hallo
habe mir den vundo.gen Virus eingefangen, und versuche nach der Anleitung vorzugehen:
habe zuerst den CCleaner angewandt.
danach Malwarebytes einen kompletten Scan durchlaufen lassen und alle Funde gelöscht.
Logdatei:
Malwarebytes' Anti-Malware 1.31
Datenbank Version: 1460
Windows 5.1.2600 Service Pack 2
04.12.2008 21:21:33
mbam-log-2008-12-04 (21-21-33).txt
Scan-Methode: Vollständiger Scan (C:\|E:\|F:\|)
Durchsuchte Objekte: 283827
Laufzeit: 46 minute(s), 51 second(s)
Infizierte Speicherprozesse: 0
Infizierte Speichermodule: 0
Infizierte Registrierungsschlüssel: 14
Infizierte Registrierungswerte: 3
Infizierte Dateiobjekte der Registrierung: 0
Infizierte Verzeichnisse: 0
Infizierte Dateien: 9
Infizierte Speicherprozesse:
(Keine bösartigen Objekte gefunden)
Infizierte Speichermodule:
(Keine bösartigen Objekte gefunden)
Infizierte Registrierungsschlüssel:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\rqribywt (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{f62817df-b094-4ac5-8620-f858cefdfcf1} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{f62817df-b094-4ac5-8620-f858cefdfcf1} (Trojan.Vundo.H) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\xpre (Trojan.Downloader) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\contim (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\instkey (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Track System (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
Infizierte Registrierungswerte:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{6d794cb4-c7cd-4c6f-bfdc-9b77afbdc02c} (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\Microsoft (Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft (Backdoor.Bot) -> Quarantined and deleted successfully.
Infizierte Dateiobjekte der Registrierung:
(Keine bösartigen Objekte gefunden)
Infizierte Verzeichnisse:
(Keine bösartigen Objekte gefunden)
Infizierte Dateien:
C:\WINDOWS\system32\rqRIbywt.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\eenxyg.dll (Trojan.Vundo.H) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{36F0C391-D442-44F4-99F8-AEAC5FC30917}\RP385\A0138174.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{36F0C391-D442-44F4-99F8-AEAC5FC30917}\RP385\A0138175.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{36F0C391-D442-44F4-99F8-AEAC5FC30917}\RP385\A0138176.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
E:\Music\Sammlungen\emule\Sony Vegas 5.0 and DVDArchitect 2+ Keygen\Sony Vegas 5.0 and DVDArchitect 2+ Keygen\Vegas5_Keygen.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
E:\Music\Sammlungen\emule\Sony.Vegas.v5.0a.and.Sony.DVD.Achitect.v2.0.Incl.Keygens-RENEGADE\Vegas5_keygen.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
E:\Programme\Sony Vegas 7 + DVD Architect 4\DVD Architect 4.0.125\Sony DVD Architect v4.0 Keygen.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
E:\Programme\Sony Vegas 7 + DVD Architect 4\Vegas 7.0a\Sony Vegas v7.0a Keygen.exe (Trojan.Downloader) -> Quarantined and deleted successfully.
Danach den WindowsScan durchgeführt.
Logdatei:
Die 30 neuesten Dateien im Ordner Windows:
***** ***** ***** ***** *****
***** Scanning C:\WINDOWS *****
***** ***** ***** ***** *****
04.12.2008 wiadebug.log 19 24:159
04.12.2008 wiaservc.log 19 24:50
04.12.2008 bootstat.dat 19 24:2.048
04.12.2008 SchedLgU.Txt 19 11:32.630
04.12.2008 win.ini 18 58:614
04.12.2008 system.ini 18 58:227
04.12.2008 NeroDigital.ini 18 00:116
04.12.2008 HCWPNP.INI 08 58:6.363
30.11.2008 psnetwork.ini 17 02:865
30.11.2008 Powerplayer.ini 17 02:1.028
30.11.2008 PPSMediaList.ini 17 02:113
30.11.2008 msgtn.ini 17 02:29
23.11.2008 setupapi.log.0.old 23 05:1.058.001
19.11.2008 QTFont.qfn 14 41:54.156
19.11.2008 PCDNSetting.ini 14 25:43
09.11.2008 gswin32.ini 16 46:43
19.10.2008 vtplus32.ini 17 39:399
19.10.2008 Irremote.ini 17 39:32.135
19.10.2008 ODBC.INI 17 38:507
19.10.2008 ODBCINST.INI 17 38:4.161
15.10.2008 oodcnt.INI 09 05:0
13.10.2008 QTFont.for 20 28:1.409
04.10.2008 disney.ini 10 49:940
01.10.2008 PhotoSnapViewer.INI 13 17:151
27.08.2008 BRPP2KA.INI 13 51:27
27.08.2008 BRWMARK.INI 13 51:425
01.07.2008 War3Unin.dat 21 35:163.194
Die 50 neuesten Dateien im Ordner Windows\system32:
***** ***** ***** ***** *****
***** Scanning C:\WINDOWS\system32 *****
***** ***** ***** ***** *****
04.12.2008 perfh009.dat 19 28:448.462
04.12.2008 perfh007.dat 19 28:463.834
04.12.2008 perfc009.dat 19 28:75.040
04.12.2008 perfc007.dat 19 28:87.086
04.12.2008 PerfStringBackup.INI 19 28:1.089.164
04.12.2008 nvapps.xml 19 24:191.909
04.12.2008 wpa.dbl 19 24:13.646
04.12.2008 oodbs.lor 19 24:95.775
04.12.2008 QXIRBJlm.ini 18 56:542.075
04.12.2008 QXIRBJlm.ini2 18 54:542.075
04.12.2008 eegwdeuc.ini 00 14:1.450.703
04.12.2008 530e97d8-.txt 00 11:0
24.11.2008 FNTCACHE.DAT 08 51:291.680
21.11.2008 winaj77.dll 20 15:401.408
19.10.2008 HCW_ChanDB.LOG 17 38:50.988
17.09.2008 nvcpl.cpl 08 55:420.384
17.09.2008 nvcpl.dll 08 55:13.574.144
17.09.2008 nvcplui.exe 08 55:797.216
17.09.2008 nvsvc32.exe 08 55:163.908
17.09.2008 nvtuicpl.cpl 08 55:73.728
17.09.2008 nvudisp.exe 08 55:453.152
17.09.2008 nvrshe.dll 08 55:331.776
17.09.2008 nvvitvs.dll 08 55:3.764.224
17.09.2008 nvrszht.dll 08 55:122.880
17.09.2008 nvcpluir.dll 08 55:1.108.512
17.09.2008 nvcuda.dll 08 55:1.368.064
17.09.2008 nvrshu.dll 08 55:258.048
17.09.2008 nvdisp.nvu 08 55:18.394
17.09.2008 nvrszhc.dll 08 55:225.280
17.09.2008 nvapps.nvb 08 55:201.050
17.09.2008 nvrsit.dll 08 55:278.528
17.09.2008 nvcolor.exe 08 55:143.360
17.09.2008 nvappbar.exe 08 55:449.056
17.09.2008 nvrsfr.dll 08 55:282.624
17.09.2008 nvrsfi.dll 08 55:249.856
17.09.2008 nvrsesm.dll 08 55:274.432
17.09.2008 nvrses.dll 08 55:282.624
17.09.2008 nvvitvsr.dll 08 55:4.149.248
17.09.2008 nvwddi.dll 08 55:81.920
17.09.2008 nvrseng.dll 08 55:245.760
17.09.2008 nvwdmcpl.dll 08 55:1.724.416
17.09.2008 nvshell.dll 08 55:466.944
17.09.2008 nvrsel.dll 08 55:282.624
17.09.2008 nvcodins.dll 08 55:122.880
17.09.2008 nvdspsch.exe 08 55:1.346.080
17.09.2008 nvwimg.dll 08 55:1.101.824
17.09.2008 nvwrsar.dll 08 55:282.624
***** ***** ***** ***** *****
***** Scanning C:\WINDOWS\system32\drivers\etc\hosts *****
***** ***** ***** ***** *****
# Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
127.0.0.1 localhost
81.31.239.161 paypal.com
***** ***** ***** ***** *****
***** Scanning Processe *****
***** ***** ***** ***** *****
Abbildname PID Sitzungsname Sitz.-Nr. Speichernutzung
========================= ===== ================ ========== ===============
System Idle Process 0 Console 0 28 K
System 4 Console 0 260 K
smss.exe 908 Console 0 724 K
csrss.exe 1000 Console 0 6.580 K
winlogon.exe 1028 Console 0 16.092 K
services.exe 1072 Console 0 4.156 K
lsass.exe 1084 Console 0 1.372 K
svchost.exe 1260 Console 0 5.192 K
svchost.exe 1324 Console 0 4.364 K
svchost.exe 1444 Console 0 32.052 K
svchost.exe 1484 Console 0 3.388 K
svchost.exe 1532 Console 0 3.340 K
svchost.exe 1684 Console 0 7.088 K
spoolsv.exe 1848 Console 0 7.264 K
avguard.exe 1896 Console 0 9.572 K
explorer.exe 324 Console 0 61.216 K
avgnt.exe 436 Console 0 1.040 K
TrueImageMonitor.exe 460 Console 0 4.392 K
TimounterMonitor.exe 540 Console 0 5.888 K
schedhlp.exe 548 Console 0 2.260 K
RTHDCPL.exe 572 Console 0 23.336 K
SSMMgr.exe 636 Console 0 3.080 K
rundll32.exe 644 Console 0 3.560 K
ctfmon.exe 1564 Console 0 3.732 K
daemon.exe 1572 Console 0 10.148 K
schedul2.exe 1716 Console 0 2.452 K
sched.exe 532 Console 0 1.776 K
FileZilla server.exe 704 Console 0 2.700 K
kavsvc.exe 732 Console 0 26.728 K
nvsvc32.exe 816 Console 0 4.396 K
oodag.exe 836 Console 0 5.412 K
PnkBstrA.exe 888 Console 0 2.440 K
PnkBstrB.exe 996 Console 0 2.616 K
klswd.exe 412 Console 0 1.000 K
svchost.exe 1612 Console 0 4.868 K
alg.exe 2452 Console 0 3.572 K
svchost.exe 3124 Console 0 3.536 K
rundll32.exe 2832 Console 0 2.608 K
Skype.exe 2760 Console 0 47.812 K
notepad.exe 3368 Console 0 3.384 K
firefox.exe 1676 Console 0 94.056 K
mbam.exe 2480 Console 0 28.604 K
PowerDVD.exe 2460 Console 0 49.692 K
notepad.exe 2960 Console 0 3.392 K
cmd.exe 768 Console 0 1.776 K
tasklist.exe 3592 Console 0 4.352 K
wmiprvse.exe 628 Console 0 5.544 K
Microsoft Windows XP [Version 5.1.2600]
http://www.paules-pc-forum.de
***** Malware Team *****
***** Ende des Scans 04.12.2008 um 21:24:08,12 ***
Cyrus1932 Gast |