![]() |
BKA Virus & Weiterleitung auf andere Seiten Hallo, habe hier den Laptop meiner Freundin (bzw. der ihres Vaters). Das BKA Bild ist zwar wieder weg und habe wieder Zugriff auf den Laptop, aber Firefox zeigt noch immer an dass versucht wird auf eine andere Seite umzuleiten dass der PC mit Malware verseucht. Hab schon Malwarebytes laufen lassen, findet aber nichts mehr. Was kann ich jetzt noch machen? Onlinebanking wird vom Laptop aus nicht betrieben. Sie will nur ungern formatieren, weils sonst Stress vom Vater gibt ;) |
Zitat:
Führe auch bitte ESET aus, danach sehen wir weiter. ESET Online Scanner
n. |
sah gestern schlimm aus, da hilft bestimmt nur noch formatieren. muss jetzt leider gleich zur Mittagschicht Malwarebytes' Anti-Malware 1.51.1.1800 Malwarebytes : Free anti-malware, anti-virus and spyware removal download Datenbank Version: 7035 Windows 5.1.2600 Service Pack 3 Internet Explorer 8.0.6001.18702 20.07.2011 11:58:41 mbam-log-2011-07-20 (11-58-41).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|) Durchsuchte Objekte: 74977 Laufzeit: 25 Minute(n), 16 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 5 Infizierte Registrierungswerte: 0 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 0 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: HKEY_CLASSES_ROOT\CLSID\{C689C99E-3A8C-4c87-A79C-C80DC9C81632} (Trojan.Banker) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\linkrdr.AIEbho.1 (Trojan.Banker) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\linkrdr.AIEbho (Trojan.Banker) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C689C99E-3A8C-4C87-A79C-C80DC9C81632} (Trojan.Banker) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{C689C99E-3A8C-4C87-A79C-C80DC9C81632} (Trojan.Banker) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: (Keine bösartigen Objekte gefunden) Malwarebytes' Anti-Malware 1.51.1.1800 Malwarebytes : Free anti-malware, anti-virus and spyware removal download Datenbank Version: 7035 Windows 5.1.2600 Service Pack 3 Internet Explorer 8.0.6001.18702 20.07.2011 21:40:04 mbam-log-2011-07-20 (21-40-04).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|) Durchsuchte Objekte: 205811 Laufzeit: 36 Minute(n), 54 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 2 Infizierte Registrierungswerte: 1 Infizierte Dateiobjekte der Registrierung: 5 Infizierte Verzeichnisse: 2 Infizierte Dateien: 172 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\prh (Trojan.Banker) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\tst (Trojan.Banker) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{6BACA9B3-F0F2-E62B-D1C9-79B3E4ECFDEE} (Trojan.ZbotR.Gen) -> Value: {6BACA9B3-F0F2-E62B-D1C9-79B3E4ECFDEE} -> Delete on reboot. Infizierte Dateiobjekte der Registrierung: HKEY_CLASSES_ROOT\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\URL (Hijack.SearchPage) -> Bad: (hxxp://findgala.com/?&uid=2121&q={searchTerms}) Good: (hxxp://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}&ie={inputEncoding}&oe={outputEncoding}&startIndex={startIndex?}&startPage={startPage}) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (PUM.Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.UserInit) -> Bad: (C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\appconf32.exe,\appconf32.exe,) Good: (userinit.exe) -> Quarantined and deleted successfully. Infizierte Verzeichnisse: c:\WINDOWS\system32\xmldm (Stolen.Data) -> Quarantined and deleted successfully. c:\Recycle.Bin (Trojan.Spyeyes) -> Quarantined and deleted successfully. Infizierte Dateien: c:\WINDOWS\system32\srvblck2.tmp (Malware.Trace) -> Quarantined and deleted successfully. c:\WINDOWS\system32\acroiehelpe.txt (Malware.Trace) -> Quarantined and deleted successfully. c:\dokumente und einstellungen\Cindy\anwendungsdaten\Syaf\evwuw.exe (Trojan.ZbotR.Gen) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2868_0000000083.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2924_0000000238.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3324_0000000239.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000093_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000094.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000095.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000096.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000097.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000098.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000099.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000101.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000102.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000103.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000104.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000105.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000106.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000107.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000108.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000109_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000149.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000150.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000151.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000152.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000153.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000155.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000156_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000157_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000158_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000159.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000160.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000161.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000163.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000164_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000165_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000111_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000112_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000113_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000114_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000115_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000116.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000117.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000118.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000143.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000144.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000145.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2868_0000000066.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000166_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000183.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000092_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000110_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2868_0000000082.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000216_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000129.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000084.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000085.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000086.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000087_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000088_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000089_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000090_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2792_0000000091_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2352_0000000146.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2352_0000000147.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2352_0000000148.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000167.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000168.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000169.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000170.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000171.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000172.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000173.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000174.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000175.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000176.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000177.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000178.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000179.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000180.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000181.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000182.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2400_0000000240.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2612_0000000206.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000184.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000185.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000186.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000187.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000188.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000189.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000190.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000191.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000192.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000193.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000195.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000196.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000197.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000198.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000199.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000200.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000201.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000202.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000203.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000204.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\2324_0000000205.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000130.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000131.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000132.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000133.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000134.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000135.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000136.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000137.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000138.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000139.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000140.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000141.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000142.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000217_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000218.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000219.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000221.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000222.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000223.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000224.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000225_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000226.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000227.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000228_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000229_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000230_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000231_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000232_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000233_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000234_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000235.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000237.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000120.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000121.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000122.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000123.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000124.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000125.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000126.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000127.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3820_0000000128.frm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc170e8f97bc2e_00001468_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc170e8f9c80e2_00001468_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc170e900ef1c2_00001468_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc170e9013b676_00001468_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc170e90b111aa_00001468_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc1ab0dd2668f0_00000524_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc1ab0dd2ff258_00000524_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc1ab0dd967776_00000524_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc1ab0dd9b3c2a_00000524_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc1ab0de317050_00000524_classes.jsa (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc1ab0de46e57a_00000524_java.security (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc1ab0de6381b2_00000524_java.policy (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\fromjava01cc1bb1d2cf7778_00004492_jvm.cfg (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\iexplore.exe_uas003.dat (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000207.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000208.pst (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000209.key (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000210.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000211_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000212_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000213_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000214_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\WINDOWS\system32\xmldm\3788_0000000215_ifrm.htm (Stolen.Data) -> Quarantined and deleted successfully. c:\Recycle.Bin\4899559652dfae4 (Trojan.Spyeyes) -> Quarantined and deleted successfully. c:\Recycle.Bin\config.bin (Trojan.Spyeyes) -> Quarantined and deleted successfully. Malwarebytes' Anti-Malware 1.51.1.1800 Malwarebytes : Free anti-malware, anti-virus and spyware removal download Datenbank Version: 7219 Windows 5.1.2600 Service Pack 3 Internet Explorer 8.0.6001.18702 21.07.2011 09:17:15 mbam-log-2011-07-21 (09-17-15).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|) Durchsuchte Objekte: 200066 Laufzeit: 41 Minute(n), 54 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 0 Infizierte Registrierungswerte: 0 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 0 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: (Keine bösartigen Objekte gefunden) ESET ESETSmartInstaller@High as downloader log: all ok # version=7 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6528 # api_version=3.0.2 # EOSSerial=a6c5af5e26e94949a15f612fdfc8134e # end=finished # remove_checked=false # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2011-07-21 12:58:17 # local_time=2011-07-21 12:58:17 (+0000, ) # country="Austria" # lang=1033 # osver=5.1.2600 NT Service Pack 3 # compatibility_mode=1280 16777191 100 0 48988 48988 0 0 # compatibility_mode=8192 67108863 100 0 7395 7395 0 0 # scanned=42992 # found=0 # cleaned=0 # scan_time=2986 |
Zitat:
|
Nein, der Pc wurde noch nie für Onlinebanking verwendet. Scheinbar wurden im Hintergrund immer weitere Trojaner oder Malware gedownloaded bei dieser Menge? Wie siehts aus wenn der PC bei mir im Netzwerk jetzt kurzzeitig hängt? Kann sich da auch was auf die anderen PCs übertragen? |
CustomScan mit OTL Falls noch nicht vorhanden, lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop
Code: netsvcs
|
ok habsOTL Logfile: Code: OTL logfile created on: 21.07.2011 13:33:14 - Run 1 |
Mach einen OTL-Fix, beende alle evtl. geöffneten Programme, auch Virenscanner deaktivieren (!), starte OTL und kopiere folgenden Text in die "Custom Scan/Fixes" Box (unten in OTL): (das ":OTL" muss mitkopiert werden!!!) Code: :OTL Das Logfile müsste geöffnet werden, wenn Du nach dem Fixen auf ok klickst, poste das bitte. Evtl. wird der Rechner neu gestartet. Die mit diesem Script gefixten Einträge, Dateien und Ordner werden zur Sicherheit nicht vollständig gelöscht, es wird eine Sicherheitskopie auf der Systempartition im Ordner "_OTL" erstellt. |
========== OTL ========== HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! C:\AUTOEXEC.BAT moved successfully. D:\AUTOMODE moved successfully. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{102553b0-6cac-11de-bbdd-001b247c312a}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{102553b0-6cac-11de-bbdd-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{102553b0-6cac-11de-bbdd-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{102553b0-6cac-11de-bbdd-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{102553b0-6cac-11de-bbdd-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{102553b0-6cac-11de-bbdd-001b247c312a}\ not found. File F:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{102553b3-6cac-11de-bbdd-001b247c312a}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{102553b3-6cac-11de-bbdd-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{102553b3-6cac-11de-bbdd-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{102553b3-6cac-11de-bbdd-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{102553b3-6cac-11de-bbdd-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{102553b3-6cac-11de-bbdd-001b247c312a}\ not found. File F:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{a3e8546e-8d7f-11de-bbe5-001b247c312a}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{a3e8546e-8d7f-11de-bbe5-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{a3e8546e-8d7f-11de-bbe5-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{a3e8546e-8d7f-11de-bbe5-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{a3e8546e-8d7f-11de-bbe5-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{a3e8546e-8d7f-11de-bbe5-001b247c312a}\ not found. File G:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c60db3a8-ab62-11de-bbec-001b247c312a}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c60db3a8-ab62-11de-bbec-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c60db3a8-ab62-11de-bbec-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c60db3a8-ab62-11de-bbec-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c60db3a8-ab62-11de-bbec-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c60db3a8-ab62-11de-bbec-001b247c312a}\ not found. File F:\setup.exe AUTORUN=1 not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0140625-8d7e-11de-bbe4-001b247c312a}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d0140625-8d7e-11de-bbe4-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0140625-8d7e-11de-bbe4-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d0140625-8d7e-11de-bbe4-001b247c312a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0140625-8d7e-11de-bbe4-001b247c312a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d0140625-8d7e-11de-bbe4-001b247c312a}\ not found. File G:\AutoRun.exe not found. C:\Dokumente und Einstellungen\Cindy\Anwendungsdaten\Ubpeyh folder moved successfully. C:\Dokumente und Einstellungen\Cindy\Anwendungsdaten\Syaf folder moved successfully. ADS C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TEMP:5C321E34 deleted successfully. ADS C:\Dokumente und Einstellungen\Cindy\Eigene Dateien\Car und Sound 2007.jpg:Roxio EMC Stream deleted successfully. ADS C:\Dokumente und Einstellungen\Cindy\Eigene Dateien\Becker Identity.mp3:Roxio EMC Stream deleted successfully. ========== COMMANDS ========== C:\WINDOWS\System32\drivers\etc\Hosts moved successfully. HOSTS file reset successfully OTL by OldTimer - Version 3.2.26.1 log created on 07212011_140020 |
Bitte nun dieses Tool von Kaspersky ausführen und das Log posten => http://www.trojaner-board.de/82358-t...entfernen.html Das Tool so einstellen wie unten im Bild angegeben - also beide Haken setzen, auf Start scan klicken und wenn es durch ist auf den Button Report klicken um das Log anzuzeigen. Dieses bitte komplett posten. http://www.trojaner-board.de/attachm...rnen-start.png Falls du durch die Infektion auf deine Dokumente/Eigenen Dateien nicht zugreifen kannst, Verknüpfungen auf dem Desktop oder im Startmenü unter "alle Programme" fehlen, bitte unhide ausführen: Downloade dir bitte unhide.exe und speichere diese Datei auf deinem Desktop. Starte das Tool und es sollten alle Dateien und Ordner wieder sichtbar sein. ( Könnte eine Weile dauern ) http://www.trojaner-board.de/images/icons/icon4.gif Windows-Vista und Windows-7-User müssen das Tool per Rechtsklick als Administrator ausführen! http://www.trojaner-board.de/images/icons/icon4.gif |
ok habs durch 2011/07/21 21:17:06.0734 3012 TDSS rootkit removing tool 2.5.11.0 Jul 11 2011 16:56:56 2011/07/21 21:17:06.0750 3012 ================================================================================ 2011/07/21 21:17:06.0750 3012 SystemInfo: 2011/07/21 21:17:06.0750 3012 2011/07/21 21:17:06.0750 3012 OS Version: 5.1.2600 ServicePack: 3.0 2011/07/21 21:17:06.0750 3012 Product type: Workstation 2011/07/21 21:17:06.0750 3012 ComputerName: CINDY-02DA14499 2011/07/21 21:17:06.0750 3012 UserName: Cindy 2011/07/21 21:17:06.0750 3012 Windows directory: C:\WINDOWS 2011/07/21 21:17:06.0750 3012 System windows directory: C:\WINDOWS 2011/07/21 21:17:06.0750 3012 Processor architecture: Intel x86 2011/07/21 21:17:06.0750 3012 Number of processors: 2 2011/07/21 21:17:06.0750 3012 Page size: 0x1000 2011/07/21 21:17:06.0750 3012 Boot type: Normal boot 2011/07/21 21:17:06.0750 3012 ================================================================================ 2011/07/21 21:17:08.0296 3012 Initialize success 2011/07/21 21:17:10.0953 0916 ================================================================================ 2011/07/21 21:17:10.0953 0916 Scan started 2011/07/21 21:17:10.0953 0916 Mode: Manual; 2011/07/21 21:17:10.0953 0916 ================================================================================ 2011/07/21 21:17:12.0484 0916 ACPI (ac407f1a62c3a300b4f2b5a9f1d55b2c) C:\WINDOWS\system32\DRIVERS\ACPI.sys 2011/07/21 21:17:12.0531 0916 ACPIEC (9e1ca3160dafb159ca14f83b1e317f75) C:\WINDOWS\system32\DRIVERS\ACPIEC.sys 2011/07/21 21:17:12.0593 0916 aec (8bed39e3c35d6a489438b8141717a557) C:\WINDOWS\system32\drivers\aec.sys 2011/07/21 21:17:12.0656 0916 AFD (355556d9e580915118cd7ef736653a89) C:\WINDOWS\System32\drivers\afd.sys 2011/07/21 21:17:12.0765 0916 Arp1394 (b5b8a80875c1dededa8b02765642c32f) C:\WINDOWS\system32\DRIVERS\arp1394.sys 2011/07/21 21:17:12.0875 0916 AsyncMac (b153affac761e7f5fcfa822b9c4e97bc) C:\WINDOWS\system32\DRIVERS\asyncmac.sys 2011/07/21 21:17:12.0906 0916 atapi (9f3a2f5aa6875c72bf062c712cfa2674) C:\WINDOWS\system32\DRIVERS\atapi.sys 2011/07/21 21:17:12.0953 0916 Atmarpc (9916c1225104ba14794209cfa8012159) C:\WINDOWS\system32\DRIVERS\atmarpc.sys 2011/07/21 21:17:13.0000 0916 audstub (d9f724aa26c010a217c97606b160ed68) C:\WINDOWS\system32\DRIVERS\audstub.sys 2011/07/21 21:17:13.0125 0916 BCM43XX (c1813dfc127ab556f31b2dfc5517c4c7) C:\WINDOWS\system32\DRIVERS\bcmwl5.sys 2011/07/21 21:17:13.0468 0916 Beep (da1f27d85e0d1525f6621372e7b685e9) C:\WINDOWS\system32\drivers\Beep.sys 2011/07/21 21:17:13.0609 0916 cbidf2k (90a673fc8e12a79afbed2576f6a7aaf9) C:\WINDOWS\system32\drivers\cbidf2k.sys 2011/07/21 21:17:13.0859 0916 CCDECODE (0be5aef125be881c4f854c554f2b025c) C:\WINDOWS\system32\DRIVERS\CCDECODE.sys 2011/07/21 21:17:14.0046 0916 Cdaudio (c1b486a7658353d33a10cc15211a873b) C:\WINDOWS\system32\drivers\Cdaudio.sys 2011/07/21 21:17:14.0062 0916 Cdfs (c885b02847f5d2fd45a24e219ed93b32) C:\WINDOWS\system32\drivers\Cdfs.sys 2011/07/21 21:17:14.0093 0916 Cdrom (1f4260cc5b42272d71f79e570a27a4fe) C:\WINDOWS\system32\DRIVERS\cdrom.sys 2011/07/21 21:17:14.0187 0916 CmBatt (0f6c187d38d98f8df904589a5f94d411) C:\WINDOWS\system32\DRIVERS\CmBatt.sys 2011/07/21 21:17:14.0218 0916 Compbatt (6e4c9f21f0fae8940661144f41b13203) C:\WINDOWS\system32\DRIVERS\compbatt.sys 2011/07/21 21:17:14.0562 0916 cpuz134 (75fa19142531cbf490770c2988a7db64) C:\Programme\CPUID\PC Wizard 2010\pcwiz_x32.sys 2011/07/21 21:17:14.0625 0916 Disk (044452051f3e02e7963599fc8f4f3e25) C:\WINDOWS\system32\DRIVERS\disk.sys 2011/07/21 21:17:14.0687 0916 dmboot (0dcfc8395a99fecbb1ef771cec7fe4ea) C:\WINDOWS\system32\drivers\dmboot.sys 2011/07/21 21:17:14.0734 0916 dmio (53720ab12b48719d00e327da470a619a) C:\WINDOWS\system32\drivers\dmio.sys 2011/07/21 21:17:14.0765 0916 dmload (e9317282a63ca4d188c0df5e09c6ac5f) C:\WINDOWS\system32\drivers\dmload.sys 2011/07/21 21:17:14.0828 0916 DMusic (8a208dfcf89792a484e76c40e5f50b45) C:\WINDOWS\system32\drivers\DMusic.sys 2011/07/21 21:17:14.0859 0916 drmkaud (8f5fcff8e8848afac920905fbd9d33c8) C:\WINDOWS\system32\drivers\drmkaud.sys 2011/07/21 21:17:14.0921 0916 eabfiltr (a6476585b4fefee46a9f42e4d2bfdfa4) C:\WINDOWS\system32\DRIVERS\eabfiltr.sys 2011/07/21 21:17:14.0968 0916 Fastfat (38d332a6d56af32635675f132548343e) C:\WINDOWS\system32\drivers\Fastfat.sys 2011/07/21 21:17:15.0015 0916 Fdc (92cdd60b6730b9f50f6a1a0c1f8cdc81) C:\WINDOWS\system32\drivers\Fdc.sys 2011/07/21 21:17:15.0031 0916 Fips (b0678a548587c5f1967b0d70bacad6c1) C:\WINDOWS\system32\drivers\Fips.sys 2011/07/21 21:17:15.0046 0916 Flpydisk (9d27e7b80bfcdf1cdd9b555862d5e7f0) C:\WINDOWS\system32\drivers\Flpydisk.sys 2011/07/21 21:17:15.0109 0916 FltMgr (b2cf4b0786f8212cb92ed2b50c6db6b0) C:\WINDOWS\system32\DRIVERS\fltMgr.sys 2011/07/21 21:17:15.0125 0916 Fs_Rec (3e1e2bd4f39b0e2b7dc4f4d2bcc2779a) C:\WINDOWS\system32\drivers\Fs_Rec.sys 2011/07/21 21:17:15.0156 0916 Ftdisk (8f1955ce42e1484714b542f341647778) C:\WINDOWS\system32\DRIVERS\ftdisk.sys 2011/07/21 21:17:15.0203 0916 Gpc (0a02c63c8b144bd8c86b103dee7c86a2) C:\WINDOWS\system32\DRIVERS\msgpc.sys 2011/07/21 21:17:15.0265 0916 GT72NDISIPXP (9eb33545bc9b1ca0c9b9e6d780ce0d27) C:\WINDOWS\system32\DRIVERS\Gt51Ip.sys 2011/07/21 21:17:15.0281 0916 GT72UBUS (687a4b740f14c2dff6dd7b848f50f0a6) C:\WINDOWS\system32\DRIVERS\gt72ubus.sys 2011/07/21 21:17:15.0328 0916 GTPTSER (346ddaefa04e49ad804ee12d4baa0ed3) C:\WINDOWS\system32\DRIVERS\gtptser.sys 2011/07/21 21:17:15.0390 0916 HBtnKey (de15777902a5d9121857d155873a1d1b) C:\WINDOWS\system32\DRIVERS\cpqbttn.sys 2011/07/21 21:17:15.0468 0916 HdAudAddService (4905d28aa09f63e6a2f4e93ed6dd7d19) C:\WINDOWS\system32\drivers\CHDAud.sys 2011/07/21 21:17:15.0546 0916 HDAudBus (573c7d0a32852b48f3058cfd8026f511) C:\WINDOWS\system32\DRIVERS\HDAudBus.sys 2011/07/21 21:17:15.0609 0916 HidUsb (ccf82c5ec8a7326c3066de870c06daf1) C:\WINDOWS\system32\DRIVERS\hidusb.sys 2011/07/21 21:17:15.0687 0916 HSFHWAZL (8e60293c44e3f6f7f09defb60023a37d) C:\WINDOWS\system32\DRIVERS\HSFHWAZL.sys 2011/07/21 21:17:15.0765 0916 HSF_DPV (4c2aab15ad6229134f70e5c950e6185c) C:\WINDOWS\system32\DRIVERS\HSF_DPV.sys 2011/07/21 21:17:15.0859 0916 HTTP (f80a415ef82cd06ffaf0d971528ead38) C:\WINDOWS\system32\Drivers\HTTP.sys 2011/07/21 21:17:15.0984 0916 hwdatacard (008ada74e3028fced5145f4f74230d4b) C:\WINDOWS\system32\DRIVERS\ewusbmdm.sys 2011/07/21 21:17:16.0250 0916 i8042prt (e283b97cfbeb86c1d86baed5f7846a92) C:\WINDOWS\system32\DRIVERS\i8042prt.sys 2011/07/21 21:17:16.0328 0916 Imapi (083a052659f5310dd8b6a6cb05edcf8e) C:\WINDOWS\system32\DRIVERS\imapi.sys 2011/07/21 21:17:16.0406 0916 Ip6Fw (3bb22519a194418d5fec05d800a19ad0) C:\WINDOWS\system32\DRIVERS\Ip6Fw.sys 2011/07/21 21:17:16.0468 0916 IpFilterDriver (731f22ba402ee4b62748adaf6363c182) C:\WINDOWS\system32\DRIVERS\ipfltdrv.sys 2011/07/21 21:17:16.0484 0916 IpInIp (b87ab476dcf76e72010632b5550955f5) C:\WINDOWS\system32\DRIVERS\ipinip.sys 2011/07/21 21:17:16.0515 0916 IpNat (cc748ea12c6effde940ee98098bf96bb) C:\WINDOWS\system32\DRIVERS\ipnat.sys 2011/07/21 21:17:16.0546 0916 IPSec (23c74d75e36e7158768dd63d92789a91) C:\WINDOWS\system32\DRIVERS\ipsec.sys 2011/07/21 21:17:16.0593 0916 IRENUM (c93c9ff7b04d772627a3646d89f7bf89) C:\WINDOWS\system32\DRIVERS\irenum.sys 2011/07/21 21:17:16.0640 0916 isapnp (6dfb88f64135c525433e87648bda30de) C:\WINDOWS\system32\DRIVERS\isapnp.sys 2011/07/21 21:17:16.0656 0916 Kbdclass (1704d8c4c8807b889e43c649b478a452) C:\WINDOWS\system32\DRIVERS\kbdclass.sys 2011/07/21 21:17:16.0718 0916 kbdhid (b6d6c117d771c98130497265f26d1882) C:\WINDOWS\system32\DRIVERS\kbdhid.sys 2011/07/21 21:17:16.0781 0916 kl1 (ce3958f58547454884e97bda78cd7040) C:\WINDOWS\system32\drivers\kl1.sys 2011/07/21 21:17:16.0812 0916 klbg (53eedab3f0511321ac3ae8bc968b158c) C:\WINDOWS\system32\drivers\klbg.sys 2011/07/21 21:17:16.0859 0916 KLIF (439c778700fce23f2852535d6fa5996d) C:\WINDOWS\system32\DRIVERS\klif.sys 2011/07/21 21:17:16.0906 0916 klim5 (fbdc2034b58d2135d25fe99eb8b747c3) C:\WINDOWS\system32\DRIVERS\klim5.sys 2011/07/21 21:17:16.0937 0916 klmouflt (1f351c4ba53bfe58a1ca5fcdd11e1f81) C:\WINDOWS\system32\DRIVERS\klmouflt.sys 2011/07/21 21:17:17.0000 0916 kmixer (692bcf44383d056aed41b045a323d378) C:\WINDOWS\system32\drivers\kmixer.sys 2011/07/21 21:17:17.0062 0916 KSecDD (b467646c54cc746128904e1654c750c1) C:\WINDOWS\system32\drivers\KSecDD.sys 2011/07/21 21:17:17.0140 0916 MBAMProtector (eca00eed9ab95489007b0ef84c7149de) C:\WINDOWS\system32\drivers\mbam.sys 2011/07/21 21:17:17.0218 0916 mdmxsdk (0cea2d0d3fa284b85ed5b68365114f76) C:\WINDOWS\system32\DRIVERS\mdmxsdk.sys 2011/07/21 21:17:17.0265 0916 mnmdd (4ae068242760a1fb6e1a44bf4e16afa6) C:\WINDOWS\system32\drivers\mnmdd.sys 2011/07/21 21:17:17.0328 0916 Modem (6fb74ebd4ec57a6f1781de3852cc3362) C:\WINDOWS\system32\drivers\Modem.sys 2011/07/21 21:17:17.0390 0916 Mouclass (b24ce8005deab254c0251e15cb71d802) C:\WINDOWS\system32\DRIVERS\mouclass.sys 2011/07/21 21:17:17.0437 0916 mouhid (66a6f73c74e1791464160a7065ce711a) C:\WINDOWS\system32\DRIVERS\mouhid.sys 2011/07/21 21:17:17.0453 0916 MountMgr (a80b9a0bad1b73637dbcbba7df72d3fd) C:\WINDOWS\system32\drivers\MountMgr.sys 2011/07/21 21:17:17.0484 0916 MRxDAV (11d42bb6206f33fbb3ba0288d3ef81bd) C:\WINDOWS\system32\DRIVERS\mrxdav.sys 2011/07/21 21:17:17.0562 0916 MRxSmb (0dc719e9b15e902346e87e9dcd5751fa) C:\WINDOWS\system32\DRIVERS\mrxsmb.sys 2011/07/21 21:17:17.0578 0916 Msfs (c941ea2454ba8350021d774daf0f1027) C:\WINDOWS\system32\drivers\Msfs.sys 2011/07/21 21:17:17.0656 0916 MSKSSRV (d1575e71568f4d9e14ca56b7b0453bf1) C:\WINDOWS\system32\drivers\MSKSSRV.sys 2011/07/21 21:17:17.0703 0916 MSPCLOCK (325bb26842fc7ccc1fcce2c457317f3e) C:\WINDOWS\system32\drivers\MSPCLOCK.sys 2011/07/21 21:17:17.0718 0916 MSPQM (bad59648ba099da4a17680b39730cb3d) C:\WINDOWS\system32\drivers\MSPQM.sys 2011/07/21 21:17:17.0781 0916 mssmbios (af5f4f3f14a8ea2c26de30f7a1e17136) C:\WINDOWS\system32\DRIVERS\mssmbios.sys 2011/07/21 21:17:17.0796 0916 MSTEE (e53736a9e30c45fa9e7b5eac55056d1d) C:\WINDOWS\system32\drivers\MSTEE.sys 2011/07/21 21:17:17.0828 0916 Mup (de6a75f5c270e756c5508d94b6cf68f5) C:\WINDOWS\system32\drivers\Mup.sys 2011/07/21 21:17:17.0875 0916 NABTSFEC (5b50f1b2a2ed47d560577b221da734db) C:\WINDOWS\system32\DRIVERS\NABTSFEC.sys 2011/07/21 21:17:17.0890 0916 NDIS (1df7f42665c94b825322fae71721130d) C:\WINDOWS\system32\drivers\NDIS.sys 2011/07/21 21:17:17.0906 0916 NdisIP (7ff1f1fd8609c149aa432f95a8163d97) C:\WINDOWS\system32\DRIVERS\NdisIP.sys 2011/07/21 21:17:17.0921 0916 NdisTapi (1ab3d00c991ab086e69db84b6c0ed78f) C:\WINDOWS\system32\DRIVERS\ndistapi.sys 2011/07/21 21:17:17.0968 0916 Ndisuio (f927a4434c5028758a842943ef1a3849) C:\WINDOWS\system32\DRIVERS\ndisuio.sys 2011/07/21 21:17:17.0984 0916 NdisWan (edc1531a49c80614b2cfda43ca8659ab) C:\WINDOWS\system32\DRIVERS\ndiswan.sys 2011/07/21 21:17:18.0031 0916 NDProxy (9282bd12dfb069d3889eb3fcc1000a9b) C:\WINDOWS\system32\drivers\NDProxy.sys 2011/07/21 21:17:18.0046 0916 NetBIOS (5d81cf9a2f1a3a756b66cf684911cdf0) C:\WINDOWS\system32\DRIVERS\netbios.sys 2011/07/21 21:17:18.0093 0916 NetBT (74b2b2f5bea5e9a3dc021d685551bd3d) C:\WINDOWS\system32\DRIVERS\netbt.sys 2011/07/21 21:17:18.0171 0916 NIC1394 (e9e47cfb2d461fa0fc75b7a74c6383ea) C:\WINDOWS\system32\DRIVERS\nic1394.sys 2011/07/21 21:17:18.0187 0916 Npfs (3182d64ae053d6fb034f44b6def8034a) C:\WINDOWS\system32\drivers\Npfs.sys 2011/07/21 21:17:18.0234 0916 Ntfs (78a08dd6a8d65e697c18e1db01c5cdca) C:\WINDOWS\system32\drivers\Ntfs.sys 2011/07/21 21:17:18.0312 0916 Null (73c1e1f395918bc2c6dd67af7591a3ad) C:\WINDOWS\system32\drivers\Null.sys 2011/07/21 21:17:18.0609 0916 nv (a50a030be64fa2fdb548a2ee888f8adb) C:\WINDOWS\system32\DRIVERS\nv4_mini.sys 2011/07/21 21:17:18.0921 0916 NVENETFD (0258d664f93b4b01ddd621b8c084f322) C:\WINDOWS\system32\DRIVERS\NVENETFD.sys 2011/07/21 21:17:18.0984 0916 nvnetbus (56ec9207906435ef1bf02f5c68e3ffec) C:\WINDOWS\system32\DRIVERS\nvnetbus.sys 2011/07/21 21:17:19.0046 0916 nvsmu (7ec12a73067baca25a8e3e2a58ae83d8) C:\WINDOWS\system32\DRIVERS\nvsmu.sys 2011/07/21 21:17:19.0093 0916 NwlnkFlt (b305f3fad35083837ef46a0bbce2fc57) C:\WINDOWS\system32\DRIVERS\nwlnkflt.sys 2011/07/21 21:17:19.0140 0916 NwlnkFwd (c99b3415198d1aab7227f2c88fd664b9) C:\WINDOWS\system32\DRIVERS\nwlnkfwd.sys 2011/07/21 21:17:19.0187 0916 ohci1394 (ca33832df41afb202ee7aeb05145922f) C:\WINDOWS\system32\DRIVERS\ohci1394.sys 2011/07/21 21:17:19.0265 0916 Parport (f84785660305b9b903fb3bca8ba29837) C:\WINDOWS\system32\drivers\Parport.sys 2011/07/21 21:17:19.0281 0916 PartMgr (beb3ba25197665d82ec7065b724171c6) C:\WINDOWS\system32\drivers\PartMgr.sys 2011/07/21 21:17:19.0328 0916 ParVdm (c2bf987829099a3eaa2ca6a0a90ecb4f) C:\WINDOWS\system32\drivers\ParVdm.sys 2011/07/21 21:17:19.0343 0916 PCI (387e8dedc343aa2d1efbc30580273acd) C:\WINDOWS\system32\DRIVERS\pci.sys 2011/07/21 21:17:19.0421 0916 PCIIde (59ba86d9a61cbcf4df8e598c331f5b82) C:\WINDOWS\system32\DRIVERS\pciide.sys 2011/07/21 21:17:19.0468 0916 Pcmcia (a2a966b77d61847d61a3051df87c8c97) C:\WINDOWS\system32\drivers\Pcmcia.sys 2011/07/21 21:17:19.0640 0916 PptpMiniport (efeec01b1d3cf84f16ddd24d9d9d8f99) C:\WINDOWS\system32\DRIVERS\raspptp.sys 2011/07/21 21:17:19.0656 0916 Processor (2cb55427c58679f49ad600fccba76360) C:\WINDOWS\system32\DRIVERS\processr.sys 2011/07/21 21:17:19.0687 0916 PSched (09298ec810b07e5d582cb3a3f9255424) C:\WINDOWS\system32\DRIVERS\psched.sys 2011/07/21 21:17:19.0718 0916 Ptilink (80d317bd1c3dbc5d4fe7b1678c60cadd) C:\WINDOWS\system32\DRIVERS\ptilink.sys 2011/07/21 21:17:19.0750 0916 PxHelp20 (49452bfcec22f36a7a9b9c2181bc3042) C:\WINDOWS\system32\Drivers\PxHelp20.sys 2011/07/21 21:17:19.0859 0916 RasAcd (fe0d99d6f31e4fad8159f690d68ded9c) C:\WINDOWS\system32\DRIVERS\rasacd.sys 2011/07/21 21:17:19.0890 0916 Rasl2tp (11b4a627bc9614b885c4969bfa5ff8a6) C:\WINDOWS\system32\DRIVERS\rasl2tp.sys 2011/07/21 21:17:19.0906 0916 RasPppoe (5bc962f2654137c9909c3d4603587dee) C:\WINDOWS\system32\DRIVERS\raspppoe.sys 2011/07/21 21:17:19.0921 0916 Raspti (fdbb1d60066fcfbb7452fd8f9829b242) C:\WINDOWS\system32\DRIVERS\raspti.sys 2011/07/21 21:17:19.0953 0916 Rdbss (7ad224ad1a1437fe28d89cf22b17780a) C:\WINDOWS\system32\DRIVERS\rdbss.sys 2011/07/21 21:17:19.0984 0916 RDPCDD (4912d5b403614ce99c28420f75353332) C:\WINDOWS\system32\DRIVERS\RDPCDD.sys 2011/07/21 21:17:20.0031 0916 rdpdr (15cabd0f7c00c47c70124907916af3f1) C:\WINDOWS\system32\DRIVERS\rdpdr.sys 2011/07/21 21:17:20.0093 0916 RDPWD (6728e45b66f93c08f11de2e316fc70dd) C:\WINDOWS\system32\drivers\RDPWD.sys 2011/07/21 21:17:20.0171 0916 redbook (ed761d453856f795a7fe056e42c36365) C:\WINDOWS\system32\DRIVERS\redbook.sys 2011/07/21 21:17:20.0218 0916 rimmptsk (7a6648b61661b1421ffab762e391e33f) C:\WINDOWS\system32\DRIVERS\rimmptsk.sys 2011/07/21 21:17:20.0234 0916 rimsptsk (8f7012d1b6a71ee9c23ce93dcdbf9f4b) C:\WINDOWS\system32\DRIVERS\rimsptsk.sys 2011/07/21 21:17:20.0281 0916 rismxdp (3ac17802740c3a4764dc9750e92e6233) C:\WINDOWS\system32\DRIVERS\rixdptsk.sys 2011/07/21 21:17:20.0375 0916 RxFilter (80cae340f37b52d1cb75ff74e6a087cd) C:\WINDOWS\system32\DRIVERS\RxFilter.sys 2011/07/21 21:17:20.0500 0916 SASDIFSV (a3281aec37e0720a2bc28034c2df2a56) C:\Programme\SUPERAntiSpyware\SASDIFSV.SYS 2011/07/21 21:17:20.0531 0916 SASKUTIL (61db0d0756a99506207fd724e3692b25) C:\Programme\SUPERAntiSpyware\SASKUTIL.SYS 2011/07/21 21:17:20.0562 0916 sdbus (8d04819a3ce51b9eb47e5689b44d43c4) C:\WINDOWS\system32\DRIVERS\sdbus.sys 2011/07/21 21:17:20.0578 0916 Secdrv (90a3935d05b494a5a39d37e71f09a677) C:\WINDOWS\system32\DRIVERS\secdrv.sys 2011/07/21 21:17:20.0625 0916 Serial (cf24eb4f0412c82bcd1f4f35a025e31d) C:\WINDOWS\system32\drivers\Serial.sys 2011/07/21 21:17:20.0687 0916 sffdisk (0fa803c64df0914b41f807ea276bf2a6) C:\WINDOWS\system32\DRIVERS\sffdisk.sys 2011/07/21 21:17:20.0703 0916 sffp_sd (c17c331e435ed8737525c86a7557b3ac) C:\WINDOWS\system32\DRIVERS\sffp_sd.sys 2011/07/21 21:17:20.0734 0916 Sfloppy (8e6b8c671615d126fdc553d1e2de5562) C:\WINDOWS\system32\drivers\Sfloppy.sys 2011/07/21 21:17:20.0812 0916 SLIP (866d538ebe33709a5c9f5c62b73b7d14) C:\WINDOWS\system32\DRIVERS\SLIP.sys 2011/07/21 21:17:20.0890 0916 splitter (ab8b92451ecb048a4d1de7c3ffcb4a9f) C:\WINDOWS\system32\drivers\splitter.sys 2011/07/21 21:17:20.0937 0916 sr (50fa898f8c032796d3b1b9951bb5a90f) C:\WINDOWS\system32\DRIVERS\sr.sys 2011/07/21 21:17:21.0000 0916 Srv (47ddfc2f003f7f9f0592c6874962a2e7) C:\WINDOWS\system32\DRIVERS\srv.sys 2011/07/21 21:17:21.0093 0916 streamip (77813007ba6265c4b6098187e6ed79d2) C:\WINDOWS\system32\DRIVERS\StreamIP.sys 2011/07/21 21:17:21.0109 0916 swenum (3941d127aef12e93addf6fe6ee027e0f) C:\WINDOWS\system32\DRIVERS\swenum.sys 2011/07/21 21:17:21.0140 0916 swmidi (8ce882bcc6cf8a62f2b2323d95cb3d01) C:\WINDOWS\system32\drivers\swmidi.sys 2011/07/21 21:17:21.0281 0916 sysaudio (8b83f3ed0f1688b4958f77cd6d2bf290) C:\WINDOWS\system32\drivers\sysaudio.sys 2011/07/21 21:17:21.0343 0916 Tcpip (9aefa14bd6b182d61e3119fa5f436d3d) C:\WINDOWS\system32\DRIVERS\tcpip.sys 2011/07/21 21:17:21.0406 0916 TDPIPE (6471a66807f5e104e4885f5b67349397) C:\WINDOWS\system32\drivers\TDPIPE.sys 2011/07/21 21:17:21.0437 0916 TDTCP (c56b6d0402371cf3700eb322ef3aaf61) C:\WINDOWS\system32\drivers\TDTCP.sys 2011/07/21 21:17:21.0468 0916 TermDD (88155247177638048422893737429d9e) C:\WINDOWS\system32\DRIVERS\termdd.sys 2011/07/21 21:17:21.0546 0916 Udfs (5787b80c2e3c5e2f56c2a233d91fa2c9) C:\WINDOWS\system32\drivers\Udfs.sys 2011/07/21 21:17:21.0609 0916 Update (402ddc88356b1bac0ee3dd1580c76a31) C:\WINDOWS\system32\DRIVERS\update.sys 2011/07/21 21:17:21.0671 0916 usbccgp (173f317ce0db8e21322e71b7e60a27e8) C:\WINDOWS\system32\DRIVERS\usbccgp.sys 2011/07/21 21:17:21.0703 0916 usbehci (65dcf09d0e37d4c6b11b5b0b76d470a7) C:\WINDOWS\system32\DRIVERS\usbehci.sys 2011/07/21 21:17:21.0734 0916 usbhub (1ab3cdde553b6e064d2e754efe20285c) C:\WINDOWS\system32\DRIVERS\usbhub.sys 2011/07/21 21:17:21.0750 0916 usbohci (0daecce65366ea32b162f85f07c6753b) C:\WINDOWS\system32\DRIVERS\usbohci.sys 2011/07/21 21:17:21.0812 0916 usbprint (a717c8721046828520c9edf31288fc00) C:\WINDOWS\system32\DRIVERS\usbprint.sys 2011/07/21 21:17:21.0859 0916 usbscan (a0b8cf9deb1184fbdd20784a58fa75d4) C:\WINDOWS\system32\DRIVERS\usbscan.sys 2011/07/21 21:17:21.0906 0916 USBSTOR (a32426d9b14a089eaa1d922e0c5801a9) C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS 2011/07/21 21:17:21.0953 0916 usbvideo (63bbfca7f390f4c49ed4b96bfb1633e0) C:\WINDOWS\system32\Drivers\usbvideo.sys 2011/07/21 21:17:22.0000 0916 VgaSave (0d3a8fafceacd8b7625cd549757a7df1) C:\WINDOWS\System32\drivers\vga.sys 2011/07/21 21:17:22.0062 0916 VolSnap (a5a712f4e880874a477af790b5186e1d) C:\WINDOWS\system32\drivers\VolSnap.sys 2011/07/21 21:17:22.0140 0916 Wanarp (e20b95baedb550f32dd489265c1da1f6) C:\WINDOWS\system32\DRIVERS\wanarp.sys 2011/07/21 21:17:22.0234 0916 wdmaud (6768acf64b18196494413695f0c3a00f) C:\WINDOWS\system32\drivers\wdmaud.sys 2011/07/21 21:17:22.0328 0916 winachsf (e17d31cd52dcb7745ac5330eea062d0b) C:\WINDOWS\system32\DRIVERS\HSF_CNXT.sys 2011/07/21 21:17:22.0437 0916 WmiAcpi (c42584fd66ce9e17403aebca199f7bdb) C:\WINDOWS\system32\DRIVERS\wmiacpi.sys 2011/07/21 21:17:22.0500 0916 WpdUsb (cf4def1bf66f06964dc0d91844239104) C:\WINDOWS\system32\DRIVERS\wpdusb.sys 2011/07/21 21:17:22.0546 0916 WSTCODEC (c98b39829c2bbd34e454150633c62c78) C:\WINDOWS\system32\DRIVERS\WSTCODEC.SYS 2011/07/21 21:17:22.0578 0916 WudfPf (f15feafffbb3644ccc80c5da584e6311) C:\WINDOWS\system32\DRIVERS\WudfPf.sys 2011/07/21 21:17:22.0625 0916 WudfRd (28b524262bce6de1f7ef9f510ba3985b) C:\WINDOWS\system32\DRIVERS\wudfrd.sys 2011/07/21 21:17:22.0703 0916 MBR (0x1B8) (72b8ce41af0de751c946802b3ed844b4) \Device\Harddisk0\DR0 2011/07/21 21:17:22.0906 0916 Boot (0x1200) (2c1e5b1e00b6ef9ca737302e57dafaf4) \Device\Harddisk0\DR0\Partition0 2011/07/21 21:17:22.0906 0916 Boot (0x1200) (a21ecbc89944dcda236c0afcf1fc131a) \Device\Harddisk0\DR0\Partition1 2011/07/21 21:17:22.0921 0916 ================================================================================ 2011/07/21 21:17:22.0921 0916 Scan finished 2011/07/21 21:17:22.0921 0916 ================================================================================ 2011/07/21 21:17:22.0937 0848 Detected object count: 0 2011/07/21 21:17:22.0937 0848 Actual detected object count: 0 |
Dann bitte jetzt CF ausführen: ComboFix Ein Leitfaden und Tutorium zur Nutzung von ComboFix
Combofix darf ausschließlich ausgeführt werden, wenn ein Kompetenzler dies ausdrücklich empfohlen hat! |
ist fertig, nach dem Neustart wurden aber Kaspersky im Autostart und Malwarebytes geladen. Dabei wurde irgendwas mit Malware von Kaspersky angezeigt. Combofix hatte kurrzeitig angezeigt, dass etwas nicht beendet werden konnte Combofix Logfile: Code: ComboFix 11-07-21.04 - Cindy 22.07.2011 9:21.1.2 - x86 |
Ok. Bitte nun Logs mit GMER und OSAM erstellen und posten. GMER stürzt häufiger ab, wenn das Tool auch beim 2. Mal nicht will, lass es einfach weg und führ nur OSAM aus - die Online-Abfrage durch OSAM bitte überspringen. Bei OSAM bitte darauf auch achten, dass Du das Log auch als *.log und nicht *.html oder so abspeicherst. Hinweis: Zum Entpacken von OSAM bitte WinRAR oder 7zip verwenden! Stell auch unbedingt den Virenscanner ab, besonders der Scanner von McAfee meldet oft einen Fehalarm in OSAM! Downloade dir bitte ![]()
Wichtig: Drücke keinesfalls einen der Fix Buttons ohne Anweisung Hinweis: Sollte der Scan Button ausgeblendet sein, schließe das Tool und starte es erneut. Sollte der Scan abbrechen und das Programm abstürzen, dann teile mir das mit und wähle unter AV Scan die Einstellung (none). |
so ist alles durch GMER Logfile: Code: GMER 1.0.15.15641 - hxxp://www.gmer.net OSAM Logfile: Code: Report of OSAM: Autorun Manager v5.0.11926.0 If You have questions or want to get some help, You can visit hxxp://forum.online-solutions.ru aswMBR version 0.9.8.976 Copyright(c) 2011 AVAST Software Run date: 2011-07-22 10:25:18 ----------------------------- 10:25:18.531 OS Version: Windows 5.1.2600 Service Pack 3 10:25:18.531 Number of processors: 2 586 0x4802 10:25:18.531 ComputerName: CINDY-02DA14499 UserName: Cindy 10:25:19.218 Initialize success 10:27:33.500 AVAST engine defs: 11072200 10:32:16.265 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-e 10:32:16.265 Disk 0 Vendor: WDC_WD1600BEVS-60RST0 04.01G04 Size: 152627MB BusType: 3 10:32:16.375 Disk 0 MBR read successfully 10:32:16.375 Disk 0 MBR scan 10:32:16.453 Disk 0 Windows XP default MBR code 10:32:16.468 Disk 0 scanning sectors +312576705 10:32:16.578 Disk 0 scanning C:\WINDOWS\system32\drivers 10:32:39.484 Service scanning 10:32:39.890 Service catchme C:\ComboFix\catchme.sys **LOCKED** 3 10:32:39.906 Service cpuz132 C:\DOKUME~1\Cindy\LOKALE~1\Temp\cpuz132\cpuz132_x32.sys **LOCKED** 3 10:32:40.609 Modules scanning 10:33:12.531 Disk 0 trace - called modules: 10:33:12.593 ntkrnlpa.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS 10:33:12.593 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x8a6adab8] 10:33:12.593 3 CLASSPNP.SYS[ba108fd7] -> nt!IofCallDriver -> \Device\00000078[0x8a6582b8] 10:33:12.593 5 ACPI.sys[b9f7e620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP2T0L0-e[0x8a6b1d98] 10:33:13.218 AVAST engine scan C:\WINDOWS 10:33:43.843 AVAST engine scan C:\WINDOWS\system32 10:38:45.875 AVAST engine scan C:\WINDOWS\system32\drivers 10:39:35.437 AVAST engine scan C:\Dokumente und Einstellungen\Cindy 10:45:55.312 AVAST engine scan C:\Dokumente und Einstellungen\All Users 10:51:31.171 Scan finished successfully 10:51:56.156 Disk 0 MBR has been saved successfully to "C:\Dokumente und Einstellungen\Cindy\Desktop\MBR.dat" 10:51:56.156 The log file has been saved successfully to "C:\Dokumente und Einstellungen\Cindy\Desktop\aswMBR.txt" |
Alle Zeitangaben in WEZ +1. Es ist jetzt 14:28 Uhr. |
Copyright ©2000-2025, Trojaner-Board