|
Plagegeister aller Art und deren Bekämpfung: GVU-Trojaner am 06.09. eingefangen, einige KomplikationenWindows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
06.09.2012, 23:03 | #1 |
| GVU-Trojaner am 06.09. eingefangen, einige Komplikationen Hallo liebes Helfer-Team, habe mir eben offenbar den GVU-Trojaner eingefangen und möchte das natürlich schnellstmöglich beheben. Momentan bin ich mit meinem Zweitrechner online und habe den befallenen Rechner vom Netz genommen, da das das Block-Fenster offenbar vom immer wieder aufploppen abhält. Ich habe bislang noch nicht die in der Checkliste angegebenen Schritte unternommen, da ich den befallenen Rechner ja vom Netz genommen habe und nicht sicher war, ob ich die Programme (defogger, OTL, Gmer, etc.) mit meinem Laptop herunterladen und per USB-Stick auf den befallenen Recher übertragen soll, oder ob sich dann die Infektion über den Stick weiterverbreitet. Wie soll ich in dieser Hinsicht verfahren? Ansonsten gibt es noch einige weitere Komplikationen, die die Behandlung des Problems etwas erschweren: -Durch einen beschädigten CD-Rohling ist mein DVD/CD-Laufwerk momentan irreparabel beschädigt. Ich wollte es am Montag austauschen, aber vorerst entfallen daher wohl alle Lösungen, die eine Boot-CD erfordern. -Die Internet-Verbindung am befallenen Rechner erfolgt über einen per USB verbundenen WLAN-Adapter. Ich bin daher nicht sicher, ob er auch im abgesicherten Modus ins Internet kommt. -Ich habe in meiner ersten Überreaktion durch den "Abmelden - Anmelden - Zeifenster bis zum Neustart des Trojaners nutzen"-Trick bereits einmal Malwarebytes Anti-Malware im Quick-Chek laufen lassen und die dabei gefundenen 37(!) Dateien löschen lassen. Das war sicher ein Fehler, ist jetzt aber nicht mehr zu ändern. Ich hoffe ihr könnt mir trotzdem helfen. Ich weiß, Doppelposts sind meistens unerwünscht, aber es gibt ein Update: 1.) Ich habe mittlerweile diesen Thread gefunden und daher per USB-Stick die Scans mit OTL und GMER gemacht. Die Loggs sind wie gewünscht angehängt. 2.) Ich habe meine Festplatte in 2 Partitionen aufgeteilt C: für das System und D: für Daten. Seit dem letzten Boot (also nachdem ich heute Nacht das System heruntergefahren hatte und eben wieder gestartet) ist die komplette Partition D: nicht mehr zu finden. Weder über den Explorer noch sonst irgendwie. Auch Verknüpfungen, die darauf verweisen, gehen ins Leere. 3.) Ich hatte gestern noch schnell eine Datensicherung auf eine externe Festplatte gemacht, als ich durch Abklemmen vom Internet wieder Zugriff auf mein System hatte. Die externe Platte habe ich jetzt abgehängt, um meine wichtigen Daten vor schlimmerem zu bewahren. Meine Frage wäre jetzt: Ist die Sicherungsplatte jetzt evtl. auch kontaminiert oder kann ich mit meinem Zweitrechner auf die zugreifen? Da sind Dateien drauf, an denen ich eigentlich dringend arbeiten müsste und ich komme sonst (siehe 2.) nicht mehr da dran. Code:
ATTFilter OTL logfile created on: 07.09.2012 11:42:19 - Run 1 OTL by OldTimer - Version 3.2.61.0 Folder = C:\Users\Franz\Desktop Professional Service Pack 1 (Version = 6.1.7601) - Type = NTWorkstation Internet Explorer (Version = 9.0.8112.16421) Locale: 00000407 | Country: Deutschland | Language: DEU | Date Format: dd.MM.yyyy 3,00 Gb Total Physical Memory | 2,59 Gb Available Physical Memory | 86,42% Memory free 6,00 Gb Paging File | 5,62 Gb Available in Paging File | 93,66% Paging File free Paging file location(s): ?:\pagefile.sys [binary data] %SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files Drive C: | 64,79 Gb Total Space | 20,55 Gb Free Space | 31,72% Space Free | Partition Type: NTFS Drive D: | 3,73 Gb Total Space | 3,73 Gb Free Space | 99,97% Space Free | Partition Type: FAT32 Computer Name: RECHENKNECHT | User Name: Franz | Logged in as Administrator. Boot Mode: SafeMode | Scan Mode: All users Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days ========== Processes (SafeList) ========== PRC - C:\Users\Franz\Desktop\OTL.exe (OldTimer Tools) PRC - C:\Windows\explorer.exe (Microsoft Corporation) ========== Modules (No Company Name) ========== ========== Services (SafeList) ========== SRV - (SBSDWSCService) -- C:\Program Files\Spybot File not found SRV - (AdobeFlashPlayerUpdateSvc) -- C:\Windows\System32\Macromed\Flash\FlashPlayerUpdateService.exe (Adobe Systems Incorporated) SRV - (MozillaMaintenance) -- C:\Programme\Mozilla Maintenance Service\maintenanceservice.exe (Mozilla Foundation) SRV - (AMD External Events Utility) -- C:\Windows\System32\atiesrxx.exe (AMD) SRV - (SkypeUpdate) -- C:\Programme\Skype\Updater\Updater.exe (Skype Technologies) SRV - (AntiVirSchedulerService) -- C:\Programme\Avira\AntiVir Desktop\sched.exe (Avira Operations GmbH & Co. KG) SRV - (AntiVirService) -- C:\Programme\Avira\AntiVir Desktop\avguard.exe (Avira Operations GmbH & Co. KG) SRV - (odserv) -- C:\Programme\Common Files\microsoft shared\OFFICE12\ODSERV.EXE (Microsoft Corporation) SRV - (ServiceLayer) -- C:\Programme\PC Connectivity Solution\ServiceLayer.exe (Nokia) SRV - (MSCamSvc) -- C:\Programme\Microsoft LifeCam\MSCamS32.exe (Microsoft Corporation) SRV - (WMPNetworkSvc) -- C:\Programme\Windows Media Player\wmpnetwk.exe (Microsoft Corporation) SRV - (Samsung Network Fax Server) -- C:\Windows\System32\spool\drivers\w32x86\3\NetFaxServer.exe (Samsung Electronics Co., Ltd.) SRV - (Creative Audio Engine Licensing Service) -- C:\Programme\Common Files\Creative Labs Shared\Service\CTAELicensing.exe (Creative Labs) SRV - (WSWNA3100) -- C:\Programme\NETGEAR\WNA3100\WifiSvc.exe () SRV - (PenSup) -- C:\Programme\Common Files\Anoto\Pen\Phal\Service\LPhal.exe (Anoto AB) SRV - (PenRendezvous) -- C:\Programme\Common Files\Anoto\Pen\Phal\Service\LPhal.exe (Anoto AB) SRV - (wlidsvc) -- C:\Programme\Common Files\microsoft shared\Windows Live\WLIDSVC.EXE (Microsoft Corporation) SRV - (LBTServ) -- C:\Programme\Common Files\Logishrd\Bluetooth\LBTServ.exe (Logitech, Inc.) SRV - (StorSvc) -- C:\Windows\System32\StorSvc.dll (Microsoft Corporation) SRV - (SensrSvc) -- C:\Windows\System32\sensrsvc.dll (Microsoft Corporation) SRV - (PeerDistSvc) -- C:\Windows\System32\PeerDistSvc.dll (Microsoft Corporation) SRV - (WinDefend) -- C:\Programme\Windows Defender\MpSvc.dll (Microsoft Corporation) SRV - (CTAudSvcService) -- C:\Programme\Creative\Shared Files\CTAudSvc.exe (Creative Technology Ltd) SRV - (ose) -- C:\Programme\Common Files\microsoft shared\Source Engine\OSE.EXE (Microsoft Corporation) ========== Driver Services (SafeList) ========== DRV - (Lbd) -- system32\DRIVERS\Lbd.sys File not found DRV - (amdkmdag) -- C:\Windows\System32\drivers\atikmdag.sys (Advanced Micro Devices, Inc.) DRV - (amdkmdap) -- C:\Windows\System32\drivers\atikmpag.sys (Advanced Micro Devices, Inc.) DRV - (ssudmdm) -- C:\Windows\System32\drivers\ssudmdm.sys (DEVGURU Co., LTD.(www.devguru.co.kr)) DRV - (dg_ssudbus) -- C:\Windows\System32\drivers\ssudbus.sys (DEVGURU Co., LTD.(www.devguru.co.kr)) DRV - (avipbb) -- C:\Windows\System32\drivers\avipbb.sys (Avira GmbH) DRV - (avgntflt) -- C:\Windows\System32\drivers\avgntflt.sys (Avira GmbH) DRV - (AtiHDAudioService) -- C:\Windows\System32\drivers\AtihdW73.sys (Advanced Micro Devices) DRV - (avkmgr) -- C:\Windows\System32\drivers\avkmgr.sys (Avira GmbH) DRV - (ssadmdm) -- C:\Windows\System32\drivers\ssadmdm.sys (MCCI Corporation) DRV - (ssadbus) -- C:\Windows\System32\drivers\ssadbus.sys (MCCI Corporation) DRV - (ssadserd) -- C:\Windows\System32\drivers\ssadserd.sys (MCCI Corporation) DRV - (ssadmdfl) -- C:\Windows\System32\drivers\ssadmdfl.sys (MCCI Corporation) DRV - (UsbserFilt) -- C:\Windows\System32\drivers\usbser_lowerfltj.sys (Nokia) DRV - (upperdev) -- C:\Windows\System32\drivers\usbser_lowerflt.sys (Nokia) DRV - (nmwcdc) -- C:\Windows\System32\drivers\ccdcmbo.sys (Nokia) DRV - (nmwcd) -- C:\Windows\System32\drivers\ccdcmb.sys (Nokia) DRV - (androidusb) -- C:\Windows\System32\drivers\ssadadb.sys (Google Inc) DRV - (MSHUSBVideo) -- C:\Windows\System32\drivers\nx6000.sys (Microsoft Corporation) DRV - (vmbus) -- C:\Windows\System32\drivers\vmbus.sys (Microsoft Corporation) DRV - (storflt) -- C:\Windows\System32\drivers\vmstorfl.sys (Microsoft Corporation) DRV - (storvsc) -- C:\Windows\System32\drivers\storvsc.sys (Microsoft Corporation) DRV - (TsUsbFlt) -- C:\Windows\System32\drivers\TsUsbFlt.sys (Microsoft Corporation) DRV - (WinUsb) -- C:\Windows\System32\drivers\winusb.sys (Microsoft Corporation) DRV - (VMBusHID) -- C:\Windows\System32\drivers\VMBusHID.sys (Microsoft Corporation) DRV - (s3cap) -- C:\Windows\System32\drivers\vms3cap.sys (Microsoft Corporation) DRV - (ssmdrv) -- C:\Windows\System32\drivers\ssmdrv.sys (Avira GmbH) DRV - (nvlddmkm) -- C:\Windows\System32\drivers\nvlddmkm.sys (NVIDIA Corporation) DRV - (BCMH43XX) -- C:\Windows\System32\drivers\bcmwlhigh6.sys (Broadcom Corporation) DRV - (NPF) -- C:\Windows\System32\drivers\npf.sys (CACE Technologies, Inc.) DRV - (vwifimp) -- C:\Windows\System32\drivers\vwifimp.sys (Microsoft Corporation) DRV - (yukonw7) -- C:\Windows\System32\drivers\yk62x86.sys (Marvell) DRV - (LMouFilt) -- C:\Windows\System32\drivers\LMouFilt.Sys (Logitech, Inc.) DRV - (LHidFilt) -- C:\Windows\System32\drivers\LHidFilt.Sys (Logitech, Inc.) DRV - (LHidEqd) -- C:\Windows\System32\drivers\LHidEqd.sys (Logitech, Inc.) DRV - (LEqdUsb) -- C:\Windows\System32\drivers\LEqdUsb.sys (Logitech, Inc.) DRV - (L8042Kbd) -- C:\Windows\System32\drivers\L8042Kbd.sys (Logitech, Inc.) DRV - (t3) -- C:\Windows\System32\drivers\t3.sys (Creative Technology Ltd.) DRV - (DgiVecp) -- C:\Windows\System32\drivers\DgivEcp.sys (Samsung Electronics Co., Ltd.) DRV - (SSPORT) -- C:\Windows\System32\drivers\SSPORT.SYS (Samsung Electronics) DRV - (pccsmcfd) -- C:\Windows\System32\drivers\pccsmcfd.sys (Nokia) DRV - (SCMNdisP) -- C:\Windows\System32\drivers\SCMNdisP.sys (Windows (R) Codename Longhorn DDK provider) DRV - (MTsensor) -- C:\Windows\System32\drivers\ASACPI.sys () ========== Standard Registry (SafeList) ========== ========== Internet Explorer ========== IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://de.msn.com/?ocid=iehp IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de-DE IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = BC E8 E8 82 70 8C CD 01 [binary data] IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local ========== FireFox ========== FF - prefs.js..extensions.enabledItems: {AB2CE124-6272-4b12-94A9-7303C7397BD1}:4.2.0.5198 FF - user.js - File not found FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\system32\Macromed\Flash\NPSWF32_11_4_402_265.dll () FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=: File not found FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=1.0: C:\Program Files\iTunes\Mozilla Plugins\npitunes.dll () FF - HKLM\Software\MozillaPlugins\@divx.com/DivX Browser Plugin,version=1.0.0: C:\Program Files\DivX\DivX Plus Web Player\npdivx32.dll (DivX,Inc.) FF - HKLM\Software\MozillaPlugins\@divx.com/DivX Player Plugin,version=1.0.0: C:\Program Files\DivX\DivX Player\npDivxPlayerPlugin.dll (DivX, Inc) FF - HKLM\Software\MozillaPlugins\@Google.com/GoogleEarthPlugin: C:\Program Files\Google\Google Earth\plugin\npgeplugin.dll (Google) FF - HKLM\Software\MozillaPlugins\@java.com/DTPlugin,version=10.5.1: C:\Windows\system32\npDeployJava1.dll (Oracle Corporation) FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin,version=10.5.1: C:\Program Files\Oracle\JavaFX 2.1 Runtime\bin\plugin2\npjp2.dll (Oracle Corporation) FF - HKLM\Software\MozillaPlugins\@microsoft.com/OfficeLive,version=1.5: C:\Program Files\Microsoft\Office Live\npOLW.dll (Microsoft Corp.) FF - HKLM\Software\MozillaPlugins\@pandonetworks.com/PandoWebPlugin: C:\Program Files\Pando Networks\Media Booster\npPandoWebPlugin.dll (Pando Networks) FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Program Files\Google\Update\1.3.21.115\npGoogleUpdate3.dll (Google Inc.) FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Program Files\Google\Update\1.3.21.115\npGoogleUpdate3.dll (Google Inc.) FF - HKLM\Software\MozillaPlugins\Adobe Reader: C:\Program Files\Adobe\Reader 9.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.) FF - HKCU\Software\MozillaPlugins\pandonetworks.com/PandoWebPlugin: C:\Program Files\Pando Networks\Media Booster\npPandoWebPlugin.dll (Pando Networks) FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\fmconverter@gmail.com: C:\Program Files\Freemake\Freemake Video Converter\BrowserPlugin\Firefox\ [2011.09.19 15:15:20 | 000,000,000 | ---D | M] FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 14.0.1\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2012.08.14 19:45:01 | 000,000,000 | ---D | M] FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 14.0.1\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2013.08.18 20:27:54 | 000,000,000 | ---D | M] FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Thunderbird 3.1.9\extensions\\Components: C:\Program Files\Mozilla Thunderbird\components [2011.03.08 23:28:28 | 000,000,000 | ---D | M] FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Thunderbird 3.1.9\extensions\\Plugins: C:\Program Files\Mozilla Thunderbird\plugins FF - HKEY_LOCAL_MACHINE\software\mozilla\Thunderbird\Extensions\\{CCB7D94B-CA92-4E3F-B79D-ADE0F07ADC74}: C:\Program Files\Nokia\Nokia Ovi Suite\Connectors\Thunderbird Connector\ThunderbirdExtension\ [2011.07.28 14:27:31 | 000,000,000 | ---D | M] FF - HKEY_CURRENT_USER\software\mozilla\Mozilla Firefox 14.0.1\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2012.08.14 19:45:01 | 000,000,000 | ---D | M] FF - HKEY_CURRENT_USER\software\mozilla\Mozilla Firefox 14.0.1\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins [2013.08.18 20:27:54 | 000,000,000 | ---D | M] [2010.07.20 22:24:35 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Franz\AppData\Roaming\mozilla\Extensions [2010.07.20 22:24:35 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Franz\AppData\Roaming\mozilla\Extensions\{3550f703-e582-4d05-9a08-453d09bdfdc6} [2010.02.20 02:51:32 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Franz\AppData\Roaming\mozilla\Firefox\Profiles\a29y5r4k.default\extensions [2012.04.28 11:31:31 | 000,000,000 | ---D | M] (No name found) -- C:\Programme\Mozilla Firefox\extensions [2012.05.31 13:37:50 | 000,000,000 | ---D | M] (Skype Click to Call) -- C:\Programme\Mozilla Firefox\extensions\{82AF8DCA-6DE9-405D-BD5E-43525BDAD38A} File not found (No name found) -- C:\PROGRAM FILES\MOZILLA FIREFOX\EXTENSIONS\{AB2CE124-6272-4B12-94A9-7303C7397BD1} File not found (No name found) -- C:\PROGRAM FILES\MOZILLA FIREFOX\EXTENSIONS\{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} [2012.08.14 19:45:01 | 000,136,672 | ---- | M] (Mozilla Foundation) -- C:\Program Files\mozilla firefox\components\browsercomps.dll [2010.03.31 11:09:22 | 010,437,264 | ---- | M] (PDFTron Systems Inc.) -- C:\Program Files\mozilla firefox\plugins\PDFNetC.dll [2010.04.08 13:36:02 | 000,107,760 | ---- | M] () -- C:\Program Files\mozilla firefox\plugins\ScorchPDFWrapper.dll [2012.04.28 11:31:25 | 000,001,392 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\amazondotcom-de.xml [2012.04.28 11:31:25 | 000,002,252 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\bing.xml [2012.04.28 11:31:25 | 000,001,153 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\eBay-de.xml [2012.04.28 11:31:25 | 000,006,805 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\leo_ende_de.xml [2012.04.28 11:31:25 | 000,001,178 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\wikipedia-de.xml [2012.04.28 11:31:25 | 000,001,105 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\yahoo-de.xml O1 HOSTS File: ([2009.06.10 23:39:37 | 000,000,824 | ---- | M]) - C:\Windows\System32\drivers\etc\hosts O2 - BHO: (Spybot-S&D IE Protection) - {53707962-6F74-2D53-2644-206D7942484F} - C:\Programme\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited) O2 - BHO: (Java(tm) Plug-In SSV Helper) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Oracle\JavaFX 2.1 Runtime\bin\ssv.dll (Oracle Corporation) O2 - BHO: (Windows Live ID Sign-in Helper) - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Common Files\microsoft shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation) O2 - BHO: (Skype Browser Helper) - {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} - C:\Programme\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.) O2 - BHO: (Java(tm) Plug-In 2 SSV Helper) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Programme\Oracle\JavaFX 2.1 Runtime\bin\jp2ssv.dll (Oracle Corporation) O4 - HKLM..\Run: [AMD AVT] C:\Windows\System32\cmd.exe (Microsoft Corporation) O4 - HKLM..\Run: [avgnt] C:\Program Files\Avira\AntiVir Desktop\avgnt.exe (Avira Operations GmbH & Co. KG) O4 - HKLM..\Run: [Kernel and Hardware Abstraction Layer] C:\Windows\KHALMNPR.Exe (Logitech, Inc.) O4 - HKLM..\Run: [LifeCam] C:\Program Files\Microsoft LifeCam\LifeExp.exe (Microsoft Corporation) O4 - HKLM..\Run: [ Malwarebytes Anti-Malware (reboot)] C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe (Malwarebytes Corporation) O4 - HKLM..\Run: [NeroFilterCheck] C:\Programme\Common Files\Ahead\Lib\NeroCheck.exe (Nero AG) O4 - HKLM..\Run: [NokiaMServer] C:\Program Files\Common Files\Nokia\MPlatform\NokiaMServer.exe (Nokia) O4 - HKLM..\Run: [Samsung PanelMgr] C:\Windows\Samsung\PanelMgr\ssmmgr.exe () O4 - HKLM..\Run: [SPIRunE] C:\Windows\System32\SpiRunE.dll (Creative Technology Ltd.) O4 - HKLM..\Run: [StartCCC] C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe (Advanced Micro Devices, Inc.) O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [] File not found O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] C:\Program Files\Common Files\Ahead\Lib\NMBgMonitor.exe (Nero AG) O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [KiesPDLR] C:\Programme\Samsung\Kies\External\FirmwareUpdate\KiesPDLR.exe () O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [KiesPreload] C:\Program Files\Samsung\Kies\Kies.exe (Samsung) O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [KiesTrayAgent] C:\Programme\Samsung\Kies\KiesTrayAgent.exe (Samsung Electronics Co., Ltd.) O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [MyScript InkRetriever] C:/Program Files/Vision Objects/MyScript Studio/MyScript_GenericInkRetriever.exe () O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [NCsoft] File not found O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [NokiaOviSuite2] C:\Program Files\Nokia\Nokia Ovi Suite\NokiaOviSuite.exe (Nokia) O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [RESTART_STICKY_NOTES] C:\Windows\System32\StikyNot.exe (Microsoft Corporation) O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [SpybotSD TeaTimer] C:\Programme\Spybot - Search & Destroy\TeaTimer.exe (Safer Networking Limited) O4 - HKU\S-1-5-19..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (Microsoft Corporation) O4 - HKU\S-1-5-20..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (Microsoft Corporation) O4 - Startup: C:\Users\Franz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DesktopVideoPlayer.lnk = C:\Users\Franz\AppData\Local\vghd\bin\vghd.exe (Totem Entertainment) O4 - Startup: C:\Users\Franz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk = C:\Users\Franz\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.) O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3 O8 - Extra context menu item: Nach Microsoft E&xel exportieren - C:\Programme\Microsoft Office\Office12\EXCEL.EXE (Microsoft Corporation) O9 - Extra Button: ICQ7.4 - {73C6DCFB-B606-47F3-BDFA-9A4FBF931E37} - C:\Programme\ICQ7.4\ICQ.exe (ICQ, LLC.) O9 - Extra 'Tools' menuitem : ICQ7.4 - {73C6DCFB-B606-47F3-BDFA-9A4FBF931E37} - C:\Programme\ICQ7.4\ICQ.exe (ICQ, LLC.) O9 - Extra Button: Skype Click to Call - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Programme\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.) O9 - Extra 'Tools' menuitem : Skype Click to Call - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Programme\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.) O9 - Extra Button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\Programme\Microsoft Office\Office12\REFIEBAR.DLL (Microsoft Corporation) O9 - Extra 'Tools' menuitem : Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Programme\Spybot - Search & Destroy\SDHelper.dll (Safer Networking Limited) O10 - NameSpace_Catalog5\Catalog_Entries\000000000005 [] - C:\Programme\Bonjour\mdnsNSP.dll (Apple Inc.) O10 - NameSpace_Catalog5\Catalog_Entries\000000000006 [] - C:\Programme\Common Files\microsoft shared\Windows Live\WLIDNSP.DLL (Microsoft Corporation) O10 - NameSpace_Catalog5\Catalog_Entries\000000000007 [] - C:\Programme\Common Files\microsoft shared\Windows Live\WLIDNSP.DLL (Microsoft Corporation) O13 - gopher Prefix: missing O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab (Shockwave Flash Object) O16 - DPF: {F6ACF75C-C32C-447B-9BEF-46B766368D29} hxxp://ccfiles.creative.com/Web/softwareupdate/su2/ocx/15111/CTPID.cab (Creative Software AutoUpdate Support Package) O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.2.1 O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{6272D311-1F57-488D-96A3-CB34B831A241}: DhcpNameServer = 192.168.2.1 O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{71D124D7-5BDA-4E18-8F63-08450D43F15A}: DhcpNameServer = 192.168.2.1 O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{FA28B682-8CF6-42DD-95A4-78D04F055931}: DhcpNameServer = 195.50.140.248 192.168.0.1 O18 - Protocol\Handler\ms-help {314111c7-a502-11d2-bbca-00c04f8ec294} - C:\Programme\Common Files\microsoft shared\Help\hxds.dll (Microsoft Corporation) O18 - Protocol\Handler\skype4com {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Programme\Common Files\Skype\Skype4COM.dll (Skype Technologies) O18 - Protocol\Handler\skype-ie-addon-data {91774881-D725-4E58-B298-07617B9B86A8} - C:\Programme\Skype\Toolbars\Internet Explorer\skypeieplugin.dll (Skype Technologies S.A.) O18 - Protocol\Filter\text/xml {807563E5-5146-11D5-A672-00B0D022E945} - C:\Programme\Common Files\microsoft shared\OFFICE12\MSOXMLMF.DLL (Microsoft Corporation) O20 - HKLM Winlogon: Shell - (explorer.exe) - C:\Windows\explorer.exe (Microsoft Corporation) O20 - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) - C:\Windows\System32\userinit.exe (Microsoft Corporation) O20 - HKLM Winlogon: VMApplet - (SystemPropertiesPerformance.exe) - C:\Windows\System32\SystemPropertiesPerformance.exe (Microsoft Corporation) O20 - HKLM Winlogon: VMApplet - (/pagefile) - File not found O20 - Winlogon\Notify\LBTWlgn: DllName - (c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll) - c:\Programme\Common Files\Logishrd\Bluetooth\LBTWLgn.dll (Logitech, Inc.) O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. O32 - HKLM CDRom: AutoRun - 1 O32 - AutoRun File - [2009.06.10 23:42:20 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ] O32 - AutoRun File - [2010.10.04 11:57:10 | 000,000,125 | -H-- | M] () - D:\autorun.inf -- [ FAT32 ] O33 - MountPoints2\{6ef579fb-a35e-11e1-bd07-001e8c6f62df}\Shell - "" = AutoRun O33 - MountPoints2\{6ef579fb-a35e-11e1-bd07-001e8c6f62df}\Shell\AutoRun\command - "" = I:\LaunchU3.exe -a O33 - MountPoints2\{85392ad5-4955-11df-bc03-001e8c6f62df}\Shell - "" = AutoRun O33 - MountPoints2\{85392ad5-4955-11df-bc03-001e8c6f62df}\Shell\AutoRun\command - "" = I:\VFPcAssistant.exe O34 - HKLM BootExecute: (autocheck autochk *) O35 - HKLM\..comfile [open] -- "%1" %* O35 - HKLM\..exefile [open] -- "%1" %* O37 - HKLM\...com [@ = comfile] -- "%1" %* O37 - HKLM\...exe [@ = exefile] -- "%1" %* O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3) O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2) O38 - SubSystems\\Windows: (ServerDll=sxssrv,4) ========== Files/Folders - Created Within 30 Days ========== [2012.09.07 11:35:50 | 000,599,040 | ---- | C] (OldTimer Tools) -- C:\Users\Franz\Desktop\OTL.exe [2012.09.07 11:09:13 | 000,000,000 | ---D | C] -- C:\samsung [2012.08.15 20:22:26 | 002,382,848 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\mshtml.tlb [2012.08.15 20:22:25 | 000,176,640 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\ieui.dll [2012.08.15 20:22:24 | 001,800,704 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\jscript9.dll [2012.08.15 20:22:24 | 000,142,848 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\ieUnatt.exe [2012.08.15 20:22:24 | 000,065,024 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\jsproxy.dll [2012.08.15 20:22:23 | 001,427,968 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\inetcpl.cpl [2012.08.15 20:22:23 | 000,231,936 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\url.dll [2012.08.15 20:21:10 | 000,400,896 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\srcore.dll [2012.08.15 20:21:09 | 002,345,984 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\win32k.sys [2012.08.15 20:20:51 | 000,041,984 | ---- | C] (Microsoft Corporation) -- C:\Windows\System32\browcli.dll [1 C:\Windows\*.tmp files -> C:\Windows\*.tmp -> ] [1 C:\Users\Franz\*.tmp files -> C:\Users\Franz\*.tmp -> ] ========== Files - Modified Within 30 Days ========== [2013.08.18 20:27:55 | 000,001,984 | ---- | M] () -- C:\Users\Public\Desktop\Adobe Reader 9.lnk [2012.09.07 11:39:38 | 000,000,000 | ---- | M] () -- C:\Users\Franz\defogger_reenable [2012.09.07 11:36:27 | 000,654,150 | ---- | M] () -- C:\Windows\System32\perfh007.dat [2012.09.07 11:36:27 | 000,616,032 | ---- | M] () -- C:\Windows\System32\perfh009.dat [2012.09.07 11:36:27 | 000,130,022 | ---- | M] () -- C:\Windows\System32\perfc007.dat [2012.09.07 11:36:27 | 000,106,412 | ---- | M] () -- C:\Windows\System32\perfc009.dat [2012.09.07 11:33:49 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat [2012.09.07 11:33:39 | 2415,222,784 | -HS- | M] () -- C:\hiberfil.sys [2012.09.07 11:25:22 | 000,050,477 | ---- | M] () -- C:\Users\Franz\Desktop\Defogger.exe [2012.09.07 11:23:50 | 000,013,584 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 [2012.09.07 11:23:50 | 000,013,584 | -H-- | M] () -- C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 [2012.09.07 11:23:09 | 000,001,092 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineCore.job [2012.09.07 11:22:39 | 004,503,728 | ---- | M] () -- C:\ProgramData\dsgsdgdsgdsgw.pad [2012.09.07 00:27:11 | 000,001,096 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineUA.job [2012.09.07 00:19:20 | 000,599,040 | ---- | M] (OldTimer Tools) -- C:\Users\Franz\Desktop\OTL.exe [2012.09.07 00:18:01 | 000,000,884 | ---- | M] () -- C:\Windows\tasks\Adobe Flash Player Updater.job [2012.09.06 22:45:05 | 000,001,895 | ---- | M] () -- C:\Users\Franz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctfmon.lnk [2012.09.04 21:02:00 | 000,011,227 | ---- | M] () -- C:\Users\Franz\AppData\Roaming\SmarThruOptions.xml [2012.08.23 14:18:07 | 000,696,520 | ---- | M] (Adobe Systems Incorporated) -- C:\Windows\System32\FlashPlayerApp.exe [2012.08.23 14:18:07 | 000,073,416 | ---- | M] (Adobe Systems Incorporated) -- C:\Windows\System32\FlashPlayerCPLApp.cpl [2012.08.21 21:40:02 | 026,987,412 | ---- | M] () -- C:\ProgramData\SamPCFax0000495C0001 [2012.08.16 21:57:52 | 000,001,358 | ---- | M] () -- C:\Users\Franz\Desktop\AB156_IG_Kleinanzeigen.rtf - Verknüpfung.lnk [2012.08.16 21:57:49 | 000,001,407 | ---- | M] () -- C:\Users\Franz\Desktop\AB156_IG_Horasisches_Allerlei.rtf - Verknüpfung.lnk [2012.08.16 21:45:35 | 000,001,500 | ---- | M] () -- C:\Users\Franz\Desktop\AB156_IG_Salamander.rtf - Verknüpfung.lnk [2012.08.15 23:08:27 | 000,015,448 | ---- | M] () -- C:\Users\Franz\.heldEinstellungen4_1.xml [2012.08.15 23:07:00 | 000,000,456 | ---- | M] () -- C:\Users\Franz\.dsa4.properties [2012.08.15 20:34:18 | 000,629,184 | ---- | M] () -- C:\Windows\System32\FNTCACHE.DAT [2012.08.14 21:30:01 | 000,003,296 | ---- | M] () -- C:\Users\Franz\Desktop\Stundenplan_2012_08.jpg - Verknüpfung.lnk [1 C:\Windows\*.tmp files -> C:\Windows\*.tmp -> ] [1 C:\Users\Franz\*.tmp files -> C:\Users\Franz\*.tmp -> ] ========== Files Created - No Company Name ========== [2012.09.07 11:39:38 | 000,000,000 | ---- | C] () -- C:\Users\Franz\defogger_reenable [2012.09.07 11:38:37 | 000,050,477 | ---- | C] () -- C:\Users\Franz\Desktop\Defogger.exe [2012.09.06 22:45:05 | 004,503,728 | ---- | C] () -- C:\ProgramData\dsgsdgdsgdsgw.pad [2012.09.06 22:45:05 | 000,001,895 | ---- | C] () -- C:\Users\Franz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctfmon.lnk [2012.08.21 21:40:01 | 026,987,412 | ---- | C] () -- C:\ProgramData\SamPCFax0000495C0001 [2012.08.16 21:57:52 | 000,001,358 | ---- | C] () -- C:\Users\Franz\Desktop\AB156_IG_Kleinanzeigen.rtf - Verknüpfung.lnk [2012.08.16 21:57:49 | 000,001,407 | ---- | C] () -- C:\Users\Franz\Desktop\AB156_IG_Horasisches_Allerlei.rtf - Verknüpfung.lnk [2012.08.16 21:45:35 | 000,001,500 | ---- | C] () -- C:\Users\Franz\Desktop\AB156_IG_Salamander.rtf - Verknüpfung.lnk [2012.08.14 21:30:01 | 000,003,296 | ---- | C] () -- C:\Users\Franz\Desktop\Stundenplan_2012_08.jpg - Verknüpfung.lnk [2012.07.19 17:57:38 | 000,015,878 | ---- | C] () -- C:\Users\Franz\pluginsautoUpdater.jar [2012.06.11 13:50:42 | 000,159,232 | ---- | C] () -- C:\Windows\System32\clinfo.exe [2012.05.26 11:33:39 | 000,000,000 | ---- | C] () -- C:\Windows\ativpsrm.bin [2012.05.26 11:30:42 | 000,003,917 | ---- | C] () -- C:\Windows\System32\atipblag.dat [2012.04.12 21:30:10 | 000,637,743 | ---- | C] () -- C:\Windows\System32\atiicdxx.dat [2012.04.06 03:21:42 | 000,204,952 | ---- | C] () -- C:\Windows\System32\ativvsvl.dat [2012.04.06 03:21:42 | 000,157,144 | ---- | C] () -- C:\Windows\System32\ativvsva.dat [2012.03.09 14:06:14 | 000,024,576 | ---- | C] () -- C:\Windows\System32\kdbsdk32.dll [2012.01.13 13:41:51 | 000,033,792 | ---- | C] () -- C:\Users\Franz\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini [2011.06.21 12:40:39 | 000,066,048 | ---- | C] () -- C:\Windows\System32\PrintBrmUi.exe [2011.06.07 11:13:38 | 000,974,848 | ---- | C] () -- C:\Windows\System32\cis-2.4.dll [2011.06.07 11:13:38 | 000,081,920 | ---- | C] () -- C:\Windows\System32\issacapi_bs-2.3.dll [2011.06.07 11:13:38 | 000,065,536 | ---- | C] () -- C:\Windows\System32\issacapi_pe-2.3.dll [2011.06.07 11:13:38 | 000,057,344 | ---- | C] () -- C:\Windows\System32\issacapi_se-2.3.dll [2011.06.07 11:13:38 | 000,030,568 | ---- | C] () -- C:\Windows\MusiccityDownload.exe [2011.04.09 18:55:28 | 000,179,261 | ---- | C] () -- C:\Windows\System32\xlive.dll.cat [2011.03.21 00:16:48 | 000,053,299 | ---- | C] () -- C:\Windows\System32\pthreadVC.dll [2011.01.28 18:16:39 | 000,140,089 | ---- | C] () -- C:\Windows\OVKSETUP.EXE [2011.01.03 04:58:45 | 000,000,064 | ---- | C] () -- C:\ProgramData\SamPCFax0000162C0002 [2011.01.03 04:58:45 | 000,000,004 | ---- | C] () -- C:\ProgramData\SamPCFax000014D80003 [2011.01.03 04:58:44 | 000,000,064 | ---- | C] () -- C:\ProgramData\SamPCFax0000168C0001 [2010.12.02 16:57:04 | 000,140,288 | ---- | C] () -- C:\Windows\System32\igfxtvcx.dll [2010.11.18 16:40:49 | 000,011,227 | ---- | C] () -- C:\Users\Franz\AppData\Roaming\SmarThruOptions.xml [2010.11.18 16:40:48 | 000,036,864 | ---- | C] () -- C:\Windows\System32\SvcMan.exe [2010.11.18 16:40:41 | 000,000,124 | ---- | C] () -- C:\Windows\Readiris.ini [2010.11.18 16:40:39 | 000,023,040 | ---- | C] () -- C:\Windows\System32\irisco32.dll [2010.11.18 16:39:01 | 000,482,408 | ---- | C] () -- C:\Windows\ssndii.exe [2010.11.18 16:38:59 | 000,113,768 | ---- | C] () -- C:\Windows\Wiainst.exe [2010.11.18 16:38:33 | 000,026,624 | ---- | C] () -- C:\Windows\System32\sso2ml3.dll [2010.11.18 16:38:03 | 000,270,336 | ---- | C] () -- C:\Windows\System32\SaMinDrv.dll [2010.11.18 16:38:03 | 000,106,496 | ---- | C] () -- C:\Windows\System32\SaImgFlt.dll [2010.11.18 16:38:03 | 000,090,112 | ---- | C] () -- C:\Windows\System32\SaSegFlt.dll [2010.11.18 16:38:03 | 000,061,440 | ---- | C] () -- C:\Windows\System32\SaErHdlr.dll [2010.05.03 16:19:02 | 000,007,389 | ---- | C] () -- C:\Users\Franz\.heldEinstellungen.xml [2010.03.02 16:29:31 | 000,015,448 | ---- | C] () -- C:\Users\Franz\.heldEinstellungen4_1.xml [2010.03.02 16:29:31 | 000,000,456 | ---- | C] () -- C:\Users\Franz\.dsa4.properties [2010.02.20 18:38:19 | 000,000,604 | -H-- | C] () -- C:\ProgramData\T2 [2010.02.20 18:38:19 | 000,000,604 | -H-- | C] () -- C:\Program Files\STLL Notifier [2010.02.20 03:47:07 | 000,000,056 | -H-- | C] () -- C:\ProgramData\ezsidmv.dat ========== LOP Check ========== [2010.02.20 17:39:54 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Ahnenblatt [2010.12.30 17:30:51 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\anoto [2010.03.13 03:55:57 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Command & Conquer 3 Kanes Rache [2010.03.11 04:09:00 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Command & Conquer 3 Tiberium Wars [2012.09.07 11:23:23 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Dropbox [2012.04.12 11:01:39 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\elsterformular [2012.01.10 23:43:00 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\GetRightToGo [2012.04.02 13:20:08 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\ICQ [2010.10.23 16:28:44 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Leadertech [2010.07.20 21:56:53 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\LolClient [2012.05.24 15:20:36 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\LolClient2 [2011.05.26 18:31:16 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Neuratron [2011.07.28 14:31:19 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Nokia [2011.07.28 14:31:20 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Nokia Ovi Suite [2011.07.28 14:05:31 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\PC Suite [2011.07.28 14:43:03 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Samsung [2012.04.29 14:32:44 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Spotify [2011.12.29 14:45:06 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Temp [2010.07.20 22:24:34 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\Thunderbird [2011.07.21 23:27:45 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\TS3Client [2011.07.21 23:17:23 | 000,000,000 | ---D | M] -- C:\Users\Franz\AppData\Roaming\ts3overlay [2012.08.21 01:03:07 | 000,032,632 | ---- | M] () -- C:\Windows\Tasks\SCHEDLGU.TXT ========== Purity Check ========== < End of report > |
07.09.2012, 11:46 | #2 |
/// Helfer-Team | GVU-Trojaner am 06.09. eingefangen, einige KomplikationenDie Bereinigung besteht aus mehreren Schritten, die ausgefuehrt werden muessen. Diese Nacheinander abarbeiten und die 4 Logs, die dabei erstellt werden bitte in deine naechste Antwort einfuegen. Sollte der OTL-FIX nicht richig durchgelaufen sein. Fahre nicht fort, sondern mede dies bitte. 1. Schritt Fixen mit OTL Lade (falls noch nicht vorhanden) OTL von Oldtimer herunter und speichere es auf Deinem Desktop (nicht woanders hin).
Code:
ATTFilter :OTL SRV - (SBSDWSCService) -- C:\Program Files\Spybot File not found DRV - (Lbd) -- system32\DRIVERS\Lbd.sys File not found IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local FF - prefs.js..extensions.enabledItems: {AB2CE124-6272-4b12-94A9-7303C7397BD1}:4.2.0.5198 FF - user.js - File not found FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=: File not found File not found (No name found) -- C:\PROGRAM FILES\MOZILLA FIREFOX\EXTENSIONS\{AB2CE124-6272-4B12-94A9-7303C7397BD1} File not found (No name found) -- C:\PROGRAM FILES\MOZILLA FIREFOX\EXTENSIONS\{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} O4 - HKLM..\Run: [SPIRunE] C:\Windows\System32\SpiRunE.dll (Creative Technology Ltd.) O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [] File not found O4 - HKU\S-1-5-21-2313672046-3609280911-3733394360-1001..\Run: [NCsoft] File not found O4 - Startup: C:\Users\Franz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DesktopVideoPlayer.lnk = C:\Users\Franz\AppData\Local\vghd\bin\vghd.exe (Totem Entertainment) O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3 O20 - HKLM Winlogon: VMApplet - (/pagefile) - File not found O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. O32 - HKLM CDRom: AutoRun - 1 O32 - AutoRun File - [2009.06.10 23:42:20 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ] O32 - AutoRun File - [2010.10.04 11:57:10 | 000,000,125 | -H-- | M] () - D:\autorun.inf -- [ FAT32 ] O33 - MountPoints2\{6ef579fb-a35e-11e1-bd07-001e8c6f62df}\Shell - "" = AutoRun O33 - MountPoints2\{6ef579fb-a35e-11e1-bd07-001e8c6f62df}\Shell\AutoRun\command - "" = I:\LaunchU3.exe -a O33 - MountPoints2\{85392ad5-4955-11df-bc03-001e8c6f62df}\Shell - "" = AutoRun O33 - MountPoints2\{85392ad5-4955-11df-bc03-001e8c6f62df}\Shell\AutoRun\command - "" = I:\VFPcAssistant.exe [2012.09.07 11:22:39 | 004,503,728 | ---- | M] () -- C:\ProgramData\dsgsdgdsgdsgw.pad [2012.09.06 22:45:05 | 000,001,895 | ---- | M] () -- C:\Users\Franz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctfmon.lnk :Files C:\ProgramData\*.exe C:\ProgramData\TEMP C:\Users\Franz\AppData\Local\{*} C:\Users\Franz\AppData\Local\Temp\*.exe C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ctfmon.lnk ipconfig /flushdns /c :Commands [purity] [emptytemp]
Hinweis für Mitleser: Obiges OTL-Script ist ausschließlich für diesen User in dieser Situtation erstellt worden. Auf keinen Fall auf anderen Rechnern anwenden, das kann andere Systeme nachhaltig schädigen! 2. Schritt Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten.danach: 3. Schritt Downloade Dir bitte AdwCleaner auf deinen Desktop.
4. Schritt
__________________ |
07.09.2012, 11:56 | #3 |
| GVU-Trojaner am 06.09. eingefangen, einige Komplikationen Hallo t'john,
__________________Schmal vielen dann für die schnelle Hilfe. Bin gerade unterwegs, versuche mich aber direkt mal an den fixes, wenn ich wieder zuhause bin. Es wäre total klasse, wenn du auch noch was zu meinen anderen Fragen (nicht erreichbare Partition, externe Platte, etc) sagen könntest. Vielen dank nochmals 1. Schritt erledigt: Logfile sieht so aus: Code:
ATTFilter All processes killed ========== OTL ========== Service SBSDWSCService stopped successfully! Service SBSDWSCService deleted successfully! File C:\Program Files\Spybot File not found not found. Service Lbd stopped successfully! Service Lbd deleted successfully! File system32\DRIVERS\Lbd.sys File not found not found. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found. HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! HKEY_USERS\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! Registry key HKEY_USERS\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found. HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! HKU\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyOverride| /E : value set successfully! Prefs.js: {AB2CE124-6272-4b12-94A9-7303C7397BD1}:4.2.0.5198 removed from extensions.enabledItems Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@Apple.com/iTunes,version=\ deleted successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\SPIRunE deleted successfully. C:\Windows\System32\SpiRunE.dll moved successfully. Registry value HKEY_USERS\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Windows\CurrentVersion\Run\\ deleted successfully. Registry value HKEY_USERS\S-1-5-21-2313672046-3609280911-3733394360-1001\Software\Microsoft\Windows\CurrentVersion\Run\\NCsoft deleted successfully. C:\Users\Franz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DesktopVideoPlayer.lnk moved successfully. C:\Users\Franz\AppData\Local\vghd\bin\vghd.exe moved successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorAdmin deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorUser deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\VMApplet:/pagefile deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! C:\autoexec.bat moved successfully. File D:\autorun.inf not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{6ef579fb-a35e-11e1-bd07-001e8c6f62df}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6ef579fb-a35e-11e1-bd07-001e8c6f62df}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{6ef579fb-a35e-11e1-bd07-001e8c6f62df}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6ef579fb-a35e-11e1-bd07-001e8c6f62df}\ not found. File I:\LaunchU3.exe -a not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{85392ad5-4955-11df-bc03-001e8c6f62df}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{85392ad5-4955-11df-bc03-001e8c6f62df}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{85392ad5-4955-11df-bc03-001e8c6f62df}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{85392ad5-4955-11df-bc03-001e8c6f62df}\ not found. File I:\VFPcAssistant.exe not found. C:\ProgramData\dsgsdgdsgdsgw.pad moved successfully. C:\Users\Franz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctfmon.lnk moved successfully. ========== FILES ========== File\Folder C:\ProgramData\*.exe not found. File\Folder C:\ProgramData\TEMP not found. File\Folder C:\Users\Franz\AppData\Local\{*} not found. C:\Users\Franz\AppData\Local\Temp\abd2bca3e572e998a09f73c81b93454a.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\A~NSISu_.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\B~NSISu_.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\FlashPlayerUpdate.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-1.6.0_20-windows-i586-iftw.exe_90744722.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-6u20-windows-i586-jinstall_uac.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-6u21-windows-i586-iftw-rv.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-6u22-windows-i586-iftw-rv.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-6u23-windows-i586-iftw-rv.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-6u24-windows-i586-iftw-rv.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-6u26-windows-i586-iftw-rv.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-6u29-windows-i586-iftw-rv.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-6u31-windows-i586-iftw-rv.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\jre-7u5-windows-i586-iftw.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\ose00000.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\SkypeSetup.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\wgsdgsdgdsgsd.exe moved successfully. C:\Users\Franz\AppData\Local\Temp\_isCE09.exe moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\tmp folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\muffin folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\host folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\62 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\61 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\6 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\59 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\51 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\49 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\4 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\39 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\26 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\19 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\17 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0 folder moved successfully. C:\Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache folder moved successfully. File/Folder C:\Users\Franz\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctfmon.lnk not found. < ipconfig /flushdns /c > Windows-IP-Konfiguration Der DNS-Aufl”sungscache konnte nicht geleert werden: Beim Ausfhren der Funktion ist ein Fehler aufgetreten. C:\Users\Franz\Desktop\cmd.bat deleted successfully. C:\Users\Franz\Desktop\cmd.txt deleted successfully. ========== COMMANDS ========== [EMPTYTEMP] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes ->Flash cache emptied: 56504 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes ->Flash cache emptied: 0 bytes User: Franz ->Temp folder emptied: 676847385 bytes ->Temporary Internet Files folder emptied: 191197544 bytes ->FireFox cache emptied: 5373485 bytes ->Flash cache emptied: 4393239 bytes User: Public %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 200704 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 270935198 bytes RecycleBin emptied: 1129037 bytes Total Files Cleaned = 1.097,00 mb OTL by OldTimer - Version 3.2.61.0 log created on 09072012_153334 Files\Folders moved on Reboot... PendingFileRenameOperations files... Registry entries deleted on Reboot... -Internet-Verbindung geht, ohne dass der Trojaner sich meldet. -Leider ist die Daten-Partition D: immer noch verschwunden Als nächstes spiele ich die neueste Version von Malwarebytes auf (wieder per USB, da mein Firefox-Profil auf der D:-Partition liegt) und lasse den Scan laufen. Kurze Ergänzung: Malwarebytes läuft und interessanterweise kann ich im Programm die Datenpartition D: zur Überprüfung auswählen. Nur über den Explorer und so habe ich keinen Zugriff. |
07.09.2012, 14:58 | #4 |
/// Helfer-Team | GVU-Trojaner am 06.09. eingefangen, einige Komplikationen Wie weit bist du denn gekommen? Zuerst sollte der Virus gestoppt werden, dann koennen wir den Hardware-Teil angehen. |
07.09.2012, 15:04 | #5 |
| GVU-Trojaner am 06.09. eingefangen, einige Komplikationen Naja, wie gesagt: -OTL ist durch (Log oben) -Malwarebytes läuft gerade (und findet auch die D:-Partition - irgendwie ist sie also noch da); aus Erfahrung würde ich sagen, es läuft auch noch ne Weile Vielen Dank auch weiterhin, ist ein tolles Board hier. So, nächste Schritte erledigt: 2.) Malwarebytes ist durchgelaufen: Code:
ATTFilter Malwarebytes Anti-Malware 1.62.0.1300 www.malwarebytes.org Datenbank Version: v2012.09.07.09 Windows 7 Service Pack 1 x86 NTFS Internet Explorer 9.0.8112.16421 Franz :: RECHENKNECHT [Administrator] 07.09.2012 15:48:34 mbam-log-2012-09-07 (15-48-34).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|) Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 325778 Laufzeit: 55 Minute(n), 42 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 0 (Keine bösartigen Objekte gefunden) (Ende) 3.) AdwCleaner Suche: Code:
ATTFilter # AdwCleaner v2.000 - Datei am 09/07/2012 um 16:46:21 erstellt # Aktualisiert am 30/08/2012 von Xplode # Betriebssystem : Windows 7 Professional Service Pack 1 (32 bits) # Benutzer : Franz - RECHENKNECHT # Normaler Modus : Normal # Ausgeführt unter : C:\Users\Franz\Desktop\adwcleaner.exe # Option [Suche] **** [Dienste] **** ***** [Dateien / Ordner] ***** Ordner Gefunden : C:\Users\Franz\AppData\Local\vghd ***** [Registrierungsdatenbank] ***** Schlüssel Gefunden : HKCU\Software\Softonic Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{813A22E0-3E2B-4188-9BDA-ECA9878B8D48} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994} Schlüssel Gefunden : HKLM\SOFTWARE\Software ***** [Internet Browser] ***** -\\ Internet Explorer v9.0.8112.16421 [OK] Die Registrierungsdatenbank ist sauber. -\\ Mozilla Firefox v14.0.1 (de) Profilname : default Datei : C:\Users\Franz\AppData\Roaming\Mozilla\Firefox\Profiles\a29y5r4k.default\prefs.js [OK] Die Datei ist sauber. ************************* AdwCleaner[R1].txt - [1446 octets] - [07/09/2012 16:46:21] ########## EOF - C:\AdwCleaner[R1].txt - [1506 octets] ########## Code:
ATTFilter # AdwCleaner v2.000 - Datei am 09/07/2012 um 16:47:32 erstellt # Aktualisiert am 30/08/2012 von Xplode # Betriebssystem : Windows 7 Professional Service Pack 1 (32 bits) # Benutzer : Franz - RECHENKNECHT # Normaler Modus : Normal # Ausgeführt unter : C:\Users\Franz\Desktop\adwcleaner.exe # Option [Löschen] **** [Dienste] **** ***** [Dateien / Ordner] ***** Ordner Gelöscht : C:\Users\Franz\AppData\Local\vghd ***** [Registrierungsdatenbank] ***** Schlüssel Gelöscht : HKCU\Software\Softonic Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556} Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Interface\{813A22E0-3E2B-4188-9BDA-ECA9878B8D48} Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994} Schlüssel Gelöscht : HKLM\SOFTWARE\Software ***** [Internet Browser] ***** -\\ Internet Explorer v9.0.8112.16421 Wiederhergestellt : [HKCU\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope] Wiederhergestellt : [HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes - DefaultScope] Wiederhergestellt : [HKU\S-1-5-18\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope] Wiederhergestellt : [HKU\S-1-5-19\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope] Wiederhergestellt : [HKU\S-1-5-20\Software\Microsoft\Internet Explorer\SearchScopes - DefaultScope] -\\ Mozilla Firefox v14.0.1 (de) Profilname : default Datei : C:\Users\Franz\AppData\Roaming\Mozilla\Firefox\Profiles\a29y5r4k.default\prefs.js [OK] Die Datei ist sauber. ************************* AdwCleaner[R1].txt - [1575 octets] - [07/09/2012 16:46:21] AdwCleaner[S1].txt - [1951 octets] - [07/09/2012 16:47:32] ########## EOF - C:\AdwCleaner[S1].txt - [2011 octets] ########## Als nächstes lade ich mal Emsisoft Anti-Malware runter, da das ja hier sonst immer als nächstes empfohlen wird, mache aber sonst mal noch nichts. So, ich entschuldige mich schonmal, wenn ich damit für Komplikationen sorge, aber ich habe mal weitergemacht, weil ich an diesem Wochenende dringend arbeiten muss und daher Zugriff auf meine Dateien brauche. Ein Scan einer aktualisierten Emsisoft-Antimalware erbrachte Folgendes: Code:
ATTFilter Emsisoft Anti-Malware - Version 6.6 Letztes Update: 08.09.2012 12:10:46 Scan Einstellungen: Scan Methode: Detail Scan Objekte: Rootkits, Speicher, Traces, C:\ Archiv Scan: An ADS Scan: An Scan Beginn: 08.09.2012 12:12:40 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\3bea1ec7-1c9bc0a4 -> mail\ClassType.class gefunden: Java.Exploit.CVE-2010!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\437bea7c-1378e6a3 -> support\IO.class gefunden: Exploit.Java.CVE-2010!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63\33c1867f-4411f445 -> youtuba\youtubd.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\3bea1ec7-1c9bc0a4 -> mail\SendMail.class gefunden: Java.Exploit.CVE-2010!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\3bea1ec7-1c9bc0a4 -> mail\MailAgent.class gefunden: Exploit.Java.CVE-2010-0840!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\437bea7c-1378e6a3 -> support\Pipe.class gefunden: Exploit.Java.CVE!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\437bea7c-1378e6a3 -> support\SendMail.class gefunden: Java.Exploit.CVE-2010!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\437bea7c-1378e6a3 -> support\SmartyPointer.class gefunden: JAVA.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\437bea7c-1378e6a3 -> support\Socket.class gefunden: Exploit.Java.CVE-2010!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58\58f6f4ba-3bab1bfd -> bpac\KAVS.class gefunden: Trojan-Downloader.Java.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58\58f6f4ba-3bab1bfd -> bpac\a.class gefunden: Trojan-Downloader.Java.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\5770bf37-4c407786 -> ya\yc.class gefunden: Exploit.Java.CVE-2012-0507!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58\58f6f4ba-3bab1bfd -> bpac\a$1.class gefunden: Java.Trojan-Downloader.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\5770bf37-4c407786 -> ya\M.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58\58f6f4ba-3bab1bfd -> bpac\b.class gefunden: Trojan.Java.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\5770bf37-4c407786 -> ya\yb.class gefunden: Java.Exploit.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\1595aeb5-3d93adcc -> bpac\a.class gefunden: Trojan-Downloader.Java.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\5a772277-1d907f44 gefunden: Exploit.Java.Blacole!E1 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\1595aeb5-3d93adcc -> bpac\a$1.class gefunden: Java.Trojan-Downloader.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\5770bf37-4c407786 -> ya\ya.class gefunden: Java.Exploit.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\259ad575-403db2ea -> Field.class gefunden: JAVA.Small!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\259ad575-403db2ea -> first.class gefunden: Trojan.Java.Exploit!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\259ad575-403db2ea -> Effect.class gefunden: Virus.Java.Exploit!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\259ad575-403db2ea -> Photo.class gefunden: Exploit.Java.CVE!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\21cae034-7e1f8a95 -> ER.class gefunden: Exploit.-!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\1595aeb5-3d93adcc -> bpac\KAVS.class gefunden: Trojan-Downloader.Java.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\21cae034-7e1f8a95 -> vc.class gefunden: Exploit.Java.CVE!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\1595aeb5-3d93adcc -> bpac\b.class gefunden: Trojan.Java.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\21cae034-7e1f8a95 -> Inc.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\259ad575-403db2ea -> Matrix.class gefunden: JAVA.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\4ab7d745-577c3186 -> json\Option.class gefunden: Java.Exploit.CVE-2010!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\21cae034-7e1f8a95 -> va.class gefunden: Trojan.Java.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\4ab7d745-577c3186 -> json\SmartyPointer.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\4ab7d745-577c3186 -> json\ThreadParser.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\4ab7d745-577c3186 -> json\XML.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 -> a0ee3d65141.class gefunden: Exploit.Java.CVE!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\21cae034-7e1f8a95 -> lz.class gefunden: Exploit.Java.CVE-2011-3544!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 -> a66d578f084.class gefunden: JAVA.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\21cae034-7e1f8a95 -> vb.class gefunden: Exploit.MS04.CVE-2004-0210-2010-0840.HE!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 -> a4cb9b1a8a5.class gefunden: Trojan-Downloader.Java.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\4ab7d745-577c3186 -> json\Parser.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 -> a6a7a760c0e gefunden: Trojan.Java.Mesdeh!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 -> aa79d1019d8.class gefunden: Exploit.Java.CVE-2008-5353!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 -> af439f03798.class gefunden: Trojan-Downloader.Java.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 -> ab5601d4848.class gefunden: JAVA.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 -> ae28546890f.class gefunden: JAVA.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 -> ab16db71cdc.class gefunden: JAVA.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\225323ae-637a58ad -> ya\M.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\74a1026e-6cb13016 -> a\a.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\74a1026e-6cb13016 -> a\b.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\74a1026e-6cb13016 -> a\J.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\74a1026e-6cb13016 -> a\ya.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\225323ae-637a58ad -> ya\yb.class gefunden: Java.Exploit.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\756e4265-674468be -> report\FWriter.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\756e4265-674468be -> report\Generator.class gefunden: Exploit.Java.CVE-2010-0840!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\4\6b64a084-56b23e6b gefunden: Trojan.Win32.Reveton.AMN!E1 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\225323ae-637a58ad -> ya\ya.class gefunden: Java.Exploit.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\756e4265-674468be -> report\SmartyPointer.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\756e4265-674468be -> report\GPanel.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\756e4265-674468be -> report\HDDDetect.class gefunden: Exploit.Java.CVE-2010-0840!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\225323ae-637a58ad -> ya\yc.class gefunden: Exploit.Java.CVE-2012-0507!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\55bdebe4-4f750b78 -> ta\ta.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\55bdebe4-4f750b78 -> ta\tb.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\55bdebe4-4f750b78 -> ta\L.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\2d4231f-1d701891 -> bpac\a$1.class gefunden: Java.Trojan-Downloader.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\2d4231f-1d701891 -> bpac\a.class gefunden: Trojan-Downloader.Java.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\2d4231f-1d701891 -> bpac\b.class gefunden: Trojan.Java.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\2d4231f-1d701891 -> bpac\KAVS.class gefunden: Trojan-Downloader.Java.OpenConnection!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\1f12c2c3-714f94b8 -> a\Help.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\1f12c2c3-714f94b8 -> a\Test.class gefunden: Exploit.Java.CVE-2011-3544!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28\2e002d9c-1227cf2e -> com\bitcoinplus\applet\MiningApplet.class gefunden: Java.Bitcoin!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\44662015-3eb602b4 -> roiqa\roiqb.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\44662015-3eb602b4 -> roiqa\roiqc.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\44662015-3eb602b4 -> roiqa\roiqd.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\44662015-3eb602b4 -> roiqa\roiqa.class gefunden: Exploit.Java.CVE-2012-1723!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-4ced6e62 -> json\ThreadParser.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-4ced6e62 -> json\XML.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-4ced6e62 -> json\SmartyPointer.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-4ced6e62 -> json\Option.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\f3002d0-7e0e9e63 -> wa\wb.class gefunden: Exploit.JS.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\f3002d0-7e0e9e63 -> wa\J.class gefunden: Exploit.JS.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\f3002d0-7e0e9e63 -> wa\wa.class gefunden: Exploit.JS.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-4ced6e62 -> json\Parser.class gefunden: Exploit.Java.CVE-2010-0840!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\f3002d0-7e0e9e63 -> wa\wc.class gefunden: Exploit.JS.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\f3002d0-7e0e9e63 -> wa\u.class gefunden: Exploit.Java.CVE!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\1e64f001-55bba174 -> Keyworq.class gefunden: Exploit.Java.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\1e64f001-55bba174 -> Uutecwv.class gefunden: Trojan-Downloader.Java.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\5c5ccc40-581801ec -> AppleT.class gefunden: Exploit.Java.Agent!E2 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\Local\Temp\wgsdgsdgdsgsd.exe gefunden: Trojan.Win32.Reveton.AMN!E1 C:\Windows\Installer\{4A19E752-56D4-4B22-BACC-256B491E8756}\NewShortcut2_DB521B34285640BE99C098F7D39BFD88.pdf gefunden: Trojan.Win32.Agent!E1 Gescannt 582938 Gefunden 90 Scan Ende: 08.09.2012 12:47:11 Scan Zeit: 0:34:31 Der letzte aber ein weiteres. Ich habe mit dem jetzt erstmal noch nichts gemacht (also auch nicht in Quarantäne verschoben), da in den meisten Anleitungen ja steht "erstmal noch nichts löschen". Ich hoffe, t'john, du kannst mir auch trotz meiner Eigenmächtigkeiten weiterhelfen. Nach wie vor ist leider die D: Partition verschwunden. Ich hab mal in der Datenträgerverwaltung nachgesehen und der zeigt mir 400 GB als frei an :-( Ich hoffe ich komme irgendwie noch dran. |
08.09.2012, 13:42 | #6 | |
/// Helfer-Team | GVU-Trojaner am 06.09. eingefangen, einige KomplikationenZitat:
Mit der Rekonstruktion von Partitionstabellen habe ich weniger Erfahrung. Das Thema hier schildern: http://www.trojaner-board.de/alles-rund-um-windows/ Schliesse die Externe mit an und mache den Scan: ESET Online Scanner Vorbereitung
__________________ --> GVU-Trojaner am 06.09. eingefangen, einige Komplikationen |
08.09.2012, 15:41 | #7 |
| GVU-Trojaner am 06.09. eingefangen, einige Komplikationen Hi t'john, danke für die weitere Betreuung. Ich mach mich dann jetzt mal an ESET. Frage zuvor: Soll ich den Emsisoft-Scanner deinstallieren? (Ist in den anderen Threads immer empfohlen) Und: Soll ich diesen 90. Fund (also den noch nicht von OTL verschobenen) in Quarantäne verschieben bevor ich den ESET-Scanner starte. Achja und noch ne ganz dumme Frage: Es kann nicht ein, dass das Verschwinden meiner Partition irgend etwas mit Defogger zu tun hat? Wieder ein Nachtrag: Mit dem Starten von ESET warte ich dann mal bis ich eine Antwort von dir habe, ob ich vorher den Emsisoft-Scanner deinstallieren soll. Und noch was: -CD/DVD-Laufwerk geht jetzt wieder (hab es ausgetauscht) kann also für evtl. Rettungstaten genutzt werden. -Das Partitionproblem hab ich jetzt mal hier geschildert. Ich meinte natürlich hier: http://www.trojaner-board.de/123745-...schwunden.html geschildert. t'john, könntest du mir noch kurz sagen, ob ich vor dem ESET diesen Fund: Code:
ATTFilter C:\Windows\Installer\{4A19E752-56D4-4B22-BACC-256B491E8756}\NewShortcut2_DB521B34285640BE99C098F7D39BFD88.pdf gefunden: Trojan.Win32.Agent!E1 Also auch nochmal: Vielen Dank! So, hab mich dann doch entschieden wie sonst überall angewiesen Emsi zu deinstallieren (habe vorher die Datei in Quarantäne verschoben) und dann ESET laufen lassen: Code:
ATTFilter ESETSmartInstaller@High as downloader log: all ok ESETSmartInstaller@High as downloader log: all ok # version=7 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6583 # api_version=3.0.2 # EOSSerial=0e3bbf0ff08d034284ab4c229885649a # end=finished # remove_checked=true # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2012-09-09 12:20:23 # local_time=2012-09-09 02:20:23 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # lang=1033 # osver=6.1.7601 NT Service Pack 1 # compatibility_mode=1792 16777215 100 0 28289811 28289811 0 0 # compatibility_mode=5893 16776574 100 94 41619 98774452 0 0 # compatibility_mode=8192 67108863 100 0 532 532 0 0 # scanned=256260 # found=24 # cleaned=24 # scan_time=6929 C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\Local\Temp\wgsdgsdgdsgsd.exe a variant of Win32/Kryptik.ALNU trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\5c5ccc40-581801ec a variant of OSX/Exploit.Smid.D trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\1e64f001-55bba174 a variant of Java/Exploit.Agent.NAC trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16\f3002d0-7e0e9e63 Java/Exploit.Agent.NBE trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-4ced6e62 Java/Exploit.Agent.NAO trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21\44662015-3eb602b4 Java/Exploit.CVE-2012-1723.F trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\1f12c2c3-714f94b8 a variant of Java/TrojanDownloader.Agent.NDR trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31\2d4231f-1d701891 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\55bdebe4-4f750b78 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37\756e4265-674468be Java/Agent.DW trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\4\6b64a084-56b23e6b a variant of Win32/Kryptik.ALNU trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\225323ae-637a58ad Java/Exploit.Agent.NAY trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46\74a1026e-6cb13016 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\4ab7d745-577c3186 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5\544af645-4a47dff9 Java/TrojanDownloader.Agent.NBU trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52\21cae034-7e1f8a95 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\1595aeb5-3d93adcc multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53\259ad575-403db2ea Java/Exploit.CVE-2011-3544.AV trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\5770bf37-4c407786 Java/Exploit.Agent.NAY trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\5a772277-1d907f44 Java/Exploit.CVE-2012-1723.E trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58\58f6f4ba-3bab1bfd multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60\437bea7c-1378e6a3 Java/Agent.DR trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63\33c1867f-4411f445 a variant of Java/Exploit.CVE-2012-4681.O trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\09072012_153334\C_Users\Franz\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\3bea1ec7-1c9bc0a4 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C Wie geht's weiter? |
09.09.2012, 23:34 | #8 |
| GVU-Trojaner am 06.09. eingefangen, einige Komplikationen Kurzer Hinweis: Ich bin beruflich bis Mittwoch mittag abwesend, würde mich aber sehr freuen, wenn ich dann auch noch weiter durch den Trojaner-Heilungsvorgang geleitet werde. Vielen Dank schonmal |
Themen zu GVU-Trojaner am 06.09. eingefangen, einige Komplikationen |
abgesicherten, abmelden, anmelden, anti-malware, austauschen, behandlung, beschädigte, boot-cd, c:\windows\system32\cmd.exe, checkliste, dateien, eingefangen, externe platte, fehler, gen, gmer, google earth, infektion, interne, langs, laptop, löschen, malwarebytes, modus, natürlich, neustart, nicht mehr, nicht sicher, nutzen, online, plug-in, programme, rechner, safer networking, tan, verweise |