![]() |
| |||||||
Log-Analyse und Auswertung: GVU Trojaner auf Windows 7Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
| | #10 |
![]() | GVU Trojaner auf Windows 7 Und weiter egth die lustige Fahrt... Die JRT.txt Code:
ATTFilter ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.4 (10.06.2013:1)
OS: Windows 7 Ultimate x86
Ran by Andy on 09.10.2013 at 21:33:45,34
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\dt soft\daemon tools toolbar
~~~ Files
~~~ Folders
~~~ FireFox
Successfully deleted: [File] C:\user.js
Emptied folder: C:\Users\Andy\AppData\Roaming\mozilla\firefox\profiles\61ndxgs9.default\minidumps [1 files]
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 09.10.2013 at 21:38:14,62
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Code:
ATTFilter ESETSmartInstaller@High as downloader log:
all ok
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6920
# api_version=3.0.2
# EOSSerial=ee8217b46828954998b4e59fc13bf700
# engine=15422
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=false
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2013-10-09 08:27:24
# local_time=2013-10-09 10:27:24 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode=5893 16776573 100 94 2794 132981635 0 0
# scanned=131824
# found=15
# cleaned=0
# scan_time=2649
sh=4D7825F94FE34D13C750CE3CF1D7833D8DDBBA07 ft=1 fh=984c2aaa076bb3fc vn="a variant of Win32/Spy.Banker.YZT trojan" ac=I fn="C:\FRST\Quarantine\AcroIEHelpe206.dll"
sh=AEF536D9FAF101EA55375AC722B76D3C51EA8260 ft=1 fh=cb2c5bec64fdaaec vn="a variant of Win32/Spy.Banker.YQR trojan" ac=I fn="C:\FRST\Quarantine\BAcroIEHelpe206.dll"
sh=CD43B3918625BBC7EB06790E9A81610C1B167047 ft=1 fh=0a97428908a22542 vn="a variant of Win32/Spy.Banker.YUN trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Andy\AppData\Roaming\BAcroIEHelpe185.dll.vir"
sh=506735513C42EFD6A3D650EC2AA19C9385C31900 ft=1 fh=d10e23fbe8fbe906 vn="probably a variant of Win32/Spy.Banker.YUN trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Andy\AppData\Roaming\BAcroIEHelpe201.dll.vir"
sh=454E3AF4913561F6733846214F7C12A5360D33CD ft=1 fh=0c43c72807fd50bb vn="probably a variant of Win32/Spy.Banker.YUN trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Andy\AppData\Roaming\BAcroIEHelpe203.dll.vir"
sh=78315DA14C794960F3CF13C401DF21800711EA1A ft=1 fh=1f3a2e03714439ad vn="a variant of Win32/Spy.Banker.YPK trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Andy\AppData\Roaming\11001.048\components\AcroFF048.dll.vir"
sh=54F5D5BA90F1D63CC2F2FECFD768B8F636CC0918 ft=1 fh=c3389fd058ad4498 vn="a variant of Win32/Spy.Banker.YPK trojan" ac=I fn="C:\Qoobox\Quarantine\C\Users\Andy\AppData\Roaming\11001.065\components\AcroFF065.dll.vir"
sh=F66F6BB2222DAF27161B2D40D89F5DC057D53C3B ft=0 fh=0000000000000000 vn="Java/Exploit.CVE-2012-4681.B trojan" ac=I fn="C:\Users\Andy\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18\7ac02ad2-76c8b377"
sh=E204F84E37A0495D06FEC90AD25FF3CDCE910191 ft=0 fh=0000000000000000 vn="multiple threats" ac=I fn="C:\Users\Andy\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23\7aabd897-127a1ac1"
sh=4787F4E7BA4D16CF569C41C77D55FDE806F90CBA ft=0 fh=0000000000000000 vn="a variant of Java/Exploit.Agent.PQI trojan" ac=I fn="C:\Users\Andy\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24\536650d8-5a05b3d8"
sh=D6F99641C5207612DFD958183E878A96C3C5677E ft=0 fh=0000000000000000 vn="Java/Exploit.CVE-2012-4681.K trojan" ac=I fn="C:\Users\Andy\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28\6d7d629c-14e0ae6e"
sh=21F969B55DED8BC2CDFE786FCE7A0BF94F8249E1 ft=0 fh=0000000000000000 vn="multiple threats" ac=I fn="C:\Users\Andy\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\51\783b8933-3ac64227"
sh=EFFB923AEC720558E847B1ACFDB2D54B10C1300A ft=1 fh=8d8edd95bdacb73d vn="a variant of Win32/Kryptik.BKTG trojan" ac=I fn="C:\Users\Andy\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\59\a621f3b-5cdf8a61"
sh=5825C91D0FFD36390DD3E033BE275092FEA0025D ft=0 fh=0000000000000000 vn="Java/Exploit.Agent.NTH trojan" ac=I fn="C:\Users\Andy\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\62\55b1d2fe-45ab82ee"
sh=360CC015805515F1286CF93215013F556B276AA9 ft=1 fh=c293ce2007ab988b vn="a variant of Win32/Spy.Banker.YZT trojan" ac=I fn="C:\Users\Andy\AppData\Roaming\AcroIEHelpe203.dll"
UNSUPPORTED OPERATING SYSTEM! ABORTED! |