![]() |
| |||||||
Plagegeister aller Art und deren Bekämpfung: Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt."Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
![]() |
| | #31 |
![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Hallo Arne. Hier das neue Log. [code] Combofix Logfile: Code:
ATTFilter ComboFix 12-07-08.01 - Chiara 09.07.2012 15:32:45.1.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.49.1031.18.2525.1430 [GMT 2:00]
ausgeführt von:: c:\users\Chiara\Downloads\ComboFix.exe
AV: Avira Desktop *Disabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
AV: Lavasoft Ad-Watch Live! Virenschutz *Disabled/Updated* {9FF26384-70D4-CE6B-3ECB-E759A6A40116}
SP: Avira Desktop *Disabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Lavasoft Ad-Watch Live! *Disabled/Updated* {24938260-56EE-C1E5-047B-DC2BDD234BAB}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((( Weitere Löschungen ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Chiara\4.0
c:\users\Chiara\antivir_workstation_winu_de_h337.exe
c:\users\Chiara\AppData\Roaming\.#
c:\users\Chiara\discountsurfer-5.0.4.exe
c:\users\Chiara\googleupdatesetup.exe
.
.
((((((((((((((((((((((( Dateien erstellt von 2012-06-09 bis 2012-07-09 ))))))))))))))))))))))))))))))
.
.
2012-07-09 13:46 . 2012-07-09 13:46 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-07-06 13:08 . 2012-06-18 01:14 6762896 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{BD1FF212-A108-4667-AB06-A83FD54411AD}\mpengine.dll
2012-07-05 13:20 . 2012-07-05 13:20 -------- d-----w- C:\_OTL
2012-07-03 17:24 . 2012-07-03 17:24 770384 ----a-w- c:\program files\Mozilla Firefox\msvcr100.dll
2012-07-03 17:24 . 2012-07-03 17:24 421200 ----a-w- c:\program files\Mozilla Firefox\msvcp100.dll
2012-06-29 14:18 . 2012-06-29 14:18 -------- d-----w- c:\program files\ESET
2012-06-24 14:28 . 2012-06-02 22:19 53784 ----a-w- c:\windows\system32\wuauclt.exe
2012-06-24 14:28 . 2012-06-02 22:19 45080 ----a-w- c:\windows\system32\wups2.dll
2012-06-24 14:28 . 2012-06-02 22:19 1933848 ----a-w- c:\windows\system32\wuaueng.dll
2012-06-24 14:28 . 2012-06-02 22:12 2422272 ----a-w- c:\windows\system32\wucltux.dll
2012-06-24 14:27 . 2012-06-02 22:19 35864 ----a-w- c:\windows\system32\wups.dll
2012-06-24 14:27 . 2012-06-02 22:19 577048 ----a-w- c:\windows\system32\wuapi.dll
2012-06-24 14:27 . 2012-06-02 22:12 88576 ----a-w- c:\windows\system32\wudriver.dll
2012-06-24 14:27 . 2012-06-02 13:19 171904 ----a-w- c:\windows\system32\wuwebv.dll
2012-06-24 14:27 . 2012-06-02 13:12 33792 ----a-w- c:\windows\system32\wuapp.exe
2012-06-21 13:23 . 2012-06-21 13:23 -------- d-----w- c:\programdata\Fighters
2012-06-19 21:33 . 2012-06-19 21:33 -------- d-----w- c:\programdata\WindowsSearch
2012-06-12 18:45 . 2012-04-23 16:00 984064 ----a-w- c:\windows\system32\crypt32.dll
2012-06-12 18:45 . 2012-04-23 16:00 98304 ----a-w- c:\windows\system32\cryptnet.dll
2012-06-12 18:45 . 2012-04-23 16:00 133120 ----a-w- c:\windows\system32\cryptsvc.dll
2012-06-12 18:45 . 2012-05-01 14:03 180736 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-06-12 18:44 . 2012-05-15 19:51 2045440 ----a-w- c:\windows\system32\win32k.sys
.
.
.
(((((((((((((((((((((((((((((((((((( Find3M Bericht ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-05-29 20:49 . 2012-05-29 20:49 70304 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-05-29 20:49 . 2012-05-29 20:49 419488 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-05-12 11:54 . 2012-04-18 17:16 83392 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2012-05-12 11:54 . 2012-04-18 17:16 137928 ----a-w- c:\windows\system32\drivers\avipbb.sys
2012-07-03 17:24 . 2012-03-17 14:53 85472 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
(((((((((((((((((((((((((((( Autostartpunkte der Registrierung ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt.
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\egisPSDP]
@="{30A0A3F6-38AC-4C53-BB8B-0D95238E25BA}"
[HKEY_CLASSES_ROOT\CLSID\{30A0A3F6-38AC-4C53-BB8B-0D95238E25BA}]
2008-07-29 16:52 121392 ----a-w- c:\program files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ISUSPM"="c:\programdata\Macrovision\FLEXnet Connect\6\ISUSPM.exe" [2007-03-29 222128]
"AutoStartNPSAgent"="c:\program files\Samsung\Samsung New PC Studio\NPSAgent.exe" [2009-08-03 102400]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 125952]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ePower_DMC"="c:\program files\Acer\Empowering Technology\ePower\ePower_DMC.exe" [2008-08-01 405504]
"eDataSecurity Loader"="c:\program files\Acer\Empowering Technology\eDataSecurity\x86\eDSloader.exe" [2008-07-29 526896]
"eAudio"="c:\program files\Acer\Empowering Technology\eAudio\eAudio.exe" [2008-05-30 544768]
"BkupTray"="c:\program files\NewTech Infosystems\NTI Backup Now 5\BkupTray.exe" [2008-04-25 28672]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-07-16 61440]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-04-25 1049896]
"PLFSetI"="c:\windows\PLFSetI.exe" [2008-06-30 200704]
"LManager"="c:\progra~1\LAUNCH~1\QtZgAcer.EXE" [2008-06-17 817672]
"ArcadeDeluxeAgent"="c:\program files\Acer Arcade Deluxe\Acer Arcade Deluxe\ArcadeDeluxeAgent.exe" [2009-09-07 152872]
"RtHDVCpl"="RtHDVCpl.exe" [2008-08-19 6265376]
"Skytel"="Skytel.exe" [2008-08-19 1833504]
"WarReg_PopUp"="c:\program files\Acer\WR_PopUp\WarReg_PopUp.exe" [2008-01-29 303104]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2009-01-10 24064]
"SSBkgdUpdate"="c:\program files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-10-11 29984]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-10-11 46368]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-08-31 328992]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2007-11-05 741376]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-10-30 77824]
"Windows Mobile-based device management"="c:\windows\WindowsMobile\wmdSync.exe" [2008-01-21 215552]
"Standby"="c:\program files\Common Files\Corel\Standby\Standby.exe" [2009-08-20 105616]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-09-06 413696]
"CloneCDTray"="c:\program files\SlySoft\CloneCD\CloneCDTray.exe" [2006-09-28 57344]
"CLMLServer"="c:\program files\Acer Arcade Deluxe\Acer Arcade Deluxe\Kernel\CLML\CLMLSvc.exe" [2009-09-07 206120]
"PlayMovie"="c:\program files\Acer Arcade Deluxe\PlayMovie\PMVService.exe" [2009-05-21 173288]
"MobileConnect"="c:\program files\Vodafone\Vodafone Mobile Connect\Bin\MobileConnect.exe" [2008-07-04 2072576]
"Nikon Transfer Monitor"="c:\program files\Common Files\Nikon\Monitor\NkMonitor.exe" [2009-09-15 479232]
"ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2010-03-18 207360]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-09-30 252296]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2012-03-27 37296]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-01-02 843712]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2012-05-12 348624]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
"DisableCAD"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\spba]
2008-03-25 13:24 567560 ----a-w- c:\program files\Common Files\SPBA\homefus2.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\Google\GOOGLE~1\GoogleDesktopNetwork3.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WindowsMobile REG_MULTI_SZ wcescomm rapimgr
LocalServiceRestricted REG_MULTI_SZ WcesComm RapiMgr
getPlusHelper REG_MULTI_SZ getPlusHelper
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Inhalt des "geplante Tasks" Ordners
.
2012-07-06 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2011-06-20 07:40]
.
.
------- Zusätzlicher Suchlauf -------
.
uStart Page = hxxp://www.n-tv.de/
mStart Page = hxxp://homepage.acer.com/rdr.aspx?b=ACAW&l=0407&s=2&o=vp32&d=0908&m=aspire_6530g
uSearchURL,(Default) = hxxp://go.gmx.net/suchbox/gmxsuche?su=%s
IE: Nach Microsoft E&xel exportieren - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.2.1
FF - ProfilePath - c:\users\Chiara\AppData\Roaming\Mozilla\Firefox\Profiles\leirc17p.default\
FF - prefs.js: network.proxy.type - 0
.
- - - - Entfernte verwaiste Registrierungseinträge - - - -
.
HKLM-Run-eRecoveryService - (no file)
HKLM-Run-NPSStartup - (no file)
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, hxxp://www.gmer.net
Rootkit scan 2012-07-09 15:47
Windows 6.0.6002 Service Pack 2 NTFS
.
Scanne versteckte Prozesse...
.
Scanne versteckte Autostarteinträge...
.
Scanne versteckte Dateien...
.
Scan erfolgreich abgeschlossen
versteckte Dateien: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\{49DE1C67-83F8-4102-99E0-C16DCC7EEC796}]
"ImagePath"="\??\c:\program files\Acer Arcade Deluxe\PlayMovie\000.fcl"
.
--------------------- Gesperrte Registrierungsschluessel ---------------------
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000001
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0005\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0006\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Zeit der Fertigstellung: 2012-07-09 15:51:22
ComboFix-quarantined-files.txt 2012-07-09 13:51
.
Vor Suchlauf: 12 Verzeichnis(se), 81.996.021.760 Bytes frei
Nach Suchlauf: 16 Verzeichnis(se), 82.019.340.288 Bytes frei
.
- - End Of File - - 2EA5798F549AE4570B52650A67E82DE9
Ich hoffe wir sind dann durch und wenn es so ist hab ich noch eine Frage. Wie kann ich solche Trojaner am besten meiden und trotzdem noch ins Internet gehen? Gibt es gute Schutzprogramme? Grüße Katja |
| | #32 |
| /// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Combofix - Scripten
__________________1. Starte das Notepad (Start / Ausführen / notepad[Enter]) 2. Jetzt füge mit copy/paste den ganzen Inhalt der untenstehenden Codebox in das Notepad Fenster ein. Code:
ATTFilter Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"=-
"DisableCAD"=-
4. Deaktivere den Guard Deines Antivirenprogramms und eine eventuell vorhandene Software Firewall. (Auch Guards von Ad-, Spyware Programmen und den Tea Timer (wenn vorhanden) !) 5. Dann ziehe die CFScript.txt auf die cofi.exe, so wie es im unteren Bild zu sehen ist. Damit wird Combofix neu gestartet. ![]() 6. Nach dem Neustart (es wird gefragt ob Du neustarten willst), poste bitte die folgenden Log Dateien: Combofix.txt Hinweis: Das obige Script ist nur für diesen einen User in dieser Situtation erstellt worden. Es ist auf keinen anderen Rechner portierbar und darf nicht anderweitig verwandt werden, da es das System nachhaltig schädigen kann!
__________________ |
| | #33 |
![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Hallo Arne.
__________________Hier das nächste Log. Computer wollte nicht neu starten? [code] Combofix Logfile: Code:
ATTFilter ComboFix 12-07-08.01 - Chiara 09.07.2012 16:34:34.2.2 - x86
Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.49.1031.18.2525.1191 [GMT 2:00]
ausgeführt von:: c:\users\Chiara\Downloads\ComboFix.exe
Benutzte Befehlsschalter :: c:\users\Chiara\Desktop\CFScript.txt
AV: Avira Desktop *Disabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
AV: Lavasoft Ad-Watch Live! Virenschutz *Disabled/Updated* {9FF26384-70D4-CE6B-3ECB-E759A6A40116}
SP: Avira Desktop *Disabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Lavasoft Ad-Watch Live! *Disabled/Updated* {24938260-56EE-C1E5-047B-DC2BDD234BAB}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((( Dateien erstellt von 2012-06-09 bis 2012-07-09 ))))))))))))))))))))))))))))))
.
.
2012-07-09 14:47 . 2012-07-09 14:47 -------- d-----w- c:\users\Default\AppData\Local\temp
2012-07-06 13:08 . 2012-06-18 01:14 6762896 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{BD1FF212-A108-4667-AB06-A83FD54411AD}\mpengine.dll
2012-07-05 13:20 . 2012-07-05 13:20 -------- d-----w- C:\_OTL
2012-07-03 17:24 . 2012-07-03 17:24 770384 ----a-w- c:\program files\Mozilla Firefox\msvcr100.dll
2012-07-03 17:24 . 2012-07-03 17:24 421200 ----a-w- c:\program files\Mozilla Firefox\msvcp100.dll
2012-06-29 14:18 . 2012-06-29 14:18 -------- d-----w- c:\program files\ESET
2012-06-24 14:28 . 2012-06-02 22:19 53784 ----a-w- c:\windows\system32\wuauclt.exe
2012-06-24 14:28 . 2012-06-02 22:19 45080 ----a-w- c:\windows\system32\wups2.dll
2012-06-24 14:28 . 2012-06-02 22:19 1933848 ----a-w- c:\windows\system32\wuaueng.dll
2012-06-24 14:28 . 2012-06-02 22:12 2422272 ----a-w- c:\windows\system32\wucltux.dll
2012-06-24 14:27 . 2012-06-02 22:19 35864 ----a-w- c:\windows\system32\wups.dll
2012-06-24 14:27 . 2012-06-02 22:19 577048 ----a-w- c:\windows\system32\wuapi.dll
2012-06-24 14:27 . 2012-06-02 22:12 88576 ----a-w- c:\windows\system32\wudriver.dll
2012-06-24 14:27 . 2012-06-02 13:19 171904 ----a-w- c:\windows\system32\wuwebv.dll
2012-06-24 14:27 . 2012-06-02 13:12 33792 ----a-w- c:\windows\system32\wuapp.exe
2012-06-21 13:23 . 2012-06-21 13:23 -------- d-----w- c:\programdata\Fighters
2012-06-19 21:33 . 2012-06-19 21:33 -------- d-----w- c:\programdata\WindowsSearch
2012-06-12 18:45 . 2012-04-23 16:00 984064 ----a-w- c:\windows\system32\crypt32.dll
2012-06-12 18:45 . 2012-04-23 16:00 98304 ----a-w- c:\windows\system32\cryptnet.dll
2012-06-12 18:45 . 2012-04-23 16:00 133120 ----a-w- c:\windows\system32\cryptsvc.dll
2012-06-12 18:45 . 2012-05-01 14:03 180736 ----a-w- c:\windows\system32\drivers\rdpwd.sys
2012-06-12 18:44 . 2012-05-15 19:51 2045440 ----a-w- c:\windows\system32\win32k.sys
.
.
.
(((((((((((((((((((((((((((((((((((( Find3M Bericht ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-05-29 20:49 . 2012-05-29 20:49 70304 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2012-05-29 20:49 . 2012-05-29 20:49 419488 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2012-05-12 11:54 . 2012-04-18 17:16 83392 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2012-05-12 11:54 . 2012-04-18 17:16 137928 ----a-w- c:\windows\system32\drivers\avipbb.sys
2012-07-03 17:24 . 2012-03-17 14:53 85472 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
(((((((((((((((((((((((((((( Autostartpunkte der Registrierung ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt.
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\egisPSDP]
@="{30A0A3F6-38AC-4C53-BB8B-0D95238E25BA}"
[HKEY_CLASSES_ROOT\CLSID\{30A0A3F6-38AC-4C53-BB8B-0D95238E25BA}]
2008-07-29 16:52 121392 ----a-w- c:\program files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ISUSPM"="c:\programdata\Macrovision\FLEXnet Connect\6\ISUSPM.exe" [2007-03-29 222128]
"AutoStartNPSAgent"="c:\program files\Samsung\Samsung New PC Studio\NPSAgent.exe" [2009-08-03 102400]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 125952]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ePower_DMC"="c:\program files\Acer\Empowering Technology\ePower\ePower_DMC.exe" [2008-08-01 405504]
"eDataSecurity Loader"="c:\program files\Acer\Empowering Technology\eDataSecurity\x86\eDSloader.exe" [2008-07-29 526896]
"eAudio"="c:\program files\Acer\Empowering Technology\eAudio\eAudio.exe" [2008-05-30 544768]
"BkupTray"="c:\program files\NewTech Infosystems\NTI Backup Now 5\BkupTray.exe" [2008-04-25 28672]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2008-07-16 61440]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-04-25 1049896]
"PLFSetI"="c:\windows\PLFSetI.exe" [2008-06-30 200704]
"LManager"="c:\progra~1\LAUNCH~1\QtZgAcer.EXE" [2008-06-17 817672]
"ArcadeDeluxeAgent"="c:\program files\Acer Arcade Deluxe\Acer Arcade Deluxe\ArcadeDeluxeAgent.exe" [2009-09-07 152872]
"RtHDVCpl"="RtHDVCpl.exe" [2008-08-19 6265376]
"Skytel"="Skytel.exe" [2008-08-19 1833504]
"WarReg_PopUp"="c:\program files\Acer\WR_PopUp\WarReg_PopUp.exe" [2008-01-29 303104]
"Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2009-01-10 24064]
"SSBkgdUpdate"="c:\program files\Common Files\Scansoft Shared\SSBkgdUpdate\SSBkgdupdate.exe" [2006-10-25 210472]
"PaperPort PTD"="c:\program files\ScanSoft\PaperPort\pptd40nt.exe" [2007-10-11 29984]
"IndexSearch"="c:\program files\ScanSoft\PaperPort\IndexSearch.exe" [2007-10-11 46368]
"PPort11reminder"="c:\program files\ScanSoft\PaperPort\Ereg\Ereg.exe" [2007-08-31 328992]
"BrMfcWnd"="c:\program files\Brother\Brmfcmon\BrMfcWnd.exe" [2007-11-05 741376]
"ControlCenter3"="c:\program files\Brother\ControlCenter3\brctrcen.exe" [2007-10-30 77824]
"Windows Mobile-based device management"="c:\windows\WindowsMobile\wmdSync.exe" [2008-01-21 215552]
"Standby"="c:\program files\Common Files\Corel\Standby\Standby.exe" [2009-08-20 105616]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2008-09-06 413696]
"CloneCDTray"="c:\program files\SlySoft\CloneCD\CloneCDTray.exe" [2006-09-28 57344]
"CLMLServer"="c:\program files\Acer Arcade Deluxe\Acer Arcade Deluxe\Kernel\CLML\CLMLSvc.exe" [2009-09-07 206120]
"PlayMovie"="c:\program files\Acer Arcade Deluxe\PlayMovie\PMVService.exe" [2009-05-21 173288]
"MobileConnect"="c:\program files\Vodafone\Vodafone Mobile Connect\Bin\MobileConnect.exe" [2008-07-04 2072576]
"Nikon Transfer Monitor"="c:\program files\Common Files\Nikon\Monitor\NkMonitor.exe" [2009-09-15 479232]
"ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2010-03-18 207360]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-09-30 252296]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2012-03-27 37296]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-01-02 843712]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2012-05-12 348624]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\spba]
2008-03-25 13:24 567560 ----a-w- c:\program files\Common Files\SPBA\homefus2.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=c:\progra~1\Google\GOOGLE~1\GoogleDesktopNetwork3.dll
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Lavasoft Ad-Aware Service]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
WindowsMobile REG_MULTI_SZ wcescomm rapimgr
LocalServiceRestricted REG_MULTI_SZ WcesComm RapiMgr
getPlusHelper REG_MULTI_SZ getPlusHelper
LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache
.
Inhalt des "geplante Tasks" Ordners
.
2012-07-06 c:\windows\Tasks\Ad-Aware Update (Weekly).job
- c:\program files\Lavasoft\Ad-Aware\Ad-AwareAdmin.exe [2011-06-20 07:40]
.
.
------- Zusätzlicher Suchlauf -------
.
uStart Page = hxxp://www.n-tv.de/
mStart Page = hxxp://homepage.acer.com/rdr.aspx?b=ACAW&l=0407&s=2&o=vp32&d=0908&m=aspire_6530g
uSearchURL,(Default) = hxxp://go.gmx.net/suchbox/gmxsuche?su=%s
IE: Nach Microsoft E&xel exportieren - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.2.1
FF - ProfilePath - c:\users\Chiara\AppData\Roaming\Mozilla\Firefox\Profiles\leirc17p.default\
FF - prefs.js: network.proxy.type - 0
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, hxxp://www.gmer.net
Rootkit scan 2012-07-09 16:47
Windows 6.0.6002 Service Pack 2 NTFS
.
Scanne versteckte Prozesse...
.
Scanne versteckte Autostarteinträge...
.
Scanne versteckte Dateien...
.
Scan erfolgreich abgeschlossen
versteckte Dateien: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\{49DE1C67-83F8-4102-99E0-C16DCC7EEC796}]
"ImagePath"="\??\c:\program files\Acer Arcade Deluxe\PlayMovie\000.fcl"
.
--------------------- Gesperrte Registrierungsschluessel ---------------------
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000001
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0005\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0006\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
--------------------- Durch laufende Prozesse gestartete DLLs ---------------------
.
- - - - - - - > 'Explorer.exe'(4560)
c:\program files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll
c:\program files\Acer\Empowering Technology\eDataSecurity\x86\sysenv.dll
c:\windows\System32\SysHook.dll
.
Zeit der Fertigstellung: 2012-07-09 16:51:00
ComboFix-quarantined-files.txt 2012-07-09 14:50
ComboFix2.txt 2012-07-09 13:51
.
Vor Suchlauf: 15 Verzeichnis(se), 82.042.036.224 Bytes frei
Nach Suchlauf: 16 Verzeichnis(se), 82.008.072.192 Bytes frei
.
- - End Of File - - D9C12ECB9911BD72614C25AA62D7BBEA
Katja |
| | #34 |
| /// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Bitte nun Logs mit GMER und OSAM erstellen und posten. GMER stürzt häufiger ab, wenn das Tool auch beim 2. Mal nicht will, lass es einfach weg und führ nur OSAM aus - die Online-Abfrage durch OSAM bitte überspringen. Bei OSAM bitte darauf auch achten, dass Du das Log auch als *.log und nicht *.html oder so abspeicherst. Hinweis: Zum Entpacken von OSAM bitte WinRAR oder 7zip verwenden! Stell auch unbedingt den Virenscanner ab, besonders der Scanner von McAfee meldet oft einen Fehalarm in OSAM! Downloade dir bitte
Wichtig: Drücke keinesfalls einen der Fix Buttons ohne Anweisung Hinweis: Sollte der Scan Button ausgeblendet sein, schließe das Tool und starte es erneut. Sollte der Scan abbrechen und das Programm abstürzen, dann teile mir das mit und wähle unter AV Scan die Einstellung (none). Noch ein Hinweis: Sollte aswMBR abstürzen und es kommt eine Meldung wie "aswMBR.exe funktioniert nicht mehr, dann mach Folgendes: Starte aswMBR neu, wähle unten links im Drop-Down-Menü (unten links im Fenster von aswMBR) bei "AV scan" (none) aus und klick nochmal auf den Scan-Button.
__________________ Logfiles bitte immer in CODE-Tags posten |
| | #35 |
![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Hallo Arne. So der 1. GMER. [code] GMER Logfile: Code:
ATTFilter GMER 1.0.15.15641 - hxxp://www.gmer.net
Rootkit scan 2012-07-10 14:53:17
Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\000000a7 Hitachi_ rev.FB4O
Running: ik4vppkw.exe; Driver: C:\Users\Chiara\AppData\Local\Temp\kxtdapob.sys
---- System - GMER 1.0.15 ----
SSDT 8A7BD91E ZwCreateSection
SSDT 8A7BD928 ZwRequestWaitReplyPort
SSDT 8A7BD923 ZwSetContextThread
SSDT 8A7BD92D ZwSetSecurityObject
SSDT 8A7BD932 ZwSystemDebugControl
SSDT 8A7BD8BF ZwTerminateProcess
---- Kernel code sections - GMER 1.0.15 ----
.text ntkrnlpa.exe!KeSetEvent + 215 82CB18D8 4 Bytes [1E, D9, 7B, 8A] {PUSH DS; FNSTCW [EBX-0x76]}
.text ntkrnlpa.exe!KeSetEvent + 539 82CB1BFC 4 Bytes [28, D9, 7B, 8A] {SUB CL, BL; JNP 0xffffffffffffff8e}
.text ntkrnlpa.exe!KeSetEvent + 56D 82CB1C30 4 Bytes [23, D9, 7B, 8A] {AND EBX, ECX; JNP 0xffffffffffffff8e}
.text ntkrnlpa.exe!KeSetEvent + 5D1 82CB1C94 4 Bytes [2D, D9, 7B, 8A]
.text ntkrnlpa.exe!KeSetEvent + 619 82CB1CDC 4 Bytes [32, D9, 7B, 8A] {XOR BL, CL; JNP 0xffffffffffffff8e}
.text ...
.text C:\Windows\system32\DRIVERS\atikmdag.sys section is writeable [0x8DE06000, 0x210596, 0xE8000020]
.text C:\Program Files\Acer Arcade Deluxe\PlayMovie\000.fcl section is writeable [0xA171E000, 0x2892, 0xE8000020]
.vmp2 C:\Program Files\Acer Arcade Deluxe\PlayMovie\000.fcl entry point in ".vmp2" section [0xA1741050]
---- User code sections - GMER 1.0.15 ----
.text C:\Windows\Explorer.EXE[728] SHELL32.dll!SHGetFolderPathAndSubDirW + 81C5 7651B37C 4 Bytes [00, 26, 00, 10] {ADD [ESI], AH; ADD [EAX], DL}
---- User IAT/EAT - GMER 1.0.15 ----
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusShutdown] [74827817] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCloneImage] [7486B4E9] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDrawImageRectI] [7482BB22] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetInterpolationMode] [7481F695] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusStartup] [748275E9] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateFromHDC] [7481E7CA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStreamICM] [748573F5] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStream] [7482DA60] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageHeight] [7481FFFA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageWidth] [7481FF61] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDisposeImage] [748171CF] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFileICM] [748ACAE2] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFile] [7484C8D8] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDeleteGraphics] [7481D968] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipFree] [74816853] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipAlloc] [7481687E] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetCompositingMode] [74822AD1] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18581_none_9e591052ca1013d0\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!CreateThread] [100027E0] C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll (Egis Inc. PSD DragDrop Protection/Egis Inc.)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!FreeLibraryAndExitThread] [10001D90] C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll (Egis Inc. PSD DragDrop Protection/Egis Inc.)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\system32\SHELL32.dll [KERNEL32.dll!GetProcAddress] [10002B30] C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll (Egis Inc. PSD DragDrop Protection/Egis Inc.)
IAT C:\Windows\Explorer.EXE[728] @ C:\Windows\system32\SHELL32.dll [KERNEL32.dll!LoadLibraryA] [100011D0] C:\Program Files\Acer\Empowering Technology\eDataSecurity\x86\PSDProtect.dll (Egis Inc. PSD DragDrop Protection/Egis Inc.)
---- Devices - GMER 1.0.15 ----
AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
AttachedDevice \Driver\kbdclass \Device\KeyboardClass1 Wdf01000.sys (WDF Dynamic/Microsoft Corporation)
---- EOF - GMER 1.0.15 ----
Katja So hier OSAM. Code:
ATTFilter OSAM Logfile: Code:
ATTFilter aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-07-10 19:49:50
-----------------------------
19:49:50.593 OS Version: Windows 6.0.6002 Service Pack 2
19:49:50.593 Number of processors: 2 586 0x301
19:49:50.593 ComputerName: PRIVAT UserName: Chiara
19:49:52.746 Initialize success
19:50:15.881 AVAST engine defs: 12071000
19:50:28.642 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\000000a8
19:50:28.657 Disk 0 Vendor: Hitachi_ FB4O Size: 305245MB BusType: 8
19:50:28.673 Disk 0 MBR read successfully
19:50:28.673 Disk 0 MBR scan
19:50:28.751 Disk 0 unknown MBR code
19:50:28.782 Disk 0 Partition 1 00 27 Hidden NTFS WinRE NTFS 10240 MB offset 2048
19:50:28.813 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 147501 MB offset 20973568
19:50:28.844 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 143872 MB offset 323055616
19:50:28.891 Disk 0 Partition 4 00 12 Compaq diag NTFS 3630 MB offset 617705472
19:50:28.907 Disk 0 scanning sectors +625139712
19:50:28.969 Disk 0 scanning C:\Windows\system32\drivers
19:50:53.212 Service scanning
19:51:42.086 Modules scanning
19:51:56.641 Disk 0 trace - called modules:
19:51:56.688 ntkrnlpa.exe CLASSPNP.SYS disk.sys storport.sys hal.dll ahcix86s.sys
19:51:56.704 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x86e9f618]
19:51:56.719 3 CLASSPNP.SYS[89da08b3] -> nt!IofCallDriver -> \Device\000000a8[0x86187c90]
19:51:58.045 AVAST engine scan C:\Windows
19:52:07.733 AVAST engine scan C:\Windows\system32
20:00:39.928 AVAST engine scan C:\Windows\system32\drivers
20:01:16.432 AVAST engine scan C:\Users\Chiara
20:16:10.686 AVAST engine scan C:\ProgramData
20:21:45.478 Scan finished successfully
20:25:13.332 Disk 0 MBR has been saved successfully to "C:\Users\Chiara\Documents\MBR.dat"
20:25:13.348 The log file has been saved successfully to "C:\Users\Chiara\Documents\aswMBR.txt"
|
| | #36 |
| /// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Wir sollten den MBR fixen, sichere für den Fall der Fälle ALLE wichtigen Daten, auch wenn meistens alles glatt geht. Hinweis: Mach bitte NICHT den MBR-Fix, wenn du noch andere Betriebssysteme wie zB Ubuntu installiert hast, ein MBR-Fix mit Windows-Tools macht ein parallel installiertes (Dualboot) Linux unbootbar. Mach den Fix auch dann nicht, wenn du zB mit TrueCrypt oder anderen Verschlüsselungsprogrammen eine Vollverschlüsselung der Windowspartition bzw. gesamten Festplatte hast Starte nach der Datensicherung aswmbr erneut und klick auf den Button FIXMBR. Hinweis: Bitte den Virenscanner abstellen bevor du aswMBR ausführst, denn v.a. Avira meldet darin oft einen Fehalalrm! Anschließend Windows neu starten und ein neues Log mit aswMBR machen.
__________________ --> Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." |
| | #37 |
![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." So hier das nächste Log. Code:
ATTFilter aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-07-10 19:49:50
-----------------------------
19:49:50.593 OS Version: Windows 6.0.6002 Service Pack 2
19:49:50.593 Number of processors: 2 586 0x301
19:49:50.593 ComputerName: PRIVAT UserName: Chiara
19:49:52.746 Initialize success
19:50:15.881 AVAST engine defs: 12071000
19:50:28.642 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\000000a8
19:50:28.657 Disk 0 Vendor: Hitachi_ FB4O Size: 305245MB BusType: 8
19:50:28.673 Disk 0 MBR read successfully
19:50:28.673 Disk 0 MBR scan
19:50:28.751 Disk 0 unknown MBR code
19:50:28.782 Disk 0 Partition 1 00 27 Hidden NTFS WinRE NTFS 10240 MB offset 2048
19:50:28.813 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 147501 MB offset 20973568
19:50:28.844 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 143872 MB offset 323055616
19:50:28.891 Disk 0 Partition 4 00 12 Compaq diag NTFS 3630 MB offset 617705472
19:50:28.907 Disk 0 scanning sectors +625139712
19:50:28.969 Disk 0 scanning C:\Windows\system32\drivers
19:50:53.212 Service scanning
19:51:42.086 Modules scanning
19:51:56.641 Disk 0 trace - called modules:
19:51:56.688 ntkrnlpa.exe CLASSPNP.SYS disk.sys storport.sys hal.dll ahcix86s.sys
19:51:56.704 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x86e9f618]
19:51:56.719 3 CLASSPNP.SYS[89da08b3] -> nt!IofCallDriver -> \Device\000000a8[0x86187c90]
19:51:58.045 AVAST engine scan C:\Windows
19:52:07.733 AVAST engine scan C:\Windows\system32
20:00:39.928 AVAST engine scan C:\Windows\system32\drivers
20:01:16.432 AVAST engine scan C:\Users\Chiara
20:16:10.686 AVAST engine scan C:\ProgramData
20:21:45.478 Scan finished successfully
20:25:13.332 Disk 0 MBR has been saved successfully to "C:\Users\Chiara\Documents\MBR.dat"
20:25:13.348 The log file has been saved successfully to "C:\Users\Chiara\Documents\aswMBR.txt"
aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-07-12 11:50:13
-----------------------------
11:50:13.447 OS Version: Windows 6.0.6002 Service Pack 2
11:50:13.447 Number of processors: 2 586 0x301
11:50:13.447 ComputerName: PRIVAT UserName: Chiara
11:50:14.695 Initialize success
11:50:31.995 AVAST engine defs: 12071200
11:50:39.593 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\000000a8
11:50:39.608 Disk 0 Vendor: Hitachi_ FB4O Size: 305245MB BusType: 8
11:50:39.639 Disk 0 MBR read successfully
11:50:39.655 Disk 0 MBR scan
11:50:39.655 Disk 0 Windows VISTA default MBR code
11:50:39.686 Disk 0 Partition 1 00 27 Hidden NTFS WinRE NTFS 10240 MB offset 2048
11:50:39.702 Disk 0 Partition 2 80 (A) 07 HPFS/NTFS NTFS 147501 MB offset 20973568
11:50:39.733 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 143872 MB offset 323055616
11:50:39.780 Disk 0 Partition 4 00 12 Compaq diag NTFS 3630 MB offset 617705472
11:50:39.811 Disk 0 scanning sectors +625139712
11:50:39.967 Disk 0 scanning C:\Windows\system32\drivers
11:50:57.330 Service scanning
11:51:37.515 Modules scanning
11:51:48.435 Disk 0 trace - called modules:
11:51:48.467 ntkrnlpa.exe CLASSPNP.SYS disk.sys storport.sys hal.dll ahcix86s.sys
11:51:48.482 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x86e3e810]
11:51:48.498 3 CLASSPNP.SYS[89da78b3] -> nt!IofCallDriver -> \Device\000000a8[0x863b6928]
11:51:49.793 AVAST engine scan C:\Windows
11:51:56.594 AVAST engine scan C:\Windows\system32
11:57:41.354 AVAST engine scan C:\Windows\system32\drivers
11:57:59.481 AVAST engine scan C:\Users\Chiara
12:10:50.621 AVAST engine scan C:\ProgramData
12:14:40.112 Scan finished successfully
12:17:03.773 Disk 0 MBR has been saved successfully to "C:\Users\Chiara\Documents\MBR.dat"
12:17:03.804 The log file has been saved successfully to "C:\Users\Chiara\Documents\aswMBR.txt"
|
| | #38 |
| /// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." adwCleaner - Toolbars und ungewollte Start-/Suchseiten aufspüren Downloade Dir bitte AdwCleaner auf deinen Desktop.
__________________ Logfiles bitte immer in CODE-Tags posten |
| | #39 |
![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Hallo Arne. Code:
ATTFilter # AdwCleaner v1.701 - Logfile created 07/12/2012 at 20:58:01
# Updated 02/07/2012 by Xplode
# Operating system : Windows Vista (TM) Home Premium Service Pack 2 (32 bits)
# User : Chiara - PRIVAT
# Running from : C:\Users\Chiara\Downloads\adwcleaner.exe
# Option [Search]
***** [Services] *****
***** [Files / Folders] *****
***** [Registry] *****
Key Found : HKCU\Software\Softonic
***** [Registre - GUID] *****
Key Found : HKLM\SOFTWARE\Classes\CLSID\{3BF72F68-72D8-461D-A884-329D936C5581}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{78E9D883-93CD-4072-BEF3-38EE581E2839}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{83AC1413-FCE4-4A46-9DD5-4F31F306E71F}
***** [Internet Browsers] *****
-\\ Internet Explorer v9.0.8112.16421
[OK] Registry is clean.
-\\ Mozilla Firefox v13.0.1 (de)
Profile name : default
File : C:\Users\Chiara\AppData\Roaming\Mozilla\Firefox\Profiles\leirc17p.default\prefs.js
[OK] File is clean.
*************************
AdwCleaner[R1].txt - [992 octets] - [12/07/2012 20:58:01]
########## EOF - C:\AdwCleaner[R1].txt - [1119 octets] ##########
|
| | #40 |
| /// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." adwCleaner - Toolbars und ungewollte Start-/Suchseiten entfernen
__________________ Logfiles bitte immer in CODE-Tags posten |
| | #41 |
![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Hallo Arne. Code:
ATTFilter # AdwCleaner v1.701 - Logfile created 07/13/2012 at 08:58:01
# Updated 02/07/2012 by Xplode
# Operating system : Windows Vista (TM) Home Premium Service Pack 2 (32 bits)
# User : Chiara - PRIVAT
# Running from : C:\Users\Chiara\Downloads\adwcleaner.exe
# Option [Delete]
***** [Services] *****
***** [Files / Folders] *****
***** [Registry] *****
Key Deleted : HKCU\Software\Softonic
***** [Registre - GUID] *****
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3BF72F68-72D8-461D-A884-329D936C5581}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{78E9D883-93CD-4072-BEF3-38EE581E2839}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{83AC1413-FCE4-4A46-9DD5-4F31F306E71F}
***** [Internet Browsers] *****
-\\ Internet Explorer v9.0.8112.16421
[OK] Registry is clean.
-\\ Mozilla Firefox v13.0.1 (de)
Profile name : default
File : C:\Users\Chiara\AppData\Roaming\Mozilla\Firefox\Profiles\leirc17p.default\prefs.js
[OK] File is clean.
*************************
AdwCleaner[R1].txt - [1120 octets] - [12/07/2012 20:58:01]
AdwCleaner[S1].txt - [1060 octets] - [13/07/2012 08:58:01]
########## EOF - C:\AdwCleaner[S1].txt - [1188 octets] ##########
|
| | #42 |
| /// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Sieht ok aus. Wir sollten fast durch sein. Mach bitte zur Kontrolle Vollscans mit Malwarebytes und SUPERAntiSpyware und poste die Logs. Denk dran beide Tools zu updaten vor dem Scan!!
__________________ Logfiles bitte immer in CODE-Tags posten |
| | #43 |
![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." Maleware Code:
ATTFilter Malwarebytes Anti-Malware 1.62.0.1300 www.malwarebytes.org Datenbank Version: v2012.07.13.09 Windows Vista Service Pack 2 x86 NTFS Internet Explorer 9.0.8112.16421 Chiara :: PRIVAT [Administrator] 13.07.2012 20:51:33 mbam-log-2012-07-13 (20-51-33).txt Art des Suchlaufs: Quick-Scan Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 211666 Laufzeit: 9 Minute(n), 5 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 0 (Keine bösartigen Objekte gefunden) (Ende) |
| | #44 |
| /// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." das war aber kein Vollscan
__________________ Logfiles bitte immer in CODE-Tags posten |
| | #45 |
![]() | Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt."Code:
ATTFilter SUPERAntiSpyware Scan Log
hxxp://www.superantispyware.com
Generated 07/14/2012 at 00:35 AM
Application Version : 5.5.1006
Core Rules Database Version : 8897
Trace Rules Database Version: 6709
Scan type : Complete Scan
Total Scan Time : 03:04:55
Operating System Information
Windows Vista Home Premium 32-bit, Service Pack 2 (Build 6.00.6002)
UAC On - Limited User (Administrator User)
Memory items scanned : 976
Memory threats detected : 0
Registry items scanned : 35088
Registry threats detected : 0
File items scanned : 161111
File threats detected : 109
Adware.Tracking Cookie
C:\Users\Chiara\AppData\Roaming\Microsoft\Windows\Cookies\UH2L9QWZ.txt [ /apmebf.com ]
C:\Users\Chiara\AppData\Roaming\Microsoft\Windows\Cookies\9XUD0QO8.txt [ /mediaplex.com ]
C:\Users\Chiara\AppData\Roaming\Microsoft\Windows\Cookies\G7LFAIZA.txt [ /atdmt.com ]
C:\USERS\CHIARA\Cookies\9XUD0QO8.txt [ Cookie:chiara@mediaplex.com/ ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADVERTISING[2].TXT [ /ADVERTISING ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD2.ADFARM1.ADITION[2].TXT [ /AD2.ADFARM1.ADITION ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD2.ADFARM1.ADITION[1].TXT [ /AD2.ADFARM1.ADITION ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@DELIVERY.ADS.COUPLING-MEDIA[2].TXT [ /DELIVERY.ADS.COUPLING-MEDIA ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD3.ADFARM1.ADITION[1].TXT [ /AD3.ADFARM1.ADITION ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@DOUBLECLICK[2].TXT [ /DOUBLECLICK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@DOUBLECLICK[4].TXT [ /DOUBLECLICK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@BS.SERVING-SYS[2].TXT [ /BS.SERVING-SYS ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@BS.SERVING-SYS[1].TXT [ /BS.SERVING-SYS ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@DOUBLECLICK[6].TXT [ /DOUBLECLICK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@DOUBLECLICK[5].TXT [ /DOUBLECLICK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ZANOX[4].TXT [ /ZANOX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ZANOX[3].TXT [ /ZANOX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ZANOX[1].TXT [ /ZANOX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ZANOX[2].TXT [ /ZANOX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WWW.GOOGLEADSERVICES[1].TXT [ /WWW.GOOGLEADSERVICES ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WW251.SMARTADSERVER[1].TXT [ /WW251.SMARTADSERVER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WW251.SMARTADSERVER[3].TXT [ /WW251.SMARTADSERVER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.ADC-SERV[1].TXT [ /AD.ADC-SERV ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WWW.GOOGLEADSERVICES[2].TXT [ /WWW.GOOGLEADSERVICES ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@2O7[3].TXT [ /2O7 ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@2O7[2].TXT [ /2O7 ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.ADNET[2].TXT [ /AD.ADNET ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WWW.GOOGLEADSERVICES[10].TXT [ /WWW.GOOGLEADSERVICES ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADSRV1.ADMEDIATE[1].TXT [ /ADSRV1.ADMEDIATE ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD2.DOUBLEPIMP[1].TXT [ /AD2.DOUBLEPIMP ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.ADNET[1].TXT [ /AD.ADNET ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WW251.SMARTADSERVER[5].TXT [ /WW251.SMARTADSERVER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WW251.SMARTADSERVER[4].TXT [ /WW251.SMARTADSERVER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@REVSCI[1].TXT [ /REVSCI ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.YIELDMANAGER[1].TXT [ /AD.YIELDMANAGER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.YIELDMANAGER[2].TXT [ /AD.YIELDMANAGER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRACKING.MLSAT02[3].TXT [ /TRACKING.MLSAT02 ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRACKING.MLSAT02[1].TXT [ /TRACKING.MLSAT02 ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.YIELDMANAGER[3].TXT [ /AD.YIELDMANAGER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRACKING.MLSAT02[2].TXT [ /TRACKING.MLSAT02 ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRACKING.QUISMA[1].TXT [ /TRACKING.QUISMA ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRACKING.MINDSHARE[2].TXT [ /TRACKING.MINDSHARE ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WWW.ETRACKER[1].TXT [ /WWW.ETRACKER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@VERLORENES-HANDY-FINDEN[2].TXT [ /VERLORENES-HANDY-FINDEN ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADFARM1.ADITION[6].TXT [ /ADFARM1.ADITION ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADFARM1.ADITION[4].TXT [ /ADFARM1.ADITION ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADFARM1.ADITION[3].TXT [ /ADFARM1.ADITION ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADFARM1.ADITION[2].TXT [ /ADFARM1.ADITION ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADFARM1.ADITION[1].TXT [ /ADFARM1.ADITION ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@MEDIAPLEX[4].TXT [ /MEDIAPLEX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@MEDIAPLEX[2].TXT [ /MEDIAPLEX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@MEDIAPLEX[1].TXT [ /MEDIAPLEX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@EAS.APM.EMEDIATE[2].TXT [ /EAS.APM.EMEDIATE ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@EAS.APM.EMEDIATE[3].TXT [ /EAS.APM.EMEDIATE ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ATDMT[1].TXT [ /ATDMT ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@EAS.APM.EMEDIATE[4].TXT [ /EAS.APM.EMEDIATE ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ZANOX-AFFILIATE[1].TXT [ /ZANOX-AFFILIATE ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@SMARTADSERVER[5].TXT [ /SMARTADSERVER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@SMARTADSERVER[3].TXT [ /SMARTADSERVER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@SMARTADSERVER[2].TXT [ /SMARTADSERVER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@SMARTADSERVER[4].TXT [ /SMARTADSERVER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADTECH[1].TXT [ /ADTECH ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.ZANOX[1].TXT [ /AD.ZANOX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@APMEBF[1].TXT [ /APMEBF ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@COLLECTIVE-MEDIA[1].TXT [ /COLLECTIVE-MEDIA ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADTECH[2].TXT [ /ADTECH ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.ZANOX[2].TXT [ /AD.ZANOX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@APMEBF[2].TXT [ /APMEBF ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADTECH[3].TXT [ /ADTECH ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADS.KISSNOFROG[2].TXT [ /ADS.KISSNOFROG ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.ZANOX[3].TXT [ /AD.ZANOX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@APMEBF[3].TXT [ /APMEBF ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@XITI[1].TXT [ /XITI ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@AD.ZANOX[4].TXT [ /AD.ZANOX ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@APMEBF[4].TXT [ /APMEBF ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADS.CREATIVE-SERVING[2].TXT [ /ADS.CREATIVE-SERVING ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@SERVING-SYS[4].TXT [ /SERVING-SYS ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@SERVING-SYS[3].TXT [ /SERVING-SYS ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@SERVING-SYS[2].TXT [ /SERVING-SYS ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@SERVING-SYS[1].TXT [ /SERVING-SYS ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@SKYDEUTSCHLAND.122.2O7[1].TXT [ /SKYDEUTSCHLAND.122.2O7 ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WEBMASTERPLAN[2].TXT [ /WEBMASTERPLAN ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WEBMASTERPLAN[3].TXT [ /WEBMASTERPLAN ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@FASTCLICK[2].TXT [ /FASTCLICK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@FASTCLICK[1].TXT [ /FASTCLICK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@GUJ.122.2O7[2].TXT [ /GUJ.122.2O7 ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@GUJ.122.2O7[1].TXT [ /GUJ.122.2O7 ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WEBMASTERPLAN[5].TXT [ /WEBMASTERPLAN ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@WEBMASTERPLAN[4].TXT [ /WEBMASTERPLAN ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRACK.ADFORM[2].TXT [ /TRACK.ADFORM ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRACKING.KLICKTEL[3].TXT [ /TRACKING.KLICKTEL ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRACKING.KLICKTEL[1].TXT [ /TRACKING.KLICKTEL ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@ADS.QUARTERMEDIA[1].TXT [ /ADS.QUARTERMEDIA ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@IM.BANNER.T-ONLINE[3].TXT [ /IM.BANNER.T-ONLINE ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@IM.BANNER.T-ONLINE[1].TXT [ /IM.BANNER.T-ONLINE ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRADEDOUBLER[4].TXT [ /TRADEDOUBLER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRAFFICTRACK[2].TXT [ /TRAFFICTRACK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRADEDOUBLER[1].TXT [ /TRADEDOUBLER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRAFFICTRACK[3].TXT [ /TRAFFICTRACK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRADEDOUBLER[2].TXT [ /TRADEDOUBLER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRADEDOUBLER[6].TXT [ /TRADEDOUBLER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRADEDOUBLER[3].TXT [ /TRADEDOUBLER ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@TRAFFICTRACK[1].TXT [ /TRAFFICTRACK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@DOUBLECLICK[1].TXT [ /DOUBLECLICK ]
C:\USERS\CHIARA\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\CHIARA@DOUBLECLICK[3].TXT [ /DOUBLECLICK ]
.doubleclick.net [ C:\USERS\CHIARA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\LEIRC17P.DEFAULT\COOKIES.SQLITE ]
.doubleclick.net [ C:\USERS\CHIARA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\LEIRC17P.DEFAULT\COOKIES.SQLITE ]
www.googleadservices.com [ C:\USERS\CHIARA\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\LEIRC17P.DEFAULT\COOKIES.SQLITE ]
Trojan.Agent/Gen-Yoddos
C:\USERS\CHIARA\DOWNLOADS\WINRAR\DEFAULT.SFX
|
![]() |
| Themen zu Trojaner - "Weißer Bildschirm mit Verbindung wird hergestellt." |
| avira, bildschirm, festplatte, frage, fragen, funktioniert, internet, langsam, laptop, malware, meldung, neu, problem, programm, schädling, system, tr/trash.gen, treiber, trojaner, verbindung, verbindung wird hergestellt, verschwunden, vista, weisser bildschirm, windows, windows vista |