|
Log-Analyse und Auswertung: Exploit.Java.CVE-2012-0507.fbWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
15.05.2012, 15:58 | #1 |
| Exploit.Java.CVE-2012-0507.fb Hallo zusammen, ein Freund hatte vor einiger Zeit bzw. hat einen BKA Trojaner auf seinem Rechner (Rechner gesperrt etc.). Komisch ist nur, dass er sich mir nicht zeigen will. Rechner läuft soweit! Microsoft Security Essentials lieferte Funde, die ich entfernt habe. Malwarebytes und ESET konnten nichts finden, dafür allerdings die Kaspersky Rescue Disk 10, trotz Entfernung der Viren/Trojaner durch Essentials. Leider ist die Option "desinfizieren" nicht möglich. Wie bekomme ich diese elendichen Trojaner vom Rechner? Logfiles aller Scans im Anhang Das System: Windows 7 Home Premium (Service Pack 1) 64 Bit-Betriebssystem Prozessor: Intel(R) Atom(TM) CPU D525 P.S.: Sorry, falls ich was falsch gemacht hab oder etwas vergessen habe. Kenne mich mit Rechnern zwar etwas besser aus, als der Durchschnittsuser, bin aber in diesem Bereich newbie ;-) |
17.05.2012, 18:51 | #2 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Exploit.Java.CVE-2012-0507.fb Malwarebytes erstellt bei jedem Scanvorgang genau ein Log. Hast du in der Vergangenheit schonmal mit Malwarebytes gescannt?
__________________Wenn ja dann stehen auch alle Logs zu jedem Scanvorgang im Reiter Logdateien. Bitte alle posten, die dort sichtbar sind.
__________________ |
17.05.2012, 19:46 | #3 |
| Exploit.Java.CVE-2012-0507.fb Ist das ertse Mal überhaupt, dass ich mit Trojanern zu tun habe und habe zuvor noch nie mit Malwarebytes gescannt.
__________________Die einzigen Infos lieferte Kaspersky. Mein eigener Rechner ist durch Firewall und Antivirusscanner geschützt und ich selber achte auf mein Surfverhalten, daher bin ich da totaler newbie. Der Infizierte Rechner gehört einem Bekannten, der gerade so eine Maus und Tastatur bedienen kann ;-) |
17.05.2012, 19:49 | #4 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Exploit.Java.CVE-2012-0507.fb Hätte da mal zwei Fragen bevor es weiter geht 1.) Geht der normale Modus uneingeschränkt? 2.) Vermisst du irgendwas im Startmenü? Sind da leere Ordner unter alle Programme oder ist alles vorhanden?
__________________ Logfiles bitte immer in CODE-Tags posten |
17.05.2012, 20:03 | #5 |
| Exploit.Java.CVE-2012-0507.fb Zu 1.) Seit dem ich den Rechner angemacht habe, ging alles. Beim ersten mal, hat er etwas länger zum hochfahren gebraucht und direkt den Internet Explorer geöffnet. Hat dann auch den Taskmanager nicht gleich geöffnet, sondern nur beim Herunterfahren bzw. Neustarten. Ab dann ging alles einwandfrei. Bevor ich den Rechner das erste mal angemacht habe, kam laut Aussage der Besitzers der BKA Trojaner zum Vorschein und nichts ging, aber das konnte ich leider nicht live miterleben. Zu 2.) Da ich den Zustand davor nicht kannte, kann ich dazu nicht viel sagen. Die Ordner die im Moment da sind, besitzen alle Dateien (exe, read me´s usw.) außer der Ordner Autostart, der ist leer. Ich habe aber gerade auf dem Desktop eine Verknüpfung entdeckt. Die heißt Browserwahl und ist mit folgendem Pfad verknüpft: C:\Windows\System32\browserchoice.exe /launch |
17.05.2012, 21:48 | #6 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Exploit.Java.CVE-2012-0507.fb Mach bitte ein neues OTL-Log. Bitte alles nach Möglichkeit hier in CODE-Tags posten. Wird so gemacht: [code] hier steht das Log [/code] Und das ganze sieht dann so aus: Code:
ATTFilter hier steht das Log Falls noch nicht vorhanden, lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop
Code:
ATTFilter netsvcs msconfig safebootminimal safebootnetwork activex drivers32 %ALLUSERSPROFILE%\Application Data\*. %ALLUSERSPROFILE%\Application Data\*.exe /s %APPDATA%\*. %APPDATA%\*.exe /s %SYSTEMDRIVE%\*.exe /md5start wininit.exe userinit.exe eventlog.dll scecli.dll netlogon.dll cngaudit.dll ws2ifsl.sys sceclt.dll ntelogon.dll winlogon.exe logevent.dll user32.DLL iaStor.sys nvstor.sys atapi.sys IdeChnDr.sys viasraid.sys AGP440.sys vaxscsi.sys nvatabus.sys viamraid.sys nvata.sys nvgts.sys iastorv.sys ViPrt.sys eNetHook.dll ahcix86.sys KR10N.sys nvstor32.sys ahcix86s.sys /md5stop %systemroot%\system32\drivers\*.sys /lockedfiles %systemroot%\System32\config\*.sav %systemroot%\*. /mp /s %systemroot%\system32\*.dll /lockedfiles CREATERESTOREPOINT
__________________ --> Exploit.Java.CVE-2012-0507.fb |
17.05.2012, 22:48 | #7 |
| Exploit.Java.CVE-2012-0507.fb Erstmal vielen Dank vorab für die bereits investierte Zeit und die Hilfe! Hier der OTL-Log: OTL Logfile: Code:
ATTFilter OTL logfile created on: 17.05.2012 23:18:21 - Run 1 OTL by OldTimer - Version 3.2.43.0 Folder = D:\Eigene Dateien\Desktop 64bit- Ultimate Edition Service Pack 1 (Version = 6.1.7601) - Type = NTWorkstation Internet Explorer (Version = 9.0.8112.16421) Locale: 00000407 | Country: Deutschland | Language: DEU | Date Format: dd.MM.yyyy 1,99 Gb Total Physical Memory | 1,25 Gb Available Physical Memory | 62,83% Memory free 3,98 Gb Paging File | 3,05 Gb Available in Paging File | 76,72% Paging File free Paging file location(s): ?:\pagefile.sys [binary data] %SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files (x86) Drive C: | 97,56 Gb Total Space | 68,31 Gb Free Space | 70,02% Space Free | Partition Type: NTFS Drive D: | 368,10 Gb Total Space | 367,78 Gb Free Space | 99,91% Space Free | Partition Type: NTFS Computer Name: SCHULLER-PC | User Name: Schuller | Logged in as Administrator. Boot Mode: Normal | Scan Mode: All users | Quick Scan | Include 64bit Scans Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days ========== Processes (SafeList) ========== PRC - [2012.05.17 23:15:05 | 000,595,456 | ---- | M] (OldTimer Tools) -- D:\Eigene Dateien\Desktop\OTL.exe PRC - [2012.04.04 15:56:40 | 000,654,408 | ---- | M] (Malwarebytes Corporation) -- C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe PRC - [2012.01.03 15:10:42 | 000,063,928 | ---- | M] (Adobe Systems Incorporated) -- C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe ========== Modules (No Company Name) ========== ========== Win32 Services (SafeList) ========== SRV - [2012.05.06 12:49:29 | 000,257,696 | ---- | M] (Adobe Systems Incorporated) [On_Demand | Stopped] -- C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe -- (AdobeFlashPlayerUpdateSvc) SRV - [2012.04.04 15:56:40 | 000,654,408 | ---- | M] (Malwarebytes Corporation) [Auto | Running] -- C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe -- (MBAMService) SRV - [2012.03.26 18:49:56 | 000,291,696 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Programme\Microsoft Security Client\NisSrv.exe -- (NisSrv) SRV - [2012.03.26 18:49:56 | 000,012,600 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Programme\Microsoft Security Client\MsMpEng.exe -- (MsMpSvc) SRV - [2012.01.03 15:10:42 | 000,063,928 | ---- | M] (Adobe Systems Incorporated) [Auto | Running] -- C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe -- (AdobeARMservice) SRV - [2010.03.18 14:16:28 | 000,130,384 | ---- | M] (Microsoft Corporation) [Auto | Stopped] -- C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -- (clr_optimization_v4.0.30319_32) SRV - [2009.06.10 23:23:09 | 000,066,384 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe -- (clr_optimization_v2.0.50727_32) ========== Driver Services (SafeList) ========== DRV:64bit: - [2012.04.04 15:56:40 | 000,024,904 | ---- | M] (Malwarebytes Corporation) [File_System | On_Demand | Running] -- C:\Windows\SysNative\drivers\mbam.sys -- (MBAMProtector) DRV:64bit: - [2012.03.20 20:44:12 | 000,098,688 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\NisDrvWFP.sys -- (NisDrv) DRV:64bit: - [2012.03.01 08:46:16 | 000,023,408 | ---- | M] (Microsoft Corporation) [Recognizer | Boot | Unknown] -- C:\Windows\SysNative\drivers\fs_rec.sys -- (Fs_Rec) DRV:64bit: - [2011.06.27 02:37:00 | 002,753,536 | ---- | M] (Atheros Communications, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\athrx.sys -- (athr) DRV:64bit: - [2011.03.11 08:41:12 | 000,107,904 | ---- | M] (Advanced Micro Devices) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\amdsata.sys -- (amdsata) DRV:64bit: - [2011.03.11 08:41:12 | 000,027,008 | ---- | M] (Advanced Micro Devices) [Kernel | Boot | Running] -- C:\Windows\SysNative\drivers\amdxata.sys -- (amdxata) DRV:64bit: - [2010.11.20 15:33:35 | 000,078,720 | ---- | M] (Hewlett-Packard Company) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\HpSAMD.sys -- (HpSAMD) DRV:64bit: - [2010.11.20 13:07:05 | 000,059,392 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\TsUsbFlt.sys -- (TsUsbFlt) DRV:64bit: - [2010.10.25 05:13:06 | 006,180,480 | ---- | M] (Intel Corporation) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\igdkmd64.sys -- (igfx) DRV:64bit: - [2009.08.13 11:10:42 | 000,112,240 | ---- | M] (JMicron Technology Corp.) [Kernel | Boot | Running] -- C:\Windows\SysNative\drivers\jraid.sys -- (JRAID) DRV:64bit: - [2009.07.14 03:52:20 | 000,194,128 | ---- | M] (AMD Technologies Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\amdsbs.sys -- (amdsbs) DRV:64bit: - [2009.07.14 03:48:04 | 000,065,600 | ---- | M] (LSI Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\lsi_sas2.sys -- (LSI_SAS2) DRV:64bit: - [2009.07.14 03:45:55 | 000,024,656 | ---- | M] (Promise Technology) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\stexstor.sys -- (stexstor) DRV:64bit: - [2009.06.10 22:34:33 | 003,286,016 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\evbda.sys -- (ebdrv) DRV:64bit: - [2009.06.10 22:34:28 | 000,468,480 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\bxvbda.sys -- (b06bdrv) DRV:64bit: - [2009.06.10 22:34:23 | 000,270,848 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\b57nd60a.sys -- (b57nd60a) DRV:64bit: - [2009.06.10 22:31:59 | 000,031,232 | ---- | M] (Hauppauge Computer Works, Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\hcw85cir.sys -- (hcw85cir) DRV:64bit: - [2009.03.02 00:05:32 | 000,187,392 | ---- | M] (Realtek Corporation ) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\Rt64win7.sys -- (RTL8167) DRV - [2009.07.14 03:19:10 | 000,019,008 | ---- | M] (Microsoft Corporation) [File_System | On_Demand | Stopped] -- C:\Windows\SysWOW64\drivers\wimmount.sys -- (WIMMount) ========== Standard Registry (SafeList) ========== ========== Internet Explorer ========== IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE:64bit: - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://www.google.com/ie IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Search Bar = hxxp://www.google.com/ie IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = hxxp://www.google.com IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.google.com/ IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://de.msn.com/?ocid=iehp IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de-DE IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 3F CB EA BC 1D C7 CC 01 [binary data] IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\SOFTWARE\Microsoft\Internet Explorer\Search,Default_Search_URL = hxxp://www.google.com/ie IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant = hxxp://www.google.com/ie IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\..\SearchScopes,DefaultScope = {19EF8F2D-62EF-43AD-AEFB-C1BC6DBA20AF} IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\..\SearchScopes\{19EF8F2D-62EF-43AD-AEFB-C1BC6DBA20AF}: "URL" = hxxp://www.google.com/search?q={searchTerms}&sourceid=ie7&rls=com.microsoft:en-US&ie=utf8&oe=utf8 IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = hxxp://www.google.com/search?q={sear IE - HKU\S-1-5-21-3891951520-3749806752-3258455948-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 ========== FireFox ========== FF - user.js - File not found FF:64bit: - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\system32\Macromed\Flash\NPSWF64_11_2_202_235.dll File not found FF:64bit: - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.) FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_2_202_235.dll () FF - HKLM\Software\MozillaPlugins\@Google.com/GoogleEarthPlugin: C:\Program Files (x86)\Google\Google Earth\plugin\npgeplugin.dll (Google) FF - HKLM\Software\MozillaPlugins\@google.com/npPicasa3,version=3.0.0: C:\Program Files (x86)\Google\Picasa3\npPicasa3.dll (Google, Inc.) FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.) FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: C:\Program Files (x86)\Microsoft Silverlight\4.1.10329.0\npctrl.dll ( Microsoft Corporation) FF - HKLM\Software\MozillaPlugins\@microsoft.com/OfficeLive,version=1.5: C:\Program Files (x86)\Microsoft\Office Live\npOLW.dll (Microsoft Corp.) FF - HKLM\Software\MozillaPlugins\Adobe Reader: C:\Program Files (x86)\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.) FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 11.0\extensions\\Components: C:\Program Files (x86)\Mozilla Firefox\components [2012.03.29 18:46:15 | 000,000,000 | ---D | M] FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 11.0\extensions\\Plugins: C:\Program Files (x86)\Mozilla Firefox\plugins [2011.11.24 15:24:57 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Schuller\AppData\Roaming\mozilla\Extensions [2012.05.04 10:04:02 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Schuller\AppData\Roaming\mozilla\Firefox\Profiles\74gyen10.default\extensions [2012.02.09 11:23:11 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files (x86)\mozilla firefox\extensions [2012.02.09 11:23:11 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files (x86)\mozilla firefox\distribution\extensions [2012.02.09 11:23:11 | 000,000,000 | ---D | M] (WEB.DE Toolbar) -- C:\Program Files (x86)\mozilla firefox\distribution\extensions\toolbar@web.de [2012.05.04 10:04:02 | 000,570,013 | ---- | M] () (No name found) -- C:\USERS\SCHULLER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\74GYEN10.DEFAULT\EXTENSIONS\TOOLBAR@WEB.DE.XPI [2012.03.29 18:46:14 | 000,097,208 | ---- | M] (Mozilla Foundation) -- C:\Program Files (x86)\mozilla firefox\components\browsercomps.dll [2012.03.29 18:46:08 | 000,001,392 | ---- | M] () -- C:\Program Files (x86)\mozilla firefox\searchplugins\amazondotcom-de.xml [2012.03.29 18:46:08 | 000,002,252 | ---- | M] () -- C:\Program Files (x86)\mozilla firefox\searchplugins\bing.xml [2012.03.29 18:46:08 | 000,001,153 | ---- | M] () -- C:\Program Files (x86)\mozilla firefox\searchplugins\eBay-de.xml [2012.03.29 18:46:08 | 000,006,805 | ---- | M] () -- C:\Program Files (x86)\mozilla firefox\searchplugins\leo_ende_de.xml [2012.03.29 18:46:08 | 000,001,178 | ---- | M] () -- C:\Program Files (x86)\mozilla firefox\searchplugins\wikipedia-de.xml [2012.03.29 18:46:08 | 000,001,105 | ---- | M] () -- C:\Program Files (x86)\mozilla firefox\searchplugins\yahoo-de.xml O1 HOSTS File: ([2009.06.10 23:00:26 | 000,000,824 | ---- | M]) - C:\Windows\SysNative\drivers\etc\hosts O4:64bit: - HKLM..\Run: [HotKeysCmds] C:\Windows\SysNative\hkcmd.exe (Intel Corporation) O4:64bit: - HKLM..\Run: [IgfxTray] C:\Windows\SysNative\igfxtray.exe (Intel Corporation) O4:64bit: - HKLM..\Run: [MSC] C:\Program Files\Microsoft Security Client\msseces.exe (Microsoft Corporation) O4:64bit: - HKLM..\Run: [Persistence] C:\Windows\SysNative\igfxpers.exe (Intel Corporation) O4 - HKLM..\Run: [Malwarebytes' Anti-Malware] C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe (Malwarebytes Corporation) O4 - HKU\S-1-5-19..\Run: [Sidebar] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe (Microsoft Corporation) O4 - HKU\S-1-5-20..\Run: [Sidebar] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe (Microsoft Corporation) O4 - HKU\S-1-5-19..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found O4 - HKU\S-1-5-20..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3 O8:64bit: - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\Windows\system32\GPhotos.scr/200 File not found O8:64bit: - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~2\MICROS~3\Office12\EXCEL.EXE/3000 File not found O8 - Extra context menu item: Add to Google Photos Screensa&ver - C:\Windows\SysWow64\GPhotos.scr (Google Inc.) O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~2\MICROS~3\Office12\EXCEL.EXE/3000 File not found O9 - Extra Button: An OneNote senden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~3\Office12\ONBttnIE.dll (Microsoft Corporation) O9 - Extra 'Tools' menuitem : An OneNote s&enden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~3\Office12\ONBttnIE.dll (Microsoft Corporation) O9 - Extra Button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~2\MICROS~3\Office12\REFIEBAR.DLL (Microsoft Corporation) O1364bit: - gopher Prefix: missing O13 - gopher Prefix: missing O16:64bit: - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab (Java Plug-in 1.6.0_27) O16:64bit: - DPF: {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab (Java Plug-in 1.6.0_27) O16:64bit: - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab (Java Plug-in 1.6.0_27) O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab (Java Plug-in 1.6.0_29) O16 - DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab (Java Plug-in 1.6.0_29) O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab (Java Plug-in 1.6.0_29) O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.1.1 O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{B447929B-8BBB-43BB-8C4C-0FB18661C40E}: DhcpNameServer = 192.168.1.1 O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{FAA053A6-C821-4C23-B390-9B094DF4AADA}: DhcpNameServer = 192.168.1.1 O18:64bit: - Protocol\Handler\ms-help - No CLSID value found O18:64bit: - Protocol\Filter\text/xml {807563E5-5146-11D5-A672-00B0D022E945} - C:\Programme\Common Files\Microsoft Shared\OFFICE12\MSOXMLMF.DLL (Microsoft Corporation) O18 - Protocol\Filter\text/xml {807563E5-5146-11D5-A672-00B0D022E945} - C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE12\MSOXMLMF.DLL (Microsoft Corporation) O20:64bit: - HKLM Winlogon: Shell - (explorer.exe) - C:\Windows\explorer.exe (Microsoft Corporation) O20:64bit: - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) - C:\Windows\SysNative\userinit.exe (Microsoft Corporation) O20:64bit: - HKLM Winlogon: VMApplet - (SystemPropertiesPerformance.exe) - C:\Windows\SysNative\SystemPropertiesPerformance.exe (Microsoft Corporation) O20:64bit: - HKLM Winlogon: VMApplet - (/pagefile) - File not found O20 - HKLM Winlogon: Shell - (explorer.exe) - C:\Windows\SysWow64\explorer.exe (Microsoft Corporation) O20 - HKLM Winlogon: UserInit - (userinit.exe) - C:\Windows\SysWow64\userinit.exe (Microsoft Corporation) O20 - HKLM Winlogon: VMApplet - (/pagefile) - File not found O20:64bit: - Winlogon\Notify\igfxcui: DllName - (igfxdev.dll) - C:\Windows\SysNative\igfxdev.dll (Intel Corporation) O21:64bit: - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. O32 - HKLM CDRom: AutoRun - 1 O33 - MountPoints2\{f9fd82c0-5244-11e1-af72-00012e35c7cc}\Shell - "" = AutoRun O33 - MountPoints2\{f9fd82c0-5244-11e1-af72-00012e35c7cc}\Shell\AutoRun\command - "" = L:\LaunchU3.exe -a O34 - HKLM BootExecute: (autocheck autochk *) O35:64bit: - HKLM\..comfile [open] -- "%1" %* O35:64bit: - HKLM\..exefile [open] -- "%1" %* O35 - HKLM\..comfile [open] -- "%1" %* O35 - HKLM\..exefile [open] -- "%1" %* O37:64bit: - HKLM\...com [@ = comfile] -- "%1" %* O37:64bit: - HKLM\...exe [@ = exefile] -- "%1" %* O37 - HKLM\...com [@ = comfile] -- "%1" %* O37 - HKLM\...exe [@ = exefile] -- "%1" %* O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3) O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2) O38 - SubSystems\\Windows: (ServerDll=sxssrv,4) SafeBootMin:64bit: AppMgmt - Service SafeBootMin:64bit: Base - Driver Group SafeBootMin:64bit: Boot Bus Extender - Driver Group SafeBootMin:64bit: Boot file system - Driver Group SafeBootMin:64bit: File system - Driver Group SafeBootMin:64bit: Filter - Driver Group SafeBootMin:64bit: HelpSvc - Service SafeBootMin:64bit: PCI Configuration - Driver Group SafeBootMin:64bit: PNP Filter - Driver Group SafeBootMin:64bit: Primary disk - Driver Group SafeBootMin:64bit: sacsvr - Service SafeBootMin:64bit: SCSI Class - Driver Group SafeBootMin:64bit: System Bus Extender - Driver Group SafeBootMin:64bit: vmms - Service SafeBootMin:64bit: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers SafeBootMin:64bit: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive SafeBootMin:64bit: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive SafeBootMin:64bit: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller SafeBootMin:64bit: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc SafeBootMin:64bit: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard SafeBootMin:64bit: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse SafeBootMin:64bit: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters SafeBootMin:64bit: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter SafeBootMin:64bit: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System SafeBootMin:64bit: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive SafeBootMin:64bit: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy SafeBootMin:64bit: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers SafeBootMin:64bit: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume SafeBootMin:64bit: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices SafeBootMin:64bit: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices SafeBootMin:64bit: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices SafeBootMin: AppMgmt - Service SafeBootMin: Base - Driver Group SafeBootMin: Boot Bus Extender - Driver Group SafeBootMin: Boot file system - Driver Group SafeBootMin: File system - Driver Group SafeBootMin: Filter - Driver Group SafeBootMin: HelpSvc - Service SafeBootMin: MsMpSvc - C:\Programme\Microsoft Security Client\MsMpEng.exe (Microsoft Corporation) SafeBootMin: PCI Configuration - Driver Group SafeBootMin: PNP Filter - Driver Group SafeBootMin: Primary disk - Driver Group SafeBootMin: sacsvr - Service SafeBootMin: SCSI Class - Driver Group SafeBootMin: System Bus Extender - Driver Group SafeBootMin: vmms - Service SafeBootMin: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers SafeBootMin: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive SafeBootMin: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive SafeBootMin: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller SafeBootMin: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc SafeBootMin: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard SafeBootMin: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse SafeBootMin: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters SafeBootMin: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter SafeBootMin: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System SafeBootMin: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive SafeBootMin: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy SafeBootMin: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers SafeBootMin: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume SafeBootMin: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices SafeBootMin: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices SafeBootMin: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices SafeBootNet:64bit: AppMgmt - Service SafeBootNet:64bit: Base - Driver Group SafeBootNet:64bit: Boot Bus Extender - Driver Group SafeBootNet:64bit: Boot file system - Driver Group SafeBootNet:64bit: File system - Driver Group SafeBootNet:64bit: Filter - Driver Group SafeBootNet:64bit: HelpSvc - Service SafeBootNet:64bit: Messenger - Service SafeBootNet:64bit: NDIS Wrapper - Driver Group SafeBootNet:64bit: NetBIOSGroup - Driver Group SafeBootNet:64bit: NetDDEGroup - Driver Group SafeBootNet:64bit: Network - Driver Group SafeBootNet:64bit: NetworkProvider - Driver Group SafeBootNet:64bit: PCI Configuration - Driver Group SafeBootNet:64bit: PNP Filter - Driver Group SafeBootNet:64bit: PNP_TDI - Driver Group SafeBootNet:64bit: Primary disk - Driver Group SafeBootNet:64bit: rdsessmgr - Service SafeBootNet:64bit: sacsvr - Service SafeBootNet:64bit: SCSI Class - Driver Group SafeBootNet:64bit: Streams Drivers - Driver Group SafeBootNet:64bit: System Bus Extender - Driver Group SafeBootNet:64bit: TDI - Driver Group SafeBootNet:64bit: vmms - Service SafeBootNet:64bit: WudfUsbccidDriver - Driver SafeBootNet:64bit: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers SafeBootNet:64bit: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive SafeBootNet:64bit: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive SafeBootNet:64bit: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller SafeBootNet:64bit: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc SafeBootNet:64bit: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard SafeBootNet:64bit: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse SafeBootNet:64bit: {4D36E972-E325-11CE-BFC1-08002BE10318} - Net SafeBootNet:64bit: {4D36E973-E325-11CE-BFC1-08002BE10318} - NetClient SafeBootNet:64bit: {4D36E974-E325-11CE-BFC1-08002BE10318} - NetService SafeBootNet:64bit: {4D36E975-E325-11CE-BFC1-08002BE10318} - NetTrans SafeBootNet:64bit: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters SafeBootNet:64bit: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter SafeBootNet:64bit: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System SafeBootNet:64bit: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive SafeBootNet:64bit: {50DD5230-BA8A-11D1-BF5D-0000F805F530} - Smart card readers SafeBootNet:64bit: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy SafeBootNet:64bit: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers SafeBootNet:64bit: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume SafeBootNet:64bit: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices SafeBootNet:64bit: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices SafeBootNet:64bit: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices SafeBootNet: AppMgmt - Service SafeBootNet: Base - Driver Group SafeBootNet: Boot Bus Extender - Driver Group SafeBootNet: Boot file system - Driver Group SafeBootNet: File system - Driver Group SafeBootNet: Filter - Driver Group SafeBootNet: HelpSvc - Service SafeBootNet: Messenger - Service SafeBootNet: MsMpSvc - C:\Programme\Microsoft Security Client\MsMpEng.exe (Microsoft Corporation) SafeBootNet: NDIS Wrapper - Driver Group SafeBootNet: NetBIOSGroup - Driver Group SafeBootNet: NetDDEGroup - Driver Group SafeBootNet: Network - Driver Group SafeBootNet: NetworkProvider - Driver Group SafeBootNet: PCI Configuration - Driver Group SafeBootNet: PNP Filter - Driver Group SafeBootNet: PNP_TDI - Driver Group SafeBootNet: Primary disk - Driver Group SafeBootNet: rdsessmgr - Service SafeBootNet: sacsvr - Service SafeBootNet: SCSI Class - Driver Group SafeBootNet: Streams Drivers - Driver Group SafeBootNet: System Bus Extender - Driver Group SafeBootNet: TDI - Driver Group SafeBootNet: vmms - Service SafeBootNet: WudfUsbccidDriver - Driver SafeBootNet: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers SafeBootNet: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive SafeBootNet: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive SafeBootNet: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller SafeBootNet: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc SafeBootNet: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard SafeBootNet: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse SafeBootNet: {4D36E972-E325-11CE-BFC1-08002BE10318} - Net SafeBootNet: {4D36E973-E325-11CE-BFC1-08002BE10318} - NetClient SafeBootNet: {4D36E974-E325-11CE-BFC1-08002BE10318} - NetService SafeBootNet: {4D36E975-E325-11CE-BFC1-08002BE10318} - NetTrans SafeBootNet: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters SafeBootNet: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter SafeBootNet: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System SafeBootNet: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive SafeBootNet: {50DD5230-BA8A-11D1-BF5D-0000F805F530} - Smart card readers SafeBootNet: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy SafeBootNet: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers SafeBootNet: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume SafeBootNet: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices SafeBootNet: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices SafeBootNet: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices ActiveX:64bit: {08B0E5C0-4FCB-11CF-AAA5-00401C608500} - Java (Sun) ActiveX:64bit: {22d6f312-b0f6-11d0-94ab-0080c74c7e95} - Microsoft Windows Media Player 12.0 ActiveX:64bit: {2C7339CF-2B09-4501-B3F3-F3508C9228ED} - %SystemRoot%\system32\regsvr32.exe /s /n /i:/UserInstall %SystemRoot%\system32\themeui.dll ActiveX:64bit: {3af36230-a269-11d1-b5bf-0000f8051515} - Offline Browsing Pack ActiveX:64bit: {44BBA840-CC51-11CF-AAFA-00AA00B6015C} - "%ProgramFiles%\Windows Mail\WinMail.exe" OCInstallUserConfigOE ActiveX:64bit: {44BBA855-CC51-11CF-AAFA-00AA00B6015F} - DirectDrawEx ActiveX:64bit: {45ea75a0-a269-11d1-b5bf-0000f8051515} - Internet Explorer Help ActiveX:64bit: {4f645220-306d-11d2-995d-00c04f98bbc9} - Microsoft Windows Script 5.6 ActiveX:64bit: {5fd399c0-a70a-11d1-9948-00c04f98bbc9} - Internet Explorer Setup Tools ActiveX:64bit: {630b1da0-b465-11d1-9948-00c04f98bbc9} - Browsing Enhancements ActiveX:64bit: {6BF52A52-394A-11d3-B153-00C04F79FAA6} - Microsoft Windows Media Player ActiveX:64bit: {6fab99d0-bab8-11d1-994a-00c04f98bbc9} - MSN Site Access ActiveX:64bit: {7790769C-0471-11d2-AF11-00C04FA35D02} - Address Book 7 ActiveX:64bit: {89820200-ECBD-11cf-8B85-00AA005B4340} - regsvr32.exe /s /n /i:U shell32.dll ActiveX:64bit: {89820200-ECBD-11cf-8B85-00AA005B4383} - C:\Windows\System32\ie4uinit.exe -BaseSettings ActiveX:64bit: {89B4C1CD-B018-4511-B0A1-5476DBF70820} - C:\Windows\system32\Rundll32.exe C:\Windows\system32\mscories.dll,Install ActiveX:64bit: {9381D8F2-0288-11D0-9501-00AA00B911A5} - Dynamic HTML Data Binding ActiveX:64bit: {C9E9A340-D1F1-11D0-821E-444553540600} - Internet Explorer Core Fonts ActiveX:64bit: {de5aed00-a4bf-11d1-9948-00c04f98bbc9} - HTML Help ActiveX:64bit: {E92B03AB-B707-11d2-9CBD-0000F87A369E} - Active Directory Service Interface ActiveX:64bit: {F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4} - .NET Framework ActiveX:64bit: {FEBEF00C-046D-438D-8A88-BF94A6C9E703} - .NET Framework ActiveX:64bit: >{22d6f312-b0f6-11d0-94ab-0080c74c7e95} - %SystemRoot%\system32\unregmp2.exe /ShowWMP ActiveX:64bit: >{26923b43-4d38-484f-9b9e-de460746276c} - C:\Windows\System32\ie4uinit.exe -UserIconConfig ActiveX:64bit: >{60B49E34-C7CC-11D0-8953-00A0C90347FF} - "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\iedkcs32.dll",BrandIEActiveSetup SIGNUP ActiveX: {08B0E5C0-4FCB-11CF-AAA5-00401C608500} - Java (Sun) ActiveX: {22d6f312-b0f6-11d0-94ab-0080c74c7e95} - Microsoft Windows Media Player 12.0 ActiveX: {25FFAAD0-F4A3-4164-95FF-4461E9F35D51} - .NET Framework ActiveX: {2C7339CF-2B09-4501-B3F3-F3508C9228ED} - %SystemRoot%\system32\regsvr32.exe /s /n /i:/UserInstall %SystemRoot%\system32\themeui.dll ActiveX: {3af36230-a269-11d1-b5bf-0000f8051515} - Offline Browsing Pack ActiveX: {44BBA840-CC51-11CF-AAFA-00AA00B6015C} - "%ProgramFiles(x86)%\Windows Mail\WinMail.exe" OCInstallUserConfigOE ActiveX: {44BBA855-CC51-11CF-AAFA-00AA00B6015F} - DirectDrawEx ActiveX: {45ea75a0-a269-11d1-b5bf-0000f8051515} - Internet Explorer Help ActiveX: {4f645220-306d-11d2-995d-00c04f98bbc9} - Microsoft Windows Script 5.6 ActiveX: {5fd399c0-a70a-11d1-9948-00c04f98bbc9} - Internet Explorer Setup Tools ActiveX: {630b1da0-b465-11d1-9948-00c04f98bbc9} - Browsing Enhancements ActiveX: {6BF52A52-394A-11d3-B153-00C04F79FAA6} - Microsoft Windows Media Player ActiveX: {6fab99d0-bab8-11d1-994a-00c04f98bbc9} - MSN Site Access ActiveX: {7790769C-0471-11d2-AF11-00C04FA35D02} - Address Book 7 ActiveX: {7C028AF8-F614-47B3-82DA-BA94E41B1089} - .NET Framework ActiveX: {89820200-ECBD-11cf-8B85-00AA005B4340} - regsvr32.exe /s /n /i:U shell32.dll ActiveX: {89820200-ECBD-11cf-8B85-00AA005B4383} - C:\Windows\SysWOW64\ie4uinit.exe -BaseSettings ActiveX: {89B4C1CD-B018-4511-B0A1-5476DBF70820} - C:\Windows\SysWOW64\Rundll32.exe C:\Windows\SysWOW64\mscories.dll,Install ActiveX: {9381D8F2-0288-11D0-9501-00AA00B911A5} - Dynamic HTML Data Binding ActiveX: {C9E9A340-D1F1-11D0-821E-444553540600} - Internet Explorer Core Fonts ActiveX: {de5aed00-a4bf-11d1-9948-00c04f98bbc9} - HTML Help ActiveX: {E92B03AB-B707-11d2-9CBD-0000F87A369E} - Active Directory Service Interface ActiveX: {F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4} - .NET Framework ActiveX: >{22d6f312-b0f6-11d0-94ab-0080c74c7e95} - %SystemRoot%\system32\unregmp2.exe /ShowWMP ActiveX: >{26923b43-4d38-484f-9b9e-de460746276c} - C:\Windows\SysWOW64\ie4uinit.exe -UserIconConfig ActiveX: >{60B49E34-C7CC-11D0-8953-00A0C90347FF} - "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\iedkcs32.dll",BrandIEActiveSetup SIGNUP Drivers32:64bit: msacm.l3acm - C:\Windows\System32\l3codeca.acm (Fraunhofer Institut Integrierte Schaltungen IIS) Drivers32: msacm.l3acm - C:\Windows\SysWOW64\l3codeca.acm (Fraunhofer Institut Integrierte Schaltungen IIS) Drivers32: vidc.cvid - C:\Windows\SysWow64\iccvid.dll (Radius Inc.) CREATERESTOREPOINT Restore point Set: OTL Restore Point ========== Files/Folders - Created Within 30 Days ========== [2012.05.17 23:14:56 | 000,595,456 | ---- | C] (OldTimer Tools) -- D:\Eigene Dateien\Desktop\OTL.exe [2012.05.15 00:54:56 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\ESET [2012.05.14 23:24:34 | 000,000,000 | ---D | C] -- C:\Users\Schuller\AppData\Roaming\Malwarebytes [2012.05.14 23:24:18 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes' Anti-Malware [2012.05.14 23:24:10 | 000,000,000 | ---D | C] -- C:\ProgramData\Malwarebytes [2012.05.14 23:24:07 | 000,024,904 | ---- | C] (Malwarebytes Corporation) -- C:\Windows\SysNative\drivers\mbam.sys [2012.05.14 23:24:07 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Malwarebytes' Anti-Malware [2012.05.14 22:34:25 | 000,000,000 | ---D | C] -- C:\Kaspersky Rescue Disk 10.0 [2012.05.14 19:10:20 | 000,000,000 | -HSD | C] -- C:\Config.Msi [2012.04.23 08:27:13 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office Live Add-in [2012.04.23 08:27:12 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Microsoft ========== Files - Modified Within 30 Days ========== [2012.05.17 23:16:45 | 000,014,656 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 [2012.05.17 23:16:45 | 000,014,656 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 [2012.05.17 23:15:05 | 000,595,456 | ---- | M] (OldTimer Tools) -- D:\Eigene Dateien\Desktop\OTL.exe [2012.05.17 23:13:58 | 001,505,390 | ---- | M] () -- C:\Windows\SysNative\PerfStringBackup.INI [2012.05.17 23:13:58 | 000,656,278 | ---- | M] () -- C:\Windows\SysNative\perfh007.dat [2012.05.17 23:13:58 | 000,618,160 | ---- | M] () -- C:\Windows\SysNative\perfh009.dat [2012.05.17 23:13:58 | 000,131,050 | ---- | M] () -- C:\Windows\SysNative\perfc007.dat [2012.05.17 23:13:58 | 000,107,440 | ---- | M] () -- C:\Windows\SysNative\perfc009.dat [2012.05.17 23:09:31 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat [2012.05.17 23:09:28 | 1601,314,816 | -HS- | M] () -- C:\hiberfil.sys [2012.05.17 22:48:00 | 000,000,884 | ---- | M] () -- C:\Windows\tasks\Adobe Flash Player Updater.job [2012.05.14 23:24:19 | 000,001,113 | ---- | M] () -- C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk [2012.05.14 20:26:59 | 000,335,864 | ---- | M] () -- C:\Windows\SysNative\FNTCACHE.DAT [2012.05.10 16:44:37 | 229,873,682 | ---- | M] () -- C:\Windows\MEMORY.DMP [2012.05.01 09:26:43 | 000,001,912 | ---- | M] () -- C:\Windows\epplauncher.mif [2012.05.01 09:26:33 | 001,526,976 | ---- | M] () -- C:\Windows\SysWow64\PerfStringBackup.INI ========== Files Created - No Company Name ========== [2012.05.14 23:24:19 | 000,001,113 | ---- | C] () -- C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk [2012.04.30 08:48:40 | 000,000,884 | ---- | C] () -- C:\Windows\tasks\Adobe Flash Player Updater.job [2011.11.24 14:57:16 | 001,526,976 | ---- | C] () -- C:\Windows\SysWow64\PerfStringBackup.INI ========== LOP Check ========== [2012.01.26 18:31:28 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\OpenOffice.org [2012.02.17 09:33:18 | 000,032,632 | ---- | M] () -- C:\Windows\Tasks\SCHEDLGU.TXT ========== Purity Check ========== ========== Custom Scans ========== < %ALLUSERSPROFILE%\Application Data\*. > < %ALLUSERSPROFILE%\Application Data\*.exe /s > < %APPDATA%\*. > [2011.12.12 17:06:34 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\Adobe [2012.02.13 13:33:59 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\Google [2011.11.23 17:02:43 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\Identities [2011.11.28 10:16:08 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\Macromedia [2012.05.14 23:24:34 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\Malwarebytes [2009.07.14 20:18:18 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\Media Center Programs [2012.02.10 13:30:16 | 000,000,000 | --SD | M] -- C:\Users\Schuller\AppData\Roaming\Microsoft [2011.11.24 15:24:57 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\Mozilla [2012.01.26 18:31:28 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\OpenOffice.org [2011.11.24 15:24:27 | 000,000,000 | ---D | M] -- C:\Users\Schuller\AppData\Roaming\vlc < %APPDATA%\*.exe /s > < %SYSTEMDRIVE%\*.exe > < MD5 for: AGP440.SYS > [2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\SysNative\drivers\AGP440.sys [2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\SysNative\DriverStore\FileRepository\machine.inf_amd64_neutral_a2f120466549d68b\AGP440.sys [2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\winsxs\amd64_machine.inf_31bf3856ad364e35_6.1.7600.16385_none_1607dee2d861e021\AGP440.sys [2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\winsxs\amd64_machine.inf_31bf3856ad364e35_6.1.7601.17514_none_1838f2aad55063bb\AGP440.sys < MD5 for: ATAPI.SYS > [2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\SysNative\drivers\atapi.sys [2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\SysNative\DriverStore\FileRepository\mshdc.inf_amd64_neutral_aad30bdeec04ea5e\atapi.sys [2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\winsxs\amd64_mshdc.inf_31bf3856ad364e35_6.1.7600.16385_none_392d19c13b3ad543\atapi.sys [2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\winsxs\amd64_mshdc.inf_31bf3856ad364e35_6.1.7601.17514_none_3b5e2d89382958dd\atapi.sys < MD5 for: CNGAUDIT.DLL > [2009.07.14 03:15:06 | 000,012,288 | ---- | M] (Microsoft Corporation) MD5=50BA656134F78AF64E4DD3C8B6FEFD7E -- C:\Windows\SysWOW64\cngaudit.dll [2009.07.14 03:15:06 | 000,012,288 | ---- | M] (Microsoft Corporation) MD5=50BA656134F78AF64E4DD3C8B6FEFD7E -- C:\Windows\winsxs\x86_microsoft-windows-cngaudit-dll_31bf3856ad364e35_6.1.7600.16385_none_e83a414890e8132b\cngaudit.dll [2009.07.14 03:40:20 | 000,018,944 | ---- | M] (Microsoft Corporation) MD5=86FE1B1F8FD42CD0DB641AB1CDB13093 -- C:\Windows\SysNative\cngaudit.dll [2009.07.14 03:40:20 | 000,018,944 | ---- | M] (Microsoft Corporation) MD5=86FE1B1F8FD42CD0DB641AB1CDB13093 -- C:\Windows\winsxs\amd64_microsoft-windows-cngaudit-dll_31bf3856ad364e35_6.1.7600.16385_none_4458dccc49458461\cngaudit.dll < MD5 for: IASTORV.SYS > [2010.11.20 15:33:38 | 000,410,496 | ---- | M] (Intel Corporation) MD5=3DF4395A7CF8B7A72A5F4606366B8C2D -- C:\Windows\SysNative\DriverStore\FileRepository\iastorv.inf_amd64_neutral_668286aa35d55928\iaStorV.sys [2010.11.20 15:33:38 | 000,410,496 | ---- | M] (Intel Corporation) MD5=3DF4395A7CF8B7A72A5F4606366B8C2D -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.17514_none_0d3757e79e6784d0\iaStorV.sys [2011.03.11 08:19:16 | 000,410,496 | ---- | M] (Intel Corporation) MD5=5B3DE7208E5000D5B451B9D290D2579C -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.21680_none_0d714416b7c182d5\iaStorV.sys [2011.03.11 08:41:26 | 000,410,496 | ---- | M] (Intel Corporation) MD5=AAAF44DB3BD0B9D1FB6969B23ECC8366 -- C:\Windows\SysNative\drivers\iaStorV.sys [2011.03.11 08:41:26 | 000,410,496 | ---- | M] (Intel Corporation) MD5=AAAF44DB3BD0B9D1FB6969B23ECC8366 -- C:\Windows\SysNative\DriverStore\FileRepository\iastorv.inf_amd64_neutral_0bcee2057afcc090\iaStorV.sys [2011.03.11 08:41:26 | 000,410,496 | ---- | M] (Intel Corporation) MD5=AAAF44DB3BD0B9D1FB6969B23ECC8366 -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.17577_none_0cf9793d9e95787b\iaStorV.sys [2011.03.11 08:23:00 | 000,410,496 | ---- | M] (Intel Corporation) MD5=B75E45C564E944A2657167D197AB29DA -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7600.16778_none_0b141c81a16e25e6\iaStorV.sys [2011.03.11 08:25:49 | 000,410,496 | ---- | M] (Intel Corporation) MD5=BFDC9D75698800CFE4D1698BF2750EA2 -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7600.20921_none_0bccc8c8ba6985c1\iaStorV.sys [2009.07.14 03:48:04 | 000,410,688 | ---- | M] (Intel Corporation) MD5=D83EFB6FD45DF9D55E9A1AFC63640D50 -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7600.16385_none_0b06441fa1790136\iaStorV.sys < MD5 for: NETLOGON.DLL > [2009.07.14 03:41:52 | 000,692,736 | ---- | M] (Microsoft Corporation) MD5=956D030D375F207B22FB111E06EF9C35 -- C:\Windows\winsxs\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7600.16385_none_59aca8ea51aaeefe\netlogon.dll [2010.11.20 15:27:22 | 000,695,808 | ---- | M] (Microsoft Corporation) MD5=AA339DD8BB128EF66660DFBBB59043D3 -- C:\Windows\SysNative\netlogon.dll [2010.11.20 15:27:22 | 000,695,808 | ---- | M] (Microsoft Corporation) MD5=AA339DD8BB128EF66660DFBBB59043D3 -- C:\Windows\winsxs\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_5bddbcb24e997298\netlogon.dll [2010.11.20 14:20:28 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=C1809B9907ADEDAF16F50C894100883B -- C:\Windows\SysWOW64\netlogon.dll [2010.11.20 14:20:28 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=C1809B9907ADEDAF16F50C894100883B -- C:\Windows\winsxs\wow64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_6632670482fa3493\netlogon.dll [2009.07.14 03:16:02 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=EAA75D9000B71F10EEC04D2AE6C60E81 -- C:\Windows\winsxs\wow64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7600.16385_none_6401533c860bb0f9\netlogon.dll < MD5 for: NVSTOR.SYS > [2009.07.14 03:45:45 | 000,167,488 | ---- | M] (NVIDIA Corporation) MD5=477DC4D6DEB99BE37084C9AC6D013DA1 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7600.16385_none_95cfb4ced8afab0e\nvstor.sys [2011.03.11 08:23:06 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=6C1D5F70E7A6A3FD1C90D840EDC048B9 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7600.16778_none_95dd8d30d8a4cfbe\nvstor.sys [2011.03.11 08:25:53 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=AE274836BA56518E279087363A781214 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7600.20921_none_96963977f1a02f99\nvstor.sys [2011.03.11 08:19:21 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=D23C7E8566DA2B8A7C0DBBB761D54888 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.21680_none_983ab4c5eef82cad\nvstor.sys [2011.03.11 08:41:34 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=DAB0E87525C10052BF65F06152F37E4A -- C:\Windows\SysNative\drivers\nvstor.sys [2011.03.11 08:41:34 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=DAB0E87525C10052BF65F06152F37E4A -- C:\Windows\SysNative\DriverStore\FileRepository\nvraid.inf_amd64_neutral_0276fc3b3ea60d41\nvstor.sys [2011.03.11 08:41:34 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=DAB0E87525C10052BF65F06152F37E4A -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.17577_none_97c2e9ecd5cc2253\nvstor.sys [2010.11.20 15:33:48 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=F7CD50FE7139F07E77DA8AC8033D1832 -- C:\Windows\SysNative\DriverStore\FileRepository\nvraid.inf_amd64_neutral_dd659ed032d28a14\nvstor.sys [2010.11.20 15:33:48 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=F7CD50FE7139F07E77DA8AC8033D1832 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.17514_none_9800c896d59e2ea8\nvstor.sys < MD5 for: SCECLI.DLL > [2009.07.14 03:16:13 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=26073302DAEA83CC5B944C546D6B47D2 -- C:\Windows\winsxs\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7600.16385_none_9e577e55272d37b4\scecli.dll [2009.07.14 03:41:53 | 000,232,448 | ---- | M] (Microsoft Corporation) MD5=398712DDDAEFB85EDF61DF6A07B65C79 -- C:\Windows\winsxs\amd64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7600.16385_none_9402d402f2cc75b9\scecli.dll [2010.11.20 14:21:04 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=8124944EC89D6A1815E4E53F5B96AAF4 -- C:\Windows\SysWOW64\scecli.dll [2010.11.20 14:21:04 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=8124944EC89D6A1815E4E53F5B96AAF4 -- C:\Windows\winsxs\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_a088921d241bbb4e\scecli.dll [2010.11.20 15:27:25 | 000,232,960 | ---- | M] (Microsoft Corporation) MD5=ED78427259134C63ED69804D2132B86C -- C:\Windows\SysNative\scecli.dll [2010.11.20 15:27:25 | 000,232,960 | ---- | M] (Microsoft Corporation) MD5=ED78427259134C63ED69804D2132B86C -- C:\Windows\winsxs\amd64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_9633e7caefbaf953\scecli.dll < MD5 for: USER32.DLL > [2010.11.20 14:08:57 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=5E0DB2D8B2750543CD2EBB9EA8E6CDD3 -- C:\Windows\SysWOW64\user32.dll [2010.11.20 14:08:57 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=5E0DB2D8B2750543CD2EBB9EA8E6CDD3 -- C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll [2009.07.14 03:41:56 | 001,008,640 | ---- | M] (Microsoft Corporation) MD5=72D7B3EA16946E8F0CF7458150031CC6 -- C:\Windows\winsxs\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_292d5de8870d85d9\user32.dll [2009.07.14 03:11:24 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=E8B0FFC209E504CB7E79FC24E6C085F0 -- C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_3382083abb6e47d4\user32.dll [2010.11.20 15:27:27 | 001,008,128 | ---- | M] (Microsoft Corporation) MD5=FE70103391A64039A921DBFFF9C7AB1B -- C:\Windows\SysNative\user32.dll [2010.11.20 15:27:27 | 001,008,128 | ---- | M] (Microsoft Corporation) MD5=FE70103391A64039A921DBFFF9C7AB1B -- C:\Windows\winsxs\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_2b5e71b083fc0973\user32.dll < MD5 for: USERINIT.EXE > [2010.11.20 14:17:48 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=61AC3EFDFACFDD3F0F11DD4FD4044223 -- C:\Windows\SysWOW64\userinit.exe [2010.11.20 14:17:48 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=61AC3EFDFACFDD3F0F11DD4FD4044223 -- C:\Windows\winsxs\x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_de3024012ff21116\userinit.exe [2009.07.14 03:14:43 | 000,026,112 | ---- | M] (Microsoft Corporation) MD5=6DE80F60D7DE9CE6B8C2DDFDF79EF175 -- C:\Windows\winsxs\x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7600.16385_none_dbff103933038d7c\userinit.exe [2009.07.14 03:39:48 | 000,030,208 | ---- | M] (Microsoft Corporation) MD5=6F8F1376A13114CC10C0E69274F5A4DE -- C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7600.16385_none_381dabbceb60feb2\userinit.exe [2010.11.20 15:25:24 | 000,030,720 | ---- | M] (Microsoft Corporation) MD5=BAFE84E637BF7388C96EF48D4D3FDD53 -- C:\Windows\SysNative\userinit.exe [2010.11.20 15:25:24 | 000,030,720 | ---- | M] (Microsoft Corporation) MD5=BAFE84E637BF7388C96EF48D4D3FDD53 -- C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_3a4ebf84e84f824c\userinit.exe < MD5 for: WININIT.EXE > [2009.07.14 03:39:52 | 000,129,024 | ---- | M] (Microsoft Corporation) MD5=94355C28C1970635A31B3FE52EB7CEBA -- C:\Windows\SysNative\wininit.exe [2009.07.14 03:39:52 | 000,129,024 | ---- | M] (Microsoft Corporation) MD5=94355C28C1970635A31B3FE52EB7CEBA -- C:\Windows\winsxs\amd64_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_8ce7aa761e01ad49\wininit.exe [2009.07.14 03:14:45 | 000,096,256 | ---- | M] (Microsoft Corporation) MD5=B5C5DCAD3899512020D135600129D665 -- C:\Windows\SysWOW64\wininit.exe [2009.07.14 03:14:45 | 000,096,256 | ---- | M] (Microsoft Corporation) MD5=B5C5DCAD3899512020D135600129D665 -- C:\Windows\winsxs\x86_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_30c90ef265a43c13\wininit.exe < MD5 for: WINLOGON.EXE > [2012.04.04 15:56:38 | 000,199,240 | ---- | M] () MD5=097D0E812D7A9A3101CE46CB2BE0474D -- C:\Program Files (x86)\Malwarebytes' Anti-Malware\Chameleon\winlogon.exe [2010.11.20 15:25:30 | 000,390,656 | ---- | M] (Microsoft Corporation) MD5=1151B1BAA6F350B1DB6598E0FEA7C457 -- C:\Windows\SysNative\winlogon.exe [2010.11.20 15:25:30 | 000,390,656 | ---- | M] (Microsoft Corporation) MD5=1151B1BAA6F350B1DB6598E0FEA7C457 -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7601.17514_none_cde90685eb910636\winlogon.exe [2009.07.14 03:39:52 | 000,389,120 | ---- | M] (Microsoft Corporation) MD5=132328DF455B0028F13BF0ABEE51A63A -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.16385_none_cbb7f2bdeea2829c\winlogon.exe [2009.10.28 09:01:57 | 000,389,632 | ---- | M] (Microsoft Corporation) MD5=A93D41A4D4B0D91C072D11DD8AF266DE -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.20560_none_cc522fd507b468f8\winlogon.exe [2009.10.28 08:24:40 | 000,389,632 | ---- | M] (Microsoft Corporation) MD5=DA3E2A6FA9660CC75B471530CE88453A -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.16447_none_cbe534e7ee8042ad\winlogon.exe < MD5 for: WS2IFSL.SYS > [2009.07.14 02:10:33 | 000,021,504 | ---- | M] (Microsoft Corporation) MD5=6BCC1D7D2FD2453957C5479A32364E52 -- C:\Windows\SysNative\drivers\ws2ifsl.sys [2009.07.14 02:10:33 | 000,021,504 | ---- | M] (Microsoft Corporation) MD5=6BCC1D7D2FD2453957C5479A32364E52 -- C:\Windows\winsxs\amd64_microsoft-windows-w..rastructure-ws2ifsl_31bf3856ad364e35_6.1.7600.16385_none_ab7b927be17eace8\ws2ifsl.sys < %systemroot%\system32\drivers\*.sys /lockedfiles > < %systemroot%\System32\config\*.sav > < %systemroot%\*. /mp /s > < %systemroot%\system32\*.dll /lockedfiles > < > < End of report > |
19.05.2012, 11:52 | #8 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Exploit.Java.CVE-2012-0507.fb Sieht unauffällig aus. Abgesehen von den Funden im Javacache noch Probleme? Leere mal den Java-Cache zB mit dem CCleaner - achte auch immer darauf, dass Java aktuell ist
__________________ Logfiles bitte immer in CODE-Tags posten |
22.05.2012, 11:32 | #9 |
| Exploit.Java.CVE-2012-0507.fb Werde den Cache leeren und alles Updaten. Sollte ich dann Kaspersky nochmal scannen lassen und Funde bekommen, hat das dann etwas zu bedeuten? Oder besser gefragt: was hat es mit den alten Funden auf sich und sollten diese nach Leeren des Caches verschwinden? Falls nicht, was dann? Danke vorab! Habe den CCleaner drüberlaufen lassen, zusätzlich den Java Cache direkt über Java geleert, die alte Java Version deinstalliert, die neuste installiert und Kaspersky nochmal scannen lassen. Wie es aussieht ohne weiteren Funde (siehe Log untersten Zeilen). Kann ich von ausgehen, dass der PC nun sauber ist? Vielen Dank und Gruß! Code:
ATTFilter Untersuchung von Objekten: wurde abgeschlossen vor 7 Tagen (Ereignis: 52, Objekte: 489291, Zeit: 02:09:37) Ergebnis: Gefunden (Ereignisse: 25) 14.05.12 22:58 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class 14.05.12 22:58 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 14.05.12 22:58 C:/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 14.05.12 22:58 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class 14.05.12 22:58 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 14.05.12 22:54 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe 14.05.12 22:13 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 14.05.12 21:33 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 14.05.12 21:33 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe 14.05.12 21:28 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class 14.05.12 21:28 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 14.05.12 21:27 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 14.05.12 21:27 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe 14.05.12 21:20 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 14.05.12 21:20 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe 14.05.12 21:15 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class 14.05.12 21:15 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 14.05.12 21:13 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 14.05.12 21:13 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe 14.05.12 21:06 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 14.05.12 21:06 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe 14.05.12 21:01 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class 14.05.12 21:01 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 14.05.12 20:59 C:/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 14.05.12 20:59 C:/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe Ergebnis: Nicht desinfizierte Objekte (Ereignisse: 24) 14.05.12 20:59 C:/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe Zurückgestellt 14.05.12 20:59 C:/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 14.05.12 21:01 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Zurückgestellt 14.05.12 21:01 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Zurückgestellt 14.05.12 21:06 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe Zurückgestellt 14.05.12 21:06 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 14.05.12 21:13 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe Zurückgestellt 14.05.12 21:13 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 14.05.12 21:15 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Zurückgestellt 14.05.12 21:15 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Zurückgestellt 14.05.12 21:20 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe Zurückgestellt 14.05.12 21:20 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 14.05.12 21:27 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe Zurückgestellt 14.05.12 21:27 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 14.05.12 21:28 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Zurückgestellt 14.05.12 21:28 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Zurückgestellt 14.05.12 21:33 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe Zurückgestellt 14.05.12 21:33 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 14.05.12 22:54 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Eintrag wird nicht unterstützt 14.05.12 22:58 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Eintrag wird nicht unterstützt 14.05.12 22:58 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Eintrag wird nicht unterstützt 14.05.12 22:58 C:/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Eintrag wird nicht unterstützt 14.05.12 22:58 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Eintrag wird nicht unterstützt 14.05.12 22:58 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Eintrag wird nicht unterstützt Ergebnis: Gelöscht (Ereignisse: 1) 14.05.12 22:58 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/mjt0uikj.exe Ergebnis: Aufgabe wurde gestartet (Ereignisse: 1) 14.05.12 20:49 Ergebnis: Aufgabe wurde abgeschlossen (Ereignisse: 1) 14.05.12 22:58 Untersuchung von Objekten: wurde abgeschlossen vor 7 Tagen (Ereignis: 38, Objekte: 484267, Zeit: 01:22:45) Ergebnis: Gefunden (Ereignisse: 18) 15.05.12 11:09 C:/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 15.05.12 11:11 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 15.05.12 11:11 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class 15.05.12 11:16 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 15.05.12 11:23 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 15.05.12 11:24 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 15.05.12 11:24 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class 15.05.12 11:29 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 15.05.12 11:36 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 15.05.12 11:37 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 15.05.12 11:37 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class 15.05.12 11:42 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 15.05.12 12:21 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 15.05.12 12:22 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 15.05.12 12:22 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class 15.05.12 12:22 C:/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class 15.05.12 12:22 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class 15.05.12 12:22 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Ergebnis: Nicht desinfizierte Objekte (Ereignisse: 18) 15.05.12 11:09 C:/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 15.05.12 11:11 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Zurückgestellt 15.05.12 11:11 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Zurückgestellt 15.05.12 11:16 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 15.05.12 11:23 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 15.05.12 11:24 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Zurückgestellt 15.05.12 11:24 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Zurückgestellt 15.05.12 11:29 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 15.05.12 11:36 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 15.05.12 11:37 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Zurückgestellt 15.05.12 11:37 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Zurückgestellt 15.05.12 11:42 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Zurückgestellt 15.05.12 12:22 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Eintrag wird nicht unterstützt 15.05.12 12:22 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Eintrag wird nicht unterstützt 15.05.12 12:22 /mnt/MountedDevices/PD-A5389ED4-0000000006500000/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Eintrag wird nicht unterstützt 15.05.12 12:22 C:/Users/Schuller/AppData/Local/Temp/jar_cache566936404082845864.tmp/fa/fb.class Eintrag wird nicht unterstützt 15.05.12 12:22 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/35/3e36f963-32884c47/fa/fb.class Eintrag wird nicht unterstützt 15.05.12 12:22 C:/Users/Schuller/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/47/47f20c2f-29b1158f/a/a1.class Eintrag wird nicht unterstützt Ergebnis: Aufgabe wurde gestartet (Ereignisse: 1) 15.05.12 10:59 Ergebnis: Aufgabe wurde abgeschlossen (Ereignisse: 1) 15.05.12 12:22 Untersuchung von Objekten: wurde abgeschlossen vor 5 Minuten (Ereignis: 2, Objekte: 229935, Zeit: 00:45:26) Ergebnis: Aufgabe wurde gestartet (Ereignisse: 1) 22.05.12 15:34 Ergebnis: Aufgabe wurde abgeschlossen (Ereignisse: 1) 22.05.12 16:20 |
Themen zu Exploit.Java.CVE-2012-0507.fb |
anhang, bereich, besser, cpu, cve-2012-0507, entfernt, entfernung, eset, essen, falsch, freund, gesperrt, hallo zusammen, home, intel, java exploit, kaspersky, logfiles, nichts, rechner, rescue, security, service, system, trojaner, trotz, zusammen |