![]() |
|
Log-Analyse und Auswertung: Ebay Mahnung Mail Anhang geöffnetWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() | #1 |
| ![]() Ebay Mahnung Mail Anhang geöffnet Hallo, meine Freundin hat an eine Mail mit einer angeblichen Mahnung von Ebay-Anwälten bekommen, hat aus Panik natürlich direkt den Anhang geöffnet und jetzt evtl nen Trojaner drauf? Ich habe bis jetzt wie in eurer Anleitung beschrieben defogger, frst und GMER drüberlaufen lassen. Die Logs dazu: FRST Code:
ATTFilter Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 25-06-2014 Ran by Puschel (administrator) on KÖÖRRRT on 26-06-2014 23:13:36 Running from C:\Users\Puschel\Desktop Platform: Windows 8 (X64) OS Language: Deutsch (Deutschland) Internet Explorer Version 10 Boot Mode: Normal The only official download link for FRST: Download link for 32-Bit version: hxxp://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/ Download link for 64-Bit Version: hxxp://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/ Download link from any site other than Bleeping Computer is unpermitted or outdated. See tutorial for FRST: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/ ==================== Processes (Whitelisted) ================= (AMD) C:\Windows\System32\atiesrxx.exe (AMD) C:\Windows\System32\atieclxx.exe (IDT, Inc.) C:\Program Files\IDT\WDM\stacsv64.exe (Hewlett-Packard Company) C:\Windows\System32\hpservice.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe (Advanced Micro Devices, Inc.) C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe (Mozilla Corporation) C:\Program Files (x86)\Mozilla Firefox\firefox.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avshadow.exe (CyberLink) C:\Program Files (x86)\CyberLink\YouCam\YCMMirage.exe (CyberLink) C:\Program Files (x86)\CyberLink\Power2Go8\CLMLSvc_P2G8.exe (IDT, Inc.) C:\Program Files\IDT\WDM\sttray64.exe (Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPEnh.exe (Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPHelper.exe (CyberLink Corp.) C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe (Advanced Micro Devices Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe (ATI Technologies Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe (Realsil Microelectronics Inc.) C:\Program Files (x86)\Realtek\Realtek PCIE Card Reader\RIconMan.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\update.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\updrgui.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\update.exe ==================== Registry (Whitelisted) ================== HKLM\...\Run: [SysTrayApp] => C:\Program Files\IDT\WDM\sttray64.exe [1664000 2012-08-20] (IDT, Inc.) HKLM\...\Run: [SynTPEnh] => C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [2916152 2012-08-25] (Synaptics Incorporated) HKLM-x32\...\Run: [StartCCC] => C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe [642216 2012-09-18] (Advanced Micro Devices, Inc.) HKLM-x32\...\Run: [CLVirtualDrive] => C:\Program Files (x86)\CyberLink\Power2Go8\VirtualDrive.exe [491632 2012-09-10] (CyberLink Corp.) HKLM-x32\...\Run: [RemoteControl10] => C:\Program Files (x86)\CyberLink\PowerDVD10\PDVD10Serv.exe [93296 2012-07-13] (CyberLink Corp.) HKLM-x32\...\Run: [avgnt] => C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe [737872 2014-06-17] (Avira Operations GmbH & Co. KG) HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated) HKLM-x32\...\Run: [mobilegeni daemon] => C:\Program Files (x86)\Mobogenie\DaemonProcess.exe HKU\S-1-5-21-2799476594-3240853191-3070442433-1002\...\Run: [NextLive] => C:\Windows\SysWOW64\rundll32.exe "C:\Users\Puschel\AppData\Roaming\newnext.me\nengine.dll",EntryPoint -m l ShellIconOverlayIdentifiers: SkyDrive1 -> {F241C880-6982-4CE5-8CF7-7085BA96DA5A} => No File ShellIconOverlayIdentifiers: SkyDrive2 -> {A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E} => No File ShellIconOverlayIdentifiers: SkyDrive3 -> {BBACC218-34EA-4666-9D7A-C78F2274A524} => No File ShellIconOverlayIdentifiers-x32: SkyDrive1 -> {F241C880-6982-4CE5-8CF7-7085BA96DA5A} => No File ShellIconOverlayIdentifiers-x32: SkyDrive2 -> {A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E} => No File ShellIconOverlayIdentifiers-x32: SkyDrive3 -> {BBACC218-34EA-4666-9D7A-C78F2274A524} => No File ==================== Internet (Whitelisted) ==================== HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://g.uk.msn.com/HPNOT13/4 HKCU\Software\Microsoft\Internet Explorer\Main,First Home Page = hxxp://g.uk.msn.com/HPNOT13/4 HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://g.uk.msn.com/HPNOT13/4 HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://g.uk.msn.com/HPNOT13/4 HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://g.uk.msn.com/HPNOT13/4 HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://g.uk.msn.com/HPNOT13/4 HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = hxxp://g.uk.msn.com/HPNOT13/4 SearchScopes: HKLM - DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=HPNTDFJS SearchScopes: HKLM - {04897A7A-AB7F-4DDF-9318-0B5088CF50D2} URL = hxxp://www.amazon.de/s/ref=azs_osd_ieade?ie=UTF-8&tag=hp-de2-vsb-21&link%5Fcode=qs&index=aps&field-keywords={searchTerms} SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=HPNTDFJS SearchScopes: HKLM - {D944BB61-2E34-4DBF-A683-47E505C587DC} URL = hxxp://rover.ebay.com/rover/1/707-154345-12128-2/4 ?mpre=http%3A%2F%2Fwww.ebay.com%2Fsch%2F%3F_nkw%3D{searchTerms}&keyword={searchTerms} SearchScopes: HKLM-x32 - DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=HPNTDFJS SearchScopes: HKLM-x32 - {04897A7A-AB7F-4DDF-9318-0B5088CF50D2} URL = hxxp://www.amazon.de/s/ref=azs_osd_ieade?ie=UTF-8&tag=hp-de2-vsb-21&link%5Fcode=qs&index=aps&field-keywords={searchTerms} SearchScopes: HKLM-x32 - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=HPNTDFJS SearchScopes: HKLM-x32 - {D944BB61-2E34-4DBF-A683-47E505C587DC} URL = hxxp://rover.ebay.com/rover/1/707-154345-12128-2/4 ?mpre=http%3A%2F%2Fwww.ebay.com%2Fsch%2F%3F_nkw%3D{searchTerms}&keyword={searchTerms} SearchScopes: HKCU - DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=HPNTDFJS SearchScopes: HKCU - {014DB5FA-EAFB-4592-A95B-F44D3EE87FA9} URL = hxxp://search.conduit.com/Results.aspx?ctid=CT3323895&octid=EB_ORIGINAL_CTID&SearchSource=58&CUI=&UM=2&UP=SPFC3980F7-DD7B-4E02-9782-CE5F08F4EC13&q={searchTerms}&SSPV= SearchScopes: HKCU - {04897A7A-AB7F-4DDF-9318-0B5088CF50D2} URL = hxxp://www.amazon.de/s/ref=azs_osd_ieade?ie=UTF-8&tag=hp-de2-vsb-21&link%5Fcode=qs&index=aps&field-keywords={searchTerms} SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=HPNTDFJS SearchScopes: HKCU - {D944BB61-2E34-4DBF-A683-47E505C587DC} URL = hxxp://rover.ebay.com/rover/1/707-154345-12128-2/4 ?mpre=http%3A%2F%2Fwww.ebay.com%2Fsch%2F%3F_nkw%3D{searchTerms}&keyword={searchTerms} BHO-x32: HP Network Check Helper - {E76FD755-C1BA-4DCB-9F13-99BD91223ADE} - C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\Resources\HPNetworkCheck\HPNetworkCheckPlugin.dll No File Toolbar: HKLM - No Name - {ae07101b-46d4-4a98-af68-0333ea26e113} - No File Toolbar: HKLM-x32 - No Name - {ae07101b-46d4-4a98-af68-0333ea26e113} - No File Tcpip\Parameters: [DhcpNameServer] 192.168.2.1 FireFox: ======== FF ProfilePath: C:\Users\Puschel\AppData\Roaming\Mozilla\Firefox\Profiles\j7a7i4b6.default FF NewTab: about:blank FF SelectedSearchEngine: Google FF Homepage: about:home FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_13_0_0_214.dll () FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_13_0_0_214.dll () FF Plugin-x32: @adobe.com/ShockwavePlayer - C:\windows\SysWOW64\Adobe\Director\np32dsw_1166636.dll (Adobe Systems, Inc.) FF Plugin-x32: @videolan.org/vlc,version=2.1.2 - C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll (VideoLAN) FF Plugin-x32: Adobe Reader - C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.) FF user.js: detected! => C:\Users\Puschel\AppData\Roaming\Mozilla\Firefox\Profiles\j7a7i4b6.default\user.js FF SearchPlugin: C:\Users\Puschel\AppData\Roaming\Mozilla\Firefox\Profiles\j7a7i4b6.default\searchplugins\conduit-search.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml FF Extension: NoScript - C:\Users\Puschel\AppData\Roaming\Mozilla\Firefox\Profiles\j7a7i4b6.default\Extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi [2013-12-19] FF Extension: Adblock Plus - C:\Users\Puschel\AppData\Roaming\Mozilla\Firefox\Profiles\j7a7i4b6.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2013-12-19] ==================== Services (Whitelisted) ================= R2 AMD FUEL Service; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [361984 2012-09-18] (Advanced Micro Devices, Inc.) [File not signed] R2 AntiVirSchedulerService; C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe [430160 2014-06-17] (Avira Operations GmbH & Co. KG) R2 AntiVirService; C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe [430160 2014-06-17] (Avira Operations GmbH & Co. KG) S4 AntiVirWebService; C:\Program Files (x86)\Avira\AntiVir Desktop\avwebg7.exe [1039952 2014-06-17] (Avira Operations GmbH & Co. KG) R2 IconMan_R; C:\Program Files (x86)\Realtek\Realtek PCIE Card Reader\RIconMan.exe [2451456 2012-07-14] (Realsil Microelectronics Inc.) [File not signed] S3 WinDefend; C:\Program Files\Windows Defender\MsMpEng.exe [16048 2013-10-25] (Microsoft Corporation) ==================== Drivers (Whitelisted) ==================== R0 amdkmpfd; C:\Windows\System32\drivers\amdkmpfd.sys [36520 2012-09-14] (Advanced Micro Devices, Inc.) R3 AtiHDAudioService; C:\Windows\system32\drivers\AtihdW86.sys [91648 2012-08-21] (Advanced Micro Devices) R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [112080 2014-06-17] (Avira Operations GmbH & Co. KG) R1 avipbb; C:\Windows\system32\DRIVERS\avipbb.sys [130584 2014-06-17] (Avira Operations GmbH & Co. KG) R1 avkmgr; C:\Windows\system32\DRIVERS\avkmgr.sys [28600 2013-11-28] (Avira Operations GmbH & Co. KG) R2 avnetflt; C:\Windows\system32\DRIVERS\avnetflt.sys [84720 2013-12-22] (Avira Operations GmbH & Co. KG) R1 CLVirtualDrive; C:\Windows\system32\DRIVERS\CLVirtualDrive.sys [92536 2012-06-25] (CyberLink) R1 dtsoftbus01; C:\Windows\System32\drivers\dtsoftbus01.sys [283064 2014-04-10] (Disc Soft Ltd) R3 RSP2STOR; C:\Windows\system32\DRIVERS\RtsP2Stor.sys [269968 2012-07-04] (Realtek Semiconductor Corp.) S3 SmbDrv; C:\Windows\System32\drivers\Smb_driver_AMDASF.sys [41272 2012-08-25] (Synaptics Incorporated) S3 SmbDrvI; C:\Windows\System32\drivers\Smb_driver_Intel.sys [43832 2012-08-25] (Synaptics Incorporated) R3 WirelessButtonDriver; C:\Windows\System32\drivers\WirelessButtonDriver64.sys [20800 2012-08-31] (Hewlett-Packard Development Company, L.P.) ==================== NetSvcs (Whitelisted) =================== ==================== One Month Created Files and Folders ======== 2014-06-26 23:13 - 2014-06-26 23:13 - 00011904 _____ () C:\Users\Puschel\Desktop\FRST.txt 2014-06-26 23:11 - 2014-06-26 23:13 - 00000000 ____D () C:\FRST 2014-06-26 23:10 - 2014-06-26 23:10 - 00000546 _____ () C:\Users\Puschel\Desktop\defogger_disable.log 2014-06-26 23:10 - 2014-06-26 23:10 - 00000168 _____ () C:\Users\Puschel\defogger_reenable 2014-06-26 22:48 - 2014-06-26 22:48 - 02082816 _____ (Farbar) C:\Users\Puschel\Desktop\FRST64.exe 2014-06-26 22:48 - 2014-06-26 22:48 - 00380416 _____ () C:\Users\Puschel\Desktop\Gmer-19357.exe 2014-06-26 22:47 - 2014-06-26 22:47 - 00050477 _____ () C:\Users\Puschel\Desktop\Defogger.exe 2014-06-26 22:28 - 2014-06-26 22:28 - 17292760 _____ (Malwarebytes Corporation ) C:\Users\Puschel\Desktop\mbam-setup-2.0.2.1012.exe 2014-06-26 22:00 - 2014-06-26 22:01 - 00000000 ____D () C:\Users\Puschel\AppData\Local\CrashDumps ==================== One Month Modified Files and Folders ======= 2014-06-26 23:13 - 2014-06-26 23:13 - 00011904 _____ () C:\Users\Puschel\Desktop\FRST.txt 2014-06-26 23:13 - 2014-06-26 23:11 - 00000000 ____D () C:\FRST 2014-06-26 23:11 - 2013-09-16 15:13 - 00003598 _____ () C:\Windows\System32\Tasks\Optimize Start Menu Cache Files-S-1-5-21-2799476594-3240853191-3070442433-1002 2014-06-26 23:11 - 2012-10-20 07:07 - 00830120 _____ () C:\Windows\system32\perfh007.dat 2014-06-26 23:11 - 2012-10-20 07:07 - 00188224 _____ () C:\Windows\system32\perfc007.dat 2014-06-26 23:11 - 2012-07-26 09:28 - 01949368 _____ () C:\Windows\system32\PerfStringBackup.INI 2014-06-26 23:10 - 2014-06-26 23:10 - 00000546 _____ () C:\Users\Puschel\Desktop\defogger_disable.log 2014-06-26 23:10 - 2014-06-26 23:10 - 00000168 _____ () C:\Users\Puschel\defogger_reenable 2014-06-26 23:10 - 2013-09-16 15:06 - 00000000 ____D () C:\Users\Puschel 2014-06-26 23:07 - 2014-01-19 17:36 - 00000000 ____D () C:\Users\Puschel\AppData\Roaming\newnext.me 2014-06-26 23:06 - 2014-03-18 15:33 - 00437408 _____ () C:\Windows\system32\FNTCACHE.DAT 2014-06-26 23:06 - 2012-07-26 09:22 - 00000006 ____H () C:\Windows\Tasks\SA.DAT 2014-06-26 23:05 - 2013-09-24 12:40 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service 2014-06-26 23:05 - 2013-09-24 12:40 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox 2014-06-26 23:04 - 2013-09-16 15:06 - 01681996 _____ () C:\Windows\WindowsUpdate.log 2014-06-26 23:04 - 2012-07-26 07:26 - 00262144 ___SH () C:\Windows\system32\config\BBI 2014-06-26 23:03 - 2014-04-10 19:04 - 00000000 ____D () C:\ProgramData\Microsoft Help 2014-06-26 23:02 - 2012-10-19 22:15 - 00000000 ____D () C:\Program Files (x86)\Microsoft Office 2014-06-26 23:02 - 2012-08-04 00:37 - 00000000 ____D () C:\Program Files (x86)\MSBuild 2014-06-26 23:00 - 2012-07-26 09:52 - 00000000 ____D () C:\Windows\ShellNew 2014-06-26 23:00 - 2012-07-26 07:26 - 00000076 _____ () C:\Windows\win.ini 2014-06-26 22:58 - 2012-07-26 09:59 - 00000000 ____D () C:\Windows\CbsTemp 2014-06-26 22:57 - 2012-07-26 10:12 - 00000000 ____D () C:\Program Files\Common Files\microsoft shared 2014-06-26 22:48 - 2014-06-26 22:48 - 02082816 _____ (Farbar) C:\Users\Puschel\Desktop\FRST64.exe 2014-06-26 22:48 - 2014-06-26 22:48 - 00380416 _____ () C:\Users\Puschel\Desktop\Gmer-19357.exe 2014-06-26 22:47 - 2014-06-26 22:47 - 00050477 _____ () C:\Users\Puschel\Desktop\Defogger.exe 2014-06-26 22:37 - 2014-04-14 18:55 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job 2014-06-26 22:28 - 2014-06-26 22:28 - 17292760 _____ (Malwarebytes Corporation ) C:\Users\Puschel\Desktop\mbam-setup-2.0.2.1012.exe 2014-06-26 22:02 - 2012-07-26 10:12 - 00000000 ____D () C:\Windows\system32\sru 2014-06-26 22:01 - 2014-06-26 22:00 - 00000000 ____D () C:\Users\Puschel\AppData\Local\CrashDumps 2014-06-26 22:00 - 2013-09-16 15:06 - 00000000 ____D () C:\Users\Puschel\AppData\Local\VirtualStore 2014-06-17 20:03 - 2013-09-24 12:47 - 00130584 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avipbb.sys 2014-06-17 20:03 - 2013-09-24 12:47 - 00112080 _____ (Avira Operations GmbH & Co. KG) C:\Windows\system32\Drivers\avgntflt.sys Some content of TEMP: ==================== C:\Users\Puschel\AppData\Local\Temp\6_Offer_15.exe C:\Users\Puschel\AppData\Local\Temp\avgnt.exe C:\Users\Puschel\AppData\Local\Temp\BackupSetup.exe C:\Users\Puschel\AppData\Local\Temp\DownloadManager.exe C:\Users\Puschel\AppData\Local\Temp\nse6761.exe C:\Users\Puschel\AppData\Local\Temp\nse6BB5.exe C:\Users\Puschel\AppData\Local\Temp\nse8D89.exe C:\Users\Puschel\AppData\Local\Temp\nsq2AAE.exe C:\Users\Puschel\AppData\Local\Temp\nsu64B2.exe C:\Users\Puschel\AppData\Local\Temp\nsu6C52.exe C:\Users\Puschel\AppData\Local\Temp\nsu6E75.exe C:\Users\Puschel\AppData\Local\Temp\nsy69C0.exe C:\Users\Puschel\AppData\Local\Temp\nsy8B94.exe C:\Users\Puschel\AppData\Local\Temp\ose00000.exe C:\Users\Puschel\AppData\Local\Temp\SearchProtectINT.exe C:\Users\Puschel\AppData\Local\Temp\vcredist_x64.exe ==================== Bamital & volsnap Check ================= C:\Windows\System32\winlogon.exe => File is digitally signed C:\Windows\System32\wininit.exe => File is digitally signed C:\Windows\explorer.exe => File is digitally signed C:\Windows\SysWOW64\explorer.exe => File is digitally signed C:\Windows\System32\svchost.exe => File is digitally signed C:\Windows\SysWOW64\svchost.exe => File is digitally signed C:\Windows\System32\services.exe => File is digitally signed C:\Windows\System32\User32.dll => File is digitally signed C:\Windows\SysWOW64\User32.dll => File is digitally signed C:\Windows\System32\userinit.exe => File is digitally signed C:\Windows\SysWOW64\userinit.exe => File is digitally signed C:\Windows\System32\rpcss.dll => File is digitally signed C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed LastRegBack: 2014-06-26 21:59 ==================== End Of Log ============================ GMER Beim Start von GMER kam direkt die Fehlermeldung "C:\Windows\System32\config\system Der Prozess kann nicht auf die Datei zugreifen, da sie von einem anderen Prozess verwendet wird." Ich konnte danach aber ganz normal scannen. Nach dem Scan kam die gleiche Fehlermeldung für den Pfad C:\Users\Puschel\ntuser.dat Code:
ATTFilter GMER 2.1.19357 - hxxp://www.gmer.net Rootkit scan 2014-06-26 23:39:37 Windows 6.2.9200 x64 \Device\Harddisk0\DR0 -> \Device\0000002e TOSHIBA_MQ01ABD100 rev.AX001C 931,51GB Running: Gmer-19357.exe; Driver: C:\Users\Puschel\AppData\Local\Temp\kfroqpob.sys ---- Threads - GMER 2.1 ---- Thread C:\Windows\system32\csrss.exe [576:612] fffff9600092c5e8 Thread [1512:1528] 00000000773d50a7 Thread [1512:1536] 00000000749c8064 Thread [1512:1560] 00000000746bbfb4 Thread [1512:1576] 00000000746bbfb4 Thread [1512:1580] 00000000746bbfb4 Thread [1512:1584] 00000000746bbfb4 Thread [1512:1600] 00000000745f304c ---- Processes - GMER 2.1 ---- Library C:\Users\Puschel\AppData\Roaming\newnext.me\nengine.dll (*** suspicious ***) @ C:\Windows\SysWOW64\rundll32.exe [2532] (NewNext Helper Engine/NewNextDotMe)(2014-01-19 15:36:14) 0000000072000000 ---- Disk sectors - GMER 2.1 ---- Disk \Device\Harddisk0\DR0 unknown MBR code ---- EOF - GMER 2.1 ---- Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Scan Date: 27.06.2014 Scan Time: 00:07:28 Logfile: mbam.txt Administrator: Yes Version: 2.00.2.1012 Malware Database: v2014.06.26.09 Rootkit Database: v2014.06.23.02 License: Free Malware Protection: Disabled Malicious Website Protection: Disabled Self-protection: Disabled OS: Windows 8 CPU: x64 File System: NTFS User: Puschel Scan Type: Threat Scan Result: Completed Objects Scanned: 265594 Time Elapsed: 10 min, 30 sec Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Disabled Heuristics: Enabled PUP: Enabled PUM: Enabled Processes: 0 (No malicious items detected) Modules: 0 (No malicious items detected) Registry Keys: 7 PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\TYPELIB\{DCABB943-792E-44C4-9029-ECBEE6265AF9}, , [69a8a0dd9ddeb58199bcea6172909e62], PUP.Optional.OutBrowse, HKLM\SOFTWARE\CLASSES\INTERFACE\{3408AC0D-510E-4808-8F7B-6B70B1F88534}, , [69a8a0dd9ddeb58199bcea6172909e62], PUP.Optional.OutBrowse, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{3408AC0D-510E-4808-8F7B-6B70B1F88534}, , [69a8a0dd9ddeb58199bcea6172909e62], PUP.Optional.OutBrowse, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{DCABB943-792E-44C4-9029-ECBEE6265AF9}, , [69a8a0dd9ddeb58199bcea6172909e62], PUP.Optional.SearchProtect.A, HKU\S-1-5-21-2799476594-3240853191-3070442433-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{014DB5FA-EAFB-4592-A95B-F44D3EE87FA9}, , [ce439edf7b0087afb1df182ef012659b], PUP.Optional.SearchProtect.A, HKU\S-1-5-21-2799476594-3240853191-3070442433-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\SEARCHPROTECTINT, , [7a97b7c6a8d3e6503680f5dae220f60a], PUP.Optional.SearchProtect.A, HKU\S-1-5-21-2799476594-3240853191-3070442433-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\SEARCHPROTECTINT2, , [b25f88f5691264d2a2155f70e81ae020], Registry Values: 3 PUP.Optional.NextLive.A, HKU\S-1-5-21-2799476594-3240853191-3070442433-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|NextLive, C:\Windows\SysWOW64\rundll32.exe "C:\Users\Puschel\AppData\Roaming\newnext.me\nengine.dll",EntryPoint -m l, , [62af077605763105851e9abf31d04cb4] PUP.Optional.SearchProtect.A, HKU\S-1-5-21-2799476594-3240853191-3070442433-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\SEARCHPROTECTINT|Install, 1, , [7a97b7c6a8d3e6503680f5dae220f60a] PUP.Optional.SearchProtect.A, HKU\S-1-5-21-2799476594-3240853191-3070442433-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\SEARCHPROTECTINT2|Install, 1, , [b25f88f5691264d2a2155f70e81ae020] Registry Data: 0 (No malicious items detected) Folders: 3 PUP.Optional.NextLive.A, C:\Users\Puschel\AppData\Roaming\newnext.me, , [ec252a53e794ca6ca0f5bed6ff038c74], PUP.Optional.NextLive.A, C:\Users\Puschel\AppData\Roaming\newnext.me\cache, , [ec252a53e794ca6ca0f5bed6ff038c74], PUP.Optional.BuzzIT.A, C:\Program Files (x86)\Buzz-it, , [3fd2bcc14437e056554da9fb4bb746ba], Files: 21 PUP.Optional.NextLive.A, C:\Users\Puschel\AppData\Roaming\newnext.me\nengine.dll, , [62af077605763105851e9abf31d04cb4], PUP.Optional.OutBrowse, C:\Users\Puschel\AppData\Local\Temp\DownloadManager.exe, , [69a8a0dd9ddeb58199bcea6172909e62], PUP.Optional.SearchProtect.A, C:\Users\Puschel\AppData\Local\Temp\nse6761.exe, , [20f1e39adc9f5fd7275215193fc247b9], PUP.Optional.SearchProtect.A, C:\Users\Puschel\AppData\Local\Temp\nse6BB5.exe, , [f51c601da7d4191df188929cac55e917], PUP.Optional.SearchProtect.A, C:\Users\Puschel\AppData\Local\Temp\nse8D89.exe, , [25ec7b02ff7cde58a7d26ec034cda45c], PUP.Optional.SearchProtect.A, C:\Users\Puschel\AppData\Local\Temp\nsq2AAE.exe, , [d43d017c1d5e50e69bde1519fe039c64], PUP.Optional.SnapDo.A, C:\Users\Puschel\AppData\Local\Temp\Installer.msi, , [2de41469403bb2849eee0088a25f7789], PUP.Optional.Conduit.A, C:\Users\Puschel\AppData\Local\Temp\SearchProtectINT.exe, , [21f086f78bf0e94ddacd26fb877a857b], PUP.Optional.SearchProtect.A, C:\Users\Puschel\AppData\Local\Temp\nsu64B2.exe, , [32dfcfae1f5c96a0f881b27c986945bb], PUP.Optional.SearchProtect.A, C:\Users\Puschel\AppData\Local\Temp\nsu6C52.exe, , [36db2d50017a64d2ef8a4ee08879f907], PUP.Optional.SearchProtect.A, C:\Users\Puschel\AppData\Local\Temp\nsu6E75.exe, , [e52cfd8044371c1a9edb4fdfd62bd729], PUP.Optional.SearchProtect.A, C:\Users\Puschel\AppData\Local\Temp\nsy69C0.exe, , [739e86f75625f244354463cb5da4cd33], PUP.Optional.SearchProtect.A, C:\Users\Puschel\AppData\Local\Temp\nsy8B94.exe, , [838e196442390b2bd6a371bd9d649070], PUP.Optional.Outbrowse, C:\Users\Puschel\AppData\Local\Temp\l0ox0hvJ.exe.part, , [759ca3da1a612e08755211fe4bb9eb15], PUP.Optional.NextLive.A, C:\Users\Puschel\AppData\Local\genienext\nengine.dll, , [db36ed907efd40f62a79154436cb3ac6], PUP.Optional.Conduit.A, C:\Users\Puschel\AppData\Roaming\Mozilla\Firefox\Profiles\j7a7i4b6.default\searchplugins\conduit-search.xml, , [a46d75083b403105425714b1c73b26da], Trojan.Downloader.Gen, C:\Users\Puschel\AppData\Local\Temp\etxbsbelsd.pre, , [a9682f4eef8c360050eae8f11ce606fa], Trojan.Downloader.Gen, C:\Users\Puschel\AppData\Local\Temp\luahfxqpmy.pre, , [1df4aecf8eede94dd06a42970ef40df3], Trojan.Downloader.Gen, C:\Users\Puschel\AppData\Local\Temp\tyuhssockk.pre, , [c34e5429057691a5be7ce6f31de5c23e], PUP.Optional.NextLive.A, C:\Users\Puschel\AppData\Roaming\newnext.me\nengine.cookie, , [ec252a53e794ca6ca0f5bed6ff038c74], PUP.Optional.NextLive.A, C:\Users\Puschel\AppData\Roaming\newnext.me\cache\spark.bin, , [ec252a53e794ca6ca0f5bed6ff038c74], Physical Sectors: 0 (No malicious items detected) (end) Grüße |