![]() |
| |||||||
Log-Analyse und Auswertung: Mein Trojan.Generic 3580153Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() |
| | #16 |
![]() ![]() ![]() ![]() | Mein Trojan.Generic 3580153 Hehe, hast Recht, war zu früh heute... 1. Hol dir RootRepeal . Starte RootRepeal. Beende alle anderen Programme, schalte AV-Wächter ab. Gehe auf Report. Klicke auf Scan. Setze alle Häkchen. Bestätige mit OK. Poste das Log. |
| | #17 |
![]() | Mein Trojan.Generic 3580153Code:
ATTFilter ROOTREPEAL (c) AD, 2007-2009
==================================================
Scan Start Time: 2010/04/18 12:41
Program Version: Version 1.3.5.0
Windows Version: Windows XP Media Center Edition SP3
==================================================
Drivers
-------------------
Name: klmdb.sys
Image Path: klmdb.sys
Address: 0xF7707000 Size: 31104 File Visible: No Signed: -
Status: -
Name: PCI_PNP0260
Image Path: \Driver\PCI_PNP0260
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -
Name: rootrepeal.sys
Image Path: C:\WINDOWS\system32\drivers\rootrepeal.sys
Address: 0xA5D8A000 Size: 49152 File Visible: No Signed: -
Status: -
Name: spgf.sys
Image Path: spgf.sys
Address: 0xF7293000 Size: 995328 File Visible: No Signed: -
Status: -
Name: sptd
Image Path: \Driver\sptd
Address: 0x00000000 Size: 0 File Visible: No Signed: -
Status: -
Name: tsk8F.tmp
Image Path: tsk8F.tmp
Address: 0xF71DE000 Size: 96512 File Visible: No Signed: -
Status: -
Hidden/Locked Files
-------------------
Path: C:\WINDOWS\system32\cfqrufu.dll.bak
Status: Locked to the Windows API!
Path: c:\dokumente und einstellungen\sascha\anwendungsdaten\mozilla\firefox\profiles\kkokuipl.default\sessionstore.js
Status: Size mismatch (API: 100357, Raw: 100699)
Path: c:\dokumente und einstellungen\sascha\lokale einstellungen\anwendungsdaten\mozilla\firefox\profiles\kkokuipl.default\cache\_cache_001_
Status: Size mismatch (API: 2065923, Raw: 2065332)
SSDT
-------------------
#: 041 Function Name: NtCreateKey
Status: Hooked by "Lbd.sys" at address 0xf74f787e
#: 071 Function Name: NtEnumerateKey
Status: Hooked by "spgf.sys" at address 0xf72acda4
#: 073 Function Name: NtEnumerateValueKey
Status: Hooked by "spgf.sys" at address 0xf72ad132
#: 119 Function Name: NtOpenKey
Status: Hooked by "spgf.sys" at address 0xf72940c0
#: 122 Function Name: NtOpenProcess
Status: Hooked by "C:\Programme\BitDefender\BitDefender 2009\bdselfpr.sys" at address 0xa6ec4c90
#: 128 Function Name: NtOpenThread
Status: Hooked by "C:\Programme\BitDefender\BitDefender 2009\bdselfpr.sys" at address 0xa6ec4d7e
#: 160 Function Name: NtQueryKey
Status: Hooked by "spgf.sys" at address 0xf72ad20a
#: 177 Function Name: NtQueryValueKey
Status: Hooked by "spgf.sys" at address 0xf72ad08a
#: 247 Function Name: NtSetValueKey
Status: Hooked by "Lbd.sys" at address 0xf74f7bfe
#: 257 Function Name: NtTerminateProcess
Status: Hooked by "C:\Programme\BitDefender\BitDefender 2009\bdselfpr.sys" at address 0xa6ec4bf4
#: 258 Function Name: NtTerminateThread
Status: Hooked by "C:\Programme\BitDefender\BitDefender 2009\bdselfpr.sys" at address 0xa6ec4ec4
Stealth Objects
-------------------
Object: Hidden Code [Driver: Ntfs, IRP_MJ_CREATE]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLOSE]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_READ]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_WRITE]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_EA]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_EA]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_CLEANUP]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_SECURITY]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_SET_QUOTA]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: Ntfs, IRP_MJ_PNP]
Process: System Address: 0x8a6031f8 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_CREATE]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_CLOSE]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_READ]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_WRITE]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_CLEANUP]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: UdfsЅ౨瑎晦܂Èੈ, IRP_MJ_PNP]
Process: System Address: 0x8a34e500 Size: 121
Object: Hidden Code [Driver: sys, IRP_MJ_CREATE]
Process: System Address: 0x89f381f8 Size: 121
Object: Hidden Code [Driver: sys, IRP_MJ_CLOSE]
Process: System Address: 0x89f381f8 Size: 121
Object: Hidden Code [Driver: sys, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x89f381f8 Size: 121
Object: Hidden Code [Driver: sys, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x89f381f8 Size: 121
Object: Hidden Code [Driver: sys, IRP_MJ_POWER]
Process: System Address: 0x89f381f8 Size: 121
Object: Hidden Code [Driver: sys, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x89f381f8 Size: 121
Object: Hidden Code [Driver: sys, IRP_MJ_PNP]
Process: System Address: 0x89f381f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_CREATE]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_CLOSE]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_READ]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_WRITE]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_SHUTDOWN]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_POWER]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: Cdrom, IRP_MJ_PNP]
Process: System Address: 0x89f5e1f8 Size: 121
Object: Hidden Code [Driver: USBSTOR, IRP_MJ_CREATE]
Process: System Address: 0x89f311f8 Size: 121
Object: Hidden Code [Driver: USBSTOR, IRP_MJ_CLOSE]
Process: System Address: 0x89f311f8 Size: 121
Object: Hidden Code [Driver: USBSTOR, IRP_MJ_READ]
Process: System Address: 0x89f311f8 Size: 121
Object: Hidden Code [Driver: USBSTOR, IRP_MJ_WRITE]
Process: System Address: 0x89f311f8 Size: 121
Object: Hidden Code [Driver: USBSTOR, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x89f311f8 Size: 121
Object: Hidden Code [Driver: USBSTOR, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x89f311f8 Size: 121
Object: Hidden Code [Driver: USBSTOR, IRP_MJ_POWER]
Process: System Address: 0x89f311f8 Size: 121
Object: Hidden Code [Driver: USBSTOR, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x89f311f8 Size: 121
Object: Hidden Code [Driver: USBSTOR, IRP_MJ_PNP]
Process: System Address: 0x89f311f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_CREATE]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_CLOSE]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_READ]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_WRITE]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_POWER]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: dmio, IRP_MJ_PNP]
Process: System Address: 0x8a6041f8 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_CREATE]
Process: System Address: 0x8a3891f8 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_CLOSE]
Process: System Address: 0x8a3891f8 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a3891f8 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a3891f8 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_POWER]
Process: System Address: 0x8a3891f8 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a3891f8 Size: 121
Object: Hidden Code [Driver: usbuhci, IRP_MJ_PNP]
Process: System Address: 0x8a3891f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CREATE]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_READ]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_WRITE]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SHUTDOWN]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_CLEANUP]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_POWER]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: Ftdisk, IRP_MJ_PNP]
Process: System Address: 0x8a6751f8 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_CREATE]
Process: System Address: 0x89ec3500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_CLOSE]
Process: System Address: 0x89ec3500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x89ec3500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x89ec3500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_CLEANUP]
Process: System Address: 0x89ec3500 Size: 121
Object: Hidden Code [Driver: NetBT, IRP_MJ_PNP]
Process: System Address: 0x89ec3500 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_CREATE]
Process: System Address: 0x89f431f8 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_CLOSE]
Process: System Address: 0x89f431f8 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x89f431f8 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x89f431f8 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_POWER]
Process: System Address: 0x89f431f8 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x89f431f8 Size: 121
Object: Hidden Code [Driver: usbehci, IRP_MJ_PNP]
Process: System Address: 0x89f431f8 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_NAMED_PIPE]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLOSE]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_READ]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_WRITE]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_INFORMATION]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_INFORMATION]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_EA]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_EA]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FLUSH_BUFFERS]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_VOLUME_INFORMATION]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_VOLUME_INFORMATION]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DIRECTORY_CONTROL]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_FILE_SYSTEM_CONTROL]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CONTROL]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_INTERNAL_DEVICE_CONTROL]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SHUTDOWN]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_LOCK_CONTROL]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CLEANUP]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_CREATE_MAILSLOT]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_SECURITY]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_SECURITY]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_POWER]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SYSTEM_CONTROL]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_DEVICE_CHANGE]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_QUERY_QUOTA]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_SET_QUOTA]
Process: System Address: 0x89f2f500 Size: 121
Object: Hidden Code [Driver: MRxSmb, IRP_MJ_PNP]
Process: System Address: 0x89f2f500 Size: 121
==EOF==
|
| | #18 | |
![]() ![]() ![]() ![]() | Mein Trojan.Generic 3580153 1. Hol dir Avenger
__________________Entpacke Avenger auf den Desktop. Starte Avenger. Setze unten beide Häkchen. Kopiere in das Skript-Feld rein: Zitat:
Neustart zulassen. Nach dem Neustart sollte ein Log eingeblendet werden, poste es. |
| | #19 |
![]() | Mein Trojan.Generic 3580153Code:
ATTFilter Logfile of The Avenger Version 2.0, (c) by Swandog46
hxxp://swandog46.geekstogo.com
Platform: Windows XP
*******************
Script file opened successfully.
Script file read successfully.
Backups directory opened successfully at C:\Avenger
*******************
Beginning to process script file:
Rootkit scan active.
No rootkits found!
Error: could not open file "C:\WINDOWS\system32\cfqrufu.dll.bak"
Deletion of file "C:\WINDOWS\system32\cfqrufu.dll.bak" failed!
Status: 0xc0000022 (STATUS_ACCESS_DENIED)
Error: registry key "\Registry\Machine\System\CurrentControlSet\Services\klmdb" not found!
Deletion of driver "klmdb" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist
Error: registry key "\Registry\Machine\System\CurrentControlSet\Services\tsk8F" not found!
Deletion of driver "tsk8F" failed!
Status: 0xc0000034 (STATUS_OBJECT_NAME_NOT_FOUND)
--> the object does not exist
Completed script processing.
*******************
Finished! Terminate.
|
| | #20 |
![]() ![]() ![]() ![]() | Mein Trojan.Generic 3580153 Heftiges Teil hast du dir da eingefangen... Hilft wohl nichts, Combofix muss ran. Ein Leitfaden und Tutorium zur Nutzung von ComboFix Den Leitfaden genau beachten und befolgen, ComboFix versteht kein Spaß. Poste anschließend das ComboFix-Log. |
| | #21 |
![]() | Mein Trojan.Generic 3580153Code:
ATTFilter ComboFix 10-04-17.07 - sascha 18.04.2010 18:38:30.1.2 - x86
Microsoft Windows XP Professional 5.1.2600.3.1252.49.1031.18.2046.1263 [GMT 2:00]
ausgeführt von:: c:\dokumente und einstellungen\sascha\Desktop\ComboFix.exe
AV: BitDefender Antivirus *On-access scanning disabled* (Updated) {6C4BB89C-B0ED-4F41-A29C-4373888923BB}
FW: BitDefender Firewall *disabled* {4055920F-2E99-48A8-A270-4243D2B8F242}
.
(((((((((((((((((((((((((((((((((((( Weitere Löschungen ))))))))))))))))))))))))))))))))))))))))))))))))
.
c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\FTFDHFHP\StartService.exe
c:\windows\eSellerateEngine.dll
c:\windows\system32\ActNAV_cltDynam.dat
c:\windows\system32\atiptaxx .exe
c:\windows\system32\cfqrufu.dll
c:\windows\system32\drivers\xliadnqr.sys
c:\windows\system32\drivers\zkstwsub.sys
c:\windows\system32\icdqctv.dll
c:\windows\system32\zcmpqciq.dll
D:\AUTORUN.INF
Infizierte Kopie von c:\windows\system32\drivers\ftdisk.sys wurde gefunden und desinfiziert
Kopie von - Kitty had a snack :p wurde wiederhergestellt
.
((((((((((((((((((((((((((((((((((((((( Treiber/Dienste )))))))))))))))))))))))))))))))))))))))))))))))))
.
-------\Legacy_JXHBWAMG
-------\Legacy_SSHNAS
-------\Legacy_ZKSTWSUB
-------\Service_jxhbwamg
-------\Service_zkstwsub
((((((((((((((((((((((( Dateien erstellt von 2010-03-18 bis 2010-04-18 ))))))))))))))))))))))))))))))
.
2010-04-15 21:33 . 2010-04-15 21:33 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Malwarebytes
2010-04-15 21:32 . 2010-03-29 13:24 38224 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2010-04-15 21:32 . 2010-04-15 21:32 -------- d-----w- c:\programme\Malwarebytes' Anti-Malware
2010-04-15 21:32 . 2010-04-15 21:32 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Malwarebytes
2010-04-15 21:32 . 2010-03-29 13:24 20824 ----a-w- c:\windows\system32\drivers\mbam.sys
2010-04-15 17:30 . 2010-04-15 17:30 -------- d-----w- c:\programme\Trend Micro
2010-04-14 20:55 . 2010-04-14 17:14 15880 ----a-w- c:\windows\system32\lsdelete.exe
2010-04-14 17:15 . 2010-02-04 15:53 64288 ----a-w- c:\windows\system32\drivers\Lbd.sys
2010-04-14 17:14 . 2010-04-14 17:14 95024 ----a-w- c:\windows\system32\drivers\SBREDrv.sys
2010-04-14 17:10 . 2010-04-14 17:10 -------- dc-h--w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\{74D08EB8-01D1-4BAE-91E3-F30C1B031AC6}
2010-04-14 17:10 . 2010-04-14 17:14 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Lavasoft
2010-04-14 17:10 . 2010-04-14 17:10 -------- d-----w- c:\programme\Lavasoft
2010-04-14 13:19 . 2010-04-14 13:19 -------- d-----w- c:\programme\Enigma Software Group
2010-04-14 13:17 . 2010-04-15 17:20 -------- d-----w- c:\windows\61D3AAE1D5214CD7939B37813DE8F955.TMP
2010-04-14 13:16 . 2010-04-14 13:16 -------- d-----w- c:\programme\Gemeinsame Dateien\Wise Installation Wizard
2010-04-14 12:53 . 2010-04-18 16:56 -------- d-----w- c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\FTFDHFHP
2010-04-12 16:46 . 2010-04-12 16:46 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\BitDefender
2010-04-11 17:44 . 2010-04-11 17:44 -------- d-----w- c:\dokumente und einstellungen\NetworkService\Tracing
2010-04-11 17:36 . 2010-04-11 17:36 -------- d-----w- c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\Symantec
2010-04-11 16:47 . 2010-04-11 21:10 -------- d-----w- c:\programme\DAEMON Tools Pro
2010-04-11 16:47 . 2010-04-11 17:33 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\DAEMON Tools Pro
2010-04-11 16:47 . 2010-04-11 16:47 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\DAEMON Tools Pro
2010-04-11 13:55 . 2010-04-11 13:55 -------- d-----r- c:\dokumente und einstellungen\NetworkService\Favoriten
2010-04-11 07:33 . 2010-04-11 17:05 654 ----a-w- c:\windows\eReg.dat
2010-04-10 18:49 . 2010-04-10 18:49 -------- d-----w- c:\programme\Intelore
2010-04-08 18:42 . 2010-04-08 18:42 -------- d-----w- c:\programme\Ulead Systems
2010-04-07 15:41 . 2010-04-07 15:41 -------- d-----w- c:\programme\Lavalys
2010-04-01 15:36 . 2010-04-01 15:36 -------- d-----w- c:\programme\Microsoft WSE
2010-03-26 16:29 . 2010-03-29 18:08 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Command and Conquer 4
2010-03-26 16:29 . 2010-03-26 16:29 -------- d-----w- c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\Electronic_Arts_Inc
2010-03-26 14:15 . 2010-04-03 18:17 708624 ----a-w- c:\dokumente und einstellungen\LocalService\Lokale Einstellungen\Anwendungsdaten\FontCache3.0.0.0.dat
2010-03-26 14:14 . 2010-03-26 14:17 -------- d-----w- c:\windows\system32\XPSViewer
2010-03-26 14:13 . 2010-03-26 14:13 -------- d-----w- c:\programme\Reference Assemblies
2010-03-21 08:55 . 2010-03-21 08:55 -------- d-----w- c:\programme\ARM Software
.
(((((((((((((((((((((((((((((((((((( Find3M Bericht ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-04-18 16:54 . 2008-11-09 16:21 81984 ----a-w- c:\windows\system32\bdod.bin
2010-04-17 21:51 . 2004-08-10 19:00 96512 ----a-w- c:\windows\system32\drivers\atapi.sys
2010-04-15 22:02 . 2009-07-28 22:59 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\vlc
2010-04-15 16:38 . 2008-12-24 09:54 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Google Updater
2010-04-13 22:21 . 2010-01-23 16:25 -------- d-----w- c:\programme\QuickTime
2010-04-13 05:20 . 2009-07-21 22:44 -------- d-----w- c:\programme\iTunes
2010-04-12 21:55 . 2008-08-12 16:40 242184 ----a-w- c:\windows\system32\drivers\bdfsfltr.sys
2010-04-12 21:55 . 2008-04-23 16:34 192512 ----a-w- c:\windows\system32\txmlutil.dll
2010-04-12 21:55 . 2008-08-14 16:54 104456 ----a-w- c:\windows\system32\drivers\bdfndisf.sys
2010-04-12 21:55 . 2008-08-12 16:40 111112 ----a-w- c:\windows\system32\drivers\bdfm.sys
2010-04-12 21:55 . 2008-07-02 11:07 82696 ----a-w- c:\windows\system32\drivers\BDVEDISK.sys
2010-04-12 21:26 . 2010-04-11 13:54 112 ----a-w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\vx1266MA.dat
2010-04-12 16:46 . 2009-01-14 14:19 -------- d-----w- c:\programme\BitDefender
2010-04-12 16:45 . 2009-01-14 14:18 -------- d-----w- c:\programme\Gemeinsame Dateien\BitDefender
2010-04-12 16:39 . 2010-02-04 19:06 -------- d-----w- c:\programme\NortonInstaller
2010-04-12 16:39 . 2009-10-25 10:49 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Norton
2010-04-12 16:35 . 2008-11-27 21:35 -------- d-----w- c:\programme\Gemeinsame Dateien\Symantec Shared
2010-04-11 20:27 . 2009-10-06 15:14 -------- d-----w- c:\programme\Stylish Profile
2010-04-11 17:04 . 2008-11-16 20:40 -------- d-----w- c:\programme\EA Sports
2010-04-11 16:47 . 2009-07-14 08:55 691696 ----a-w- c:\windows\system32\drivers\sptd.sys
2010-04-08 21:26 . 2010-04-08 21:26 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Ulead Systems
2010-04-08 21:26 . 2010-04-08 18:42 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Ulead Systems
2010-04-08 20:23 . 2008-11-09 13:01 85240 ----a-w- c:\dokumente und einstellungen\sascha\Lokale Einstellungen\Anwendungsdaten\GDIPFONTCACHEV1.DAT
2010-04-08 19:22 . 2009-06-16 22:18 -------- d-----w- c:\programme\Gemeinsame Dateien\DVDVideoSoft
2010-04-08 19:22 . 2009-06-16 22:18 -------- d-----w- c:\programme\DVDVideoSoft
2010-04-08 18:49 . 2010-04-08 18:49 -------- d-----w- c:\programme\Gemeinsame Dateien\SONY Digital Images
2010-04-08 18:49 . 2010-04-08 18:42 -------- d-----w- c:\programme\Gemeinsame Dateien\Ulead Systems
2010-04-08 18:47 . 2008-11-09 13:03 -------- d--h--w- c:\programme\InstallShield Installation Information
2010-04-08 18:47 . 2010-04-08 18:47 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\SmartSound Software Inc
2010-04-08 18:47 . 2010-04-08 18:47 -------- d-----w- c:\programme\SmartSound Software
2010-04-08 18:45 . 2010-04-08 18:45 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\QuickTime
2010-04-08 18:44 . 2010-04-08 18:44 -------- d-----w- c:\programme\Windows Media-Komponenten
2010-04-01 15:08 . 2008-11-16 21:13 -------- d-----w- c:\programme\Electronic Arts
2010-03-28 07:14 . 2004-08-10 19:00 85836 ----a-w- c:\windows\system32\perfc007.dat
2010-03-28 07:14 . 2004-08-10 19:00 462938 ----a-w- c:\windows\system32\perfh007.dat
2010-03-26 14:14 . 2008-11-09 13:18 -------- d-----w- c:\programme\MSBuild
2010-03-19 19:41 . 2009-06-23 08:09 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\gtk-2.0
2010-03-18 22:56 . 2009-07-07 20:09 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Skype
2010-03-18 15:06 . 2009-07-07 20:18 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\skypePM
2010-03-15 11:28 . 2010-03-15 11:28 -------- d-----w- c:\programme\dehmer
2010-03-13 20:40 . 2010-01-30 21:22 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Facebook
2010-02-25 13:05 . 2010-02-25 13:05 58204 ---ha-w- c:\windows\system32\mlfcache.dat
2010-02-24 15:38 . 2009-03-28 12:18 -------- d-----w- c:\dokumente und einstellungen\sascha\Anwendungsdaten\Move Networks
2010-02-18 18:13 . 2008-11-27 21:35 -------- d-----w- c:\programme\Norton Security Scan
2010-02-18 18:12 . 2010-02-18 18:12 -------- d-----w- c:\dokumente und einstellungen\All Users\Anwendungsdaten\Symantec
2010-01-24 13:57 . 2010-01-24 13:47 132 ----a-w- c:\windows\system32\rezumatenoi.dat
2010-04-12 21:55 . 2008-08-13 17:02 65536 ----a-w- c:\programme\mozilla firefox\components\FFComm.dll
.
|
| | #22 |
![]() ![]() ![]() ![]() | Mein Trojan.Generic 3580153 Auf Kitty ist Verlass. 1. Mach einen erneuten Suchlauf mit Malwarebytes. Denk ans Updaten. 2. Versuche einen erneuten Suchlauf mit Gmer. Sollte jetzt gehen. Lösche aber erst die alte Gmer-Datei und hol dir eine "frische". |
| | #23 |
![]() | Mein Trojan.Generic 3580153 Kann man das irgendwie einstellen dass GMER nicht automatisch nach dem Scan neustartet? Hab jetzt schon mehrfach mit GMER gescannt aber nicht alle ~3 Stunden abwarten können um wirklich den kompletten Log zu kopieren. Hier mal Malware Log von gestern Abend: Code:
ATTFilter Malwarebytes' Anti-Malware 1.45
www.malwarebytes.org
Datenbank Version: 4005
Windows 5.1.2600 Service Pack 3
Internet Explorer 7.0.5730.13
18.04.2010 22:10:25
ambam-log-2010-04-18 (22-10-25).txt
Art des Suchlaufs: Vollständiger Suchlauf (C:\|)
Durchsuchte Objekte: 292436
Laufzeit: 1 Stunde(n), 28 Minute(n), 20 Sekunde(n)
Infizierte Speicherprozesse: 0
Infizierte Speichermodule: 0
Infizierte Registrierungsschlüssel: 0
Infizierte Registrierungswerte: 0
Infizierte Dateiobjekte der Registrierung: 0
Infizierte Verzeichnisse: 0
Infizierte Dateien: 6
Infizierte Speicherprozesse:
(Keine bösartigen Objekte gefunden)
Infizierte Speichermodule:
(Keine bösartigen Objekte gefunden)
Infizierte Registrierungsschlüssel:
(Keine bösartigen Objekte gefunden)
Infizierte Registrierungswerte:
(Keine bösartigen Objekte gefunden)
Infizierte Dateiobjekte der Registrierung:
(Keine bösartigen Objekte gefunden)
Infizierte Verzeichnisse:
(Keine bösartigen Objekte gefunden)
Infizierte Dateien:
C:\Dokumente und Einstellungen\sascha\Eigene Dateien\TigerWoods PGA08\tw08\kaplan.odun\Tiger Woods PGA Tour 08\CRACK&SERIAL\keygen.exe (Trojan.Downloader) -> No action taken.
C:\Dokumente und Einstellungen\sascha\Eigene Dateien\E2004\UEFA EURO 2004\crack\EA Keygen.exe (Trojan.Orsam) -> No action taken.
C:\Dokumente und Einstellungen\sascha\Eigene Dateien\KW.DotNXT\KW\EA Games Generic Keygen 190.exe (Trojan.Orsam) -> No action taken.
C:\Programme\Gemeinsame Dateien\DVDVideoSoft\unins000.exe (Rogue.Installer) -> No action taken.
C:\Programme\DVDVideoSoft\Free YouTube Download\unins000.exe (Rogue.Installer) -> No action taken.
C:\System Volume Information\_restore{8E7F6492-B30F-4E74-BE00-F624172B868A}\RP6\A0012028.sys (Rootkit.Agent) -> No action taken.
|
| | #24 | |
![]() ![]() ![]() ![]() | Mein Trojan.Generic 3580153Zitat:
http://www.trojaner-board.de/51262-a...sicherung.html Du solltest in der Zukunft von der Benutzung solcher Sachen absehen - die sind nicht nur illegal, sondern auch in den meisten Fällen verseucht. Ich bin weg. |
| | #25 |
![]() | Mein Trojan.Generic 3580153 ok danke dennoch. |
![]() |
| Themen zu Mein Trojan.Generic 3580153 |
| ad-aware, bho, browser, defender, desktop, dringend, einstellungen, enigma, firefox, google, gupdate, hijack, hijackthis, hkus\s-1-5-18, internet, internet explorer, jusched.exe, mozilla, neu aufsetzen, plug-in, programm, security, security suite, senden, software, spyhunter 4, system, system 32, trojaner, uleadburninghelper, viren, virus, windows, windows xp |