Das hat jetzt eine Weile gedauert. Hier die Log:
Combofix Logfile:
Code:
Alles auswählen Aufklappen ATTFilter
ComboFix 12-02-17.02 - ASUS 18.02.2012 18:00:32.1.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.49.1031.18.3071.1987 [GMT 1:00]
ausgeführt von:: c:\users\ASUS\Desktop\ComboFix.exe
AV: AntiVir Desktop *Disabled/Updated* {090F9C29-64CE-6C6F-379C-5901B49A85B7}
SP: AntiVir Desktop *Disabled/Updated* {B26E7DCD-42F4-63E1-0D2C-6273CF1DCF0A}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((( Weitere Löschungen ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\program files\Common Files\ASPG_icon.ico
c:\programdata\Windows
c:\programdata\Windows\dsdd.dat
c:\programdata\Windows\nudr.dat
c:\windows\IsUn0407.exe
.
.
((((((((((((((((((((((( Dateien erstellt von 2012-01-18 bis 2012-02-18 ))))))))))))))))))))))))))))))
.
.
2012-02-18 17:21 . 2012-02-18 17:21 -------- d-----w- c:\users\ASUS\AppData\Local\temp
2012-02-18 17:21 . 2012-02-18 17:21 -------- d-----w- c:\users\Jessy\AppData\Local\temp
2012-02-18 17:21 . 2012-02-18 17:21 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-02-18 15:26 . 2012-02-18 15:26 -------- d-----w- C:\dvmexp
2012-02-17 20:01 . 2012-02-17 20:01 -------- d-----w- C:\found.000
2012-02-17 17:31 . 2012-01-06 04:19 6557240 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{85633861-5D67-4D0A-A5D2-A0F777FED96A}\mpengine.dll
2012-02-16 01:23 . 2012-02-17 20:18 -------- d-----w- c:\users\ASUS\AppData\Roaming\Lyamuh
2012-02-16 01:23 . 2012-02-16 13:53 -------- d-----w- c:\users\ASUS\AppData\Roaming\Duul
2012-02-13 22:40 . 2008-07-07 04:20 224016 ----a-w- c:\windows\system32\tabctl32.ocx
2012-02-13 22:40 . 2008-07-07 04:20 152848 ----a-w- c:\windows\system32\comdlg32.ocx
2012-02-13 22:40 . 2008-07-07 04:20 119808 ----a-w- c:\windows\system32\msstdfmt.dll
2012-02-13 22:40 . 2008-07-07 04:20 1081616 ----a-w- c:\windows\system32\mscomctl.ocx
2012-02-13 22:40 . 2012-02-14 01:26 -------- d-----w- c:\program files\iMacros
2012-02-09 16:51 . 2012-02-17 21:35 -------- d-----w- c:\users\ASUS\AppData\Local\PokerStars
2012-02-09 16:50 . 2012-02-10 08:11 -------- d-----w- c:\program files\PokerStars
.
.
.
(((((((((((((((((((((((((((((((((((( Find3M Bericht ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-02-18 15:26 . 2011-03-03 13:48 45056 ----a-w- c:\windows\system32\acovcnt.exe
2012-02-16 00:24 . 2011-08-06 19:50 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-01-26 23:21 . 2011-04-25 11:36 237072 ------w- c:\windows\system32\MpSigStub.exe
2011-12-10 14:24 . 2011-06-03 20:36 20464 ----a-w- c:\windows\system32\drivers\mbam.sys
2011-11-25 15:59 . 2012-01-11 19:51 376320 ----a-w- c:\windows\system32\winsrv.dll
2008-08-08 22:48 . 2008-08-08 22:48 90112 ----a-w- c:\program files\Common Files\CPInstallAction.dll
2012-02-17 19:54 . 2011-04-01 20:57 134104 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
(((((((((((((((((((((((((((( Autostartpunkte der Registrierung ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt.
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-08-24 113024]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\!SASWinLogon]
2009-09-03 22:21 548352 ----a-w- c:\program files\SUPERAntiSpyware\SASWINLO.DLL
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [2011-08-24 116608]
.
.
.
------- Zusätzlicher Suchlauf -------
.
uStart Page = hxxp://www.google.de/
TCP: DhcpNameServer = 193.189.244.206 193.189.244.225
TCP: Interfaces\{9D21917B-13E3-480F-B124-E38DF509530B}: NameServer = 208.67.222.222,208.67.220.220
FF - ProfilePath - c:\users\ASUS\AppData\Roaming\Mozilla\Firefox\Profiles\m3coibkm.default\
FF - prefs.js: browser.startup.homepage - about :home
FF - prefs.js: keyword.URL - hxxp://www.google.com/search?sourceid=navclient&hl=de&q=
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
FF - user.js: security.warn_viewing_mixed - false
FF - user.js: security.warn_viewing_mixed.show_once - false
FF - user.js: security.warn_submit_insecure - false
FF - user.js: security.warn_submit_insecure.show_once - false
.
- - - - Entfernte verwaiste Registrierungseinträge - - - -
.
AddRemove-Adobe Photoshop 7.0 - c:\windows\ISUN0407.EXE
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, GMER - Rootkit Detector and Remover
Rootkit scan 2012-02-18 18:21
Windows 6.0.6002 Service Pack 2 NTFS
.
Scanne versteckte Prozesse...
.
Scanne versteckte Autostarteinträge...
.
Scanne versteckte Dateien...
.
Scan erfolgreich abgeschlossen
versteckte Dateien: 0
.
**************************************************************************
.
Stealth MBR rootkit/Mebroot/Sinowal/TDL4 detector 0.4.2 by Gmer, GMER - Rootkit Detector and Remover
Windows 6.0.6002 Disk: ST9250320AS rev.0303 -> Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-1
.
device: opened successfully
user: MBR read successfully
kernel: MBR read successfully
user != kernel MBR !!!
.
**************************************************************************
.
--------------------- Gesperrte Registrierungsschluessel ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0004\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0005\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0006\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Zeit der Fertigstellung: 2012-02-18 18:23:43
ComboFix-quarantined-files.txt 2012-02-18 17:23
.
Vor Suchlauf: 6 Verzeichnis(se), 59.965.771.776 Bytes frei
Nach Suchlauf: 13 Verzeichnis(se), 60.956.827.648 Bytes frei
.
- - End Of File - - 6FDCDFE21B7BABC147091D38E28EA987
--- --- ---