![]() |
|
Log-Analyse und Auswertung: GVU-Virus bei Windows 7, weißer Bildschirm nach dem NeustartenWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() | #1 |
| ![]() GVU-Virus bei Windows 7, weißer Bildschirm nach dem Neustarten Guten Morgen zusammen, ich habe eine Rechner von einem Kupel bekommen der mit dem "GVU Trojaner" verseucht ist. Der Desktop erscheint ohne Taskleiste und beim Runterfahren kommt dann die Aufforderung 100€ zu bezahlen. Ein Starten im Abgesicherten Modus funktioniert nicht. Der PC hat Windows 7 64Bit installiert. Als ersten Schritt habe ich meine "Avira" Notstart CD zum Scanen drüberlaufen lassen. Er hat auch einige Viren gefunden, nur nach dem Systemstart war der GVU immer noch da. Hier das Log File: Code:
ATTFilter Avira / Linux Version 1.9.152.0 Copyright (c) 2010 by Avira GmbH All rights reserved. engine set: 8.2.12.34 VDF Version: 7.11.76.94 Scan start time: Sat Jul 6 12:37:14 2013 configuration file: /etc/avira/scancl.conf WARNING: [File is encrypted] /media/Devices/sda3/$Recycle.Bin/S-1-5-21-2346994299-3269427803-4161735757-1000/$RCTVA09/avira_free_antivirus_de.exe --> AVSDKList.zip WARNING: [File is encrypted] /media/Devices/sda3/$Recycle.Bin/S-1-5-21-2346994299-3269427803-4161735757-1000/$RCTVA09/avira_free_antivirus_de.exe --> ManualUninstallConfig.zip WARNING: [File is encrypted] /media/Devices/sda3/$Recycle.Bin/S-1-5-21-2346994299-3269427803-4161735757-1000/$RCTVA09/avira_free_antivirus_de.exe --> ProductReleaseNotes.zip WARNING: [File is encrypted] /media/Devices/sda3/$Recycle.Bin/S-1-5-21-2346994299-3269427803-4161735757-1000/$RCTVA09/avira_free_antivirus_de.exe --> QATestedProducts.zip WARNING: [Archive is invalid or corrupt] /media/Devices/sda3/Program Files (x86)/WinRAR/rarnew.dat ALERT: [JS/Agent.480412] /media/Devices/sda3/ProgramData/iwfeqh.js <<< Contains signature of the Java script virus JS/Agent.480412 [deleted] ALERT: [EXP/2012-1723.GE] /media/Devices/sda3/Users/1/AppData/Local/Temp/jar_cache3461464136008127522.tmp --> Quylpz/bSoziKZ.class <<< Contains signature of the exploits EXP/2012-1723.GE [archive scan abort] ALERT: [EXP/CVE-2012-0507.A.206] /media/Devices/sda3/Users/1/AppData/Local/Temp/jar_cache3616318572784126356.tmp --> javax/Mac.class <<< Contains signature of the exploits EXP/CVE-2012-0507.A.206 [archive scan abort] ALERT: [EXP/CVE-2012-1723.HR] /media/Devices/sda3/Users/1/AppData/Local/Temp/jar_cache4719756962590023929.tmp --> BsdjfsdjfU/Asdf3cvR55.class <<< Contains signature of the exploits EXP/CVE-2012-1723.HR [archive scan abort] ALERT: [EXP/2012-1723.GE] /media/Devices/sda3/Users/1/AppData/Local/Temp/jar_cache5208538848834539002.tmp --> Quylpz/bSoziKZ.class <<< Contains signature of the exploits EXP/2012-1723.GE [archive scan abort] ALERT: [Java/Jogek.aqp] /media/Devices/sda3/Users/1/AppData/Local/Temp/jar_cache6642505943394469264.tmp --> LSAHWatOM.class <<< Contains signature of the Java virus JAVA/Jogek.aqp [archive scan abort] ALERT: [EXP/2012-1723.GE] /media/Devices/sda3/Users/1/AppData/Local/Temp/jar_cache7179218830119193411.tmp --> Quylpz/bSoziKZ.class <<< Contains signature of the exploits EXP/2012-1723.GE [archive scan abort] ALERT: [Java/Jogek.aqg] /media/Devices/sda3/Users/1/AppData/Local/Temp/jar_cache7829479413430386707.tmp --> jaawumNTgc.class <<< Contains signature of the Java virus JAVA/Jogek.aqg [archive scan abort] ALERT: [Java/Rilly.AU] /media/Devices/sda3/Users/1/AppData/Local/Temp/jar_cache8151366114007179802.tmp --> wqvwabnqd/qmudcnaw.class <<< Contains signature of the Java virus JAVA/Rilly.AU [archive scan abort] ALERT: [EXP/Java.5448] /media/Devices/sda3/Users/1/AppData/Local/Temp/M.class <<< Contains signature of the exploits EXP/Java.5448 [deleted] ALERT: [EXP/Java.Ternub.a.17] /media/Devices/sda3/Users/1/AppData/Local/Temp/Main.class <<< Contains signature of the exploits EXP/Java.Ternub.a.17 [deleted] ALERT: [TR/Spy.Bebloh.EB.2] /media/Devices/sda3/Users/1/AppData/Local/Temp/ch8l0.exe <<< Is the Trojan horse TR/Spy.Bebloh.EB.2 [deleted] ALERT: [EXP/JAVA.Jovab.Gen] /media/Devices/sda3/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/12/5f6c5f8c-3d85e2b6 --> m.class <<< Contains signature of the exploits EXP/JAVA.Jovab.Gen [archive scan abort] ALERT: [EXP/JAVA.Coniz.Gen] /media/Devices/sda3/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/24/da7ced8-6d6a6160 --> xmltree/alpina.class <<< Contains signature of the exploits EXP/JAVA.Coniz.Gen [archive scan abort] ALERT: [EXP/2010-0840.CM] /media/Devices/sda3/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/28/29dba2dc-5cd2adbf --> ER.class <<< Contains signature of the exploits EXP/2010-0840.CM [archive scan abort] ALERT: [EXP/2011-3544.DF] /media/Devices/sda3/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/3/61c49b03-7cf7ad99 --> ba/ba.class <<< Contains signature of the exploits EXP/2011-3544.DF [archive scan abort] ALERT: [EXP/2010-0840.CM] /media/Devices/sda3/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/33/20ad3661-103d0089 --> ER.class <<< Contains signature of the exploits EXP/2010-0840.CM [archive scan abort] ALERT: [EXP/CVE-2010-4452] /media/Devices/sda3/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/39/58ec35a7-7f9a2248 <<< Contains signature of the exploits EXP/CVE-2010-4452 [deleted] ALERT: [EXP/CVE-2010-0840.L] /media/Devices/sda3/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/51/2f1b0f33-102e1b1f --> bpac/b.class <<< Contains signature of the exploits EXP/CVE-2010-0840.L [archive scan abort] Statistics : Directories............... : 32042 Archives.................. : 9516 Files..................... : 1359756 Infected.............. : 19 Deleted........... : 19 Warnings.............. : 153 Suspicious............ : 0 Infections................ : 19 Log: Code:
ATTFilter Untersuchung von Objekten: wurde abgeschlossen vor weniger als einer Minute (Ereignis: 54, Objekte: 1361574, Zeit: 03:18:17) 06.07.13 21:08 Aufgabe wurde abgeschlossen 06.07.13 21:08 Gelöscht: HEUR:Exploit.Java.CVE-2012-1723.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 06.07.13 21:08 Gefunden: HEUR:Exploit.Java.CVE-2012-1723.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 06.07.13 21:06 Gefunden: HEUR:Exploit.Java.CVE-2012-1723.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 06.07.13 21:06 Gelöscht: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp 06.07.13 21:03 Gefunden: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp 06.07.13 21:03 Gelöscht: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 20:21 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 20:13 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 20:13 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 20:05 Nicht desinfizierte Objekte: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp Zurückgestellt 06.07.13 20:05 Gefunden: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp 06.07.13 19:59 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 19:59 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 19:57 Gefunden: HEUR:Exploit.Java.CVE-2012-1723.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 06.07.13 19:57 Nicht desinfizierte Objekte: HEUR:Exploit.Java.CVE-2012-1723.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 Zurückgestellt 06.07.13 19:57 Gefunden: HEUR:Exploit.Java.CVE-2012-1723.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 06.07.13 19:56 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 19:56 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 19:47 Nicht desinfizierte Objekte: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp Zurückgestellt 06.07.13 19:47 Gefunden: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp 06.07.13 19:42 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 19:42 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 19:39 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 19:39 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 19:30 Nicht desinfizierte Objekte: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp Zurückgestellt 06.07.13 19:30 Gefunden: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp 06.07.13 19:25 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 19:25 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 19:22 Gefunden: HEUR:Exploit.Java.CVE-2012-1723.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 06.07.13 19:22 Nicht desinfizierte Objekte: HEUR:Exploit.Java.CVE-2012-1723.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 Zurückgestellt 06.07.13 19:22 Gefunden: HEUR:Exploit.Java.CVE-2012-1723.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 06.07.13 19:22 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 19:22 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 19:14 Nicht desinfizierte Objekte: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp Zurückgestellt 06.07.13 19:14 Gefunden: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp 06.07.13 19:08 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 19:08 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 18:31 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 18:31 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 18:22 Nicht desinfizierte Objekte: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp Zurückgestellt 06.07.13 18:22 Gefunden: HEUR:Exploit.Java.CVE-2012-0507.gen /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp 06.07.13 18:17 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 18:17 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 18:14 Gefunden: HEUR:Exploit.Java.CVE-2012-1723.gen C:/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 06.07.13 18:14 Nicht desinfizierte Objekte: HEUR:Exploit.Java.CVE-2012-1723.gen C:/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 Zurückgestellt 06.07.13 18:14 Gefunden: HEUR:Exploit.Java.CVE-2012-1723.gen C:/Users/1/AppData/LocalLow/Sun/Java/Deployment/cache/6.0/14/61ca0c0e-29abf2a5 06.07.13 18:13 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 18:13 Gefunden: HEUR:Trojan.Script.Iframer /mnt/MountedDevices/PD-7C83D076-00000003AC000000/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 18:05 Nicht desinfizierte Objekte: HEUR:Exploit.Java.CVE-2012-0507.gen C:/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp Zurückgestellt 06.07.13 18:05 Gefunden: HEUR:Exploit.Java.CVE-2012-0507.gen C:/Users/1/AppData/Local/Temp/jar_cache1119726448825806171.tmp 06.07.13 18:00 Nicht desinfizierte Objekte: HEUR:Trojan.Script.Iframer C:/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm Zurückgestellt 06.07.13 18:00 Gefunden: HEUR:Trojan.Script.Iframer C:/Users/1/AppData/Local/Microsoft/Windows/Temporary Internet Files/Content.IE5/6Y0PIGEY/cpvload[1].htm 06.07.13 17:50 Aufgabe wurde gestartet So und dann bin ich durch google auf euer Forum gestoßen. Und habe dann den "Farbars Recovery Scan" laufen gelassen laut Anleitung. Log: Code:
ATTFilter Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 04-07-2013 Ran by SYSTEM on 07-07-2013 11:51:23 Running from F:\ Windows 7 Professional (X64) OS Language: German Standard Internet Explorer Version 10 Boot Mode: Recovery The current controlset is ControlSet001 ATTENTION!:=====> FRST is updated to run from normal or Safe mode to produce a full FRST.txt log and an extra Addition.txt log. ==================== Registry (Whitelisted) ================== HKLM\...\Run: [Apoint] C:\Program Files\DellTPad\Apoint.exe [309248 2009-06-29] (Alps Electric Co., Ltd.) HKLM\...\Run: [SysTrayApp] %ProgramFiles%\IDT\WDM\sttray64.exe [450048 2009-07-15] (IDT, Inc.) HKLM\...\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup [16328736 2009-06-11] (NVIDIA Corporation) HKLM\...\Run: [NVHotkey] rundll32.exe C:\Windows\system32\nvHotkey.dll,Start [93728 2009-06-11] (NVIDIA Corporation) HKLM\...\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre6\bin\jusched.exe" [171520 2009-12-06] (Sun Microsystems, Inc.) HKLM-x32\...\Run: [PDVDDXSrv] "C:\Program Files (x86)\CyberLink\PowerDVD DX\PDVDDXSrv.exe" [140520 2009-06-25] (CyberLink Corp.) HKLM-x32\...\Run: [OEM13Mon.exe] C:\Windows\OEM13Mon.exe [36864 2008-01-07] (Creative Technology Ltd.) HKLM-x32\...\Run: [TkBellExe] "C:\Program Files (x86)\Real\RealPlayer\Update\realsched.exe" -osboot [296056 2011-12-04] (RealNetworks, Inc.) HKLM-x32\...\Run: [SunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" [254896 2012-09-17] (Sun Microsystems, Inc.) HKLM-x32\...\Run: [Adobe Reader Speed Launcher] "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Reader_sl.exe" [41056 2013-05-08] (Adobe Systems Incorporated) HKLM-x32\...\Run: [Adobe ARM] "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [958576 2013-04-04] (Adobe Systems Incorporated) HKLM-x32\...\Run: [HP Software Update] C:\Program Files (x86)\HP\HP Software Update\HPWuSchd2.exe [54840 2007-05-08] (Hewlett-Packard) HKLM-x32\...\Run: [] [x] HKLM-x32\...\Run: [ApnUpdater] "C:\Program Files (x86)\Ask.com\Updater\Updater.exe" [1646216 2013-04-01] (Ask) HKLM-x32\...\Run: [avgnt] "C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe" /min [345144 2013-07-02] (Avira Operations GmbH & Co. KG) HKLM-x32\...\Run: [MailCheck IE Broker] "C:\Program Files (x86)\WEB.DE MailCheck\IE\WEB.DE_MailCheck_Broker.exe" [1519680 2013-07-01] (1und1 Mail und Media GmbH) HKU\1\...\Run: [msnmsgr] "C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe" /background [x] HKU\1\...\Run: [swg] "C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [39408 2009-12-14] (Google Inc.) HKU\1\...\Run: [anexqqnrkmfdzjl] C:\ProgramData\emlmtarjnmgratipjoqv.exe [x] HKU\1\...\Run: [ctfmon.exe] C:\PROGRA~3\rundll32.exe FG00 [44544 2013-05-16] (Microsoft Corporation) HKU\1\...\Run: [qcgce2mrvjq91kk1e7pnbb19m52fx] C:\Users\1\AppData\Local\Temp\fveolbwiabsneimuc.exe [65024 2013-07-02] (NVIDIA Corporation) <===== ATTENTION HKU\1\...\Winlogon: [Shell] explorer.exe,C:\Users\1\AppData\Roaming\skype.dat [59392 2011-11-17] () <==== ATTENTION HKU\1\...\Command Processor: "C:\Users\1\AppData\Local\Temp\fveolbwiabsneimuc.exe" <===== ATTENTION! Startup: C:\ProgramData\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk ShortcutTarget: HP Digital Imaging Monitor.lnk -> C:\Program Files (x86)\HP\Digital Imaging\bin\hpqtra08.exe (Hewlett-Packard Co.) ==================== Services (Whitelisted) ================= S2 AntiVirSchedulerService; C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe [84024 2013-07-02] (Avira Operations GmbH & Co. KG) S2 AntiVirService; C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe [108088 2013-07-02] (Avira Operations GmbH & Co. KG) S2 AntiVirWebService; C:\Program Files (x86)\Avira\AntiVir Desktop\AVWEBGRD.EXE [589368 2013-07-02] (Avira Operations GmbH & Co. KG) S2 STacSV; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_e19b3ab5cd326817\STacSV64.exe [240128 2009-07-15] (IDT, Inc.) ==================== Drivers (Whitelisted) ==================== S2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [100712 2013-05-15] (Avira Operations GmbH & Co. KG) S1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [130016 2013-05-15] (Avira Operations GmbH & Co. KG) S1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [28600 2013-05-15] (Avira Operations GmbH & Co. KG) S3 O2SDGRDR; C:\Windows\System32\DRIVERS\o2sdgx64.sys [48800 2009-05-07] (O2Micro ) S3 OEM13Vfx; C:\Windows\System32\DRIVERS\OEM13Vfx.sys [12288 2007-03-05] (EyePower Games Pte. Ltd.) S3 OEM13Vid; C:\Windows\System32\DRIVERS\OEM13Vid.sys [267296 2008-05-28] (Creative Technology Ltd.) ==================== NetSvcs (Whitelisted) =================== ==================== One Month Created Files and Folders ======== 2013-07-07 11:50 - 2013-07-07 11:50 - 00000000 ____D C:\FRST 2013-07-02 23:13 - 2013-07-07 08:32 - 00000004 ____A C:\Users\1\AppData\Roaming\skype.ini 2013-07-02 23:13 - 2013-07-02 23:13 - 01084673 ____A C:\Users\1\AppData\Roaming\2433f433 2013-07-02 23:13 - 2013-07-02 23:13 - 01084656 ____A C:\ProgramData\2433f433 2013-07-02 23:13 - 2013-07-02 23:13 - 01084654 ____A C:\Users\1\AppData\Local\2433f433 2013-07-02 19:01 - 2013-07-02 19:01 - 00000000 ____D C:\Program Files\WEB.DE MailCheck 2013-07-02 19:01 - 2013-07-02 19:01 - 00000000 ____D C:\Program Files (x86)\WEB.DE MailCheck 2013-07-01 22:56 - 2013-07-01 22:56 - 00000000 ____D C:\ProgramData\UUdb 2013-06-30 22:44 - 2013-06-30 22:44 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox 2013-06-26 14:13 - 2013-06-26 14:13 - 00006801 ____A C:\Users\1\Documents\Kaufvertrag.html 2013-06-26 14:09 - 2013-06-26 14:09 - 00063977 ____A C:\Users\1\Documents\WEB_DE FreeMail.txt 2013-06-25 20:39 - 2013-06-25 20:39 - 00006801 ____A C:\Users\1\Downloads\Kaufvertrag.html 2013-06-18 21:10 - 2013-06-18 21:10 - 00567952 ____A C:\Windows\Minidump\061813-19687-01.dmp 2013-06-15 11:49 - 2013-06-08 15:08 - 01365504 ____A (Microsoft Corporation) C:\Windows\System32\urlmon.dll 2013-06-15 11:49 - 2013-06-08 15:07 - 19233792 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.dll 2013-06-15 11:49 - 2013-06-08 15:06 - 15404544 ____A (Microsoft Corporation) C:\Windows\System32\ieframe.dll 2013-06-15 11:49 - 2013-06-08 15:06 - 02648064 ____A (Microsoft Corporation) C:\Windows\System32\iertutil.dll 2013-06-15 11:49 - 2013-06-08 15:06 - 00526336 ____A (Microsoft Corporation) C:\Windows\System32\ieui.dll 2013-06-15 11:49 - 2013-06-08 13:28 - 02706432 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.tlb 2013-06-15 11:49 - 2013-06-08 12:42 - 01141248 ____A (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll 2013-06-15 11:49 - 2013-06-08 12:40 - 14327808 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll 2013-06-15 11:49 - 2013-06-08 12:40 - 13760512 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll 2013-06-15 11:49 - 2013-06-08 12:40 - 02046976 ____A (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll 2013-06-15 11:49 - 2013-06-08 12:40 - 00391168 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll 2013-06-15 11:49 - 2013-06-08 12:13 - 02706432 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb 2013-06-13 05:55 - 2013-05-17 02:25 - 02877440 ____A (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll 2013-06-13 05:55 - 2013-05-17 02:25 - 01767936 ____A (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll 2013-06-13 05:55 - 2013-05-17 02:25 - 00690688 ____A (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll 2013-06-13 05:55 - 2013-05-17 02:25 - 00493056 ____A (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll 2013-06-13 05:55 - 2013-05-17 02:25 - 00109056 ____A (Microsoft Corporation) C:\Windows\SysWOW64\iesysprep.dll 2013-06-13 05:55 - 2013-05-17 02:25 - 00061440 ____A (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll 2013-06-13 05:55 - 2013-05-17 02:25 - 00039424 ____A (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll 2013-06-13 05:55 - 2013-05-17 02:25 - 00033280 ____A (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll 2013-06-13 05:55 - 2013-05-17 01:59 - 02241024 ____A (Microsoft Corporation) C:\Windows\System32\wininet.dll 2013-06-13 05:55 - 2013-05-17 01:59 - 00051712 ____A (Microsoft Corporation) C:\Windows\System32\ie4uinit.exe 2013-06-13 05:55 - 2013-05-17 01:58 - 03958784 ____A (Microsoft Corporation) C:\Windows\System32\jscript9.dll 2013-06-13 05:55 - 2013-05-17 01:58 - 00855552 ____A (Microsoft Corporation) C:\Windows\System32\jscript.dll 2013-06-13 05:55 - 2013-05-17 01:58 - 00603136 ____A (Microsoft Corporation) C:\Windows\System32\msfeeds.dll 2013-06-13 05:55 - 2013-05-17 01:58 - 00136704 ____A (Microsoft Corporation) C:\Windows\System32\iesysprep.dll 2013-06-13 05:55 - 2013-05-17 01:58 - 00067072 ____A (Microsoft Corporation) C:\Windows\System32\iesetup.dll 2013-06-13 05:55 - 2013-05-17 01:58 - 00053248 ____A (Microsoft Corporation) C:\Windows\System32\jsproxy.dll 2013-06-13 05:55 - 2013-05-17 01:58 - 00039936 ____A (Microsoft Corporation) C:\Windows\System32\iernonce.dll 2013-06-13 05:55 - 2013-05-14 13:23 - 00089600 ____A (Microsoft Corporation) C:\Windows\System32\RegisterIEPKEYs.exe 2013-06-13 05:55 - 2013-05-14 09:40 - 00071680 ____A (Microsoft Corporation) C:\Windows\SysWOW64\RegisterIEPKEYs.exe 2013-06-12 22:26 - 2013-05-10 06:49 - 00030720 ____A (Microsoft Corporation) C:\Windows\System32\cryptdlg.dll 2013-06-12 22:26 - 2013-05-10 04:20 - 00024576 ____A (Microsoft Corporation) C:\Windows\SysWOW64\cryptdlg.dll 2013-06-12 22:26 - 2013-05-08 07:39 - 01910632 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\tcpip.sys 2013-06-12 22:26 - 2013-04-26 06:51 - 00751104 ____A (Microsoft Corporation) C:\Windows\System32\win32spl.dll 2013-06-12 22:26 - 2013-04-26 05:55 - 00492544 ____A (Microsoft Corporation) C:\Windows\SysWOW64\win32spl.dll 2013-06-12 22:26 - 2013-04-17 08:02 - 01230336 ____A (Microsoft Corporation) C:\Windows\SysWOW64\WindowsCodecs.dll 2013-06-12 22:26 - 2013-04-17 07:24 - 01424384 ____A (Microsoft Corporation) C:\Windows\System32\WindowsCodecs.dll 2013-06-12 22:25 - 2013-05-13 06:51 - 01464320 ____A (Microsoft Corporation) C:\Windows\System32\crypt32.dll 2013-06-12 22:25 - 2013-05-13 06:51 - 00184320 ____A (Microsoft Corporation) C:\Windows\System32\cryptsvc.dll 2013-06-12 22:25 - 2013-05-13 06:51 - 00139776 ____A (Microsoft Corporation) C:\Windows\System32\cryptnet.dll 2013-06-12 22:25 - 2013-05-13 06:50 - 00052224 ____A (Microsoft Corporation) C:\Windows\System32\certenc.dll 2013-06-12 22:25 - 2013-05-13 05:45 - 01160192 ____A (Microsoft Corporation) C:\Windows\SysWOW64\crypt32.dll 2013-06-12 22:25 - 2013-05-13 05:45 - 00140288 ____A (Microsoft Corporation) C:\Windows\SysWOW64\cryptsvc.dll 2013-06-12 22:25 - 2013-05-13 05:45 - 00103936 ____A (Microsoft Corporation) C:\Windows\SysWOW64\cryptnet.dll 2013-06-12 22:25 - 2013-05-13 04:43 - 01192448 ____A (Microsoft Corporation) C:\Windows\System32\certutil.exe 2013-06-12 22:25 - 2013-05-13 04:08 - 00903168 ____A (Microsoft Corporation) C:\Windows\SysWOW64\certutil.exe 2013-06-12 22:25 - 2013-05-13 04:08 - 00043008 ____A (Microsoft Corporation) C:\Windows\SysWOW64\certenc.dll 2013-06-12 22:25 - 2013-04-26 00:30 - 01505280 ____A (Microsoft Corporation) C:\Windows\SysWOW64\d3d11.dll 2013-06-12 22:25 - 2013-03-31 23:52 - 01887232 ____A (Microsoft Corporation) C:\Windows\System32\d3d11.dll 2013-06-11 19:37 - 2013-06-11 19:37 - 00020722 ____H C:\Users\1\Documents\~WRL3473.tmp ==================== One Month Modified Files and Folders ======= 2013-07-07 11:50 - 2013-07-07 11:50 - 00000000 ____D C:\FRST 2013-07-07 08:32 - 2013-07-02 23:13 - 00000004 ____A C:\Users\1\AppData\Roaming\skype.ini 2013-07-07 08:31 - 2010-01-29 08:27 - 00001110 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job 2013-07-07 08:31 - 2009-07-14 06:10 - 01218339 ____A C:\Windows\WindowsUpdate.log 2013-07-07 08:31 - 2009-07-14 05:51 - 00127636 ____A C:\Windows\setupact.log 2013-07-07 08:29 - 2010-01-29 08:27 - 00001106 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job 2013-07-06 20:14 - 2009-07-14 18:58 - 00654400 ____A C:\Windows\System32\perfh007.dat 2013-07-06 20:14 - 2009-07-14 18:58 - 00130240 ____A C:\Windows\System32\perfc007.dat 2013-07-06 20:14 - 2009-07-14 06:13 - 01498742 ____A C:\Windows\System32\PerfStringBackup.INI 2013-07-06 16:39 - 2009-07-14 06:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT 2013-07-06 16:32 - 2009-07-14 05:45 - 00014032 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 2013-07-06 16:32 - 2009-07-14 05:45 - 00014032 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 2013-07-06 16:28 - 2009-07-14 05:45 - 00301952 ____A C:\Windows\System32\FNTCACHE.DAT 2013-07-02 23:15 - 2012-10-29 12:16 - 00000000 ____D C:\Program Files (x86)\Mozilla Maintenance Service 2013-07-02 23:13 - 2013-07-02 23:13 - 01084673 ____A C:\Users\1\AppData\Roaming\2433f433 2013-07-02 23:13 - 2013-07-02 23:13 - 01084656 ____A C:\ProgramData\2433f433 2013-07-02 23:13 - 2013-07-02 23:13 - 01084654 ____A C:\Users\1\AppData\Local\2433f433 2013-07-02 23:06 - 2013-05-15 21:26 - 00000000 ____D C:\Users\1\AppData\Local\DoNotTrackPlus 2013-07-02 19:06 - 2013-05-15 21:26 - 00083672 ____A (Avira Operations GmbH & Co. KG) C:\Windows\System32\Drivers\avnetflt.sys 2013-07-02 19:01 - 2013-07-02 19:01 - 00000000 ____D C:\Program Files\WEB.DE MailCheck 2013-07-02 19:01 - 2013-07-02 19:01 - 00000000 ____D C:\Program Files (x86)\WEB.DE MailCheck 2013-07-01 22:56 - 2013-07-01 22:56 - 00000000 ____D C:\ProgramData\UUdb 2013-07-01 22:56 - 2013-04-03 18:50 - 00002008 ____A C:\Users\1\Desktop\Amazon.lnk 2013-07-01 22:56 - 2013-04-03 18:50 - 00002006 ____A C:\Users\1\Desktop\WEB.DE.lnk 2013-07-01 22:56 - 2013-04-03 18:50 - 00002000 ____A C:\Users\1\Desktop\eBay.lnk 2013-07-01 22:56 - 2013-04-03 18:50 - 00000000 ____D C:\Program Files (x86)\1und1Softwareaktualisierung 2013-06-30 22:44 - 2013-06-30 22:44 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox 2013-06-30 22:41 - 2012-11-08 19:18 - 00000000 ____D C:\HP WIN 2013-06-26 14:13 - 2013-06-26 14:13 - 00006801 ____A C:\Users\1\Documents\Kaufvertrag.html 2013-06-26 14:09 - 2013-06-26 14:09 - 00063977 ____A C:\Users\1\Documents\WEB_DE FreeMail.txt 2013-06-26 11:49 - 2011-05-08 15:44 - 00030208 __ASH C:\Users\1\Documents\Thumbs.db 2013-06-25 20:39 - 2013-06-25 20:39 - 00006801 ____A C:\Users\1\Downloads\Kaufvertrag.html 2013-06-18 21:10 - 2013-06-18 21:10 - 00567952 ____A C:\Windows\Minidump\061813-19687-01.dmp 2013-06-18 21:10 - 2010-10-14 19:01 - 00000000 ____D C:\Windows\Minidump 2013-06-18 21:10 - 2010-10-14 19:00 - 449436303 ____A C:\Windows\MEMORY.DMP 2013-06-14 21:01 - 2009-07-14 04:20 - 00000000 ____D C:\Windows\rescache 2013-06-13 05:56 - 2009-12-15 11:12 - 75825640 ____A (Microsoft Corporation) C:\Windows\System32\MRT.exe 2013-06-11 19:37 - 2013-06-11 19:37 - 00020722 ____H C:\Users\1\Documents\~WRL3473.tmp 2013-06-08 15:08 - 2013-06-15 11:49 - 01365504 ____A (Microsoft Corporation) C:\Windows\System32\urlmon.dll 2013-06-08 15:07 - 2013-06-15 11:49 - 19233792 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.dll 2013-06-08 15:06 - 2013-06-15 11:49 - 15404544 ____A (Microsoft Corporation) C:\Windows\System32\ieframe.dll 2013-06-08 15:06 - 2013-06-15 11:49 - 02648064 ____A (Microsoft Corporation) C:\Windows\System32\iertutil.dll 2013-06-08 15:06 - 2013-06-15 11:49 - 00526336 ____A (Microsoft Corporation) C:\Windows\System32\ieui.dll 2013-06-08 13:28 - 2013-06-15 11:49 - 02706432 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.tlb 2013-06-08 12:42 - 2013-06-15 11:49 - 01141248 ____A (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll 2013-06-08 12:40 - 2013-06-15 11:49 - 14327808 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll 2013-06-08 12:40 - 2013-06-15 11:49 - 13760512 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll 2013-06-08 12:40 - 2013-06-15 11:49 - 02046976 ____A (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll 2013-06-08 12:40 - 2013-06-15 11:49 - 00391168 ____A (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll 2013-06-08 12:13 - 2013-06-15 11:49 - 02706432 ____A (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb Files to move or delete: ==================== C:\Users\1\1361014.dll C:\Users\1\AppData\Roaming\skype.dat C:\Users\1\AppData\Roaming\skype.ini C:\ProgramData\rundll32.exe C:\ProgramData\iwfeqh.bat C:\ProgramData\iwfeqh.pad C:\ProgramData\iwfeqh.reg ==================== Known DLLs (Whitelisted) ================ ==================== Bamital & volsnap Check ================= C:\Windows\System32\winlogon.exe => MD5 is legit C:\Windows\System32\wininit.exe => MD5 is legit C:\Windows\SysWOW64\wininit.exe => MD5 is legit C:\Windows\explorer.exe => MD5 is legit C:\Windows\SysWOW64\explorer.exe => MD5 is legit C:\Windows\System32\svchost.exe => MD5 is legit C:\Windows\SysWOW64\svchost.exe => MD5 is legit C:\Windows\System32\services.exe => MD5 is legit C:\Windows\System32\User32.dll => MD5 is legit C:\Windows\SysWOW64\User32.dll => MD5 is legit C:\Windows\System32\userinit.exe => MD5 is legit C:\Windows\SysWOW64\userinit.exe => MD5 is legit C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit ==================== EXE ASSOCIATION ===================== HKLM\...\.exe: exefile => OK HKLM\...\exefile\DefaultIcon: %1 => OK HKLM\...\exefile\open\command: "%1" %* => OK ==================== Restore Points ========================= Restore point made on: 2013-05-07 21:36:50 Restore point made on: 2013-05-10 21:46:31 Restore point made on: 2013-05-15 09:47:55 Restore point made on: 2013-05-15 19:20:00 Restore point made on: 2013-05-15 21:13:53 Restore point made on: 2013-06-04 20:02:00 Restore point made on: 2013-06-13 05:54:48 Restore point made on: 2013-06-14 19:58:50 Restore point made on: 2013-06-15 11:49:35 Restore point made on: 2013-06-22 20:48:54 Restore point made on: 2013-06-26 14:56:24 Restore point made on: 2013-06-30 22:18:57 ==================== Memory info =========================== Percentage of memory in use: 14% Total physical RAM: 4090.96 MB Available physical RAM: 3507.06 MB Total Pagefile: 4089.11 MB Available Pagefile: 3484.98 MB Total Virtual: 8192 MB Available Virtual: 8191.87 MB ==================== Drives ================================ Drive c: (OS) (Fixed) (Total:283.4 GB) (Free:150.71 GB) NTFS (Disk=0 Partition=3) Drive f: (CORSAIR) (Removable) (Total:3.76 GB) (Free:3.75 GB) FAT32 (Disk=1 Partition=1) Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS Drive y: (RECOVERY) (Fixed) (Total:14.65 GB) (Free:10.27 GB) NTFS (Disk=0 Partition=2) ==>[System with boot components (obtained from reading drive)] ==================== MBR & Partition Table ================== ======================================================== Disk: 0 (MBR Code: Windows 7 or Vista) (Size: 298 GB) (Disk ID: 7C83D076) Partition 1: (Not Active) - (Size=39 MB) - (Type=DE) Partition 2: (Active) - (Size=15 GB) - (Type=07 NTFS) Partition 3: (Not Active) - (Size=283 GB) - (Type=07 NTFS) ======================================================== Disk: 1 (Size: 4 GB) (Disk ID: 04DD5721) Partition 1: (Active) - (Size=4 GB) - (Type=0B) LastRegBack: 2013-06-26 14:49 ==================== End Of Log ============================ |
Themen zu GVU-Virus bei Windows 7, weißer Bildschirm nach dem Neustarten |
adobe, antivirus, association, avg, avira, bildschirm, desktop, exp/java.jovab.gen, explorer, farbar recovery scan tool, farbars recovery, frst.txt, google, heur, internet, kaspersky, log file, minidump, mozilla, neustart, registry, rundll, script virus, services.exe, software, starten, svchost.exe, taskleiste, trojaner, viren, vista, windows |