Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Umleitung über newsbuster.org und sureonlinefind bei Firefox/google suche.

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML.

 
Alt 01.07.2013, 15:36   #5
nulle
 
Umleitung über newsbuster.org und sureonlinefind bei Firefox/google suche. - Standard

Umleitung über newsbuster.org und sureonlinefind bei Firefox/google suche.



So hier die logs


Gmer:

Code:
ATTFilter
GMER 2.1.19163 - hxxp://www.gmer.net
Rootkit scan 2013-07-01 16:25:42
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-2 Intel___ rev.1.0. 931,52GB
Running: gmer_2.1.19163.exe; Driver: Q:\Temp\fxldqpow.sys


---- User code sections - GMER 2.1 ----

.text   C:\Program Files (x86)\Autodesk\Content Service\Connect.Service.ContentService.exe[2012] C:\Windows\syswow64\psapi.dll!

GetModuleInformation + 69   0000000074d11465 2 bytes [D1, 74]
.text   C:\Program Files (x86)\Autodesk\Content Service\Connect.Service.ContentService.exe[2012] C:\Windows\syswow64\psapi.dll!

GetModuleInformation + 155  0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   E:\Programme\RocketDock\RocketDock.exe[2772] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                       

                        0000000074d11465 2 bytes [D1, 74]
.text   E:\Programme\RocketDock\RocketDock.exe[2772] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155                      

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Windows\SysWOW64\PnkBstrA.exe[1752] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 322                                    

                        000000006b8d1a22 2 bytes [8D, 6B]
.text   C:\Windows\SysWOW64\PnkBstrA.exe[1752] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 496                                    

                        000000006b8d1ad0 2 bytes [8D, 6B]
.text   C:\Windows\SysWOW64\PnkBstrA.exe[1752] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 552                                    

                        000000006b8d1b08 2 bytes [8D, 6B]
.text   C:\Windows\SysWOW64\PnkBstrA.exe[1752] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 730                                    

                        000000006b8d1bba 2 bytes [8D, 6B]
.text   C:\Windows\SysWOW64\PnkBstrA.exe[1752] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 762                                    

                        000000006b8d1bda 2 bytes [8D, 6B]
.text   C:\Windows\SysWOW64\PnkBstrA.exe[1752] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                             

                        0000000074d11465 2 bytes [D1, 74]
.text   C:\Windows\SysWOW64\PnkBstrA.exe[1752] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155                            

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\SysWOW64\ntdll.dll!NtQueryInformationProcess  

                        000000007740fab8 5 bytes JMP 0000000107a64696
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\GDI32.dll!ExtTextOutW                

                        0000000076798b7a 5 bytes JMP 0000000107a69c72
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\GDI32.dll!GetGlyphIndicesW           

                        0000000076799963 5 bytes JMP 0000000107a6a0ff
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\GDI32.dll!TextOutW                   

                        000000007679d41c 5 bytes JMP 0000000107a6973e
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\GDI32.dll!ExtTextOutA                

                        000000007679dce4 5 bytes JMP 0000000107a69b8e
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\GDI32.dll!TextOutA                   

                        000000007679eda3 5 bytes JMP 0000000107a69672
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\GDI32.dll!GetGlyphIndicesA           

                        00000000767b8dbd 5 bytes JMP 0000000107a6a032
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\USER32.dll!DrawTextExW               

                        00000000768e149e 5 bytes JMP 0000000107a69aa7
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\USER32.dll!DrawTextW                 

                        00000000768e25cf 5 bytes JMP 0000000107a698e5
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\USER32.dll!DrawTextA                 

                        00000000768eaea1 5 bytes JMP 0000000107a6980a
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\USER32.dll!DrawTextExA               

                        00000000768eaed8 5 bytes JMP 0000000107a699c0
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\USER32.dll!DialogBoxParamW           

                        00000000768fcfca 5 bytes JMP 0000000107a684fb
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\USER32.dll!SetClipboardData          

                        0000000076918e57 1 byte JMP 0000000107a6955b
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\USER32.dll!SetClipboardData + 2      

                        0000000076918e59 3 bytes {JMP 0xffffffff91150704}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69  

                        0000000074d11465 2 bytes [D1, 74]
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!closesocket               

                        0000000074d83918 5 bytes JMP 0000000107a694a1
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!getaddrinfo               

                        0000000074d84296 5 bytes JMP 0000000107a68039
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!WSASend                   

                        0000000074d84406 5 bytes JMP 0000000107a69150
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!GetAddrInfoW              

                        0000000074d84889 5 bytes JMP 0000000107a68119
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!recv                      

                        0000000074d86b0e 5 bytes JMP 0000000107a6908e
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!send                      

                        0000000074d86f01 5 bytes JMP 0000000107a68fd5
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!WSARecv                   

                        0000000074d87089 5 bytes JMP 0000000107a69224
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!WSAGetOverlappedResult    

                        0000000074d87489 5 bytes JMP 0000000107a6936b
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!WSAAsyncGetHostByName     

                        0000000074d9726a 5 bytes JMP 0000000107a6841c
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WS2_32.dll!gethostbyname             

                        0000000074d97673 5 bytes JMP 0000000107a67f78
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3920] C:\Windows\syswow64\WININET.dll!InternetCrackUrlW        

                        0000000074c03059 5 bytes JMP 0000000107a6a3c5
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 

                        000000007740f991 7 bytes {MOV EDX, 0xcf8228; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5      

                        000000007740fbd5 7 bytes {MOV EDX, 0xcf8268; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5          

                        000000007740fc05 7 bytes {MOV EDX, 0xcf81a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5   

                        000000007740fc1d 7 bytes {MOV EDX, 0xcf8128; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5     

                        000000007740fc35 7 bytes {MOV EDX, 0xcf8328; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5   

                        000000007740fc65 7 bytes {MOV EDX, 0xcf8368; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5    

                        000000007740fce5 7 bytes {MOV EDX, 0xcf82e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5   

                        000000007740fcfd 7 bytes {MOV EDX, 0xcf82a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5             

                        000000007740fd49 7 bytes {MOV EDX, 0xcf8068; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5  

                        000000007740fe41 7 bytes {MOV EDX, 0xcf80a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5           

                        0000000077410099 7 bytes {MOV EDX, 0xcf8028; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5     

                        00000000774110a5 7 bytes {MOV EDX, 0xcf81e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5           

                        000000007741111d 7 bytes {MOV EDX, 0xcf8168; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile 

+ 5                      0000000077411321 7 bytes {MOV EDX, 0xcf80e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69  

                        0000000074d11465 2 bytes [D1, 74]
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3796] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 

                        000000007740f991 7 bytes {MOV EDX, 0x6a9228; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5      

                        000000007740fbd5 7 bytes {MOV EDX, 0x6a9268; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5          

                        000000007740fc05 7 bytes {MOV EDX, 0x6a91a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5   

                        000000007740fc1d 7 bytes {MOV EDX, 0x6a9128; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5     

                        000000007740fc35 7 bytes {MOV EDX, 0x6a9328; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5   

                        000000007740fc65 7 bytes {MOV EDX, 0x6a9368; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5    

                        000000007740fce5 7 bytes {MOV EDX, 0x6a92e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5   

                        000000007740fcfd 7 bytes {MOV EDX, 0x6a92a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5             

                        000000007740fd49 7 bytes {MOV EDX, 0x6a9068; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5  

                        000000007740fe41 7 bytes {MOV EDX, 0x6a90a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5           

                        0000000077410099 7 bytes {MOV EDX, 0x6a9028; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5     

                        00000000774110a5 7 bytes {MOV EDX, 0x6a91e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5           

                        000000007741111d 7 bytes {MOV EDX, 0x6a9168; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile 

+ 5                      0000000077411321 7 bytes {MOV EDX, 0x6a90e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69  

                        0000000074d11465 2 bytes [D1, 74]
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4204] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 

                        000000007740f991 7 bytes {MOV EDX, 0xa21a28; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5      

                        000000007740fbd5 7 bytes {MOV EDX, 0xa21a68; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5          

                        000000007740fc05 7 bytes {MOV EDX, 0xa219a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5   

                        000000007740fc1d 7 bytes {MOV EDX, 0xa21928; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5     

                        000000007740fc35 7 bytes {MOV EDX, 0xa21b28; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5   

                        000000007740fc65 7 bytes {MOV EDX, 0xa21b68; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5    

                        000000007740fce5 7 bytes {MOV EDX, 0xa21ae8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5   

                        000000007740fcfd 7 bytes {MOV EDX, 0xa21aa8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5             

                        000000007740fd49 7 bytes {MOV EDX, 0xa21868; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5  

                        000000007740fe41 7 bytes {MOV EDX, 0xa218a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5           

                        0000000077410099 7 bytes {MOV EDX, 0xa21828; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5     

                        00000000774110a5 7 bytes {MOV EDX, 0xa219e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5           

                        000000007741111d 7 bytes {MOV EDX, 0xa21968; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile 

+ 5                      0000000077411321 7 bytes {MOV EDX, 0xa218e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69  

                        0000000074d11465 2 bytes [D1, 74]
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4672] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 

                        000000007740f991 7 bytes {MOV EDX, 0x405628; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5      

                        000000007740fbd5 7 bytes {MOV EDX, 0x405668; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5          

                        000000007740fc05 7 bytes {MOV EDX, 0x4055a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5   

                        000000007740fc1d 7 bytes {MOV EDX, 0x405528; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5     

                        000000007740fc35 7 bytes {MOV EDX, 0x405728; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5   

                        000000007740fc65 7 bytes {MOV EDX, 0x405768; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5    

                        000000007740fce5 7 bytes {MOV EDX, 0x4056e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5   

                        000000007740fcfd 7 bytes {MOV EDX, 0x4056a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5             

                        000000007740fd49 7 bytes {MOV EDX, 0x405468; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5  

                        000000007740fe41 7 bytes {MOV EDX, 0x4054a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5           

                        0000000077410099 7 bytes {MOV EDX, 0x405428; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5     

                        00000000774110a5 7 bytes {MOV EDX, 0x4055e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5           

                        000000007741111d 7 bytes {MOV EDX, 0x405568; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile 

+ 5                      0000000077411321 7 bytes {MOV EDX, 0x4054e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69  

                        0000000074d11465 2 bytes [D1, 74]
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[4688] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe[4560] C:\Windows\syswow64\PSAPI.DLL!

GetModuleInformation + 69             0000000074d11465 2 bytes [D1, 74]
.text   C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe[4560] C:\Windows\syswow64\PSAPI.DLL!

GetModuleInformation + 155            0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationThread + 5 

                        000000007740f991 7 bytes {MOV EDX, 0xddb228; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadToken + 5      

                        000000007740fbd5 7 bytes {MOV EDX, 0xddb268; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcess + 5          

                        000000007740fc05 7 bytes {MOV EDX, 0xddb1a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtSetInformationFile + 5   

                        000000007740fc1d 7 bytes {MOV EDX, 0xddb128; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtMapViewOfSection + 5     

                        000000007740fc35 7 bytes {MOV EDX, 0xddb328; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtUnmapViewOfSection + 5   

                        000000007740fc65 7 bytes {MOV EDX, 0xddb368; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtOpenThreadTokenEx + 5    

                        000000007740fce5 7 bytes {MOV EDX, 0xddb2e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessTokenEx + 5   

                        000000007740fcfd 7 bytes {MOV EDX, 0xddb2a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtOpenFile + 5             

                        000000007740fd49 7 bytes {MOV EDX, 0xddb068; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtQueryAttributesFile + 5  

                        000000007740fe41 7 bytes {MOV EDX, 0xddb0a8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtCreateFile + 5           

                        0000000077410099 7 bytes {MOV EDX, 0xddb028; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtOpenProcessToken + 5     

                        00000000774110a5 7 bytes {MOV EDX, 0xddb1e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtOpenThread + 5           

                        000000007741111d 7 bytes {MOV EDX, 0xddb168; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\SysWOW64\ntdll.dll!NtQueryFullAttributesFile 

+ 5                      0000000077411321 7 bytes {MOV EDX, 0xddb0e8; JMP RDX}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69  

                        0000000074d11465 2 bytes [D1, 74]
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5884] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\SysWOW64\ntdll.dll!NtQueryInformationProcess  

                        000000007740fab8 5 bytes JMP 0000000102c84696
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\GDI32.dll!ExtTextOutW                

                        0000000076798b7a 5 bytes JMP 0000000102c89c72
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\GDI32.dll!GetGlyphIndicesW           

                        0000000076799963 5 bytes JMP 0000000102c8a0ff
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\GDI32.dll!TextOutW                   

                        000000007679d41c 5 bytes JMP 0000000102c8973e
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\GDI32.dll!ExtTextOutA                

                        000000007679dce4 5 bytes JMP 0000000102c89b8e
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\GDI32.dll!TextOutA                   

                        000000007679eda3 5 bytes JMP 0000000102c89672
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\GDI32.dll!GetGlyphIndicesA           

                        00000000767b8dbd 5 bytes JMP 0000000102c8a032
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\USER32.dll!DrawTextExW               

                        00000000768e149e 5 bytes JMP 0000000102c89aa7
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\USER32.dll!DrawTextW                 

                        00000000768e25cf 5 bytes JMP 0000000102c898e5
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\USER32.dll!DrawTextA                 

                        00000000768eaea1 5 bytes JMP 0000000102c8980a
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\USER32.dll!DrawTextExA               

                        00000000768eaed8 5 bytes JMP 0000000102c899c0
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\USER32.dll!DialogBoxParamW           

                        00000000768fcfca 5 bytes JMP 0000000102c884fb
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\USER32.dll!SetClipboardData          

                        0000000076918e57 1 byte JMP 0000000102c8955b
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\USER32.dll!SetClipboardData + 2      

                        0000000076918e59 3 bytes {JMP 0xffffffff8c370704}
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69  

                        0000000074d11465 2 bytes [D1, 74]
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!closesocket               

                        0000000074d83918 5 bytes JMP 0000000102c894a1
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!getaddrinfo               

                        0000000074d84296 5 bytes JMP 0000000102c88039
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!WSASend                   

                        0000000074d84406 5 bytes JMP 0000000102c89150
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!GetAddrInfoW              

                        0000000074d84889 5 bytes JMP 0000000102c88119
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!recv                      

                        0000000074d86b0e 5 bytes JMP 0000000102c8908e
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!send                      

                        0000000074d86f01 5 bytes JMP 0000000102c88fd5
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!WSARecv                   

                        0000000074d87089 5 bytes JMP 0000000102c89224
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!WSAGetOverlappedResult    

                        0000000074d87489 5 bytes JMP 0000000102c8936b
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!WSAAsyncGetHostByName     

                        0000000074d9726a 5 bytes JMP 0000000102c8841c
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WS2_32.dll!gethostbyname             

                        0000000074d97673 5 bytes JMP 0000000102c87f78
.text   C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[5212] C:\Windows\syswow64\WININET.dll!InternetCrackUrlW        

                        0000000074c03059 5 bytes JMP 0000000102c8a3c5
.text   E:\Programme\DAEMON Tools Pro\DTShellHlp.exe[1880] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                 

                        0000000074d11465 2 bytes [D1, 74]
.text   E:\Programme\DAEMON Tools Pro\DTShellHlp.exe[1880] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155                

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2
.text   C:\Users\Nullinger\Downloads\gmer_2.1.19163.exe[5916] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69              

                        0000000074d11465 2 bytes [D1, 74]
.text   C:\Users\Nullinger\Downloads\gmer_2.1.19163.exe[5916] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155             

                        0000000074d114bb 2 bytes [D1, 74]
.text   ...                                                                                                                        

                        * 2

---- Threads - GMER 2.1 ----

Thread  C:\Windows\SysWOW64\rundll32.exe [1760:1924]                                                                               

                        0000000000300500
Thread  C:\Windows\SysWOW64\rundll32.exe [1760:1928]                                                                               

                        0000000000193a80
Thread  C:\Windows\SysWOW64\rundll32.exe [1760:2040]                                                                               

                        0000000000193a10
Thread  C:\Windows\SysWOW64\rundll32.exe [1760:5392]                                                                               

                        0000000000a196b7
Thread  C:\Windows\SysWOW64\rundll32.exe [1760:5388]                                                                               

                        0000000000a16874
Thread  C:\Windows\SysWOW64\rundll32.exe [1760:5384]                                                                               

                        0000000000a16dbc

---- EOF - GMER 2.1 ----
         

MBR:

Code:
ATTFilter
Malwarebytes Anti-Rootkit BETA 1.06.0.1004
www.malwarebytes.org

Database version: v2013.07.01.04

Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Nullinger :: GROTTE [administrator]

01.07.2013 16:28:55
mbar-log-2013-07-01 (16-28-55).txt

Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUM | P2P
Scan options disabled: PUP
Objects scanned: 268235
Time elapsed: 5 minute(s), 58 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

Physical Sectors Detected: 0
(No malicious items detected)

(end)
         


 

Themen zu Umleitung über newsbuster.org und sureonlinefind bei Firefox/google suche.
.dll, antivir, avg, bho, black, explorer, firefox, google, langsam, launch, mozilla, nodrives, nvidia, plug-in, problem, programme, realtek, registry, scan, software, super, temp, tr/crypt.zpack.gen6, tr/fakeav.82365488, usb, windows




Ähnliche Themen: Umleitung über newsbuster.org und sureonlinefind bei Firefox/google suche.


  1. Umleitung nach Klick auf Link in Google Suche
    Log-Analyse und Auswertung - 29.01.2015 (28)
  2. Trojaner - Umleitung bei Google-Suche (ihavenet)
    Log-Analyse und Auswertung - 30.09.2013 (30)
  3. Firefox Google Newsbuster/Ihavenet Umleitung
    Log-Analyse und Auswertung - 29.07.2013 (13)
  4. Newsbuster- ihavenet-Umleitung
    Log-Analyse und Auswertung - 25.07.2013 (15)
  5. Firefox: Bei Anklicken von Links nach Google-Suche erfolgt Umleitung auf Werbeseiten
    Log-Analyse und Auswertung - 12.07.2013 (13)
  6. Ihavenet.com und Sureonlinefind weiterleitung bei Mozilla Firefox und Google
    Log-Analyse und Auswertung - 02.07.2013 (19)
  7. Werbetrojaner (?) bei der Google Suche über Firefox
    Log-Analyse und Auswertung - 13.05.2013 (16)
  8. Umleitung auf andere Websites bei Google suche mit IExplorer
    Plagegeister aller Art und deren Bekämpfung - 27.02.2013 (29)
  9. Google Suche Umleitung
    Log-Analyse und Auswertung - 17.02.2013 (1)
  10. Nach Google Suche umleitung über Rocketnews zu safeseeking.com
    Plagegeister aller Art und deren Bekämpfung - 02.07.2012 (16)
  11. Umleitung auf fremde URLs bei Google-Suche
    Log-Analyse und Auswertung - 26.01.2012 (1)
  12. Google-Umleitung und eingeschränkte Google-Suche
    Plagegeister aller Art und deren Bekämpfung - 14.06.2011 (7)
  13. Firefox öffnet falsche Seiten über die Google suche
    Log-Analyse und Auswertung - 17.05.2011 (1)
  14. Google Redirect / Umleitung bei jeder Suche - Rootkit?
    Log-Analyse und Auswertung - 18.01.2010 (4)
  15. pc friert ein und umleitung bei google suche
    Log-Analyse und Auswertung - 22.12.2009 (3)
  16. Google Suche Umleitung ebay
    Log-Analyse und Auswertung - 04.06.2009 (5)
  17. resycle, Trojan32, Google Suche Umleitung
    Log-Analyse und Auswertung - 07.11.2008 (8)

Zum Thema Umleitung über newsbuster.org und sureonlinefind bei Firefox/google suche. - So hier die logs Gmer: Code: Alles auswählen Aufklappen ATTFilter GMER 2.1.19163 - hxxp://www.gmer.net Rootkit scan 2013-07-01 16:25:42 Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-2 Intel___ rev.1.0. 931,52GB - Umleitung über newsbuster.org und sureonlinefind bei Firefox/google suche....
Archiv
Du betrachtest: Umleitung über newsbuster.org und sureonlinefind bei Firefox/google suche. auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.