hallo,
vor einigen tagen hat mein Antivir den virus TR/Dldr.FraudLoa.NC gemeldet und es hat sich auf meinem pc ein programm namens Antivir XP 2008 installiert welches sich dann selbstständig gemacht hat und mir immer wieder fehlermeldungen gebracht hat. da mein antivir den virus nicht löschen konnte habe ich dann hier im forum von MBAM gelesen und mir dieses sofort besorgt, laufen lassen, alles gelöscht was als probleme angezeigt wurde und folgendes LOGFILE erhalten
PHP-Code:
Malwarebytes' Anti-Malware 1.24
Datenbank Version: 1049
Windows 5.1.2600 Service Pack 2
23:13:37 13.08.2008
mbam-log-8-13-2008 (23-13-37).txt
Scan-Methode: Vollständiger Scan (C:\|D:\|)
Durchsuchte Objekte: 110594
Laufzeit: 1 hour(s), 6 minute(s), 7 second(s)
Infizierte Speicherprozesse: 3
Infizierte Speichermodule: 4
Infizierte Registrierungsschlüssel: 11
Infizierte Registrierungswerte: 9
Infizierte Dateiobjekte der Registrierung: 3
Infizierte Verzeichnisse: 15
Infizierte Dateien: 35
Infizierte Speicherprozesse:
C:\Programme\rhc7f8j0eaaa\rhc7f8j0eaaa.exe (Rogue.Multiple) -> Failed to unload process.
C:\WINDOWS\system32\lphc3f8j0eaaa.exe (Trojan.FakeAlert) -> Unloaded process successfully.
C:\WINDOWS\system32\drivers\svchost.exe (Heuristics.Reserved.Word.Exploit) -> Unloaded process successfully.
Infizierte Speichermodule:
C:\Programme\rhc7f8j0eaaa\MFC71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\msvcp71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\msvcr71.dll (Rogue.Multiple) -> Delete on reboot.
C:\WINDOWS\system32\blphc3f8j0eaaa.scr (Trojan.FakeAlert) -> Delete on reboot.
Infizierte Registrierungsschlüssel:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1394fd4b-14dc-1f56-ab3d-1ce34f99a9e9} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1394fd4b-14dc-1f56-ab3d-1ce34f99a9e9} (Trojan.BHO) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{28252909-1be7-4236-bd77-b59cff2ae6c4} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{1e5dd896-fd9b-4d31-831a-2427216a0a02} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{39d37d53-eab9-4e04-9ac2-1d72f051590c} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e0e86956-ee02-43ab-b410-fd690c490adb} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{f13554a0-047e-4d0e-836f-1cbf1e265c28} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{39d37d53-eab9-4e04-9ac2-1d72f051590c} (Adware.Popups) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\rhc7f8j0eaaa (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\rhc7f8j0eaaa (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Software Notifier (Rogue.Multiple) -> Quarantined and deleted successfully.
Infizierte Registrierungswerte:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.SoftMate) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smrhc7f8j0eaaa (Rogue.Multiple) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lphc3f8j0eaaa (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow\*.starsdoor.com (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\Desktop\wallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\Desktop\originalwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\Desktop\convertedwallpaper (Hijack.Wallpaper) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\Desktop\scrnsave.exe (Hijack.Wallpaper) -> Quarantined and deleted successfully.
Infizierte Dateiobjekte der Registrierung:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System (Rootkit.DNSChanger) -> Data: kduxj.exe -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispBackgroundPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoDispScrSavPage (Hijack.DisplayProperties) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
Infizierte Verzeichnisse:
C:\Programme\Outerinfo (Adware.Outerinfo) -> Quarantined and deleted successfully.
C:\Programme\PeDevice (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\tmp (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa (Rogue.Multiple) -> Delete on reboot.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\HKCU (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\HKCU\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\HKLM (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\HKLM\RunOnce (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\StartMenuAllUsers (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Autorun\StartMenuCurrentUser (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\BrowserObjects (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Anwendungsdaten\rhc7f8j0eaaa\Quarantine\Packages (Rogue.Multiple) -> Quarantined and deleted successfully.
Infizierte Dateien:
C:\WINDOWS\system32\kduxj.exe (Rootkit.DNSChanger) -> Delete on reboot.
C:\WINDOWS\system32\aakvhyv.dll (Trojan.BHO) -> Quarantined and deleted successfully.
C:\Programme\Outerinfo\outerinfo.ico (Adware.Outerinfo) -> Quarantined and deleted successfully.
C:\Programme\Outerinfo\Terms.rtf (Adware.Outerinfo) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\communication.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\Domain.Watchlist.txt (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\pae-options.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\pae_url.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\PeDev.dll (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\PeDev.exe (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\pedevPS.dll (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\search.watchlist.txt (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\statistic.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\watchlist.xml (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\PeDevice\tmp\tmp.html (Adware.Popups) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\database.dat (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\license.txt (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\MFC71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\MFC71ENU.DLL (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\msvcp71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\msvcr71.dll (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\rhc7f8j0eaaa.exe (Rogue.Multiple) -> Delete on reboot.
C:\Programme\rhc7f8j0eaaa\rhc7f8j0eaaa.exe.local (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\Programme\rhc7f8j0eaaa\Uninstall.exe (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\drivers\svchost.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\blphc3f8j0eaaa.scr (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\lphc3f8j0eaaa.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\phc3f8j0eaaa.bmp (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\pphc3f8j0eaaa.exe (Trojan.FakeAlert) -> Delete on reboot.
C:\WINDOWS\system32\ClickToFindandFixErrors_RON.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\ClickToFindandFixErrors_RON_Intl.ico (Malware.Trace) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\NeoN\Anwendungsdaten\Microsoft\Internet Explorer\Quick Launch\Antivirus XP 2008.lnk (Rogue.Antivirus2008) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temp\.tt1.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temp\.tt4.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\****\Lokale Einstellungen\Temp\.ttE.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.