|
Log-Analyse und Auswertung: Werbefenster öffnen sich selbstständigWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
05.11.2008, 01:57 | #1 |
| Werbefenster öffnen sich selbstständig Hallo Wie mein Titel schon sagt, öffnen sich ständig Werbefenster auf meinem Desktop. Ich habe meinen Laptop auch mehrere Male mit meinem GData AV gescannt, der jedoch erkennt keine schädlichen Programme, deshalb hab ich mal HijackThis durchlaufen lassen und bitte euch um eine Analyse der Log-File. Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 17:54:49, on 04.11.2008 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v7.00 (7.00.6001.18000) Boot mode: Normal Running processes: C:\Windows\system32\taskeng.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Program Files\Windows Defender\MSASCui.exe C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe C:\Windows\RtHDVCpl.exe C:\Program Files\Steganos Security Suite 2007\PasswordManagerFFAutoFill.exe C:\Program Files\Steganos Security Suite 2007\SteganosHotKeyService.exe C:\Program Files\Steganos Security Suite 2007\fredirstarter.exe C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe C:\Program Files\G DATA InternetSecurity\Firewall\GDFirewallTray.exe C:\Program Files\G DATA InternetSecurity\AVKTray\AVKTray.exe C:\Windows\System32\igfxtray.exe C:\Windows\System32\hkcmd.exe C:\Windows\System32\igfxpers.exe C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe C:\Program Files\Windows Live\Messenger\msnmsgr.exe C:\Program Files\Windows Media Player\wmpnscfg.exe C:\Windows\system32\igfxsrvc.exe C:\Program Files\Internet Explorer\iexplore.exe C:\Program Files\Internet Explorer\IEUser.exe C:\Windows\System32\regsvr32.exe C:\Windows\system32\conime.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = google.de R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = F2 - REG:system.ini: UserInit=C:\Windows\system32\userinit.exe,c:\program files\g data internetsecurity\avkkid\avkcks.exe O1 - Hosts: ::1 localhost O2 - BHO: G DATA WebFilter Class - {0124123D-61B4-456f-AF86-78C53A0790C5} - C:\Program Files\G DATA InternetSecurity\Webfilter\AVKWebIE.dll O2 - BHO: Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll O2 - BHO: cpmsky browser enhancer - {11AF275E-7B67-132A-4637-A8E52F8DF728} - C:\Windows\system32\zlynopilff.dll O2 - BHO: Steganos Password Manager AutoFill - {1427A821-7B93-4F08-9A34-9FA03A3D93DB} - C:\Program Files\Steganos Security Suite 2007\PasswordManagerBHO.dll O2 - BHO: mysidesearch search enhancer - {4AB32A02-64A3-F329-8235-D32BA08AA974} - C:\Windows\system32\zabsqyetsniok.dll O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file) O3 - Toolbar: G DATA WebFilter - {0124123D-61B4-456f-AF86-78C53A0790C5} - C:\Program Files\G DATA InternetSecurity\Webfilter\AVKWebIE.dll O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - HKLM\..\Run: [SMSERIAL] C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe O4 - HKLM\..\Run: [Skytel] Skytel.exe O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [SSS2007 PasswordManagerFFAutoFill] "C:\Program Files\Steganos Security Suite 2007\PasswordManagerFFAutoFill.exe" O4 - HKLM\..\Run: [SSS2007 HotKeys] "C:\Program Files\Steganos Security Suite 2007\SteganosHotKeyService.exe" O4 - HKLM\..\Run: [SSS2007 File Redirection Starter] "C:\Program Files\Steganos Security Suite 2007\fredirstarter.exe" O4 - HKLM\..\Run: [IAAnotif] "C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" O4 - HKLM\..\Run: [GDFirewallTray] C:\Program Files\G DATA InternetSecurity\Firewall\GDFirewallTray.exe O4 - HKLM\..\Run: [AVKTray] "C:\Program Files\G DATA InternetSecurity\AVKTray\AVKTray.exe" O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe" O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOKALER DIENST') O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETZWERKDIENST') O4 - Global Startup: Bluetooth Manager.lnk = ? O4 - Global Startup: G DATA Firewall Tray.lnk = ? O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000 O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~1.0_0\bin\ssv.dll O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~1.0_0\bin\ssv.dll O9 - Extra button: An OneNote senden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll O9 - Extra 'Tools' menuitem: An OneNote s&enden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL O13 - Gopher Prefix: O23 - Service: G DATA AntiVirus Proxy (AVKProxy) - G DATA Software AG - C:\Program Files\Common Files\G DATA\AVKProxy\AVKProxy.exe O23 - Service: G DATA Scheduler (AVKService) - G DATA Software AG - C:\Program Files\G DATA InternetSecurity\AVK\AVKService.exe O23 - Service: AntiVirus Wächter (AVKWCtl) - G DATA Software AG - C:\Program Files\G DATA InternetSecurity\AVK\AVKWCtl.exe O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe O23 - Service: G DATA Personal Firewall (GDFwSvc) - G DATA Software AG - C:\Program Files\G DATA InternetSecurity\Firewall\GDFwSvc.exe O23 - Service: HP Port Resolver - Hewlett-Packard Company - C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPBPRO.EXE O23 - Service: HP Status Server - Hewlett-Packard Company - C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPBOID.EXE O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe O23 - Service: Steganos AntiTheft (SatSrv) - Unknown owner - C:\Windows\system32\\SatSrv.exe O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe O23 - Service: Steam Client Service - Unknown owner - C:\Program Files\Common Files\Steam\SteamService.exe (file missing) O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe -- End of file - 8178 bytes Vielen Dank im Vorraus evolution (hoffe dieses Mal ist alles korrekt) |
05.11.2008, 20:25 | #2 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Werbefenster öffnen sich selbstständig Hallo und
__________________Acker diese Punkte für weitere Analysen ab: 1.) Stell sicher, daß Dir auch alle Dateien angezeigt werden, danach folgende Dateien bei Virustotal.com auswerten lassen und alle Ergebnisse posten, und zwar so, daß man die der einzelnen Virenscanner sehen kann. Bitte mit Dateigrößen und Prüfsummen: Code:
ATTFilter C:\Windows\system32\zlynopilff.dll C:\Windows\system32\zabsqyetsniok.dll 3.) Führe dieses MBR-Tool aus und poste die Ausgabe 4.) Blacklight und Malwarebytes Antimalware ausführen und Logfiles posten 5.) Führe Silentrunners nach dieser Anleitung aus und poste das Logfile (mit Codetags umschlossen), falls es zu groß sein sollte kannst Du es (gezippt) bei file-upload.net hochladen und hier verlinken. 6.) ComboFix Ein Leitfaden und Tutorium zur Nutzung von ComboFix
Combofix darf ausschließlich ausgeführt werden wenn ein Kompetenzler dies ausdrücklich empfohlen hat!Hinweis: Combofix verhindert die Autostart Funktion aller CD / DVD und USB - Laufwerken um so eine Verbeitung einzudämmen. Wenn es hierdurch zu Problemen kommt, diese im Thread posten. Poste alle Logfiles bitte mit Codetags umschlossen (#-Button) also so: HTML-Code: [code] Hier das Logfile rein! [/code]
Diese listing.txt z.B. bei File-Upload.net hochladen und hier verlinken, da dieses Logfile zu groß fürs Board ist. 8.) Poste ein neues Hijackthis Logfile, nimm dazu diese umbenannte hijackthis.exe - editiere die Links und privaten Infos!!
__________________ |
06.11.2008, 02:59 | #3 |
| Werbefenster öffnen sich selbstständig Danke für deine Mühe.
__________________Ich habe so ziemlich alle Schritte durchgeführt, außer Schritt 3, da mein AV einen Virus beim Laden der Seite entdeckt hat und mich somit nicht auf die Seite ließ. 4) Blacklight hat nichts gefunden Das sind all meine Log-Files: VirusTotal Analyse: Code:
ATTFilter AhnLab-V3 2008.11.5.3 2008.11.05 - AntiVir 7.9.0.26 2008.11.05 - Authentium 5.1.0.4 2008.11.05 - Avast 4.8.1248.0 2008.11.05 - AVG 8.0.0.161 2008.11.05 - BitDefender 7.2 2008.11.05 Generic.Adw.Rotator.CFA8F5D7 CAT-QuickHeal 9.50 2008.11.04 - ClamAV 0.94.1 2008.11.05 - DrWeb 4.44.0.09170 2008.11.05 Adware.Adrotate.12 eSafe 7.0.17.0 2008.11.05 - eTrust-Vet 31.6.6193 2008.11.05 - Ewido 4.0 2008.11.05 - F-Prot 4.4.4.56 2008.11.05 - F-Secure 8.0.14332.0 2008.11.05 - Fortinet 3.117.0.0 2008.11.05 Adware/AdClicker GData 19 2008.11.05 Generic.Adw.Rotator.CFA8F5D7 Ikarus T3.1.1.45.0 2008.11.05 Virus.Win32.Adload.LN K7AntiVirus 7.10.517 2008.11.05 - Kaspersky 7.0.0.125 2008.11.05 - McAfee 5425 2008.11.05 - Microsoft 1.4005 2008.11.05 Adware:Win32/AdRotator NOD32 3588 2008.11.05 - Norman 5.80.02 2008.11.05 - Panda 9.0.0.4 2008.11.05 Generic Malware PCTools 4.4.2.0 2008.11.05 - Rising 21.02.22.00 2008.11.05 Trojan.Clicker.Win32.Agent.eda SecureWeb-Gateway 6.7.6 2008.11.05 - Sophos 4.35.0 2008.11.05 - Sunbelt 3.1.1783.2 2008.11.05 - Symantec 10 2008.11.05 - TheHacker 6.3.1.1.141 2008.11.05 - TrendMicro 8.700.0.1004 2008.11.05 - ViRobot 2008.11.5.1453 2008.11.05 - VirusBuster 4.5.11.0 2008.11.05 - weitere Informationen File size: 172544 bytes MD5...: bac5165f3581a69c87f097094ec77404 SHA1..: 78180f1ea814ff777f3391b7bd01a3d3e0eae9a3 SHA256: 76cae7bb1ea03a85a8c32656e16ac8019e33cbf73562160a4f39c1cbac8d99f3 SHA512: 8b5d99bc28fbd7a708217f683438c5ddc7165e092174472dc50172794f3140f7 edab47e8801164d0cda369cac72e388346736a882e374792b0fa6d51207d266f PEiD..: - TrID..: File type identification Win32 Executable MS Visual C++ (generic) (65.2%) Win32 Executable Generic (14.7%) Win32 Dynamic Link Library (generic) (13.1%) Generic Win/DOS Executable (3.4%) DOS Executable Generic (3.4%) PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x1000fc48 timedatestamp.....: 0x49078231 (Tue Oct 28 21:20:49 2008) machinetype.......: 0x14c (I386) ( 5 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0x1ecff 0x1ee00 6.68 c37a1cfcd807b807873f28f4f4f250d0 .rdata 0x20000 0x6bdb 0x6c00 5.42 f00948f2933f949d02af382db70c5247 Code:
ATTFilter AhnLab-V3 2008.11.5.3 2008.11.05 - AntiVir 7.9.0.26 2008.11.05 - Authentium 5.1.0.4 2008.11.05 - Avast 4.8.1248.0 2008.11.05 - AVG 8.0.0.161 2008.11.05 - BitDefender 7.2 2008.11.05 - CAT-QuickHeal 9.50 2008.11.04 - ClamAV 0.94.1 2008.11.05 - DrWeb 4.44.0.09170 2008.11.05 - eSafe 7.0.17.0 2008.11.05 - eTrust-Vet 31.6.6193 2008.11.05 - Ewido 4.0 2008.11.05 - F-Prot 4.4.4.56 2008.11.05 - F-Secure 8.0.14332.0 2008.11.05 - Fortinet 3.117.0.0 2008.11.05 - GData 19 2008.11.05 - Ikarus T3. 1.1.45.0 2008.11.05 - K7AntiVirus 7.10.517 2008.11.05 - Kaspersky 7.0.0.125 2008.11.05 - McAfee 5425 2008.11.05 - Microsoft 1.4005 2008.11.05 - NOD32 3588 2008.11.05 - Norman 5.80.02 2008.11.05 - Panda 9.0.0.4 2008.11.05 - PCTools 4.4.2.0 2008.11.05 - Prevx1 V2 2008.11.05 Malicious Software Rising 21.02.22.00 2008.11.05 - SecureWeb-Gateway 6.7.6 2008.11.05 - Sophos 4.35.0 2008.11.05 - Sunbelt 3.1.1783.2 2008.11.05 - Symantec 10 2008.11.05 - TheHacker 6.3.1.1.141 2008.11.05 - TrendMicro 8.700.0.1004 2008.11.05 - VBA32 3.12.8.9 2008.11.05 - ViRobot 2008.11.5.1453 2008.11.05 - VirusBuster 4.5.11.0 2008.11.05 - weitere Informationen File size: 600576 bytes MD5...: 3bb655a363ee93ff26dff1be95c347fb SHA1..: 9b9c9651e3c9f91f8b543973569e0054de63df70 SHA256: 2c668e3552c5a3702087d29bda6585f4425c02980c91cedc09d3a243c6e7461f SHA512: ea6116558e411e072a12cb84a9197a1c0027af5c1a4586fba0ce6b2285ffac9f 30c122d0f1946c0ad7fd5cfea3b29ca47e6c6fdf5cd9a56de4f5965819308cb7 PEiD..: - TrID..: File type identification Win32 Executable MS Visual C++ (generic) (65.2%) Win32 Executable Generic (14.7%) Win32 Dynamic Link Library (generic) (13.1%) Generic Win/DOS Executable (3.4%) DOS Executable Generic (3.4%) PEInfo: PE Structure information ( base data ) entrypointaddress.: 0x10056094 timedatestamp.....: 0x490efbbf (Mon Nov 03 13:25:19 2008) machinetype.......: 0x14c (I386) ( 5 sections ) name viradd virsiz rawdsiz ntrpy md5 .text 0x1000 0x6f4bc 0x6f600 6.52 39b9e77c5e3bfda5738555441cfb3b57 .rdata 0x71000 0x13773 0x13800 4.76 ca15244e79d8369bb11e474de680033a .data 0x85000 0x7358 0x2c00 4.44 521bd0b9ba076f6e9afd4154aa5ca243 .rsrc 0x8d000 0x5a4 0x600 4.12 e17af9581ff74abb62c3a4463779a125 .reloc 0x8e000 0xc41a 0xc600 4.77 3544ac195425ed8c1aa50b92787a5398 ( 12 imports ) > imagehlp.dll: UnMapAndLoad, MapAndLoad > RPCRT4.dll: UuidToStringW, RpcStringFreeW > KERNEL32.dll: FileTimeToLocalFileTime, GetFileAttributesW, GetFileSizeEx, GetFileTime, HeapFree, HeapAlloc, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCommandLineA, RtlUnwind, RaiseException, HeapReAlloc, HeapSize, Sleep, ExitProcess, VirtualProtect, VirtualAlloc, GetSystemInfo, VirtualQuery, HeapCreate, HeapDestroy, VirtualFree, GetStdHandle, GetTickCount, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LCMapStringW, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, GetTimeZoneInformation, LCMapStringA, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetConsoleCP, GetConsoleMode, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEnvironmentVariableA, CreateFileW, GetFullPathNameW, GetVolumeInformationW, FindFirstFileW, FindClose, GetCurrentProcess, DuplicateHandle, GetFileSize, SetEndOfFile, UnlockFile, LockFile, FlushFileBuffers, SetFilePointer, WriteFile, ReadFile, FileTimeToSystemTime, lstrlenA, lstrcmpA, CompareStringA, InterlockedExchange, GlobalFlags, GetThreadLocale, GetCurrentProcessId, SetErrorMode, TlsFree, DeleteCriticalSection, LocalReAlloc, TlsSetValue, TlsAlloc, InitializeCriticalSection, GlobalHandle, GlobalReAlloc, EnterCriticalSection, TlsGetValue, LeaveCriticalSection, LocalAlloc, GetModuleHandleA, GetModuleFileNameW, FreeResource, GetCurrentThreadId, GlobalAddAtomW, GlobalFindAtomW, GlobalDeleteAtom, GetVersionExW, CompareStringW, lstrcmpW, GetModuleHandleW, GetVersionExA, SetLastError, GlobalFree, GlobalAlloc, GlobalLock, GlobalUnlock, FormatMessageW, LocalFree, MulDiv, ReleaseMutex, OpenMutexW, CreateMutexW, WaitForSingleObject, CloseHandle, ExitThread, WideCharToMultiByte, LockResource, LoadLibraryW, FreeLibrary, MultiByteToWideChar, SizeofResource, LoadResource, FindResourceW, GetLastError, InterlockedDecrement, InterlockedIncrement, lstrlenW, LoadLibraryA, GetProcAddress, GetModuleFileNameA > USER32.dll: PostThreadMessageW, CopyAcceleratorTableW, PostQuitMessage, DestroyMenu, CharNextW, GetWindowThreadProcessId, LoadCursorW, GetSysColorBrush, UnregisterClassW, GetMessageW, TranslateMessage, ValidateRect, EndPaint, BeginPaint, GetWindowDC, ReleaseDC, GetDC, ClientToScreen, GrayStringW, DrawTextExW, DrawTextW, TabbedTextOutW, SetWindowContextHelpId, MapDialogRect, GetDesktopWindow, GetActiveWindow, CreateDialogIndirectParamW, GetNextDlgTabItem, IsWindowEnabled, MoveWindow, SetWindowTextW, IsDialogMessageW, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, ModifyMenuW, EnableMenuItem, CheckMenuItem, RegisterWindowMessageW, LoadIconW, SendDlgItemMessageW, SendDlgItemMessageA, WinHelpW, IsChild, SetWindowsHookExW, CallNextHookEx, GetClassLongW, GetFocus, IsWindow, SetFocus, InvalidateRect, GetLastActivePopup, SetActiveWindow, DispatchMessageW, GetDlgItem, GetTopWindow, DestroyWindow, UnhookWindowsHookEx, GetMessageTime, GetMessagePos, PeekMessageW, MapWindowPoints, GetKeyState, SetMenu, SetForegroundWindow, IsWindowVisible, UpdateWindow, PostMessageW, MessageBoxW, CreateWindowExW, GetClassInfoExW, GetClassInfoW, RegisterClassW, GetSysColor, AdjustWindowRectEx, ScreenToClient, EqualRect, CopyRect, PtInRect, GetDlgCtrlID, DefWindowProcW, GetMenu, RegisterClipboardFormatW, CharUpperW, MessageBeep, GetNextDlgGroupItem, ReleaseCapture, SetCapture, LoadBitmapW, InvalidateRgn, GetWindowLongW, SetWindowPos, OffsetRect, IntersectRect, SystemParametersInfoA, IsIconic, GetWindowPlacement, GetSystemMetrics, GetWindow, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, GetClientRect, ShowWindow, BringWindowToTop, GetParent, GetWindowRect, SetPropW, CallWindowProcW, RemovePropW, SetWindowLongW, GetPropW, SendMessageW, CharUpperBuffW, RealGetWindowClassW, GetClassNameW, GetWindowTextW, EnumChildWindows, EnableWindow, SetRect, GetForegroundWindow, IsRectEmpty, GetCapture, EndDialog > GDI32.dll: Escape, ExtSelectClipRgn, DeleteDC, GetStockObject, SetWindowExtEx, GetTextColor, CreateRectRgnIndirect, GetRgnBox, GetMapMode, ScaleWindowExtEx, ExtTextOutW, TextOutW, RectVisible, PtVisible, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, SetViewportOrgEx, SetTextColor, GetClipBox, GetBkColor, GetDeviceCaps, GetWindowExtEx, GetViewportExtEx, DeleteObject, SetMapMode, RestoreDC, SaveDC, CreateBitmap, GetObjectW, SetBkColor, SelectObject > COMDLG32.dll: GetFileTitleW > WINSPOOL.DRV: DocumentPropertiesW, ClosePrinter, OpenPrinterW > SHLWAPI.dll: SHDeleteKeyW, PathStripToRootW, StrCpyW, PathFindFileNameW, UrlUnescapeW, StrStrIW, UrlGetPartW, PathFindExtensionW, PathIsUNCW, StrCmpIW > oledlg.dll: OleUIBusyW > ole32.dll: CoRegisterMessageFilter, OleFlushClipboard, OleIsCurrentClipboard, CoRevokeClassObject, OleInitialize, CoFreeUnusedLibraries, OleUninitialize, CreateILockBytesOnHGlobal, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CoGetClassObject, CLSIDFromString, CLSIDFromProgID, CoTaskMemAlloc, CoUninitialize, CoInitialize, StringFromCLSID, CoCreateInstance, CoTaskMemFree > OLEAUT32.dll: -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, -, - > urlmon.dll: URLDownloadToFileW, UrlMkGetSessionOption ( 4 exports ) DllCanUnloadNow, DllGetClassObject, DllRegisterServer, DllUnregisterServer Prevx info: http://info.prevx.com/aboutprogramtext.asp?PX5=54D2374800BAC31D2A1C095E78E07700DD6CD57A .data 0x27000 0x33e4 0x1800 3.92 28de8ea2564e5e37fe1b0eab06bac37e .rsrc 0x2b000 0x34c 0x400 4.69 119f993e12f49a1739e2bb96f9406f97 .reloc 0x2c000 0x271a 0x2800 4.95 4e63c10a63d924c57778b2bad3196748 ( 8 imports ) > RPCRT4.dll: UuidToStringW, RpcStringFreeW > VERSION.dll: VerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW > SHLWAPI.dll: StrCmpIW, StrStrIW, PathStripPathW, UrlEscapeW, SHDeleteKeyW > KERNEL32.dll: ExitThread, WaitForSingleObject, CreateThread, Sleep, GetModuleFileNameW, OpenMutexW, GetSystemTime, CreateEventW, OpenProcess, CreateMutexW, GetLastError, InterlockedIncrement, InterlockedDecrement, lstrcmpW, GetTickCount, SystemTimeToFileTime, GetLocalTime, LocalFree, LoadLibraryA, FreeLibrary, ExpandEnvironmentStringsW, WideCharToMultiByte, MultiByteToWideChar, GetTempFileNameW, GetEnvironmentVariableW, LocalAlloc, VirtualQuery, GetVolumeInformationW, LoadLibraryW, GetSystemInfo, GetStringTypeW, GetStringTypeA, LCMapStringA, GetLocaleInfoA, InitializeCriticalSectionAndSpinCount, GetConsoleMode, GetConsoleCP, SetFilePointer, HeapReAlloc, VirtualAlloc, GetSystemTimeAsFileTime, GetCurrentProcessId, QueryPerformanceCounter, VirtualFree, HeapDestroy, HeapCreate, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetStartupInfoA, GetProcAddress, CreateProcessW, CloseHandle, SetEvent, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, lstrlenW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, FlushFileBuffers, GetWindowsDirectoryW, GetFileType, SetHandleCount, LCMapStringW, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, GetModuleFileNameA, GetStdHandle, WriteFile, ExitProcess, HeapSize, GetModuleHandleA, SetLastError, TlsFree, TlsSetValue, RaiseException, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlUnwind, GetCurrentThreadId, GetCommandLineA, HeapFree, HeapAlloc, GetModuleHandleW, TlsGetValue, TlsAlloc > USER32.dll: GetWindowTextW, EnumChildWindows, RealGetWindowClassW, CallWindowProcW, SetWindowLongW, GetWindowThreadProcessId, SetActiveWindow, SendMessageW, GetPropW, RemovePropW, SetWindowTextW, SetPropW, IntersectRect, InflateRect, ClientToScreen, PeekMessageW, MsgWaitForMultipleObjects, TranslateMessage, DispatchMessageW, GetClassNameW, PostMessageW, OffsetRect > ADVAPI32.dll: CryptCreateHash, CryptGetHashParam, ConvertStringSecurityDescriptorToSecurityDescriptorW, GetSecurityDescriptorSacl, SetSecurityInfo, CryptGenRandom, CryptAcquireContextW, CryptHashData, CryptDestroyHash, CryptReleaseContext, RegQueryValueExW, RegCreateKeyW, RegCreateKeyExW, RegSetValueW, RegDeleteValueW, RegOpenKeyExW, RegSetValueExW, RegCloseKey > ole32.dll: CoInitializeEx, CoCreateInstance, CoTaskMemFree, CoUninitialize > OLEAUT32.dll: -, -, -, -, -, -, -, -, -, -, - ( 4 exports ) DllCanUnloadNow, DllGetClassObject, DllRegisterServer, DllUnregisterServer File-Upload.net - Silent-Runners.vbs--log--2008-11-05-16.20.02.txt File-Upload.net - Combofix-log.txt Code:
ATTFilter Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 18:46:39, on 05.11.2008 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v7.00 (7.00.6001.18000) Boot mode: Normal Running processes: C:\Windows\system32\Dwm.exe C:\Windows\system32\taskeng.exe C:\Program Files\Windows Defender\MSASCui.exe C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe C:\Windows\RtHDVCpl.exe C:\Program Files\Steganos Security Suite 2007\PasswordManagerFFAutoFill.exe C:\Program Files\Steganos Security Suite 2007\SteganosHotKeyService.exe C:\Program Files\Steganos Security Suite 2007\fredirstarter.exe C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe C:\Program Files\G DATA InternetSecurity\Firewall\GDFirewallTray.exe C:\Program Files\G DATA InternetSecurity\AVKTray\AVKTray.exe C:\Windows\System32\igfxtray.exe C:\Windows\System32\hkcmd.exe C:\Windows\System32\igfxpers.exe C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe C:\Windows\system32\igfxsrvc.exe C:\Program Files\Windows Media Player\wmpnscfg.exe C:\Windows\system32\conime.exe C:\Windows\Explorer.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\Windows\system32\SearchFilterHost.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = google.de R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O1 - Hosts: ::1 localhost O2 - BHO: G DATA WebFilter Class - {0124123D-61B4-456f-AF86-78C53A0790C5} - C:\Program Files\G DATA InternetSecurity\Webfilter\AVKWebIE.dll O2 - BHO: Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll O2 - BHO: Steganos Password Manager AutoFill - {1427A821-7B93-4F08-9A34-9FA03A3D93DB} - C:\Program Files\Steganos Security Suite 2007\PasswordManagerBHO.dll O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file) O3 - Toolbar: G DATA WebFilter - {0124123D-61B4-456f-AF86-78C53A0790C5} - C:\Program Files\G DATA InternetSecurity\Webfilter\AVKWebIE.dll O4 - HKLM\..\Run: [SMSERIAL] C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe O4 - HKLM\..\Run: [Skytel] Skytel.exe O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [SSS2007 PasswordManagerFFAutoFill] "C:\Program Files\Steganos Security Suite 2007\PasswordManagerFFAutoFill.exe" O4 - HKLM\..\Run: [SSS2007 HotKeys] "C:\Program Files\Steganos Security Suite 2007\SteganosHotKeyService.exe" O4 - HKLM\..\Run: [SSS2007 File Redirection Starter] "C:\Program Files\Steganos Security Suite 2007\fredirstarter.exe" O4 - HKLM\..\Run: [IAAnotif] "C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" O4 - HKLM\..\Run: [GDFirewallTray] C:\Program Files\G DATA InternetSecurity\Firewall\GDFirewallTray.exe O4 - HKLM\..\Run: [AVKTray] "C:\Program Files\G DATA InternetSecurity\AVKTray\AVKTray.exe" O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.6.0_07\bin\jusched.exe" O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\Windows Live\Messenger\MsnMsgr.Exe" /background O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOKALER DIENST') O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETZWERKDIENST') O4 - Global Startup: Bluetooth Manager.lnk = ? O4 - Global Startup: G DATA Firewall Tray.lnk = ? O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~3\Office12\EXCEL.EXE/3000 O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~1.0_0\bin\ssv.dll O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~1.0_0\bin\ssv.dll O9 - Extra button: An OneNote senden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll O9 - Extra 'Tools' menuitem: An OneNote s&enden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL O13 - Gopher Prefix: O23 - Service: G DATA AntiVirus Proxy (AVKProxy) - G DATA Software AG - C:\Program Files\Common Files\G DATA\AVKProxy\AVKProxy.exe O23 - Service: G DATA Scheduler (AVKService) - G DATA Software AG - C:\Program Files\G DATA InternetSecurity\AVK\AVKService.exe O23 - Service: AntiVirus Wächter (AVKWCtl) - G DATA Software AG - C:\Program Files\G DATA InternetSecurity\AVK\AVKWCtl.exe O23 - Service: ##Id_String1.6844F930_1628_4223_B5CC_5BB94B879762## (Bonjour Service) - Apple Computer, Inc. - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: FLEXnet Licensing Service - Macrovision Europe Ltd. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe O23 - Service: G DATA Personal Firewall (GDFwSvc) - G DATA Software AG - C:\Program Files\G DATA InternetSecurity\Firewall\GDFwSvc.exe O23 - Service: HP Port Resolver - Hewlett-Packard Company - C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPBPRO.EXE O23 - Service: HP Status Server - Hewlett-Packard Company - C:\WINDOWS\SYSTEM32\SPOOL\DRIVERS\W32X86\3\HPBOID.EXE O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe O23 - Service: Steganos AntiTheft (SatSrv) - Unknown owner - C:\Windows\system32\\SatSrv.exe O23 - Service: PC Tools Auxiliary Service (sdAuxService) - PC Tools - C:\Program Files\Spyware Doctor\pctsAuxs.exe O23 - Service: PC Tools Security Service (sdCoreService) - PC Tools - C:\Program Files\Spyware Doctor\pctsSvc.exe O23 - Service: Steam Client Service - Unknown owner - C:\Program Files\Common Files\Steam\SteamService.exe (file missing) O23 - Service: TOSHIBA Bluetooth Service - TOSHIBA CORPORATION - C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe -- End of file - 7332 bytes evolution Geändert von evolution (06.11.2008 um 03:52 Uhr) |
06.11.2008, 09:37 | #4 | |
/// Winkelfunktion /// TB-Süch-Tiger™ | Werbefenster öffnen sich selbstständigZitat:
__________________ Logfiles bitte immer in CODE-Tags posten |
06.11.2008, 20:05 | #5 |
| Werbefenster öffnen sich selbstständig Ich glaube das ist jetzt gar nicht mehr nötig. Ich war gestern sehr lange an meinem PC und es hat sich nicht ein einziges Fenster geöffnet. Vielen Dank evoluion |
Themen zu Werbefenster öffnen sich selbstständig |
adobe, antivirus, bho, bonjour, browser, computer, defender, firefox, g data, gdata, hijack, hijackthis, internet, internet explorer, mehrere, monitor, mozilla, rundll, security, security suite, senden, server, software, spyware, system, userinit.exe, vista, werbefenster, windows, windows defender, windows sidebar |