Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Internetseiten oeffnen sich einfach, Trojaner

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML

Antwort
Alt 16.12.2008, 12:26   #1
kathy-brown
 
Internetseiten oeffnen sich einfach, Trojaner - Unglücklich

Internetseiten oeffnen sich einfach, Trojaner



Hallo!

Immer wieder oeffnen sich neue Internetseiten,egal ob ich im Internet explorer bin oder im Mozilla.
Sehr oft kommt folgende siete, die aber komplett weiss bleibt:

h**p://sagipsul.com/go/rfe.php?cmp=vm_mg_fails_juan&uid=490DA4A2C98711DDAF87150044CFFFFF&guid=0F924E0627AE4EB8B7203B85158E5140&lid=&url=sich&affid=150044&b42=&b42=0.0020

Ausserdem kommt die Meldung:
RUNDLL
c:windows/system32/bnspvfwf.dll

Wenn ich ein Update von avira antivir machen moechte, sagt es mir, dass ich eine verbindung mit dem internet herstellen soll, obwohl ich schon laengst im internet bin.

Ich weiss nicht genau, was hier passiert ist, denn ich habe den pc fuer eine woche nicht benutzt, sondern meine mitbewohner, die behaupten auch keine ahnung zu haben....

Es waere nett wenn man mir hier, schritt fuer schritt wie einem kleinkind, erklaert was ich tun muss ich bin ledier kein pc-kenner!

Hier habe ich schon mal die hijack file:
(Benutze Windows XP)


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 12:14:44, on 2008-12-16
Platform: Windows XP Dodatek SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\System32\FTRTSVC.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe
D:\Program Files\PowerISO\PWRISOVM.EXE
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\PROGRA~1\NEOSTR~1\TaskBarIcon.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
D:\Program Files\Picasa2\PicasaMediaDetector.exe
C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
C:\Program Files\Hewlett-Packard\Toolbox2.0\Javasoft\JRE\1.3.1\bin\javaw.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Program Files\Common Files\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\PROGRA~1\NEOSTR~1\neostradatp.exe
C:\PROGRA~1\NEOSTR~1\ComComp.exe
C:\PROGRA~1\NEOSTR~1\Toaster.exe
C:\PROGRA~1\NEOSTR~1\Inactivity.exe
C:\PROGRA~1\NEOSTR~1\PollingModule.exe
C:\WINDOWS\System32\ALERTM~1\ALERTM~1.EXE
C:\PROGRA~1\NEOSTR~1\Watch.exe
D:\Program Files\Mozilla Firefox\firefox.exe
D:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://www.google.pl/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = h**p://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = h**p://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = h**p://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = neostrada tp
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
R3 - URLSearchHook: (no name) - {00A6FAF6-072E-44cf-8957-5838F569A31D} - C:\Program Files\MyWebSearch\SrchAstt\1.bin\MWSSRCAS.DLL
R3 - URLSearchHook: Search Class - {08C06D61-F1F3-4799-86F8-BE1A89362C85} - C:\PROGRA~1\NEOSTR~1\SEARCH~1.DLL
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [StatusClient] C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe /auto
O4 - HKLM\..\Run: [TomcatStartup] C:\Program Files\Hewlett-Packard\Toolbox2.0\hpbpsttp.exe
O4 - HKLM\..\Run: [WOOWATCH] C:\PROGRA~1\NEOSTR~1\Watch.exe
O4 - HKLM\..\Run: [WOOTASKBARICON] C:\PROGRA~1\NEOSTR~1\GestMaj.exe TaskBarIcon.exe
O4 - HKLM\..\Run: [PWRISOVM.EXE] d:\Program Files\PowerISO\PWRISOVM.EXE
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "D:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [VoipDiscount] "D:\instalki\voipdiscount\voipdiscount.exe" -nosplash -minimized
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [Picasa Media Detector] D:\Program Files\Picasa2\PicasaMediaDetector.exe
O4 - HKCU\..\Run: [Octoshape Streaming Services] "C:\Documents and Settings\**\Ustawienia lokalne\Dane aplikacji\Octoshape\Octoshape Streaming Services\OctoshapeClient.exe" -inv:bootrun
O4 - HKLM\..\Policies\Explorer\Run: [iTunesHelper Module] C:\Program Files\WebMediaViewer\itunes.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'USŁUGA LOKALNA')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'USŁUGA SIECIOWA')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: DSLMON.lnk = C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O8 - Extra context menu item: E&ksport do programu Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Pobierz z &BitSpirit - D:\Program Files\BitSpirit\bsurl.htm
O9 - Extra button: Badanie - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O17 - HKLM\System\CCS\Services\Tcpip\..\{984B8E35-5C07-43F7-A013-10358FEECE11}: NameServer = 85.255.113.149;85.255.112.218
O17 - HKLM\System\CCS\Services\Tcpip\..\{F988697C-6960-41E0-985F-D99BFE9132DB}: NameServer = 85.255.113.149;85.255.112.218
O17 - HKLM\System\CS1\Services\Tcpip\Parameters: NameServer = 85.255.113.149;85.255.112.218
O17 - HKLM\System\CS2\Services\Tcpip\Parameters: NameServer = 85.255.113.149;85.255.112.218
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: NameServer = 85.255.113.149;85.255.112.218
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: fopumn.dll
O23 - Service: Avira AntiVir Personal - Free Antivirus Planer (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom - C:\WINDOWS\System32\FTRTSVC.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

--
End of file - 7524 bytes

Ich habe mit avira antivir folgendes herausbekommen:

Die Datei 'C:\Documents and Settings\***\Ustawienia lokalne\Temporary Internet Files\Content.IE5\GFBYNAMN\freescan[1].htm'
enthielt einen Virus oder unerwünschtes Programm 'JS/Agent.1366' [virus].
Durchgeführte Aktion(en):
Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '49ac9285.qua' verschoben!


vielen dank schon mal im voraus!!!

Geändert von kathy-brown (16.12.2008 um 13:24 Uhr)

Alt 16.12.2008, 14:54   #2
kathy-brown
 
Internetseiten oeffnen sich einfach, Trojaner - Standard

Internetseiten oeffnen sich einfach, Trojaner



Jetzt habe ich das alles mal noch durch die Malwarebytes laufen lassen und geloescht:


Malwarebytes' Anti-Malware 1.31
Datenbank Version: 1506
Windows 5.1.2600 Dodatek Service Pack 2

2008-12-16 14:07:57
mbam-log-2008-12-16 (14-07-57).txt

Scan-Methode: Vollständiger Scan (C:\|D:\|)
Durchsuchte Objekte: 124803
Laufzeit: 45 minute(s), 10 second(s)

Infizierte Speicherprozesse: 0
Infizierte Speichermodule: 4
Infizierte Registrierungsschlüssel: 25
Infizierte Registrierungswerte: 2
Infizierte Dateiobjekte der Registrierung: 20
Infizierte Verzeichnisse: 10
Infizierte Dateien: 35

Infizierte Speicherprozesse:
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule:
C:\WINDOWS\system32\cbXRIbBu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948.x86 (Rootkit.Zlob) -> Delete on reboot.
C:\WINDOWS\system32\mlJCVOhi.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\fopumn.dll (Trojan.Vundo.H) -> Delete on reboot.

Infizierte Registrierungsschlüssel:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2c038891-1225-4730-b88d-d65c2535c3de} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2c038891-1225-4730-b88d-d65c2535c3de} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mljcvohi (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{e3021737-4057-4164-99b2-4a654b92fb3e} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{e3021737-4057-4164-99b2-4a654b92fb3e} (Trojan.Vundo.H) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{00a6faf6-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{147a976f-eee1-4377-8ea7-4716e4cdd239} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00a6faf1-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{e3021737-4057-4164-99b2-4a654b92fb3e} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2c038891-1225-4730-b88d-d65c2535c3de} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\FocusInteractive (Adware.MyWebSearch) -> Quarantined and deleted successfully.

Infizierte Registrierungswerte:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{00a6faf6-072e-44cf-8957-5838f569a31d} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Delete on reboot.

Infizierte Dateiobjekte der Registrierung:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\cbxribbu -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Authentication Packages (Trojan.Vundo.H) -> Data: c:\windows\system32\cbxribbu -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Delete on reboot.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{984b8e35-5c07-43f7-a013-10358feece11}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\DhcpNameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\Tcpip\Parameters\Interfaces\{f988697c-6960-41e0-985f-d99bfe9132db}\NameServer (Trojan.DNSChanger) -> Data: 85.255.113.149;85.255.112.218 -> Quarantined and deleted successfully.

Infizierte Verzeichnisse:
C:\Program Files\MyWebSearch (Adware.MyWebSearch) -> Delete on reboot.
C:\Program Files\MyWebSearch\bar (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\SrchAstt (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\SrchAstt\1.bin (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\FunWebProducts\ScreenSaver\Images (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\resycled (Trojan.DNSChanger) -> Quarantined and deleted successfully.

Infizierte Dateien:
C:\WINDOWS\system32\fopumn.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\mlJCVOhi.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\cbXRIbBu.dll (Trojan.Vundo.H) -> Delete on reboot.
C:\WINDOWS\system32\uBbIRXbc.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\uBbIRXbc.ini2 (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\cabrvgwb.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\bwgvrbac.ini (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948.x86 (Rootkit.Zlob) -> Delete on reboot.
C:\Program Files\MyWebSearch\SrchAstt\1.bin\MWSSRCAS.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948 (Rootkit.Zlob) -> Quarantined and deleted successfully.
C:\Documents and Settings\Bronek\Ustawienia lokalne\Temp\vmitla1.exe (Rootkit.Zlob) -> Quarantined and deleted successfully.
C:\Documents and Settings\Bronek\Ustawienia lokalne\Temporary Internet Files\Content.IE5\4TNAZ1JC\kbp41256[1] (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\Bronek\Ustawienia lokalne\Temporary Internet Files\Content.IE5\FJI6KRXV\index[2] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Documents and Settings\Bronek\Ustawienia lokalne\Temporary Internet Files\Content.IE5\GFBYNAMN\zc113432[1] (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\1.bin\MWSOEMON.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\Internet Explorer\msimg32.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\Program Files\Mozilla Firefox\components\iamfamous.dll (Spyware.Passwords) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\f3PSSavr.scr (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rvavkckw.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lsktkgxx.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\qibvblgv.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\rkcagybn.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sklfmq.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
D:\Program Files\Mozilla Firefox\components\iamfamous.dll (Spyware.Passwords) -> Quarantined and deleted successfully.
C:\Program Files\MyWebSearch\bar\Settings\s_pid.dat (Adware.MyWebSearch) -> Quarantined and deleted successfully.
C:\resycled\boot.com (Trojan.DNSChanger) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\msqpdxosvdbrsr.dll (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\drivers\msqpdxpqltoiqh.sys (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\msqpdxserv.sys (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\tempo-FF.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\tempo-31D.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\tempo-3B9.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\tempo-AEB.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\tempo-BC9.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully.
C:\WINDOWS\Temp\tempo-D6F.tmp (Trojan.DNSChanger) -> Quarantined and deleted successfully.
__________________


Alt 16.12.2008, 14:55   #3
kathy-brown
 
Internetseiten oeffnen sich einfach, Trojaner - Standard

Internetseiten oeffnen sich einfach, Trojaner



dannach nochmal im runscan:


Runscanner logfile http://www.runscanner.net

* = signed file
- = file not found

General info
------------
Computer name : ***
Creation time : 2008-12-16 14:38:39
Hosts <> 127.0.0.1 : 0
Hosts file location : %SystemRoot%\System32\drivers\etc
IE version : 7.0.5730.13
OS : Microsoft Windows XP
OS Build : 2600
OS SP : Dodatek Service Pack 2
RunScanner Version : 1.7.0.0
User Language : Polski
User rights : Administrator
Windows folder : C:\WINDOWS

Running processes
-----------------
C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
* C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe (Adobe Systems Incorporated)
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe (Avira GmbH)
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe (Avira GmbH)
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe (Avira GmbH)
* C:\WINDOWS\system32\winlogon.exe (Microsoft Corporation)
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
* C:\WINDOWS\System32\alg.exe (Microsoft Corporation)
C:\WINDOWS\System32\ALERTM~1\ALERTM~1.EXE
C:\PROGRA~1\NEOSTR~1\Inactivity.exe
C:\PROGRA~1\NEOSTR~1\Toaster.exe (France Telecom R&D)
C:\PROGRA~1\NEOSTR~1\PollingModule.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe (Sony Ericsson Mobile Communications AB)
* C:\WINDOWS\system32\csrss.exe (Microsoft Corporation)
* D:\instalki\voipdiscount\voipdiscount.exe (VoipDiscount)
* C:\WINDOWS\system32\ctfmon.exe (Microsoft Corporation)
* C:\WINDOWS\Explorer.EXE (Microsoft Corporation)
C:\PROGRA~1\NEOSTR~1\neostradatp.exe (France Télécom R&D)
* D:\Program Files\Mozilla Firefox\firefox.exe (Mozilla Corporation)
C:\WINDOWS\System32\FTRTSVC.exe (France Telecom)
C:\Program Files\Common Files\Teleca Shared\Generic.exe (Teleca AB)
* C:\WINDOWS\system32\svchost.exe (Microsoft Corporation)
* C:\WINDOWS\system32\svchost.exe (Microsoft Corporation)
* C:\WINDOWS\system32\svchost.exe (Microsoft Corporation)
* C:\WINDOWS\System32\svchost.exe (Microsoft Corporation)
* C:\WINDOWS\system32\svchost.exe (Microsoft Corporation)
* C:\WINDOWS\system32\svchost.exe (Microsoft Corporation)
C:\PROGRA~1\NEOSTR~1\TaskBarIcon.exe (France Télécom R&D)
C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe (Hewlett-Packard)
C:\Program Files\Hewlett-Packard\Toolbox2.0\Javasoft\JRE\1.3.1\bin\javaw.exe
* C:\WINDOWS\system32\lsass.exe (Microsoft Corporation)
* c:\windows\System32\smss.exe (Microsoft Corporation)
C:\PROGRA~1\NEOSTR~1\ComComp.exe (France Télécom R&D)
C:\WINDOWS\system32\nvsvc32.exe (NVIDIA Corporation)
* D:\Program Files\Picasa2\PicasaMediaDetector.exe (Google Inc.)
D:\Program Files\PowerISO\PWRISOVM.EXE (PowerISO Computing, Inc.)
C:\Program Files\QuickTime\qttask.exe (Apple Computer, Inc.)
* D:\RunScanner.exe (Runscanner.net)
* C:\WINDOWS\system32\spoolsv.exe (Microsoft Corporation)
C:\PROGRA~1\NEOSTR~1\Watch.exe (France Télécom R&D)
* C:\WINDOWS\system32\RUNDLL32.EXE (Microsoft Corporation)
* C:\WINDOWS\system32\services.exe (Microsoft Corporation)
* C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe (Microsoft Corporation)
* C:\WINDOWS\system32\wscntfy.exe (Microsoft Corporation)
* C:\WINDOWS\system32\wdfmgr.exe (Microsoft Corporation)

Unrated items
-------------
002 C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe (Avira GmbH)
002 C:\WINDOWS\system32\NvCpl.dll (NVIDIA Corporation)
002 C:\WINDOWS\system32\NvMcTray.dll (NVIDIA Corporation)
002 d:\Program Files\PowerISO\PWRISOVM.EXE (PowerISO Computing, Inc.)
002 C:\Program Files\QuickTime\qttask.exe (Apple Computer, Inc.)
002 C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
002 C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe (Hewlett-Packard)
002 C:\Program Files\Hewlett-Packard\Toolbox2.0\hpbpsttp.exe (Hewlett-Packard)
002 C:\PROGRA~1\NEOSTR~1\GestMaj.exe (France Télécom R&D)
002 C:\PROGRA~1\NEOSTR~1\Watch.exe (France Télécom R&D)
003 * C:\Documents and Settings\***\Ustawienia lokalne\Dane aplikacji\Octoshape\Octoshape Streaming Services\OctoshapeClient.exe (Octoshape ApS)
003 * D:\instalki\voipdiscount\voipdiscount.exe (VoipDiscount)
005 C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
010 C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe (Avira AntiVir Personal - Free Antivirus Guard)
010 C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe (Avira AntiVir Personal - Free Antivirus Planer)
010 C:\WINDOWS\System32\FTRTSVC.exe (France Telecom Routing Table Service)
010 C:\WINDOWS\system32\nvsvc32.exe (NVIDIA Display Driver Service)
011 * C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgio.sys (avgio)
011 * C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgntflt.sys (avgntflt)
011 * C:\WINDOWS\system32\DRIVERS\avipbb.sys (avipbb)
011 C:\WINDOWS\System32\Drivers\e4ldr.sys (General Purpose USB Driver (e4ldr.sys))
011 C:\WINDOWS\system32\DRIVERS\nv4_mini.sys (nv)
011 * C:\WINDOWS\system32\drivers\pavboot.sys (pavboot)
011 C:\WINDOWS\system32\PCANDIS5.SYS (PCANDIS5 NDIS Protocol Driver)
011 * C:\WINDOWS\System32\Drivers\PxHelp20.sys (PxHelp20)
011 C:\WINDOWS\system32\drivers\SCDEmu.sys (SCDEmu)
011 * C:\WINDOWS\system32\DRIVERS\s816bus.sys (Sony Ericsson Device 816 driver (WDM))
011 * C:\WINDOWS\system32\DRIVERS\s816nd5.sys (Sony Ericsson Device 816 USB Ethernet Emulation SEMCMR7 (NDIS))
011 * C:\WINDOWS\system32\DRIVERS\s816unic.sys (Sony Ericsson Device 816 USB Ethernet Emulation SEMCMR7 (WDM))
011 * C:\WINDOWS\system32\DRIVERS\s816mgmt.sys (Sony Ericsson Device 816 USB WMC Device Management Drivers (WDM))
011 * C:\WINDOWS\system32\DRIVERS\s816mdm.sys (Sony Ericsson Device 816 USB WMC Modem Driver)
011 * C:\WINDOWS\system32\DRIVERS\s816mdfl.sys (Sony Ericsson Device 816 USB WMC Modem Filter)
011 * C:\WINDOWS\system32\DRIVERS\s816obex.sys (Sony Ericsson Device 816 USB WMC OBEX Interface)
011 C:\WINDOWS\System32\Drivers\sptd.sys (sptd)
011 C:\WINDOWS\system32\DRIVERS\ssmdrv.sys (ssmdrv)
011 C:\WINDOWS\system32\DRIVERS\e4usbaw.sys (USB ADSL2 WAN Adapter)
011 C:\WINDOWS\System32\Drivers\pcouffin.sys (VSO Software pcouffin)
040 C:\PROGRA~1\NEOSTR~1\SEARCH~1.DLL {08C06D61-F1F3-4799-86F8-BE1A89362C85}
061 C:\WINDOWS\system32\nvshell.dll {1CDB2949-8F65-4355-8456-263E7C208A5D}
061 C:\WINDOWS\system32\nvshell.dll {1E9B04FB-F9E5-4718-997B-B8DA88302A47}
061 d:\Program Files\Codec\Haali\mmfinfo.dll {0561EC90-CE54-4f0c-9C55-E226110A740C}
061 d:\Program Files\Codec\Haali\mmfinfo.dll {5574006C-28F5-4a65-A28C-74DE6BFBE0BB}
061 d:\Program Files\Codec\Haali\mmfinfo.dll {327669A0-59A7-4be9-B99E-1C9F3A57611A}
061 C:\Program Files\Sony Ericsson\Mobile2\File Manager\FM.dll (Popwire AB) {03DAACC5-10BA-4E3E-9D54-2A569F6B4B87}
061 C:\Program Files\Sony Ericsson\Mobile2\File Manager\FM.dll (Popwire AB) {738D66C6-0149-4D40-84E4-A7BB2D0CE949}
061 C:\WINDOWS\system32\nvcpl.dll (NVIDIA Corporation) {A70C977A-BF00-412C-90B7-034C51DA2439}
061 C:\WINDOWS\system32\nvshell.dll {1E9B04FB-F9E5-4718-997B-B8DA88302A48}
061 C:\WINDOWS\system32\nvcpl.dll (NVIDIA Corporation) {FFB699E0-306A-11d3-8BD1-00104B6F7516}
061 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE}
061 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A}
061 * C:\PROGRA~1\TUNEUP~1\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403}
061 * C:\WINDOWS\system32\uxtuneup.dll (TuneUp Software GmbH) {44440D00-FF19-4AFC-B765-9A0970567D97}
061 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA}
062 d:\Program Files\Codec\Haali\mmfinfo.dll {0561EC90-CE54-4f0c-9C55-E226110A740C}
100 Start Page HKCU : http://www.google.pl/
104 GUID / CLSID not found {8FFBE65D-2C9C-4669-84BD-5829DC0B603C}
105 &Windows Live Search : res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
105 E&ksport do programu Microsoft Excel : res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
105 ÓñČĚŘľ«ÁéĎÂÔŘ(&B) :
105 Pobierz z &BitSpirit : D:\Program Files\BitSpirit\bsurl.htm
120 NameServer {F988697C-6960-41E0-985F-D99BFE9132DB} : 194.204.159.1 217.98.63.164
170 {1d060757-76f4-11db-a7b8-806d6172696f} : C:\WINDOWS\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL resycled\boot.com c:
170 {1d060758-76f4-11db-a7b8-806d6172696f} : C:\WINDOWS\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL resycled\boot.com d:
173 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE}
173 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A}
173 * C:\PROGRA~1\TUNEUP~1\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403}
173 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA}
221 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE}
221 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A}
221 * C:\PROGRA~1\TUNEUP~1\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403}
221 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA}
225 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE}
225 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE}
225 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A}
225 C:\Program Files\Avira\AntiVir PersonalEdition Classic\shlext.dll (Avira GmbH) {45AC2688-0253-4ED8-97DE-B5370FA7D48A}
225 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA}
225 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA}
227 d:\Program Files\PowerISO\PWRISOSH.DLL (PowerISO Computing, Inc.) {967B2D40-8B7D-4127-9049-61EA0C2C6DCE}
227 * C:\PROGRA~1\TUNEUP~1\SDShelEx-win32.dll (TuneUp Software GmbH) {4858E7D9-8E12-45a3-B6A3-1CD128C9D403}
227 C:\Program Files\WinRAR\rarext.dll {B41DB860-8EE4-11D2-9906-E49FADC173CA}
229 C:\WINDOWS\system32\nvshell.dll {1E9B04FB-F9E5-4718-997B-B8DA88302A48}
229 C:\WINDOWS\system32\nvcpl.dll (NVIDIA Corporation) {A70C977A-BF00-412C-90B7-034C51DA2439}
231 d:\Program Files\Codec\Haali\mmfinfo.dll Haali Column Provider

Missing files
-------------
011 C:\WINDOWS\system32\drivers\Abiosdsk.sys
011 C:\WINDOWS\system32\drivers\abp480n5.sys
011 C:\WINDOWS\system32\drivers\adpu160m.sys
011 C:\WINDOWS\system32\drivers\Aha154x.sys
011 C:\WINDOWS\system32\drivers\aic78u2.sys
011 C:\WINDOWS\system32\drivers\aic78xx.sys
011 C:\WINDOWS\system32\drivers\AliIde.sys
011 C:\WINDOWS\system32\drivers\amsint.sys
011 C:\WINDOWS\system32\drivers\asc.sys
011 C:\WINDOWS\system32\drivers\asc3350p.sys
011 C:\WINDOWS\system32\drivers\asc3550.sys
011 C:\WINDOWS\system32\drivers\Atdisk.sys
011 C:\WINDOWS\system32\drivers\cd20xrnt.sys
011 C:\WINDOWS\system32\drivers\Changer.sys
011 C:\WINDOWS\system32\drivers\CmdIde.sys
011 C:\WINDOWS\system32\drivers\Cpqarray.sys
011 C:\WINDOWS\system32\drivers\dac2w2k.sys
011 C:\WINDOWS\system32\drivers\dac960nt.sys
011 C:\WINDOWS\system32\drivers\dpti2o.sys
011 E:\INSTALL\GMSIPCI.SYS
011 C:\WINDOWS\system32\drivers\hpn.sys
011 C:\WINDOWS\system32\drivers\i2omgmt.sys
011 C:\WINDOWS\system32\drivers\i2omp.sys
011 C:\WINDOWS\system32\drivers\ini910u.sys
011 C:\WINDOWS\system32\drivers\IntelIde.sys
011 C:\WINDOWS\system32\drivers\lbrtfdc.sys
011 C:\WINDOWS\system32\drivers\mraid35x.sys
011 E:\NTACCESS.sys
011 c:\windows\system32\drivers\PalmUSBD.sys
011 C:\WINDOWS\system32\PCAMPR5.SYS
011 C:\WINDOWS\system32\drivers\PCIDump.sys
011 C:\WINDOWS\system32\drivers\PCIIde.sys
011 C:\WINDOWS\system32\drivers\PDCOMP.sys
011 C:\WINDOWS\system32\drivers\PDFRAME.sys
011 C:\WINDOWS\system32\drivers\PDRELI.sys
011 C:\WINDOWS\system32\drivers\PDRFRAME.sys
011 C:\WINDOWS\system32\drivers\perc2.sys
011 C:\WINDOWS\system32\drivers\perc2hib.sys
011 C:\WINDOWS\system32\drivers\ql1080.sys
011 C:\WINDOWS\system32\drivers\Ql10wnt.sys
011 C:\WINDOWS\system32\drivers\ql12160.sys
011 C:\WINDOWS\system32\drivers\ql1240.sys
011 C:\WINDOWS\system32\drivers\ql1280.sys
011 E:\NTGLM7X.sys
011 C:\WINDOWS\system32\drivers\Simbad.sys
011 C:\WINDOWS\system32\drivers\Sparrow.sys
011 C:\WINDOWS\system32\drivers\sym_hi.sys
011 C:\WINDOWS\system32\drivers\sym_u3.sys
011 C:\WINDOWS\system32\drivers\symc810.sys
011 C:\WINDOWS\system32\drivers\symc8xx.sys
011 C:\WINDOWS\system32\drivers\TosIde.sys
011 C:\WINDOWS\system32\drivers\ultra.sys
011 C:\WINDOWS\system32\drivers\WDICA.sys
061 deskpan.dll
121 fopumn.dll
167 C:\Program Files\WebMediaViewer\itunes.exe



hoffe das bring euch weiter
__________________

Alt 16.12.2008, 14:58   #4
Argus
 
Internetseiten oeffnen sich einfach, Trojaner - Standard

Internetseiten oeffnen sich einfach, Trojaner



SDFix für Windows 2000 und Windows XP
Download link 1 SDFix zum Desktop
Starte dein Recher in
abgesicherten Modus

SDFix.zip entpacken
unter C:\ findet man nun den SDFix-Ordner

Doppelklick RunThis.bat
Schreibe: Y folge allen Anweisungen
Dann wird der Rechner neustarten
SDFix entfernt jetzt die gefundene Objekte

Kopiere den Inhalt des Berichts SophosReport.txt in diesen Thread

Und ein log von HJ

Alt 16.12.2008, 16:36   #5
kathy-brown
 
Internetseiten oeffnen sich einfach, Trojaner - Standard

Internetseiten oeffnen sich einfach, Trojaner



SDFix: Version 1.240
Run by *** on 2008-12-16 at 15:53

Microsoft Windows XP [Wersja 5.1.2600]
Running From: C:\SDFix

Checking Services :


Restoring Default Security Values
Restoring Default Hosts File

Rebooting


Checking Files :

Trojan Files Found:

C:\autorun.inf - Deleted
C:\resycled\boot.com - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\tmp1.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\TMP10.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\tmp11.tmp - Deleted
C:\DOCUME~1***\USTAWI~1\Temp\tmp12.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\TMP13.tmp - Deleted
C:\DOCUME~1***\\USTAWI~1\Temp\TMP14.tmp - Deleted
C:\DOCUME~1\***\\USTAWI~1\Temp\tmp15.tmp - Deleted
C:\DOCUME~1**\USTAWI~1\Temp\tmp16.tmp - Deleted
C:\DOCUME~1***\\USTAWI~1\Temp\TMP17.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\tmp18.tmp - Deleted
C:\DOCUME~1\***\\USTAWI~1\Temp\tmp19.tmp - Deleted
C:\DOCUME~1\***\\USTAWI~1\Temp\tmp2.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\tmp3.tmp - Deleted
C:\DOCUME~1\***\\USTAWI~1\Temp\TMP3C.tmp - Deleted
C:\DOCUME~1\***\\USTAWI~1\Temp\TMP3D.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\tmp4.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\tmp5.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\TMP6.tmp - Deleted
C:\DOCUME~1\***\\USTAWI~1\Temp\tmp7.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\TMP8.tmp - Deleted
C:\DOCUME~1\***\\USTAWI~1\Temp\TMP9.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\tmpA7.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\tmpA8.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\TMPE.tmp - Deleted
C:\DOCUME~1\***\USTAWI~1\Temp\TMPF.tmp - Deleted



Folder C:\resycled - Removed


Removing Temp Files

ADS Check :



Final Check :

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-12-16 15:58:41
Windows 5.1.2600 Dodatek Service Pack 2 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\C5D31D3C0ABCB948]
"Type"=dword:00000001
"Start"=dword:00000002
"ErrorControl"=dword:00000000
"ImagePath"=str(2):"\??\C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\C5D31D3C0ABCB948\Security]
"Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,..
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msqpdxserv.sys]
"start"=dword:00000001
"type"=dword:00000001
"imagepath"=str(2):"\systemroot\system32\drivers\msqpdxpqltoiqh.sys"
"group"="file system"

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\msqpdxserv.sys\modules]
"msqpdxserv"="\systemroot\system32\drivers\msqpdxpqltoiqh.sys"
"msqpdxl"="\systemroot\system32\msqpdxosvdbrsr.dll"
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg]
"s1"=dword:2df9c43f
"s2"=dword:110480d0
"h0"=dword:00000003

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04]
"h0"=dword:00000000
"ujdew"=hex:ed,ca,34,06,ae,8a,15,ee,78,ea,96,c9,54,ac,a9,44,79,6d,2b,e0,71,..

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC]
"h0"=dword:00000001
"hdf12"=hex:b7,78,c6,e0,49,b2,1b,59,51,9e,dc,82,11,aa,e3,fd,c1,35,2d,46,ae,..

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"h0"=dword:00000002
"khjeh"=hex:e5,02,82,bb,02,9e,af,b6,b5,4c,df,9f,78,48,e4,ed,d7,f9,19,3a,69,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\C5D31D3C0ABCB948]
"Type"=dword:00000001
"Start"=dword:00000002
"ErrorControl"=dword:00000000
"ImagePath"=str(2):"\??\C:\Documents and Settings\Bronek\Pulpit\C5D31D3C0ABCB948\C5D31D3C0ABCB948"

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\C5D31D3C0ABCB948\Security]
"Security"=hex:01,00,14,80,90,00,00,00,9c,00,00,00,14,00,00,00,30,00,00,00,02,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\msqpdxserv.sys]
"start"=dword:00000001
"type"=dword:00000001
"imagepath"=str(2):"\systemroot\system32\drivers\msqpdxpqltoiqh.sys"
"group"="file system"

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\msqpdxserv.sys\modules]
"msqpdxserv"="\systemroot\system32\drivers\msqpdxpqltoiqh.sys"
"msqpdxl"="\systemroot\system32\msqpdxosvdbrsr.dll"
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\0D79C293C1ED61418462E24595C90D04]
"h0"=dword:00000000
"ujdew"=hex:ed,ca,34,06,ae,8a,15,ee,78,ea,96,c9,54,ac,a9,44,79,6d,2b,e0,71,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\14919EA49A8F3B4AA3CF1058D9A64CEC]
"h0"=dword:00000001
"hdf12"=hex:b7,78,c6,e0,49,b2,1b,59,51,9e,dc,82,11,aa,e3,fd,c1,35,2d,46,ae,..
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4]
"h0"=dword:00000002
"khjeh"=hex:e5,02,82,bb,02,9e,af,b6,b5,4c,df,9f,78,48,e4,ed,d7,f9,19,3a,69,..

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services :




Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\VoipDiscount.com\\VoipDiscount\\VoipDiscount.exe"="C:\\Program Files\\VoipDiscount.com\\VoipDiscount\\VoipDiscount.exe:*:Enabled:VoipDiscount"
"D:\\instalki\\VoipDiscount\\VoipDiscount.exe"="D:\\instalki\\VoipDiscount\\VoipDiscount.exe:*:Enabled:VoipDiscount"
"C:\\Program Files\\BitSpirit\\BitSpirit.exe"="C:\\Program Files\\BitSpirit\\BitSpirit.exe:*:Enabled:The powerful and easy-to-use BitTorrent Client"
"C:\\Program Files\\Ares\\Ares.exe"="C:\\Program Files\\Ares\\Ares.exe:*:Enabled:Ares p2p for windows"
"D:\\instalki\\Gadu-Gadu\\gg.exe"="D:\\instalki\\Gadu-Gadu\\gg.exe:*:Enabled:Gadu-Gadu - program gˆ˘wny"
"C:\\Program Files\\Hewlett-Packard\\Toolbox2.0\\Javasoft\\JRE\\1.3.1\\bin\\javaw.exe"="C:\\Program Files\\Hewlett-Packard\\Toolbox2.0\\Javasoft\\JRE\\1.3.1\\bin\\javaw.exe:*isabled:javaw"
"C:\\WINDOWS\\system32\\usmt\\migwiz.exe"="C:\\WINDOWS\\system32\\usmt\\migwiz.exe:*:Enabled:Kreator transferu plik˘w i ustawieä"
"d:\\Program Files\\BitSpirit\\BitSpirit.exe"="D:\\Program Files\\BitSpirit\\BitSpirit.exe:*:Enabled:The powerful and easy-to-use BitTorrent Client"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"
"C:\\Documents and Settings\\**\\Ustawienia lokalne\\Dane aplikacji\\Octoshape\\Octoshape Streaming Services\\OctoshapeClient.exe"="C:\\Documents and Settings\\Bronek\\Ustawienia lokalne\\Dane aplikacji\\Octoshape\\Octoshape Streaming Services\\OctoshapeClient.exe:*:Enabled:Main program for Octoshape client"
"C:\\Program Files\\Skype\\Phone\\Skype.exe"="C:\\Program Files\\Skype\\Phone\\Skype.exe:*:Enabled:Skype"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe"="C:\\Program Files\\Windows Live\\Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger"
"C:\\Program Files\\Windows Live\\Messenger\\livecall.exe"="C:\\Program Files\\Windows Live\\Messenger\\livecall.exe:*:Enabled:Windows Live Messenger (Phone)"

Remaining Files :


File Backups: - C:\SDFix\backups\backups.zip

Files with Hidden Attributes :

Sun 16 Dec 2007 4,348 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Sun 16 Dec 2007 401 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv17.bak"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\0c17680ecec6cda1c3c55287bcbfb340\BIT1F.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\1831cb0eb2edc94e4099a128e7774c8f\BIT1E.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\28fa3d552b86948b1c727cfe113ce6b9\BIT18.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\54924a4acd8227e4b644db54793d38f9\BIT1A.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\62e985536d679e5c72447be3ed1a4bfb\BIT20.tmp"
Tue 16 Dec 2008 7,771,584 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\9de4903f01b4008e08b567e41ba8107e\BIT17.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\ac2b030bd2575b71a4dd058e8259226c\BIT1D.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\b15f12905daf2d5f4bb1d398773d75a0\BIT19.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\b1b2fa76f94f5a551abbbe9b97448e9d\BIT1C.tmp"
Tue 16 Dec 2008 5,856,519 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\dcfb3f0fee0b76240a4ce7e93515b1e3\BIT12.tmp"
Tue 16 Dec 2008 5,687,304 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\deb185b7c3743a27be869545db996079\BIT2.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\e79b7c1528f460c7b86498b0cee3d526\BIT14.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\fec979e1a8d79e0808a864efd8bed119\BIT1B.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\74527552c85695f6da4aaf4636e2cd44\download\BIT23.tmp"
Tue 16 Dec 2008 0 A..H. --- "C:\WINDOWS\SoftwareDistribution\Download\d58864c012c0884f13f3aa870d1f644b\download\BIT26.tmp"

Finished!




Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 16:36:19, on 2008-12-16
Platform: Windows XP Dodatek SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\System32\FTRTSVC.exe
C:\WINDOWS\system32\nvsvc32.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\RUNDLL32.EXE
C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe
D:\Program Files\PowerISO\PWRISOVM.EXE
C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe
C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe
C:\Program Files\QuickTime\qttask.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\PROGRA~1\NEOSTR~1\TaskBarIcon.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\Hewlett-Packard\Toolbox2.0\Javasoft\JRE\1.3.1\bin\javaw.exe
D:\instalki\voipdiscount\voipdiscount.exe
C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe
D:\Program Files\Picasa2\PicasaMediaDetector.exe
C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
C:\Program Files\Common Files\Teleca Shared\Generic.exe
C:\Program Files\Sony Ericsson\Mobile2\Mobile Phone Monitor\epmworker.exe
C:\PROGRA~1\NEOSTR~1\neostradatp.exe
C:\PROGRA~1\NEOSTR~1\ComComp.exe
C:\PROGRA~1\NEOSTR~1\Toaster.exe
C:\PROGRA~1\NEOSTR~1\Inactivity.exe
C:\PROGRA~1\NEOSTR~1\PollingModule.exe
C:\WINDOWS\System32\ALERTM~1\ALERTM~1.EXE
C:\PROGRA~1\NEOSTR~1\Watch.exe
D:\Program Files\Mozilla Firefox\firefox.exe
D:\Program Files\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = ht**p://www.google.pl/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = h**://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = ht**p://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = h**p://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = neostrada tp
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = Łącza
R3 - URLSearchHook: Search Class - {08C06D61-F1F3-4799-86F8-BE1A89362C85} - C:\PROGRA~1\NEOSTR~1\SEARCH~1.DLL
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.5.0_11\bin\ssv.dll
O2 - BHO: Pomocnik rejestracji usługi Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Windows Live Toolbar Helper - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O3 - Toolbar: Windows Live Toolbar - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - C:\Program Files\Windows Live Toolbar\msntb.dll
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [StatusClient] C:\Program Files\Hewlett-Packard\Toolbox2.0\Apache Tomcat 4.0\webapps\Toolbox\StatusClient\StatusClient.exe /auto
O4 - HKLM\..\Run: [TomcatStartup] C:\Program Files\Hewlett-Packard\Toolbox2.0\hpbpsttp.exe
O4 - HKLM\..\Run: [WOOWATCH] C:\PROGRA~1\NEOSTR~1\Watch.exe
O4 - HKLM\..\Run: [WOOTASKBARICON] C:\PROGRA~1\NEOSTR~1\GestMaj.exe TaskBarIcon.exe
O4 - HKLM\..\Run: [PWRISOVM.EXE] d:\Program Files\PowerISO\PWRISOVM.EXE
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "D:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Program Files\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [Adobe Photo Downloader] "C:\Program Files\Adobe\Photoshop Album Starter Edition\3.2\Apps\apdproxy.exe"
O4 - HKLM\..\Run: [avgnt] "C:\Program Files\Avira\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [MSConfig] C:\WINDOWS\PCHealth\HelpCtr\Binaries\MSConfig.exe /auto
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [VoipDiscount] "D:\instalki\voipdiscount\voipdiscount.exe" -nosplash -minimized
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [Picasa Media Detector] D:\Program Files\Picasa2\PicasaMediaDetector.exe
O4 - HKCU\..\Run: [Octoshape Streaming Services] "C:\Documents and Settings\Bronek\Ustawienia lokalne\Dane aplikacji\Octoshape\Octoshape Streaming Services\OctoshapeClient.exe" -inv:bootrun
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'USŁUGA LOKALNA')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'USŁUGA SIECIOWA')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O4 - Global Startup: DSLMON.lnk = C:\Program Files\SAGEM\SAGEM F@st 800-840\dslmon.exe
O8 - Extra context menu item: &Windows Live Search - res://C:\Program Files\Windows Live Toolbar\msntb.dll/search.htm
O8 - Extra context menu item: E&ksport do programu Microsoft Excel - res://C:\PROGRA~1\MICROS~2\OFFICE11\EXCEL.EXE/3000
O8 - Extra context menu item: Pobierz z &BitSpirit - D:\Program Files\BitSpirit\bsurl.htm
O9 - Extra button: Badanie - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\OFFICE11\REFIEBAR.DLL
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O17 - HKLM\System\CCS\Services\Tcpip\..\{F988697C-6960-41E0-985F-D99BFE9132DB}: NameServer = 194.204.159.1 217.98.63.164
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O20 - AppInit_DLLs: fopumn.dll
O23 - Service: Avira AntiVir Personal - Free Antivirus Planer (AntiVirScheduler) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: Avira AntiVir Personal - Free Antivirus Guard (AntiVirService) - Avira GmbH - C:\Program Files\Avira\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: France Telecom Routing Table Service (FTRTSVC) - France Telecom - C:\WINDOWS\System32\FTRTSVC.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe
O23 - Service: Pml Driver HPZ12 - HP - C:\WINDOWS\system32\HPZipm12.exe

--
End of file - 7543 bytes


Geändert von kathy-brown (16.12.2008 um 16:43 Uhr)

Alt 16.12.2008, 16:38   #6
kathy-brown
 
Internetseiten oeffnen sich einfach, Trojaner - Standard

Internetseiten oeffnen sich einfach, Trojaner



die internetseiten kommen nicht mehr, alles funktioniert wieder schnell!
danke!!!

soll man noch etwas machen, oder ist jetzt alles wirklich endgueltig weg??
vielen, vielen dank!

Alt 16.12.2008, 17:06   #7
Argus
 
Internetseiten oeffnen sich einfach, Trojaner - Standard

Internetseiten oeffnen sich einfach, Trojaner



Entferne auf C:\SDFix\ backups Papierkorb leeren

Schliesse alle Fenster und starte Hijack This
Klicke: Do a Systemscan only
Setze ein Häckchen in das Kästchen vor den genannten Eintrag bei

O20 - AppInit_DLLs: fopumn.dll
klicke: Fix checked

Um sicher zu gehen

ComboFix(by sUBs)
Download ComboFix und speichert es auf den Desktop!

Schliesse alle Programme und Anwendungen mit Hintergrundwächtern inklusive der Firewall + Antivirusprogramme müssen deaktiviert sein

Starte combofix.exe
Note:
Wenn ComboFix schon eher benutzt worden ist, kann es sein das eine Meldung kommt das es ein Update gibt
Lass es zu das ComboFix ge-updatet wird
Klicke OK im "NirCmd") Fenster klicke ja um Combofix zu starten

Folge den Instruktionen in das Fenster

Während Combofix lauft NICHT ins Fenster klicken sonst erfriert dein Rechner

Wenn das Tool fertig ist,oeffnet sich ein logfile (C:\ combofix.txt)
nun das KOMPLETTE Log mit rechtem Mausklick ab kopieren und ins Forum mit rechtem Mausklick "einfügen"
Befolge diese Anleitung und installiere auch den Wiederherstellungskonsole

Alt 17.12.2008, 20:43   #8
Nickel367
 
Internetseiten oeffnen sich einfach, Trojaner - Standard

Internetseiten oeffnen sich einfach, Trojaner



Hallo! Habe alles so gemacht wie hier beschrieben (hab natürlich dasselbe Problem) es gibt aber keine Änderungen...bzw. die Seiten öffnen sich immernoch

Hat jemand nen Tipp?

Danke im Voraus

Antwort

Themen zu Internetseiten oeffnen sich einfach, Trojaner
adobe, antivir, antivirus, application, avira, content.ie5, downloader, excel, explorer, file, firefox, hijack, hijackthis, hkus\s-1-5-18, internet explorer, messenger, micro, microsoft, monitor, namen, neue, nvidia, photoshop, picasa, poweriso, programm, seiten, software, trojane, trojaner, windows xp




Ähnliche Themen: Internetseiten oeffnen sich einfach, Trojaner


  1. Windows 7: Programme lassen sich nicht oeffnen und oder brauchen ewig, Fehlermeldungen wie microsoft explorer reagiert nicht, schwarzes Bild
    Log-Analyse und Auswertung - 08.09.2015 (18)
  2. Programme öffnen sich einfach / PC schaltet sich ab usw
    Log-Analyse und Auswertung - 19.02.2013 (12)
  3. Trojaner lässt sich einfach nicht entfernen
    Plagegeister aller Art und deren Bekämpfung - 01.12.2010 (1)
  4. Würmer, Trojaner und Internetseiten die sich automatisch öffnen!
    Plagegeister aller Art und deren Bekämpfung - 22.08.2010 (1)
  5. Trojaner TR/FakeAV.CX.175616 lässt sich einfach nicht entfernen
    Plagegeister aller Art und deren Bekämpfung - 06.05.2010 (1)
  6. Internetseiten öffnen sich einfach so
    Mülltonne - 31.01.2010 (6)
  7. internetseiten bauen sich langsam auf/laptop hängt sich ständig auf
    Plagegeister aller Art und deren Bekämpfung - 14.01.2009 (0)
  8. Internetseiten öffnen sich
    Log-Analyse und Auswertung - 24.11.2008 (0)
  9. Internetseiten lassen sich nicht mehr oeffnen/hiJackThis Logfile
    Log-Analyse und Auswertung - 04.05.2008 (11)
  10. Trojaner eingefangen Internetseiten lassen sich nicht mehr öffnen!
    Log-Analyse und Auswertung - 15.04.2008 (3)
  11. Trojaner drauf, Netstat lässt sich nich oeffnen
    Log-Analyse und Auswertung - 10.01.2008 (0)
  12. Internetseiten öffnen sich von selbst.
    Log-Analyse und Auswertung - 11.12.2007 (5)
  13. kann nur noch wenige internetseiten oeffnen
    Antiviren-, Firewall- und andere Schutzprogramme - 15.02.2007 (5)
  14. Chinesische Internetseiten oeffnen sich hartnaeckig von selbst (IE6)
    Log-Analyse und Auswertung - 04.02.2007 (1)
  15. AntivirenKit 2006 laesst sich nicht oeffnen!!
    Alles rund um Windows - 07.09.2005 (1)
  16. 4 trojaner/internetseiten öffnen sich allein/Log-Datei anbei
    Log-Analyse und Auswertung - 10.08.2005 (1)
  17. Probleme mit meinem Rechner/Seiten lassen sich nicht oeffnen/Hijackthis Log
    Log-Analyse und Auswertung - 26.09.2004 (10)

Zum Thema Internetseiten oeffnen sich einfach, Trojaner - Hallo! Immer wieder oeffnen sich neue Internetseiten,egal ob ich im Internet explorer bin oder im Mozilla. Sehr oft kommt folgende siete, die aber komplett weiss bleibt: h**p://sagipsul.com/go/rfe.php?cmp=vm_mg_fails_juan&uid=490DA4A2C98711DDAF87150044CFFFFF&guid=0F924E0627AE4EB8B7203B85158E5140&lid=&url=sich&affid=150044&b42=&b42=0.0020 Ausserdem kommt die - Internetseiten oeffnen sich einfach, Trojaner...
Archiv
Du betrachtest: Internetseiten oeffnen sich einfach, Trojaner auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.