![]() |
HijackThis logfile auswerten Hallo, ich hab mal mit HijackThis mein System gescannt, weiß aber nicht, was ich nun tun soll. Logfile of HijackThis v1.99.1 Scan saved at 18:33:31, on 14.05.2005 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180) Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\Programme\Ahead\InCD\InCDsrv.exe C:\WINDOWS\system32\spoolsv.exe D:\AVPersonal\AVGUARD.EXE C:\WINDOWS\Microsoft.NET\Framework\v2.0.40607\aspnet_admin.exe D:\AVPersonal\AVWUPSRV.EXE D:\Kerio\Personal Firewall 4\kpf4ss.exe C:\WINDOWS\Explorer.exe C:\WINDOWS\system32\sysinit32p2.exe D:\FRITZ!DSL\Awatch.exe D:\T-DSL SpeedManager\SpeedMgr.exe D:\CyberLink DVD Solution\PowerDVD\PDVDServ.exe D:\QuickTime\qttask.exe C:\WINDOWS\system32\rundll32.exe D:\AVPersonal\AVGNT.EXE C:\WINDOWS\system32\ctfmon.exe D:\Kerio\Personal Firewall 4\kpf4gui.exe D:\T-DSL SpeedManager\tsmsvc.exe D:\Kerio\Personal Firewall 4\kpf4gui.exe F:\Sicherheit\processExplorer\procexp.exe C:\Programme\Internet Explorer\iexplore.exe F:\Sicherheit\hijackthis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://69.50.190.135/?to=FED&from=start_page&type=start_page R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page_bak = h**p://www.web.de/ R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyServer = 127.0.0.1:4001 R3 - Default URLSearchHook is missing F2 - REG:system.ini: Shell=Explorer.exe sysinit32p2.exe O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - D:\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll O2 - BHO: Class - {5B539ABB-4124-C42B-3E68-7E7FC740FB02} - C:\WINDOWS\ntkr.dll (file missing) O2 - BHO: Class - {65365E5C-A84C-79CB-4FC6-7C1BFA8DEF55} - C:\WINDOWS\atldl32.dll (file missing) O2 - BHO: IeCatch2 Class - {A5366673-E8CA-11D3-9CD9-0090271D075B} - D:\FlashGet\jccatch.dll O2 - BHO: Class - {FE7B5336-0902-4B57-4547-53A2ECE5F3B9} - C:\WINDOWS\msxi.dll (file missing) O3 - Toolbar: FlashGet Bar - {E0E899AB-F487-11D5-8D29-0050BA6940E3} - D:\FlashGet\fgiebar.dll O4 - HKLM\..\Run: [AWatch] d:\FRITZ!DSL\Awatch.exe O4 - HKLM\..\Run: [T-DSL SpeedMgr] "D:\T-DSL SpeedManager\SpeedMgr.exe" O4 - HKLM\..\Run: [RemoteControl] "D:\CyberLink DVD Solution\PowerDVD\PDVDServ.exe" O4 - HKLM\..\Run: [CloneCDTray] "D:\SlySoft\CloneCD\CloneCDTray.exe" /s O4 - HKLM\..\Run: [QuickTime Task] "D:\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [TrojanScanner] D:\Trojan Remover\Trjscan.exe O4 - HKLM\..\Run: [mslv32.exe] C:\WINDOWS\system32\mslv32.exe O4 - HKLM\..\Run: [BluetoothAuthenticationAgent] rundll32.exe bthprops.cpl,,BluetoothAuthenticationAgent O4 - HKLM\..\Run: [AVGCtrl] D:\AVPersonal\AVGNT.EXE /min O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe O4 - Global Startup: Microsoft Office.lnk = D:\Microsoft Office\Office10\OSA.EXE O8 - Extra context menu item: Alles mit FlashGet laden - D:\FlashGet\jc_all.htm O8 - Extra context menu item: Mit FlashGet laden - D:\FlashGet\jc_link.htm O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://D:\MICROS~1\Office10\EXCEL.EXE/3000 O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\j2re1.4.2_06\bin\npjpi142_06.dll O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\j2re1.4.2_06\bin\npjpi142_06.dll O9 - Extra button: Run WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - D:\WinHTTrack\WinHTTrackIEBar.dll O9 - Extra 'Tools' menuitem: Launch WinHTTrack - {36ECAF82-3300-8F84-092E-AFF36D6C7040} - D:\WinHTTrack\WinHTTrackIEBar.dll O9 - Extra button: Preispiraten 2.1.1 - {86DE8B3B-1EB7-4386-84BD-EBE94348A913} - D:\Preispiraten\Preispiraten2\preispiraten2ie.exe O9 - Extra button: ICQ 4.1 - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - D:\ICQLite\ICQLite.exe O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - D:\ICQLite\ICQLite.exe O9 - Extra button: eBay Homepage - {D4951B60-8FF9-4813-B716-FF3E75386E74} - h**p://www.preispiraten.de/cgi-bin/e/tracker_short.pl?h**p://www.ebay.de (file missing) O9 - Extra button: FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - D:\FlashGet\flashget.exe O9 - Extra 'Tools' menuitem: &FlashGet - {D6E814A0-E0C5-11d4-8D29-0050BA6940E3} - D:\FlashGet\flashget.exe O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - h**p://tools.ebayimg.com/eps/wl/activex/EPUWALControl_v1-0-3-9.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{3F8F32D9-3E27-4495-B97A-AFEC88D9FF87}: NameServer = 217.237.150.33 217.237.151.161 O18 - Protocol: ms-help - {314111C7-A502-11D2-BBCA-00C04F8EC294} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Help\hxds.dll O23 - Service: AntiVir Service (AntiVirService) - H+BEDV Datentechnik GmbH - D:\AVPersonal\AVGUARD.EXE O23 - Service: AntiVir Update (AVWUpSrv) - H+BEDV Datentechnik GmbH, Germany - D:\AVPersonal\AVWUPSRV.EXE O23 - Service: AVM FRITZ!web Routing Service (de_serv) - AVM Berlin - C:\Programme\Gemeinsame Dateien\AVM\de_serv.exe O23 - Service: InCD Helper (InCDsrv) - Ahead Software AG - C:\Programme\Ahead\InCD\InCDsrv.exe O23 - Service: Kerio Personal Firewall 4 (KPF4) - Kerio Technologies - D:\Kerio\Personal Firewall 4\kpf4ss.exe O23 - Service: OracleJobSchedulerORCL - Unknown owner - d:\oracle\product\10.1.0\db_1\Bin\extjob.exe O23 - Service: OracleOraDb10g_home1iSQL*Plus - Oracle - D:\oracle\product\10.1.0\Db_1\bin\isqlplussvc.exe O23 - Service: OracleOraDb10g_home1SNMPPeerEncapsulator - Unknown owner - D:\oracle\product\10.1.0\Db_1\BIN\ENCSVC.EXE O23 - Service: OracleOraDb10g_home1SNMPPeerMasterAgent - Unknown owner - D:\oracle\product\10.1.0\Db_1\BIN\AGNTSVC.EXE O23 - Service: TSMService - T-Systems Nova, Berkom - D:\T-DSL SpeedManager\tsmsvc.exe Ich wäre für schelle Hilfe sehr dankbar. mfg geometer |
Gehe wie folgt vor, wechsle in den abgesicherten Modus bei deaktivierter Systemwiederherstellung: http://www.trojaner-board.de/63335-w...s-starten.html http://service1.symantec.com/SUPPORT...30807105707924 Fixe mittels Hijackthis folgende Einträge: R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = h**p://69.50.190.135/?to=FED&from=start_page&type=start_page R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = about:blank R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKCU\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = res://C:\WINDOWS\wyhba.dll/sp.html#37049 R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Int ernet Settings,ProxyServer = 127.0.0.1:4001 R3 - Default URLSearchHook is missing F2 - REG:system.ini: Shell=Explorer.exe sysinit32p2.exe O2 - BHO: Class - {5B539ABB-4124-C42B-3E68-7E7FC740FB02} - C:\WINDOWS\ntkr.dll (file missing) O2 - BHO: Class - {65365E5C-A84C-79CB-4FC6-7C1BFA8DEF55} - C:\WINDOWS\atldl32.dll (file missing) O2 - BHO: Class - {FE7B5336-0902-4B57-4547-53A2ECE5F3B9} - C:\WINDOWS\msxi.dll (file missing) O4 - HKLM\..\Run: [mslv32.exe] C:\WINDOWS\system32\mslv32.exe O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - Lösche manuell: C:\WINDOWS\system32\sysinit32p2.exe C:\WINDOWS\system32\mslv32.exe Führe dann folgendes aus: http://www.trojaner-info.de/anleitun...out_blank.html Nach Neustart neu booten,die Systemwiedererstellung anschalten und neuen Log posten. |
Alle Zeitangaben in WEZ +1. Es ist jetzt 20:26 Uhr. |
Copyright ©2000-2025, Trojaner-Board