDI.SYS
Address: 0xF77C7000        Size: 20480        File Visible: -        Signed: Yes
Status: -

Name: termdd.sys
Image Path: C:\WINDOWS\system32\DRIVERS\termdd.sys
Address: 0xBA74F000        Size: 40704        File Visible: -        Signed: Yes
Status: -

Name: update.sys
Image Path: C:\WINDOWS\system32\DRIVERS\update.sys
Address: 0xB9C58000        Size: 209408        File Visible: -        Signed: Yes
Status: -

Name: usbccgp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbccgp.sys
Address: 0xF7777000        Size: 31616        File Visible: -        Signed: Yes
Status: -

Name: USBD.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\USBD.SYS
Address: 0xF79C9000        Size: 8192        File Visible: -        Signed: Yes
Status: -

Name: usbehci.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbehci.sys
Address: 0xF7757000        Size: 26624        File Visible: -        Signed: Yes
Status: -

Name: usbhub.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbhub.sys
Address: 0xBA72F000        Size: 57600        File Visible: -        Signed: Yes
Status: -

Name: USBPORT.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\USBPORT.SYS
Address: 0xB9F20000        Size: 143360        File Visible: -        Signed: Yes
Status: -

Name: usbprint.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbprint.sys
Address: 0xF7787000        Size: 25856        File Visible: -        Signed: Yes
Status: -

Name: usbscan.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbscan.sys
Address: 0xB7870000        Size: 15104        File Visible: -        Signed: Yes
Status: -

Name: USBSTOR.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
Address: 0xF7747000        Size: 26496        File Visible: -        Signed: Yes
Status: -

Name: usbuhci.sys
Image Path: C:\WINDOWS\system32\DRIVERS\usbuhci.sys
Address: 0xF774F000        Size: 20480        File Visible: -        Signed: Yes
Status: -

Name: vga.sys
Image Path: C:\WINDOWS\System32\drivers\vga.sys
Address: 0xF7807000        Size: 20992        File Visible: -        Signed: Yes
Status: -

Name: VIDEOPRT.SYS
Image Path: C:\WINDOWS\system32\DRIVERS\VIDEOPRT.SYS
Address: 0xB9F43000        Size: 81920        File Visible: -        Signed: Yes
Status: -

Name: VolSnap.sys
Image Path: VolSnap.sys
Address: 0xF7647000        Size: 53760        File Visible: -        Signed: Yes
Status: -

Name: wanarp.sys
Image Path: C:\WINDOWS\system32\DRIVERS\wanarp.sys
Address: 0xF76D7000        Size: 34560        File Visible: -        Signed: Yes
Status: -

Name: watchdog.sys
Image Path: C:\WINDOWS\System32\watchdog.sys
Address: 0xF778F000        Size: 20480        File Visible: -        Signed: Yes
Status: -

Name: wdmaud.sys
Image Path: C:\WINDOWS\system32\drivers\wdmaud.sys
Address: 0xB70BA000        Size: 82944        File Visible: -        Signed: Yes
Status: -

Name: Win32k
Image Path: \Driver\Win32k
Address: 0xBF800000        Size: 1843200        File Visible: -        Signed: Yes
Status: -

Name: win32k.sys
Image Path: C:\WINDOWS\System32\win32k.sys
Address: 0xBF800000        Size: 1843200        File Visible: -        Signed: Yes
Status: -

Name: WMILIB.SYS
Image Path: C:\WINDOWS\System32\Drivers\WMILIB.SYS
Address: 0xF7989000        Size: 8192        File Visible: -        Signed: Yes
Status: -

Name: WMIxWDM
Image Path: \Driver\WMIxWDM
Address: 0x804D7000        Size: 2181632        File Visible: -        Signed: Yes
Status: -

Name: ws2ifsl.sys
Image Path: C:\WINDOWS\System32\drivers\ws2ifsl.sys
Address: 0xBA5E3000        Size: 12032        File Visible: -        Signed: Yes
Status: -


Stealth Objects:

Code:

ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time:                2010/01/01 17:29
Program Version:                Version 1.3.5.0
Windows Version:                Windows XP SP2
==================================================

Stealth Objects
-------------------
Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP]
Process: System        Address: 0x89b9d1e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_CREATE]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_CLOSE]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_READ]
Process: System        Address: 0x89918180        Size: 11

Object: Hidden Code [Driver: Fastfat, IRP_MJ_WRITE]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_QUERY_INFORMATION]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_SET_INFORMATION]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_QUERY_EA]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_SET_EA]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_FLUSH_BUFFERS]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_DIRECTORY_CONTROL]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_SHUTDOWN]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_LOCK_CONTROL]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_CLEANUP]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: Fastfat, IRP_MJ_PNP]
Process: System        Address: 0x896371e8        Size: 121

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_CREATE]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_CREATE_NAMED_PIPE]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_CLOSE]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_READ]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_WRITE]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_QUERY_INFORMATION]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_SET_INFORMATION]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_QUERY_EA]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_SET_EA]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_FLUSH_BUFFERS]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_DIRECTORY_CONTROL]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_SHUTDOWN]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_LOCK_CONTROL]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_CLEANUP]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_CREATE_MAILSLOT]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_QUERY_SECURITY]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_SET_SECURITY]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_POWER]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_SYSTEM_CONTROL]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_DEVICE_CHANGE]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_QUERY_QUOTA]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_SET_QUOTA]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: a2z6qbkw扨湩က, IRP_MJ_PNP]
Process: System        Address: 0x899eef00        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE_NAMED_PIPE]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_CLOSE]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_READ]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_WRITE]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_INFORMATION]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_INFORMATION]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_EA]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_EA]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_FLUSH_BUFFERS]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_DIRECTORY_CONTROL]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SHUTDOWN]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_LOCK_CONTROL]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_CLEANUP]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_CREATE_MAILSLOT]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_SECURITY]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_SECURITY]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_POWER]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SYSTEM_CONTROL]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_DEVICE_CHANGE]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_QUERY_QUOTA]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_SET_QUOTA]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: atapi, IRP_MJ_PNP]
Process: System        Address: 0x89920c70        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE_NAMED_PIPE]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_INFORMATION]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_INFORMATION]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_EA]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_EA]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DIRECTORY_CONTROL]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_LOCK_CONTROL]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLEANUP]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE_MAILSLOT]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_SECURITY]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_SECURITY]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CHANGE]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_QUERY_QUOTA]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_SET_QUOTA]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP]
Process: System        Address: 0x899faf00        Size: 99

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_CREATE]
Process: System        Address: 0x89934790        Size: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_CLOSE]
Process: System        Address: 0x89934790        Size: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_READ]
Process: System        Address: 0x89934790        Size: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_WRITE]
Process: System        Address: 0x89934790        Size: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x89934790        Size: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x89934790        Size: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_POWER]
Process: System        Address: 0x89934790        Size: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_SYSTEM_CONTROL]
Process: System        Address: 0x89934790        Size: 121

Object: Hidden Code [Driver: USBSTOR, IRP_MJ_PNP]
Process: System        Address: 0x89934790        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_CREATE]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_CLOSE]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_READ]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_WRITE]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_FLUSH_BUFFERS]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_SHUTDOWN]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_POWER]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_SYSTEM_CONTROL]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: dmio, IRP_MJ_PNP]
Process: System        Address: 0x89b9f1e8        Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE]
Process: System        Address: 0x89a13790        Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE]
Process: System        Address: 0x89a13790        Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x89a13790        Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x89a13790        Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER]
Process: System        Address: 0x89a13790        Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL]
Process: System        Address: 0x89a13790        Size: 121

Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP]
Process: System        Address: 0x89a13790        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP]
Process: System        Address: 0x89c0c1e8        Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CREATE]
Process: System        Address: 0x89943790        Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLOSE]
Process: System        Address: 0x89943790        Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x89943790        Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x89943790        Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_CLEANUP]
Process: System        Address: 0x89943790        Size: 121

Object: Hidden Code [Driver: NetBT, IRP_MJ_PNP]
Process: System        Address: 0x89943790        Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE]
Process: System        Address: 0x89949790        Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE]
Process: System        Address: 0x89949790        Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x89949790        Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x89949790        Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER]
Process: System        Address: 0x89949790        Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL]
Process: System        Address: 0x89949790        Size: 121

Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP]
Process: System        Address: 0x89949790        Size: 121

Object: Hidden Code [Driver: Rdbss, IRP_MJ_READ]
Process: System        Address: 0x8979ab98        Size: 11

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_NAMED_PIPE]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLOSE]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_READ]
Process: System        Address: 0x89a26e30        Size: 11

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_WRITE]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_INFORMATION]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_INFORMATION]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_EA]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_EA]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FLUSH_BUFFERS]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DIRECTORY_CONTROL]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SHUTDOWN]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_LOCK_CONTROL]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLEANUP]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_MAILSLOT]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_SECURITY]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_SECURITY]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_POWER]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SYSTEM_CONTROL]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CHANGE]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_QUOTA]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_QUOTA]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: MRxSmb, IRP_MJ_PNP]
Process: System        Address: 0x897461e8        Size: 121

Object: Hidden Code [Driver: NpfsЅఐ偶瑲, IRP_MJ_READ]
Process: System        Address: 0x899f5280        Size: 11

Object: Hidden Code [Driver: MsfsЅఐ卆浩, IRP_MJ_READ]
Process: System        Address: 0x89a35568        Size: 11

Object: Hidden Code [Driver: Fs_Rec, IRP_MJ_READ]
Process: System        Address: 0x89b66188        Size: 11

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_CREATE]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_CLOSE]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_READ]
Process: System        Address: 0x89a03348        Size: 11

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_QUERY_INFORMATION]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_SET_INFORMATION]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_DIRECTORY_CONTROL]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_DEVICE_CONTROL]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_SHUTDOWN]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_LOCK_CONTROL]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_CLEANUP]
Process: System        Address: 0x8991a698        Size: 121

Object: Hidden Code [Driver: CdfsЅ扏煓̸掀Ђఄ灐†LVMV, IRP_MJ_PNP]
Process: System        Address: 0x8991a698        Size: 121


MBAM hat 6 infizierte Dateien gefunden:

Code:

Malwarebytes' Anti-Malware 1.43
Datenbank Version: 3468
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

01.01.2010 17:15:07
mbam-log-2010-01-01 (17-15-07).txt

Scan-Methode: Vollständiger Scan (C:\|D:\|E:\|J:\|)
Durchsuchte Objekte: 171877
Laufzeit: 41 minute(s), 3 second(s)

Infizierte Speicherprozesse: 0
Infizierte Speichermodule: 0
Infizierte Registrierungsschlüssel: 6
Infizierte Registrierungswerte: 2
Infizierte Dateiobjekte der Registrierung: 1
Infizierte Verzeichnisse: 0
Infizierte Dateien: 6

Infizierte Speicherprozesse:
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule:
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel:
HKEY_CURRENT_USER\SOFTWARE\LEO0WTUNO7 (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DRM\amty (Worm.Autorun) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SSHNAS (Trojan.Renos) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Handle (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\J8RPLTROBQ (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Infizierte Registrierungswerte:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\csrcs (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\j8rpltrobq (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Infizierte Dateiobjekte der Registrierung:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell (Hijack.Shell) -> Bad: (Explorer.exe csrcs.exe) Good: (Explorer.exe) -> Quarantined and deleted successfully.

Infizierte Verzeichnisse:
(Keine bösartigen Objekte gefunden)

Infizierte Dateien:
C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Temp\a.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{66BA574B-1E11-49b8-909C-8CC9E0E8E015}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\WINDOWS\msa.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Temp\b.exe (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Temp\c.exe (Trojan.Dropper) -> Delete on reboot.


danach erneut durchlaufen lassen:


Code:

Malwarebytes' Anti-Malware 1.43
Datenbank Version: 3468
Windows 5.1.2600 Service Pack 2
Internet Explorer 6.0.2900.2180

01.01.2010 18:03:23
mbam-log-2010-01-01 (18-03-23).txt

Scan-Methode: Vollständiger Scan (C:\|D:\|E:\|J:\|)
Durchsuchte Objekte: 171874
Laufzeit: 43 minute(s), 47 second(s)

Infizierte Speicherprozesse: 0
Infizierte Speichermodule: 0
Infizierte Registrierungsschlüssel: 0
Infizierte Registrierungswerte: 0
Infizierte Dateiobjekte der Registrierung: 0
Infizierte Verzeichnisse: 0
Infizierte Dateien: 0

Infizierte Speicherprozesse:
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule:
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel:
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte:
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung:
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse:
(Keine bösartigen Objekte gefunden)

Infizierte Dateien:
(Keine bösartigen Objekte gefunden)


HiJackThis:

Code:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:06:02, on 01.01.2010
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
c:\programme\gemeinsame dateien\logitech\lvmvfm\LVPrcSrv.exe
C:\WINDOWS\Explorer.EXE
C:\Programme\Avira\AntiVir Desktop\sched.exe
C:\Programme\Avira\AntiVir Desktop\avguard.exe
C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\WINDOWS\system32\bmwebcfg.exe
C:\Programme\Bonjour\mDNSResponder.exe
C:\Programme\ICQ6Toolbar\ICQ Service.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\Programme\CyberLink\Shared Files\RichVideo.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe
C:\Programme\Gemeinsame Dateien\Logitech\LComMgr\Communications_Helper.exe
C:\Programme\Gemeinsame Dateien\Logitech\LComMgr\LVComSX.exe
C:\Programme\Tools\Player\Quicktime\QTTask.exe
C:\Programme\iTunes\iTunesHelper.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Programme\Avira\AntiVir Desktop\avgnt.exe
C:\Programme\ICQ6.5\ICQ.exe
C:\Programme\NETGEAR\MA111 Configuration Utility\wlancfg4.exe
C:\Programme\iPod\bin\iPodService.exe
E:\Downloads\Antivirus_kram\HiJackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = h**p://google.icq.com/search/search_frame.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = h**p://google.icq.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://www.sat1.de/index.php?icqpath=icq
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R3 - URLSearchHook: ICQToolBar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - C:\Programme\ICQ6Toolbar\ICQToolBar.dll
R3 - URLSearchHook: (no name) -  - (no file)
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre1.5.0_06\bin\ssv.dll
O2 - BHO: Hilfsobjekt für Encarta Web-Begleiter - {955BE0B8-BC85-4CAF-856E-8E0D8B610560} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Encarta Web Companion\2007\ENCWCBAR.DLL
O3 - Toolbar: ICQToolBar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - C:\Programme\ICQ6Toolbar\ICQToolBar.dll
O3 - Toolbar: Encarta Web-Begleiter - {147D6308-0614-4112-89B1-31402F9B82C4} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Encarta Web Companion\2007\ENCWCBAR.DLL
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Programme\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll (file missing)
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [nwiz] nwiz.exe /install
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [LXCGCATS] rundll32 C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\LXCGtime.dll,_RunDLLEntry@16
O4 - HKLM\..\Run: [TkBellExe] "C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe"  -osboot
O4 - HKLM\..\Run: [LogitechCommunicationsManager] "C:\Programme\Gemeinsame Dateien\Logitech\LComMgr\Communications_Helper.exe"
O4 - HKLM\..\Run: [LVCOMSX] "C:\Programme\Gemeinsame Dateien\Logitech\LComMgr\LVComSX.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Programme\Tools\Player\Quicktime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Programme\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [avgnt] "C:\Programme\Avira\AntiVir Desktop\avgnt.exe" /min
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Programme\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\RunServices: [csrcs] C:\WINDOWS\system32\csrcs.exe
O4 - HKCU\..\Run: [Veoh] "C:\Programme\Veoh Networks\Veoh\VeohClient.exe" /VeohHide
O4 - HKCU\..\Run: [ICQ] "C:\Programme\ICQ6.5\ICQ.exe" silent
O4 - Global Startup: MA111 Configuration Utility.lnk = ?
O8 - Extra context menu item: &ICQ Toolbar Search - res://C:\Programme\Tools\Internet\Messenger\icq\ICQToolbar\toolbaru.dll/SEARCH.HTML
O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.5.0_06\bin\ssv.dll
O9 - Extra button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: Encarta Suchleiste - {B205A35E-1FC4-4CE3-818B-899DBBB3388C} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Encarta Search Bar\ENCSBAR.DLL
O9 - Extra button: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Programme\Tools\Internet\Messenger\icq\ICQLite\ICQLite.exe (file missing)
O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Programme\Tools\Internet\Messenger\icq\ICQLite\ICQLite.exe (file missing)
O9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6.5\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6.5\ICQ.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O10 - Unknown file in Winsock LSP: bmnet.dll
O10 - Unknown file in Winsock LSP: bmnet.dll
O10 - Unknown file in Winsock LSP: bmnet.dll
O23 - Service: Avira AntiVir Planer (AntiVirSchedulerService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\sched.exe
O23 - Service: Avira AntiVir Guard (AntiVirService) - Avira GmbH - C:\Programme\Avira\AntiVir Desktop\avguard.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bytemobile Web Configurator (bmwebcfg) - Bytemobile, Inc. - C:\WINDOWS\system32\bmwebcfg.exe
O23 - Service: Bonjour-Dienst (Bonjour Service) - Apple Inc. - C:\Programme\Bonjour\mDNSResponder.exe
O23 - Service: ICQ Service - Unknown owner - C:\Programme\ICQ6Toolbar\ICQ Service.exe
O23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Programme\iPod\bin\iPodService.exe
O23 - Service: Logitech Process Monitor (LVPrcSrv) - Logitech Inc. - c:\programme\gemeinsame dateien\logitech\lvmvfm\LVPrcSrv.exe
O23 - Service: LVSrvLauncher - Logitech Inc. - C:\Programme\Gemeinsame Dateien\Logitech\SrvLnch\SrvLnch.exe
O23 - Service: lxcg_device - Unknown owner - C:\WINDOWS\system32\lxcgcoms.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Programme\CyberLink\Shared Files\RichVideo.exe

--
End of file - 7435 bytes


Filelist:

Code:

----- Root -----------------------------
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\

01.01.2010  18:07                43 filelist.txt
01.01.2010  17:16    2.147.061.760 hiberfil.sys
01.01.2010  17:16      805.306.368 pagefile.sys
29.12.2009  13:24            4.229 filelist1.txt
26.12.2009  13:08                0 khw

 
----- Windows --------------------------
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\WINDOWS

01.01.2010  17:17                0 0.log
01.01.2010  17:16              159 wiadebug.log
01.01.2010  17:16              313 wiaservc.log
01.01.2010  17:16            2.048 bootstat.dat
01.01.2010  17:15                78 WindowsUpdate.log
29.11.2009  13:24              116 NeroDigital.ini
27.11.2009  15:43              526 eReg.dat
13.11.2009  19:23                24 SELINGUA.INI
30.08.2009  10:05              169 RtlRack.ini
 
 
----- System 32 (Achtung: Zeitfenster beachten!) ---
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\WINDOWS\system32

01.01.2010  17:16          204.100 nvapps.xml
01.01.2010  13:23            2.206 wpa.dbl
26.12.2009  13:07          (1.579) autorun.i
26.12.2009  13:07            (833) autorun.in
19.12.2009  11:46            12.524 KGyGaAvL.sys
29.10.2009  18:14          392.296 perfh009.dat
29.10.2009  18:14            58.596 perfc009.dat
29.10.2009  18:14          405.118 perfh007.dat
29.10.2009  18:14            70.580 perfc007.dat
29.10.2009  18:14          938.224 PerfStringBackup.INI

 

 
----- Windows/Temp -----------------------
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\WINDOWS\Temp

14.11.2009  22:52            7.168 etilqs_faNciDRYIZjbHVXABWw9
14.11.2009  22:52            1.028 etilqs_R3RphEOkT7tm0VLwLPfm
14.11.2009  22:52              512 etilqs_qa9sclhamg2f6L0mCjuQ

----- Temp -----------------------------
 Datentr„ger in Laufwerk C: ist System
 Volumeseriennummer: 78A6-D7DA

 Verzeichnis von C:\DOKUME~1\***\LOKALE~1\Temp

01.01.2010  17:17                0 JET20B2.tmp
01.01.2010  17:17            17.926 LVCOMSX.LOG
01.01.2010  16:17          311.296 ~DFD48B.tmp
31.12.2009  13:39            68.096 mtawws2v.ppt
30.12.2009  16:43            70.656 4-2_-_Straftaten_gegen_die_pers__nliche_Freiheit.ppt
29.12.2009  15:27              416 java_install_reg.log
29.12.2009  13:19              549 t853zogh.zip
26.12.2009  19:27            39.532 a.dat
26.12.2009  16:51          311.296 ~DF9098.tmp
25.12.2009  17:50            16.384 ~DF1AA0.tmp
25.12.2009  17:49            16.384 ~DF5F3F.tmp
11.12.2009  10:00        1.166.464 55b8nihn.rar
27.11.2009  16:07            24.516 SIntfNT.dll
27.11.2009  16:07            19.924 SIntf32.dll
27.11.2009  16:07            12.067 SIntf16.dll
15.11.2009  14:52        36.526.028 ubi54.tmp.exe
15.11.2009  14:08            36.864 CmdLineExt02.dll
14.11.2009  10:23          212.992 3_-_Straftaten_gegen_die_k__rperliche_Unversehrtheit.ppt
01.11.2009  13:47          288.768 1_-_Einleitung__Straftaten_gegen_das_Leben.ppt
30.10.2009  16:11        1.734.274 newn46rn.rar
19.10.2009  10:56        1.392.805 LastScan.jpg
08.10.2009  22:35          100.293 coredmp
05.10.2009  16:18              252 r2h68.tmp
05.10.2009  12:03            27.648 18-taeterschaft04.doc
24.08.2009  12:07            39.424 at10910 Folien 040609.doc
26.07.2009  09:04          358.912 e62iavbc.rar
23.07.2009  14:35        16.825.216 718631~1.exe
10.07.2009  14:09              823 {AC76BA86-7AD7-1031-7B44-A81300000003}.ini
12.06.2009  07:54        2.196.934 g0rtfkqy.exe
05.06.2009  14:26          167.936 schuldrecht.ppt
05.06.2009  12:55            26.112 Hinweise zum Gutachten-und Urteilsstil.doc
05.06.2009  12:52            22.528 Fall Kopierpapier.doc


kira 02.01.2010 06:54

hi

1.
Lade das SDFix von AndyManchesta eine der folgenden Links herunter:
bleepingcomputer.com
andymanchesta.com
  • auf deinem Desktop speichern
  • per Doppelklick SDFix.exe starten
  • wähle installieren, um das Programm in seinen eigenen Ordner auf deinem Desktop zu entpacken
  • starte den Rechner im abgesicherten Modus - die Taste [F8] drücken, bevor das Windows-Logo angezeigt wird
  • öffne den neu entstandenen SDFix Ordner
  • mit einem Doppelklick auf die RunThis.bat kannst Du das Skript starten
  • gib ein Y ein, um den Reinigungsprozess zu beginnen
  • nun wirst Du aufgefordert, eine beliebige Taste zu drücken, damit dein Rechner neu aufstarten kann
  • nachdem Neustart, wird das Fixtool nocheinmal laufen, um den Reinigungsprozess zu vervollständigen.
  • nachdem der Lauf beendet ist - Finished - drücke wieder auf irgendeine Taste, um das Skript zu beenden und deine Desktop Iconen wieder zu laden

- Wenn die Desktop Icons wieder da sind, wird das Skript ein Fenster öffnen und das Ergebnis als einen Report.txt im Ordner SDFix speichern. Kopiere den Inhalt dieses Report.txt und poste ihn!

2.
Schliesse alle Programme einschliesslich Internet Explorer und fixe mit Hijackthis die Einträge aus der nachfolgenden Codebox (HijackThis starten→ "Do a system scan only"→ Einträge auswählen→ Häckhen setzen→ "Fix checked"klicken→ PC neu aufstarten):
HijackThis erstellt ein Backup, Falls bei "Fixen" etwas schief geht, kann man unter "View the list of backups"- die Objekte wiederherstellen
Code:

R3 - URLSearchHook: (no name) - - (no file)
O3 - Toolbar: Veoh Browser Plug-in - {D0943516-5076-4020-A3B5-AEFAF26AB263} - C:\Programme\Veoh Networks\Veoh\Plugins\reg\VeohToolbar.dll (file missing)
O4 - HKLM\..\RunServices: [csrcs] C:\WINDOWS\system32\csrcs.exe

3.
alle Anwendungen schließen → Ordner für temporäre Dateien bitte leeren
**Der Temp Ordner,ist für temporäre Dateien,also der Inhalt kann man ohne weiteres löschen.- Dateien, die noch in Benutzung sind, nicht löschbar.
**Lösche nur den Inhalt der Ordner, nicht die Ordner selbst!
  • `Start → ausführen` "cleanmgr" reinschreiben (ohne "") → "ok" - die Temporary Files, Temporary Internet Files, und der Papierkorb (Recycle Bin) müssen geleert werden→ "Ok"
  • `Start → ausführen` → %temp% reinschreiben (ohne "")→ "Ok" - - Ordnerinhalt überall markieren und löschen
  • für jedes Benutzerkonto bitte durchführen
  • anschließend den Papierkorb leeren

4.
reinige dein System mit Ccleaner:
  • "Cleaner"→ "Analysieren"→ Klick auf den Button "Start CCleaner"
  • "Registry""Fehler suchen"→ "Fehler beheben"→ "Alle beheben"
  • Starte dein System neu auf

5.
- Lade dir RSIT - http://filepony.de/download-rsit/:
- an einen Ort deiner Wahl und führe die rsit.exe aus
- wird "Hijackthis" auch von Rsit installiert und ausgeführt
- RSIT erstellt 2 Logfiles (C:\rsit\log.txt und C:\rsit\info.txt) mit erweiterten Infos von deinem System - diese beide bitte komplett hier posten
**Kannst Du das Log in Textdatei speichern und hier anhängen (auf "Erweitert" klicken)

kall9r 02.01.2010 20:52

SDFix:

Code:

SDFix: Version 1.240
Run by *** on 02.01.2010 at 20:00

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix

Checking Services :


Restoring Default Security Values
Restoring Default Hosts File

Rebooting


Checking Files :

Trojan Files Found:

C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Temp\ubi54.tmp.exe - Deleted





Removing Temp Files

ADS Check :
 


                                Final Check :

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2010-01-02 20:39:57
Windows 5.1.2600 Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
"s1"=dword:be254b73
"s2"=dword:7994e65d
"h0"=dword:00000001

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"p0"="C:\Programme\Tools\Brennen\DAEMON Tools\"
"h0"=dword:00000000
"khjeh"=hex:b8,93,f0,9c,ca,eb,cb,62,7f,7d,7b,43,95,23,a9,d7,ec,e8,3f,28,66,..

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"a0"=hex:20,01,00,00,68,26,15,aa,89,88,fa,a1,e0,4b,30,23,0c,17,0d,ac,6e,..
"khjeh"=hex:61,4a,d5,93,43,53,e4,45,f3,d7,fa,94,09,34,d1,ea,2d,9f,66,a6,e2,..

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:43,04,3b,d8,79,39,ef,9a,4e,ba,ee,59,af,ad,64,06,96,56,ef,82,4f,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"p0"="C:\Programme\Tools\Brennen\DAEMON Tools\"
"h0"=dword:00000000
"khjeh"=hex:b8,93,f0,9c,ca,eb,cb,62,7f,7d,7b,43,95,23,a9,d7,ec,e8,3f,28,66,..

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001]
"a0"=hex:20,01,00,00,68,26,15,aa,89,88,fa,a1,e0,4b,30,23,0c,17,0d,ac,6e,..
"khjeh"=hex:61,4a,d5,93,43,53,e4,45,f3,d7,fa,94,09,34,d1,ea,2d,9f,66,a6,e2,..

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40]
"khjeh"=hex:43,04,3b,d8,79,39,ef,9a,4e,ba,ee,59,af,ad,64,06,96,56,ef,82,4f,..

scanning hidden registry entries ...

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E9F81423-211E-46B6-9AE0-38568BC5CF6F}]
"DisplayName"="Alcohol 120% (Trial Version)"

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services :




Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Programme\\Tools\\Internet\\Messenger\\icq\\ICQLite\\ICQLite.exe"="C:\\Programme\\Tools\\Internet\\Messenger\\icq\\ICQLite\\ICQLite.exe:*:Enabled:ICQ Lite"
"E:\\Azureus\\Azureus\\Azureus.exe"="E:\\Azureus\\Azureus\\Azureus.exe:*:Enabled:Azureus"
"C:\\WINDOWS\\system32\\lxcgcoms.exe"="C:\\WINDOWS\\system32\\lxcgcoms.exe:*:Enabled:2300 Series"
"D:\\Spiele\\Siedler 6\\Play Settlers 6.exe"="D:\\Spiele\\Siedler 6\\Play Settlers 6.exe:*:Disabled:Play THE SETTLERS - Rise of an Empire"
"C:\\Programme\\ICQ6\\ICQ.exe"="C:\\Programme\\ICQ6\\ICQ.exe:*:Enabled:ICQ6"
"C:\\Programme\\Messenger\\msmsgs.exe"="C:\\Programme\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
"C:\\Programme\\Ascaron Entertainment\\Sacred 2 - Demo\\system\\s2gs.exe"="C:\\Programme\\Ascaron Entertainment\\Sacred 2 - Demo\\system\\s2gs.exe:*:Enabled:Sacred 2 Game Server"
"C:\\Programme\\Ascaron Entertainment\\Sacred 2 - Demo\\system\\sacred2.exe"="C:\\Programme\\Ascaron Entertainment\\Sacred 2 - Demo\\system\\sacred2.exe:*:Enabled:Sacred 2"
"C:\\Programme\\Bonjour\\mDNSResponder.exe"="C:\\Programme\\Bonjour\\mDNSResponder.exe:*:Enabled:Bonjour"
"C:\\Programme\\iTunes\\iTunes.exe"="C:\\Programme\\iTunes\\iTunes.exe:*:Enabled:iTunes"
"C:\\Programme\\Veoh Networks\\Veoh\\VeohClient.exe"="C:\\Programme\\Veoh Networks\\Veoh\\VeohClient.exe:*:Disabled:Veoh Client"
"C:\\Programme\\Zattoo\\zattood.exe"="C:\\Programme\\Zattoo\\zattood.exe:*:Disabled:zattood"
"C:\\Programme\\DAP\\DAP.exe"="C:\\Programme\\DAP\\DAP.exe:*:Disabled:Download Accelerator Plus (DAP)"
"C:\\Programme\\uTorrent\\uTorrent.exe"="C:\\Programme\\uTorrent\\uTorrent.exe:*:Disabled:æTorrent"
"C:\\Programme\\Ascaron Entertainment\\Sacred Underworld\\Sacred.exe"="C:\\Programme\\Ascaron Entertainment\\Sacred Underworld\\Sacred.exe:*:Enabled:Sacred"
"C:\\Programme\\ICQ6.5\\ICQ.exe"="C:\\Programme\\ICQ6.5\\ICQ.exe:*:Enabled:ICQ6"
"E:\\Downloads\\sft-loader\\leecher.exe"="E:\\Downloads\\sft-loader\\leecher.exe:*:Enabled:SFT Loader"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"

Remaining Files :


File Backups: - C:\SDFix\backups\backups.zip

Files with Hidden Attributes :

Wed  3 Jan 2007            56 ..SHR --- "C:\WINDOWS\system32\BE7CFECCF9.sys"
Sat 19 Dec 2009        12,524 A.SH. --- "C:\WINDOWS\system32\KGyGaAvL.sys"
Fri 18 Feb 2005        38,912 A..H. --- "C:\Dokumente und Einstellungen\***\Eigene Dateien\Schriften\~WRL1005.tmp"
Fri 18 Feb 2005        22,528 A..H. --- "C:\Dokumente und Einstellungen\***\Eigene Dateien\Schriften\~WRL2999.tmp"
Fri 18 Feb 2005        19,968 A..H. --- "C:\Dokumente und Einstellungen\***\Eigene Dateien\Schriften\~WRL3808.tmp"
Fri 18 Feb 2005        38,912 A..H. --- "C:\Dokumente und Einstellungen\***\Eigene Dateien\Schriften\~WRL3943.tmp"
Sat  2 Jan 2010            0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\3118e39ffffb244560638e7e221e1956\BIT4.tmp"
Fri  2 May 2008    3,493,888 A..H. --- "C:\Dokumente und Einstellungen\***\Anwendungsdaten\U3\temp\Launchpad Removal.exe"

Finished!


kall9r 02.01.2010 21:11

Habe die Anweisungen befolgt, mit HiJackThis die 3 Einträge gefixt und anschließend mit Ccleaner die auszuführenden Aktionen durchgeführt.

Und hier noch die beiden Logs von RSIT

kira 05.01.2010 02:31

hi

1.
Kannst du die Programme die wir verwendet haben und nicht brauchst entfernen, bis auf:
Code:

HijackThis/Trend Micro
hjtscanlist
CCleaner

Die sind nützliche Programme, die bei Probleme/Notfall sehr hilfreich sein können!

2.
- Speichermedien wie Externe Festplatte/USB-Stick usw bitte anschließen - Halte aber beim einstecken des Sticks die Shift-Taste gedrückt! Dadurch wird der Autostart des Datenträgers deaktiviert.
- Lade das Combofix von einem der folgenden Download Spiegel herunter:
BleepingComputer - ForoSpyware

- Wichtig!:[/u] muss auf dem Desktop installiert werden!
- Antiviren, - und andere Schutz/Spyprogramme bitte deaktivieren
- Schließe jeder externe Datenträger (USB Stick und USB Festplatte etc) an dein Computer an - dabei die Shift-Taste bitte unbedingt gedrückt halten!
- Per Doppelklick die ComboFix.exe starten und den Anweisungen folgen
- Falls die Microsoft-Windows-Wiederherstellungskonsole auf dein Rechner nicht installiert ist, und wenn du direkt gefragt wirst, es zu ermöglichen stimme dem Lizenzvertrag zu. Danach erscheint ein Fenster zur Bestätigung, ansonsten wird ComboFix mit der Arbeit fortfahren
- bestätige mit "ja", damit den Suchlauf automatisch beginnen kann
Zitat:

Achtung! Während ComboFix läuft: Ab sofort die Maus nicht mehr bewegen oder/und auf dem PC irgendetwas machen!!
** Für alle die das Tool benutzen, eine gewisse Vorsicht geboten, also die Reihenfolge und Anweisungen gründlich lesen und streng einhalten!!
- wird ein Log-Datei - C:\ComboFix.txt erstellt, deren Inhalte bitte posten
Zitat:

** Eine bebilderte Anleitung findest Du hier: bleepingcomputer.com/combofix/Anleitung
**Danach nicht vergessen die Schutzprogramme wieder aktivieren!!

Lukcy 14.01.2010 12:59

Hallo an alle!
Bin neu hier und habe wohl das gleiche Problem erwischt.

1.: Ich habe Vista und wollte fragen, ob ich nach dem gleichen Muster vorgehen soll, wie der Themensteller hier?

2.: Wenn ihr schreibt, dass alle Programme während eines Scans beendet werden müssen, meint ihr dann auch die Programme, die im Hitergrund laufen (die ich im Taskmanager unter "Prozesse" finde)?

3.: Ich kenne mich mit Fachbegriffen sehr schlecht aus (das kann man wohl auch nicht so schnell beheben ;) )

Vielen Dank und viele Grüße, Lukcy

kira 14.01.2010 16:31

@Lukcy

http://www.world-of-smilies.com/wos_...ge/vertag0.gifAllgemeine Forenregeln: Neue Thread eröffnen!
Also bitte nicht in die Threads anderer User hineinposten,sondern suche dir das richtige Unterforum für deine Frage aus!
Dort "Neues Thema" auswählen und dein Problem so kurz und detailliert wie möglich beschreiben:)

gruß
Cf


Alle Zeitangaben in WEZ +1. Es ist jetzt 08:48 Uhr.

Copyright ©2000-2025, Trojaner-Board


Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19