Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: GVU-Trojaner weg dank malwarebytes?

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML

Antwort
Alt 20.08.2012, 21:26   #1
tacyttik
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Hallo Trojaner-Jäger,

toll, dass es dieses Forum gibt! Ich habe einen GVU-Trojaner (gehabt), habe dann Malwarebytes runtergeladen und gestern einen scan gemacht und heute (siehe Anhang). Dann habe ich noch den OLT gemacht, da kam aber (warum?) nur ein file raus, nämlich OLT.txt, leider kein Extras.txt.

[code]
wie geht das als code hochzuladen?
[\code]

Die Frage ist jetzt: Isser weg, der blöde Trojaner oder nicht??? Und falls nein: was kann ich tun?

Leider bin ich echt kein Computercrack, der schritt bis hier war schon ne Nummer... ich danke im Voraus für eure Hilfe!!

Alt 20.08.2012, 21:44   #2
t'john
/// Helfer-Team
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?





1. Schritt

Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten.
Denk daran, dass Malwarebytes vor jedem Scan manuell aktualisiert werden muss!

Malwarebytes Anti-Malware
- Anwendbar auf Windows 2000, XP, Vista und 7.
- Installiere das Programm in den vorgegebenen Pfad.
- Aktualisiere die Datenbank!
- Aktiviere "Komplett Scan durchführen" => Scan.
- Wähle alle verfügbaren Laufwerke (ausser CD/DVD) aus und starte den Scan.
- Funde bitte löschen lassen oder in Quarantäne.
- Wenn der Scan beendet ist, klicke auf "Zeige Resultate".

2. Schritt
Systemscan mit OTL (bebilderte Anleitung)

Lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop ( falls noch nicht vorhanden)- Doppelklick auf die OTL.exe

  • Vista und Win7 User: Rechtsklick auf die OTL.exe und "als Administrator ausführen" wählen
  • Wähle Scanne Alle Benuzer
  • Oben findest Du ein Kästchen mit Ausgabe. Wähle bitte Minimale Ausgabe
  • Unter Extra Registrierung, wähle bitte Benutze SafeList
  • Klicke nun auf Scan links oben
  • Wenn der Scan beendet wurde werden 2 Logfiles erstellt
  • Poste die Logfiles hier in den Thread.
__________________

__________________

Alt 21.08.2012, 07:44   #3
tacyttik
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Hallo t´john,

danke für deine Antwort. ich hatte genau das was Du beschreibst, gemacht und als Anhang hochgeladen - dachte ich jedenfalls. Ich poste das heute Abend nochmal hier rein. Wie kann ich denn etwas als "Code" (also dass das in so einem Kästchen erscheint) posten/hochladen?
Also, ich mache das heute Abend - Danke und viele Grüße!
__________________

Alt 21.08.2012, 15:50   #4
t'john
/// Helfer-Team
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Wo sind die Logfiles?
__________________
Mfg, t'john
Das TB unterstützen

Alt 21.08.2012, 21:00   #5
tacyttik
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



hi,hier malwarebyteslog, rest kommt gleich

Code:
ATTFilter
 Malwarebytes Anti-Malware  (Test) 1.62.0.1300
www.malwarebytes.org

Datenbank Version: v2012.08.19.03

Windows 7 x64 NTFS
Internet Explorer 9.0.8112.16421
log :: LOTTA [Administrator]

Schutz: Aktiviert

20.08.2012 07:30:26
mbam-log-2012-08-20 (07-30-26).txt

Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|E:\|F:\|)
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 353050
Laufzeit: 1 Stunde(n), 36 Minute(n), 17 Sekunde(n)

Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateien: 1
C:\Users\log\AppData\Local\Temp\InstallMonetizer.exe (PUP.Adware.Agent) -> Erfolgreich gelöscht und in Quarantäne gestellt.

(Ende)
         
hier das otl-file:

OTL Logfile:
Code:
ATTFilter
OTL logfile created on: 21.08.2012 21:57:53 - Run 4
OTL by OldTimer - Version 3.2.55.0     Folder = C:\Users\log\Desktop
64bit- Professional  (Version = 6.1.7600) - Type = NTWorkstation
Internet Explorer (Version = 9.0.8112.16421)
Locale: 00000407 | Country: Deutschland | Language: DEU | Date Format: dd.MM.yyyy
 
1,75 Gb Total Physical Memory | 0,61 Gb Available Physical Memory | 34,94% Memory free
3,50 Gb Paging File | 1,98 Gb Available in Paging File | 56,54% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files (x86)
Drive C: | 48,83 Gb Total Space | 9,96 Gb Free Space | 20,40% Space Free | Partition Type: NTFS
Drive D: | 62,96 Gb Total Space | 39,14 Gb Free Space | 62,17% Space Free | Partition Type: NTFS
Drive F: | 1,89 Gb Total Space | 1,88 Gb Free Space | 99,32% Space Free | Partition Type: FAT
 
Computer Name: LOTTA | User Name: log | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users | Include 64bit Scans
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days
 
========== Processes (SafeList) ==========
 
PRC - C:\Users\log\Desktop\OTL.exe (OldTimer Tools)
PRC - C:\Program Files (x86)\Mozilla Firefox\firefox.exe (Mozilla Corporation)
PRC - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe (Malwarebytes Corporation)
PRC - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe (Malwarebytes Corporation)
PRC - C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe (Avira Operations GmbH & Co. KG)
PRC - C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe (Avira Operations GmbH & Co. KG)
PRC - C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe (Avira Operations GmbH & Co. KG)
PRC - C:\Program Files (x86)\Winamp\winampa.exe (Nullsoft, Inc.)
PRC - C:\Program Files (x86)\pdf24\pdf24.exe (Geek Software GmbH)
PRC - C:\Program Files (x86)\CDBurnerXP\NMSAccessU.exe ()
PRC - C:\Program Files (x86)\Samsung\Easy Display Manager\dmhkcore.exe (Samsung Electronics Co., Ltd.)
 
 
========== Modules (No Company Name) ==========
 
MOD - C:\Program Files (x86)\Mozilla Firefox\mozjs.dll ()
MOD - C:\Program Files (x86)\Samsung\Easy Display Manager\HookDllPS2.dll ()
 
 
========== Win32 Services (SafeList) ==========
 
SRV:64bit: - (Ati External Event Utility) -- C:\Windows\SysNative\Ati2evxx.exe (ATI Technologies Inc.)
SRV:64bit: - (AppMgmt) -- C:\Windows\SysNative\appmgmts.dll (Microsoft Corporation)
SRV - (MBAMService) -- C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe (Malwarebytes Corporation)
SRV - (AntiVirSchedulerService) -- C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe (Avira Operations GmbH & Co. KG)
SRV - (AntiVirService) -- C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe (Avira Operations GmbH & Co. KG)
SRV - (ServiceLayer) -- C:\Program Files (x86)\PC Connectivity Solution\ServiceLayer.exe (Nokia)
SRV - (clr_optimization_v4.0.30319_32) -- C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe (Microsoft Corporation)
SRV - (NMSAccess) -- C:\Program Files (x86)\CDBurnerXP\NMSAccessU.exe ()
SRV - (HPSLPSVC) -- C:\Program Files (x86)\HP\Digital Imaging\bin\HPSLPSVC64.DLL (Hewlett-Packard Co.)
SRV - (clr_optimization_v2.0.50727_32) -- C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe (Microsoft Corporation)
 
 
========== Driver Services (SafeList) ==========
 
DRV:64bit: - (MBAMProtector) -- C:\Windows\SysNative\drivers\mbam.sys (Malwarebytes Corporation)
DRV:64bit: - (avkmgr) -- C:\Windows\SysNative\drivers\avkmgr.sys (Avira GmbH)
DRV:64bit: - (avipbb) -- C:\Windows\SysNative\drivers\avipbb.sys (Avira GmbH)
DRV:64bit: - (avgntflt) -- C:\Windows\SysNative\drivers\avgntflt.sys (Avira GmbH)
DRV:64bit: - (Fs_Rec) -- C:\Windows\SysNative\drivers\fs_rec.sys (Microsoft Corporation)
DRV:64bit: - (atksgt) -- C:\Windows\SysNative\drivers\atksgt.sys ()
DRV:64bit: - (lirsgt) -- C:\Windows\SysNative\drivers\lirsgt.sys ()
DRV:64bit: - (hcw17bda) -- C:\Windows\SysNative\drivers\hcw17bda.sys (Hauppauge Computer Works, Inc.)
DRV:64bit: - (hwdatacard) -- C:\Windows\SysNative\drivers\ewusbmdm.sys (Huawei Technologies Co., Ltd.)
DRV:64bit: - (ewusbnet) -- C:\Windows\SysNative\drivers\ewusbnet.sys (Huawei Technologies Co., Ltd.)
DRV:64bit: - (StarOpen) -- C:\Windows\SysNative\drivers\StarOpen.sys ()
DRV:64bit: - (HTCAND64) -- C:\Windows\SysNative\drivers\ANDROIDUSB.sys (HTC, Corporation)
DRV:64bit: - (hwusbdev) -- C:\Windows\SysNative\drivers\ewusbdev.sys (Huawei Technologies Co., Ltd.)
DRV:64bit: - (atikmdag) -- C:\Windows\SysNative\drivers\atikmdag.sys (ATI Technologies Inc.)
DRV:64bit: - (amdsata) -- C:\Windows\SysNative\drivers\amdsata.sys (Advanced Micro Devices)
DRV:64bit: - (amdxata) -- C:\Windows\SysNative\drivers\amdxata.sys (Advanced Micro Devices)
DRV:64bit: - (amdsbs) -- C:\Windows\SysNative\drivers\amdsbs.sys (AMD Technologies Inc.)
DRV:64bit: - (LSI_SAS2) -- C:\Windows\SysNative\drivers\lsi_sas2.sys (LSI Corporation)
DRV:64bit: - (HpSAMD) -- C:\Windows\SysNative\drivers\HpSAMD.sys (Hewlett-Packard Company)
DRV:64bit: - (stexstor) -- C:\Windows\SysNative\drivers\stexstor.sys (Promise Technology)
DRV:64bit: - (usbser) -- C:\Windows\SysNative\drivers\usbser.sys (Microsoft Corporation)
DRV:64bit: - (athr) -- C:\Windows\SysNative\drivers\athrx.sys (Atheros Communications, Inc.)
DRV:64bit: - (AgereSoftModem) -- C:\Windows\SysNative\drivers\agrsm64.sys (LSI Corp)
DRV:64bit: - (yukonw7) -- C:\Windows\SysNative\drivers\yk62x64.sys (Marvell)
DRV:64bit: - (ebdrv) -- C:\Windows\SysNative\drivers\evbda.sys (Broadcom Corporation)
DRV:64bit: - (b06bdrv) -- C:\Windows\SysNative\drivers\bxvbda.sys (Broadcom Corporation)
DRV:64bit: - (b57nd60a) -- C:\Windows\SysNative\drivers\b57nd60a.sys (Broadcom Corporation)
DRV:64bit: - (hcw85cir) -- C:\Windows\SysNative\drivers\hcw85cir.sys (Hauppauge Computer Works, Inc.)
DRV:64bit: - (SABI) -- C:\Windows\SysNative\drivers\SABI.sys (SAMSUNG ELECTRONICS)
DRV:64bit: - (sfdrv01) -- C:\Windows\SysNative\drivers\sfdrv01.sys (Protection Technology (StarForce))
DRV:64bit: - (pccsmcfd) -- C:\Windows\SysNative\drivers\pccsmcfdx64.sys (Nokia)
DRV:64bit: - (sfvfs02) -- C:\Windows\SysNative\drivers\sfvfs02.sys (Protection Technology (StarForce))
DRV:64bit: - (sfhlp02) -- C:\Windows\SysNative\drivers\sfhlp02.sys (Protection Technology (StarForce))
DRV - (StarOpen) -- C:\Windows\SysWow64\drivers\StarOpen.sys ()
DRV - (WIMMount) -- C:\Windows\SysWOW64\drivers\wimmount.sys (Microsoft Corporation)
 
 
========== Standard Registry (SafeList) ==========
 
 
========== Internet Explorer ==========
 
IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE:64bit: - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
 
 
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
 
IE - HKU\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-21-948820188-2401921178-1341083259-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://de.msn.com/?ocid=iehp
IE - HKU\S-1-5-21-948820188-2401921178-1341083259-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de-DE
IE - HKU\S-1-5-21-948820188-2401921178-1341083259-1000\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 3C 83 AB E5 56 79 CD 01  [binary data]
IE - HKU\S-1-5-21-948820188-2401921178-1341083259-1000\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKU\S-1-5-21-948820188-2401921178-1341083259-1000\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC
IE - HKU\S-1-5-21-948820188-2401921178-1341083259-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
========== FireFox ==========
 
FF - user.js - File not found
 
FF:64bit: - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\system32\Macromed\Flash\NPSWF64_11_4_400_231.dll File not found
FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_4_400_231.dll ()
FF - HKLM\Software\MozillaPlugins\@divx.com/DivX Browser Plugin,version=1.0.0: C:\Program Files (x86)\DivX\DivX Plus Web Player\npdivx32.dll (DivX,Inc.)
FF - HKLM\Software\MozillaPlugins\@divx.com/DivX Player Plugin,version=1.0.0: C:\Program Files (x86)\DivX\DivX Player\npDivxPlayerPlugin.dll (DivX, Inc)
FF - HKLM\Software\MozillaPlugins\@java.com/DTPlugin,version=10.4.1: C:\Windows\SysWOW64\npDeployJava1.dll (Oracle Corporation)
FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin,version=10.4.1: C:\Program Files (x86)\Oracle\JavaFX 2.1 Runtime\bin\plugin2\npjp2.dll (Oracle Corporation)
FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: C:\Program Files (x86)\Microsoft Silverlight\4.1.10329.0\npctrl.dll ( Microsoft Corporation)
 
FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\smartwebprinting@hp.com: C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\MozillaAddOn3 [2010.10.10 15:54:58 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 14.0.1\extensions\\Components: C:\Program Files (x86)\Mozilla Firefox\components [2012.08.19 19:59:19 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 14.0.1\extensions\\Plugins: C:\Program Files (x86)\Mozilla Firefox\plugins [2012.08.19 21:58:51 | 000,000,000 | ---D | M]
FF - HKEY_CURRENT_USER\software\mozilla\Firefox\Extensions\\smartwebprinting@hp.com: C:\Program Files (x86)\HP\Digital Imaging\Smart Web Printing\MozillaAddOn3 [2010.10.10 15:54:58 | 000,000,000 | ---D | M]
 
[2012.08.19 19:59:36 | 000,000,000 | ---D | M] (No name found) -- C:\Users\log\AppData\Roaming\mozilla\Extensions
[2012.08.19 19:59:19 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files (x86)\mozilla firefox\extensions
[2012.07.14 02:17:47 | 000,136,672 | ---- | M] (Mozilla Foundation) -- C:\Program Files (x86)\mozilla firefox\components\browsercomps.dll
[2011.12.09 19:23:32 | 000,012,800 | ---- | M] (Nullsoft, Inc.) -- C:\Program Files (x86)\mozilla firefox\plugins\npwachk.dll
[2012.07.14 02:16:36 | 000,002,252 | ---- | M] () -- C:\Program Files (x86)\mozilla firefox\searchplugins\bing.xml
[2012.07.14 02:16:36 | 000,002,040 | ---- | M] () -- C:\Program Files (x86)\mozilla firefox\searchplugins\twitter.xml
 
========== Chrome  ==========
 
CHR - default_search_provider: Google (Enabled)
CHR - default_search_provider: search_url = {google:baseURL}search?{google:RLZ}{google:acceptedSuggestion}{google:originalQueryForSuggestion}sourceid=chrome&ie={inputEncoding}&q={searchTerms}
CHR - default_search_provider: suggest_url = {google:baseSuggestURL}search?client=chrome&hl={language}&q={searchTerms}
CHR - homepage: hxxp://home.sweetim.com/?barid={FECE890E-EA05-11E1-8D9D-0013776043FF}
CHR - plugin: Shockwave Flash (Enabled) = C:\Users\log\AppData\Local\Google\Chrome\Application\10.0.648.204\gcswf32.dll
CHR - plugin: Shockwave Flash (Enabled) = C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll
CHR - plugin: Java Deployment Toolkit 6.0.240.7 (Enabled) = C:\Program Files (x86)\Java\jre6\bin\new_plugin\npdeployJava1.dll
CHR - plugin: Java(TM) Platform SE 6 U24 (Enabled) = C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll
CHR - plugin: Adobe Acrobat (Disabled) = C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\nppdf32.dll
CHR - plugin: Silverlight Plug-In (Enabled) = c:\Program Files (x86)\Microsoft Silverlight\4.0.60129.0\npctrl.dll
CHR - plugin: DivX Web Player (Enabled) = C:\Program Files (x86)\DivX\DivX Plus Web Player\npdivx32.dll
CHR - plugin: Microsoft Office 2003 (Enabled) = C:\Program Files (x86)\Mozilla Firefox\plugins\NPOFFICE.DLL
CHR - plugin: Chrome PDF Viewer (Enabled) = C:\Users\log\AppData\Local\Google\Chrome\Application\10.0.648.204\pdf.dll
CHR - plugin: Google Gears 0.5.33.0 (Enabled) = C:\Users\log\AppData\Local\Google\Chrome\Application\10.0.648.204\gears.dll
CHR - plugin: DivX Player Netscape Plugin (Enabled) = C:\Program Files (x86)\Mozilla Firefox\plugins\npDivxPlayerPlugin.dll
CHR - plugin: king.com - Game controller for firefox (Enabled) = C:\Program Files (x86)\Mozilla Firefox\plugins\npmidas.dll
CHR - plugin: Winamp Application Detector (Enabled) = C:\Program Files (x86)\Mozilla Firefox\plugins\npwachk.dll
CHR - plugin: Zylom Plugin (Enabled) = C:\Program Files (x86)\Mozilla Firefox\plugins\npzylomgamesplayer.dll
CHR - plugin: Google Update (Enabled) = C:\Users\log\AppData\Local\Google\Update\1.2.183.39\npGoogleOneClick8.dll
CHR - plugin: Default Plug-in (Enabled) = default_plugin
 
O1 HOSTS File: ([2009.06.10 23:00:26 | 000,000,824 | ---- | M]) - C:\Windows\SysNative\drivers\etc\hosts
O2 - BHO: (Java(tm) Plug-In SSV Helper) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Oracle\JavaFX 2.1 Runtime\bin\ssv.dll (Oracle Corporation)
O2 - BHO: (Java(tm) Plug-In 2 SSV Helper) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Oracle\JavaFX 2.1 Runtime\bin\jp2ssv.dll (Oracle Corporation)
O4:64bit: - HKLM..\Run: [RtHDVCpl] C:\Windows\RAVCpl64.exe (Realtek Semiconductor)
O4 - HKLM..\Run: [avgnt] C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe (Avira Operations GmbH & Co. KG)
O4 - HKLM..\Run: [LexwareInfoService] C:\Program Files (x86)\Common Files\Lexware\Update Manager\LxUpdateManager.exe (Haufe-Lexware GmbH & Co. KG)
O4 - HKLM..\Run: [Malwarebytes' Anti-Malware] C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe (Malwarebytes Corporation)
O4 - HKLM..\Run: [PDFPrint] C:\Program Files (x86)\pdf24\pdf24.exe (Geek Software GmbH)
O4 - HKLM..\Run: [StartCCC] C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe (Advanced Micro Devices, Inc.)
O4 - HKLM..\Run: [WinampAgent] C:\Program Files (x86)\Winamp\winampa.exe (Nullsoft, Inc.)
O4 - HKU\S-1-5-19..\Run: [Sidebar] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe (Microsoft Corporation)
O4 - HKU\S-1-5-20..\Run: [Sidebar] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe (Microsoft Corporation)
O4 - HKU\S-1-5-21-948820188-2401921178-1341083259-1000..\Run: [niuvo.exe] C:\Users\log\AppData\Roaming\Ytogw\niuvo.exe File not found
O4 - HKU\S-1-5-19..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found
O4 - HKU\S-1-5-20..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3
O8:64bit: - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~2\MICROS~1\OFFICE11\EXCEL.EXE/3000 File not found
O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~2\MICROS~1\OFFICE11\EXCEL.EXE/3000 File not found
O9 - Extra Button: Recherchieren - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~2\MICROS~1\OFFICE11\REFIEBAR.DLL (Microsoft Corporation)
O1364bit: - gopher Prefix: missing
O13 - gopher Prefix: missing
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab (Java Plug-in 10.4.1)
O16 - DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab (Java Plug-in 1.6.0_29)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab (Java Plug-in 10.4.1)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab (Shockwave Flash Object)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.2.1
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{41854E95-66BA-472C-9947-66B3BC8F70A3}: NameServer = 193.189.244.225 193.189.244.206
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{5B4F5982-E4B7-49F3-879D-D722A728A14E}: DhcpNameServer = 192.168.2.1
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{70BF7447-54F9-4D86-914D-9BFA5C80F549}: NameServer = 193.189.244.225 193.189.244.206
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{87D60EC4-88B9-44BC-A528-D4C1B3E06C5B}: DhcpNameServer = 192.168.2.1
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{C65B6460-BABF-46B0-9AF4-51D4DB0F2E2F}: NameServer = 193.189.244.225 193.189.244.206
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{E2C14AE4-55A8-47E4-8C11-5F41DD320E72}: NameServer = 193.189.244.225 193.189.244.206
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{E8D20500-31FE-4214-B523-94919A59EB68}: NameServer = 193.189.244.225 193.189.244.206
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{EEB0EF94-75A2-44FA-BC0A-91769B74CFB2}: NameServer = 193.189.244.225 193.189.244.206
O18:64bit: - Protocol\Handler\msdaipp - No CLSID value found
O18:64bit: - Protocol\Handler\msdaipp\0x00000001 - No CLSID value found
O18:64bit: - Protocol\Handler\msdaipp\oledb - No CLSID value found
O18:64bit: - Protocol\Handler\mso-offdap11 - No CLSID value found
O18:64bit: - Protocol\Handler\skype4com - No CLSID value found
O18 - Protocol\Handler\msdaipp\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
O18 - Protocol\Handler\msdaipp\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
O18 - Protocol\Handler\mso-offdap11 {32505114-5902-49B2-880A-1F7738E5A384} - C:\PROGRA~2\COMMON~1\MICROS~1\WEBCOM~1\11\OWC11.DLL (Microsoft Corporation)
O18 - Protocol\Handler\skype4com {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL (Skype Technologies)
O18:64bit: - Protocol\Filter\text/xml - No CLSID value found
O20:64bit: - HKLM Winlogon: Shell - (explorer.exe) - C:\Windows\explorer.exe (Microsoft Corporation)
O20:64bit: - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) - C:\Windows\SysNative\userinit.exe (Microsoft Corporation)
O20:64bit: - HKLM Winlogon: VMApplet - (SystemPropertiesPerformance.exe) - C:\Windows\SysNative\SystemPropertiesPerformance.exe (Microsoft Corporation)
O20:64bit: - HKLM Winlogon: VMApplet - (/pagefile) -  File not found
O20 - HKLM Winlogon: Shell - (explorer.exe) - C:\Windows\SysWow64\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (userinit.exe) - C:\Windows\SysWow64\userinit.exe (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (/pagefile) -  File not found
O21:64bit: - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
O32 - HKLM CDRom: AutoRun - 1
O33 - MountPoints2\{0b26efcd-54ce-11e0-acd0-001e101fe70e}\Shell - "" = AutoRun
O33 - MountPoints2\{0b26efcd-54ce-11e0-acd0-001e101fe70e}\Shell\AutoRun\command - "" = H:\AutoRun.exe
O33 - MountPoints2\{175fb637-b378-11df-9c63-001e101f82a7}\Shell - "" = AutoRun
O33 - MountPoints2\{175fb637-b378-11df-9c63-001e101f82a7}\Shell\AutoRun\command - "" = J:\AutoRun.exe
O33 - MountPoints2\{397ed14d-53e4-11e0-a372-001e101fa1f5}\Shell - "" = AutoRun
O33 - MountPoints2\{397ed14d-53e4-11e0-a372-001e101fa1f5}\Shell\AutoRun\command - "" = K:\AutoRun.exe
O33 - MountPoints2\{d04321cd-a3c7-11df-9297-0013776043ff}\Shell - "" = AutoRun
O33 - MountPoints2\{d04321cd-a3c7-11df-9297-0013776043ff}\Shell\AutoRun\command - "" = F:\AutoRun.exe
O33 - MountPoints2\{d04321ee-a3c7-11df-9297-0013776043ff}\Shell - "" = AutoRun
O33 - MountPoints2\{d04321ee-a3c7-11df-9297-0013776043ff}\Shell\AutoRun\command - "" = F:\AutoRun.exe
O33 - MountPoints2\{d0432210-a3c7-11df-9297-0013776043ff}\Shell - "" = AutoRun
O33 - MountPoints2\{d0432210-a3c7-11df-9297-0013776043ff}\Shell\AutoRun\command - "" = F:\AutoRun.exe
O33 - MountPoints2\{db6a7325-a3ca-11df-8b89-0013776043ff}\Shell - "" = AutoRun
O33 - MountPoints2\{db6a7325-a3ca-11df-8b89-0013776043ff}\Shell\AutoRun\command - "" = F:\AutoRun.exe
O33 - MountPoints2\F\Shell - "" = AutoRun
O33 - MountPoints2\F\Shell\AutoRun\command - "" = F:\AutoRun.exe
O34 - HKLM BootExecute: (autocheck autochk *)
O35:64bit: - HKLM\..comfile [open] -- "%1" %*
O35:64bit: - HKLM\..exefile [open] -- "%1" %*
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37:64bit: - HKLM\...com [@ = comfile] -- "%1" %*
O37:64bit: - HKLM\...exe [@ = exefile] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3)
O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2)
O38 - SubSystems\\Windows: (ServerDll=sxssrv,4)
 
========== Files/Folders - Created Within 30 Days ==========
 
[2012.08.19 23:42:35 | 000,096,768 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\mshtmled.dll
[2012.08.19 23:42:35 | 000,073,216 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\mshtmled.dll
[2012.08.19 23:42:34 | 000,237,056 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\url.dll
[2012.08.19 23:42:34 | 000,231,936 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\url.dll
[2012.08.19 23:42:33 | 000,176,640 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\ieui.dll
[2012.08.19 23:42:32 | 000,248,320 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\ieui.dll
[2012.08.19 23:42:32 | 000,173,056 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\ieUnatt.exe
[2012.08.19 23:42:32 | 000,142,848 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\ieUnatt.exe
[2012.08.19 23:42:31 | 001,494,528 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\inetcpl.cpl
[2012.08.19 23:42:31 | 001,427,968 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\inetcpl.cpl
[2012.08.19 23:42:30 | 002,312,704 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\jscript9.dll
[2012.08.19 23:42:29 | 000,717,824 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\jscript.dll
[2012.08.19 23:42:28 | 000,816,640 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\jscript.dll
[2012.08.19 20:03:09 | 000,000,000 | ---D | C] -- C:\Users\log\Desktop\Musik Handball
[2012.08.19 19:59:26 | 000,000,000 | ---D | C] -- C:\Users\log\AppData\Roaming\Mozilla
[2012.08.19 19:46:07 | 000,000,000 | -H-D | C] -- C:\Windows\AxInstSV
[2012.08.19 16:01:32 | 000,000,000 | ---D | C] -- C:\Users\log\AppData\Roaming\TuneUp Software
[2012.08.19 16:01:17 | 000,000,000 | ---D | C] -- C:\ProgramData\TuneUp Software
[2012.08.19 16:01:13 | 000,000,000 | -HSD | C] -- C:\ProgramData\{32364CEA-7855-4A3C-B674-53D8E9B97936}
[2012.08.19 16:01:13 | 000,000,000 | -H-D | C] -- C:\ProgramData\Common Files
[2012.08.19 15:58:28 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\zebNet Windows Keyfinder 2012 R2
[2012.08.19 15:27:29 | 000,597,504 | ---- | C] (OldTimer Tools) -- C:\Users\log\Desktop\OTL.exe
[2012.08.19 13:41:28 | 000,073,216 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\netapi32.dll
[2012.08.19 13:41:28 | 000,058,880 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\browcli.dll
[2012.08.19 13:41:28 | 000,041,472 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysWow64\browcli.dll
[2012.08.19 13:41:22 | 000,956,416 | ---- | C] (Microsoft Corporation) -- C:\Windows\SysNative\localspl.dll
[2012.08.19 13:25:43 | 000,000,000 | ---D | C] -- C:\Users\log\AppData\Roaming\Malwarebytes
[2012.08.19 13:25:28 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes' Anti-Malware
[2012.08.19 13:25:27 | 000,024,904 | ---- | C] (Malwarebytes Corporation) -- C:\Windows\SysNative\drivers\mbam.sys
[2012.08.19 13:25:27 | 000,000,000 | ---D | C] -- C:\ProgramData\Malwarebytes
[2012.08.19 13:25:26 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\Malwarebytes' Anti-Malware
[2012.08.19 13:22:46 | 010,652,120 | ---- | C] (Malwarebytes Corporation                                    ) -- C:\Users\log\Desktop\mbam-setup-1.62.0.1300.exe
[2012.08.13 06:39:49 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\MSECache
[2012.08.13 06:37:55 | 039,074,536 | ---- | C] (Microsoft Corporation) -- C:\Users\log\Desktop\FileFormatConverters.exe
[2012.07.30 21:25:20 | 010,198,728 | ---- | C] (Adobe Systems Incorporated) -- C:\Users\log\Desktop\flashplayer11-4_p1_install_win_pi_071612.exe
[2012.07.30 20:47:51 | 000,000,000 | ---D | C] -- C:\Users\log\AppData\Roaming\Ytogw
[2012.07.30 20:47:51 | 000,000,000 | ---D | C] -- C:\Users\log\AppData\Roaming\Yqxyer
[2012.07.29 14:41:18 | 000,000,000 | ---D | C] -- C:\Users\log\AppData\Local\Macromedia
 
========== Files - Modified Within 30 Days ==========
 
[2012.08.21 21:57:29 | 000,014,752 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
[2012.08.21 21:57:29 | 000,014,752 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
[2012.08.21 21:49:23 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat
[2012.08.21 21:49:17 | 1407,848,448 | -HS- | M] () -- C:\hiberfil.sys
[2012.08.20 07:25:28 | 000,288,992 | ---- | M] () -- C:\Windows\SysNative\FNTCACHE.DAT
[2012.08.19 19:59:21 | 000,001,130 | ---- | M] () -- C:\Users\Public\Desktop\Mozilla Firefox.lnk
[2012.08.19 16:26:04 | 000,035,344 | ---- | M] () -- C:\Windows\Irremote.ini
[2012.08.19 15:57:25 | 002,774,400 | ---- | M] () -- C:\Users\log\Desktop\de_windows_keyfinder_2012_x86.exe
[2012.08.19 15:27:37 | 000,597,504 | ---- | M] (OldTimer Tools) -- C:\Users\log\Desktop\OTL.exe
[2012.08.19 15:26:32 | 000,124,085 | ---- | M] () -- C:\Users\log\Desktop\malwarebytes_19.08.2012.JPG
[2012.08.19 13:25:29 | 000,001,109 | ---- | M] () -- C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk
[2012.08.19 13:23:11 | 010,652,120 | ---- | M] (Malwarebytes Corporation                                    ) -- C:\Users\log\Desktop\mbam-setup-1.62.0.1300.exe
[2012.08.13 19:10:53 | 004,503,728 | ---- | M] () -- C:\ProgramData\ism_0_llatsni.pad
[2012.08.13 19:05:50 | 000,003,704 | ---- | M] () -- C:\ProgramData\erolpxei.pad
[2012.08.13 15:26:42 | 004,503,728 | ---- | M] () -- C:\ProgramData\23lldnur.pad
[2012.08.13 06:37:56 | 039,074,536 | ---- | M] (Microsoft Corporation) -- C:\Users\log\Desktop\FileFormatConverters.exe
[2012.07.30 21:26:35 | 000,696,520 | ---- | M] (Adobe Systems Incorporated) -- C:\Windows\SysWow64\FlashPlayerApp.exe
[2012.07.30 21:26:35 | 000,073,416 | ---- | M] (Adobe Systems Incorporated) -- C:\Windows\SysWow64\FlashPlayerCPLApp.cpl
[2012.07.30 21:25:45 | 010,198,728 | ---- | M] (Adobe Systems Incorporated) -- C:\Users\log\Desktop\flashplayer11-4_p1_install_win_pi_071612.exe
 
========== Files Created - No Company Name ==========
 
[2012.08.19 19:59:21 | 000,001,130 | ---- | C] () -- C:\Users\Public\Desktop\Mozilla Firefox.lnk
[2012.08.19 15:58:29 | 000,002,194 | ---- | C] () -- C:\Users\log\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\zebNet Windows Keyfinder 2012 R2.lnk
[2012.08.19 15:57:19 | 002,774,400 | ---- | C] () -- C:\Users\log\Desktop\de_windows_keyfinder_2012_x86.exe
[2012.08.19 15:26:31 | 000,124,085 | ---- | C] () -- C:\Users\log\Desktop\malwarebytes_19.08.2012.JPG
[2012.08.19 13:25:29 | 000,001,109 | ---- | C] () -- C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk
[2012.08.13 16:03:51 | 000,003,704 | ---- | C] () -- C:\ProgramData\erolpxei.pad
[2012.08.13 15:26:42 | 004,503,728 | ---- | C] () -- C:\ProgramData\23lldnur.pad
[2012.08.13 15:23:52 | 004,503,728 | ---- | C] () -- C:\ProgramData\ism_0_llatsni.pad
[2012.02.20 20:48:22 | 000,000,852 | ---- | C] () -- C:\Users\log\.recently-used.xbel
[2011.02.12 19:45:08 | 000,000,010 | ---- | C] () -- C:\Windows\popcinfo.dat
[2010.10.10 15:43:47 | 000,266,092 | ---- | C] () -- C:\Windows\hpwins23.dat
[2010.10.02 19:44:33 | 000,007,612 | ---- | C] () -- C:\Users\log\AppData\Local\resmon.resmoncfg
[2010.09.17 02:19:10 | 000,032,608 | ---- | C] () -- C:\Windows\king-uninstall.exe
[2010.09.08 14:10:09 | 000,003,584 | ---- | C] () -- C:\Users\log\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2010.07.29 14:15:16 | 001,360,316 | ---- | C] () -- C:\Users\log\Loettchen_2010-07-29.nbu
[2010.02.24 21:58:25 | 000,000,056 | -H-- | C] () -- C:\ProgramData\ezsidmv.dat
 
========== LOP Check ==========
 
[2012.08.19 16:30:37 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\Amazon
[2010.07.07 15:45:44 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\Canneverbe Limited
[2010.07.06 11:29:14 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\EndNote
[2011.05.29 21:08:11 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\gtk-2.0
[2012.06.04 19:06:46 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\Lexware
[2012.07.14 23:02:31 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\MediaMonkey
[2012.08.19 15:48:07 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\Nokia
[2010.07.30 09:51:25 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\Nokia Ovi Suite
[2010.07.29 14:07:09 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\PC Suite
[2011.08.13 20:30:17 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\ProtectDISC
[2012.08.19 16:01:32 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\TuneUp Software
[2012.08.13 19:03:20 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\Yqxyer
[2012.08.19 15:36:24 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\Ytogw
[2011.02.11 23:45:25 | 000,000,000 | ---D | M] -- C:\Users\log\AppData\Roaming\Zylom
[2012.03.04 13:15:01 | 000,032,632 | ---- | M] () -- C:\Windows\Tasks\SCHEDLGU.TXT
 
========== Purity Check ==========
 
 

< End of report >
         
--- --- ---

[/CODE]



OTL Logfile:
Code:
ATTFilter
OTL Extras logfile created on: 21.08.2012 21:57:53 - Run 4
OTL by OldTimer - Version 3.2.55.0     Folder = C:\Users\log\Desktop
64bit- Professional  (Version = 6.1.7600) - Type = NTWorkstation
Internet Explorer (Version = 9.0.8112.16421)
Locale: 00000407 | Country: Deutschland | Language: DEU | Date Format: dd.MM.yyyy
 
1,75 Gb Total Physical Memory | 0,61 Gb Available Physical Memory | 34,94% Memory free
3,50 Gb Paging File | 1,98 Gb Available in Paging File | 56,54% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files (x86)
Drive C: | 48,83 Gb Total Space | 9,96 Gb Free Space | 20,40% Space Free | Partition Type: NTFS
Drive D: | 62,96 Gb Total Space | 39,14 Gb Free Space | 62,17% Space Free | Partition Type: NTFS
Drive F: | 1,89 Gb Total Space | 1,88 Gb Free Space | 99,32% Space Free | Partition Type: FAT
 
Computer Name: LOTTA | User Name: log | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users | Include 64bit Scans
Company Name Whitelist: Off | Skip Microsoft Files: Off | No Company Name Whitelist: On | File Age = 30 Days
 
========== Extra Registry (SafeList) ==========
 
 
========== File Associations ==========
 
64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.url[@ = InternetShortcut] -- C:\Windows\SysNative\rundll32.exe (Microsoft Corporation)
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]
.cpl [@ = cplfile] -- C:\Windows\SysWow64\control.exe (Microsoft Corporation)
 
[HKEY_USERS\S-1-5-21-948820188-2401921178-1341083259-1000\SOFTWARE\Classes\<extension>]
.html [@ = FirefoxHTML] -- C:\Program Files (x86)\Mozilla Firefox\firefox.exe (Mozilla Corporation)
 
========== Shell Spawning ==========
 
64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
exefile [open] -- "%1" %*
helpfile [open] -- Reg Error: Key error.
inffile [install] -- %SystemRoot%\System32\InfDefaultInstall.exe "%1" (Microsoft Corporation)
InternetShortcut [open] -- "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\ieframe.dll",OpenURL %l (Microsoft Corporation)
InternetShortcut [print] -- "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\mshtml.dll",PrintHTML "%1" (Microsoft Corporation)
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [cmd] -- cmd.exe /s /k pushd "%V" (Microsoft Corporation)
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Directory [MediaMonkey.1Play] -- "C:\PROGRA~2\MEDIAM~1\MediaMonkey.exe" "%1"
Directory [MediaMonkey.2PlayNext] -- "C:\PROGRA~2\MEDIAM~1\MediaMonkey.exe" /NEXT "%1"
Directory [MediaMonkey.3Enqueue] -- "C:\PROGRA~2\MEDIAM~1\MediaMonkey.exe" /ADD "%1"
Directory [Winamp.Bookmark] -- "C:\Program Files (x86)\Winamp\winamp.exe" /BOOKMARK "%1" (Nullsoft, Inc.)
Directory [Winamp.Enqueue] -- "C:\Program Files (x86)\Winamp\winamp.exe" /ADD "%1" (Nullsoft, Inc.)
Directory [Winamp.Play] -- "C:\Program Files (x86)\Winamp\winamp.exe" "%1" (Nullsoft, Inc.)
Folder [open] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [explore] -- Reg Error: Value error.
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
cplfile [cplopen] -- %SystemRoot%\System32\control.exe "%1",%* (Microsoft Corporation)
exefile [open] -- "%1" %*
helpfile [open] -- Reg Error: Key error.
inffile [install] -- %SystemRoot%\System32\InfDefaultInstall.exe "%1" (Microsoft Corporation)
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [cmd] -- cmd.exe /s /k pushd "%V" (Microsoft Corporation)
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Directory [MediaMonkey.1Play] -- "C:\PROGRA~2\MEDIAM~1\MediaMonkey.exe" "%1"
Directory [MediaMonkey.2PlayNext] -- "C:\PROGRA~2\MEDIAM~1\MediaMonkey.exe" /NEXT "%1"
Directory [MediaMonkey.3Enqueue] -- "C:\PROGRA~2\MEDIAM~1\MediaMonkey.exe" /ADD "%1"
Directory [Winamp.Bookmark] -- "C:\Program Files (x86)\Winamp\winamp.exe" /BOOKMARK "%1" (Nullsoft, Inc.)
Directory [Winamp.Enqueue] -- "C:\Program Files (x86)\Winamp\winamp.exe" /ADD "%1" (Nullsoft, Inc.)
Directory [Winamp.Play] -- "C:\Program Files (x86)\Winamp\winamp.exe" "%1" (Nullsoft, Inc.)
Folder [open] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Folder [explore] -- Reg Error: Value error.
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
 
========== Security Center Settings ==========
 
64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"cval" = 1
 
64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]
 
64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
"VistaSp1" = 28 4D B2 76 41 04 CA 01  [binary data]
"AntiVirusOverride" = 0
"AntiSpywareOverride" = 0
"FirewallOverride" = 0
 
64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\Vol]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc]
 
========== Firewall Settings ==========
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]
"DisableNotifications" = 0
"EnableFirewall" = 1
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"DisableNotifications" = 0
"EnableFirewall" = 1
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile]
"DisableNotifications" = 0
"EnableFirewall" = 1
 
========== Authorized Applications List ==========
 
 
========== Vista Active Open Ports Exception List ==========
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
"{023C6E0A-9563-44DF-8E7C-A8B8AD025611}" = rport=5355 | protocol=17 | dir=out | svc=dnscache | app=%systemroot%\system32\svchost.exe | 
"{056E67D4-1040-45B5-AFAD-8DB07270FB6A}" = rport=139 | protocol=6 | dir=out | app=system | 
"{05CE15FB-F198-44D7-9E7D-052532336FF1}" = lport=3702 | protocol=17 | dir=in | svc=fdrespub | app=%systemroot%\system32\svchost.exe | 
"{08574EBB-E7D2-4FD2-8CBD-7D890A1C1613}" = lport=rpc-epmap | protocol=6 | dir=in | svc=rpcss | name=@firewallapi.dll,-28539 | 
"{145AB6DA-718F-4540-A54C-92673811570E}" = rport=2177 | protocol=17 | dir=out | svc=qwave | app=%systemroot%\system32\svchost.exe | 
"{28A1559F-DA7D-4046-9CCF-396CF859AF13}" = rport=5355 | protocol=17 | dir=out | svc=dnscache | app=%systemroot%\system32\svchost.exe | 
"{2C288B65-82C0-4837-A570-8614E44F7FAF}" = lport=2177 | protocol=17 | dir=in | svc=qwave | app=%systemroot%\system32\svchost.exe | 
"{2F60D519-CBE1-464A-9DE8-3AFB6BAF8F5F}" = lport=2177 | protocol=6 | dir=in | svc=qwave | app=%systemroot%\system32\svchost.exe | 
"{3ABCECAD-6D28-444F-A267-5BCFF2E7D86D}" = rport=1900 | protocol=17 | dir=out | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe | 
"{3D27599F-C21E-4348-8225-368AE19B2376}" = rport=3702 | protocol=17 | dir=out | svc=fdrespub | app=%systemroot%\system32\svchost.exe | 
"{43B99CE9-7A3C-42A5-A8D7-6546937B291D}" = rport=10243 | protocol=6 | dir=out | app=system | 
"{47106EBD-DB2D-4960-81A3-3E1E6AE00800}" = lport=10243 | protocol=6 | dir=in | app=system | 
"{4C958903-6F23-4EE4-AA60-C491C9571B84}" = lport=2869 | protocol=6 | dir=in | app=system | 
"{4DD46A17-007C-4257-969E-DE307E8D59E8}" = rport=2177 | protocol=6 | dir=out | svc=qwave | app=%systemroot%\system32\svchost.exe | 
"{53F0846C-E7E9-4449-AC94-D32DFBE43B04}" = lport=139 | protocol=6 | dir=in | app=system | 
"{5DFDEB79-6D1C-4461-A760-5FEC7090EFE5}" = lport=rpc | protocol=6 | dir=in | svc=spooler | app=%systemroot%\system32\spoolsv.exe | 
"{65DD1892-14FF-4B4B-9D68-FC7C9F49619B}" = lport=1900 | protocol=17 | dir=in | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe | 
"{72FEF135-E48B-4968-A2EE-CDCB65660B03}" = lport=137 | protocol=17 | dir=in | app=system | 
"{7C13AA72-6E3F-4B69-A7FA-2A7A2FC3BE02}" = lport=445 | protocol=6 | dir=in | app=system | 
"{80532684-4849-4205-8F95-D7044703CAC2}" = lport=5355 | protocol=17 | dir=in | svc=dnscache | app=%systemroot%\system32\svchost.exe | 
"{956ECF0C-CEF3-451A-8170-EA29062D4944}" = rport=5355 | protocol=17 | dir=out | svc=dnscache | app=%systemroot%\system32\svchost.exe | 
"{9F0DC946-46BC-4FD7-BAD0-B15AFCA7891A}" = rport=137 | protocol=17 | dir=out | app=system | 
"{A93EEC15-EC4A-4103-8E5E-8919AA7F9BFF}" = rport=138 | protocol=17 | dir=out | app=system | 
"{B22FB8B3-26E2-4CE9-82A4-B0EC63AED23A}" = lport=138 | protocol=17 | dir=in | app=system | 
"{BB1DC66A-0210-4EC2-B2D9-D8395BE26913}" = lport=3702 | protocol=17 | dir=in | svc=fdphost | app=%systemroot%\system32\svchost.exe | 
"{BD7738D9-9097-4DDA-94FB-155273D19ECA}" = rport=1900 | protocol=17 | dir=out | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe | 
"{D2EF8D22-F9E1-46E6-AA99-5F984B5ACFCB}" = lport=5355 | protocol=17 | dir=in | svc=dnscache | app=%systemroot%\system32\svchost.exe | 
"{E2E219E8-A7D4-41EA-AFED-2B1364450737}" = lport=5355 | protocol=17 | dir=in | svc=dnscache | app=%systemroot%\system32\svchost.exe | 
"{E697FB7A-C67A-4835-9CF5-31E627D6F791}" = rport=3702 | protocol=17 | dir=out | svc=fdphost | app=%systemroot%\system32\svchost.exe | 
"{F0E473AB-C26B-45B4-B132-74295483E32A}" = rport=445 | protocol=6 | dir=out | app=system | 
"{FBEC8D22-E919-425C-9D88-F17060D9E9F1}" = lport=1900 | protocol=17 | dir=in | svc=ssdpsrv | app=%systemroot%\system32\svchost.exe | 
 
========== Vista Active Application Exception List ==========
 
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules]
"{021EDDC5-C05A-43BC-A710-33DF098FF65A}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hposfx08.exe | 
"{030E091A-3AC8-40C6-A9F3-00900A938919}" = protocol=17 | dir=out | app=%programfiles(x86)%\windows media player\wmplayer.exe | 
"{0835B9AE-E127-47C7-8ADF-A32AFB4D1E6C}" = protocol=17 | dir=in | app=%programfiles%\windows media player\wmplayer.exe | 
"{1735E8C1-CCA9-4642-A438-FE7FE8F122EC}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpqgpc01.exe | 
"{378DC232-36F9-4D54-9707-47F6357E1B8A}" = protocol=1 | dir=out | name=@firewallapi.dll,-28544 | 
"{4289D283-9D3D-467F-8A5D-A5BC9F2F99E9}" = protocol=6 | dir=out | svc=upnphost | app=%systemroot%\system32\svchost.exe | 
"{4D188200-6926-4939-9CB1-8821E7FD45BE}" = protocol=6 | dir=out | app=%programfiles%\windows media player\wmplayer.exe | 
"{4FA689E9-3E99-4E89-BBDF-C30A39576A10}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpqtra08.exe | 
"{526B3328-C3E1-4245-AA1E-6C76AAA3AAD5}" = protocol=17 | dir=in | app=c:\program files (x86)\sweetim\communicator\sweetpacksupdatemanager.exe | 
"{59614008-B197-4295-85DB-D0C02DBDEF11}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpqfxt08.exe | 
"{5B366F51-3B1C-4FE0-A498-C3C8C5506985}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpqusgh.exe | 
"{618EBEAF-5CDF-4BBC-90DA-7B7B0CE1750F}" = protocol=6 | dir=out | svc=upnphost | app=%systemroot%\system32\svchost.exe | 
"{79FF1CC2-8E55-48A5-B923-2FE4DA95C42E}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hposid01.exe | 
"{7A80F5D2-0A60-4313-BDCB-9741BCB8500C}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpzwiz01.exe | 
"{813A8F9A-2F0E-4258-BDB3-6AA5198521AB}" = protocol=6 | dir=in | app=%programfiles%\windows media player\wmpnetwk.exe | 
"{88BD1EFA-DF78-4944-9833-580607E8576C}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpqkygrp.exe | 
"{9084695B-0CB5-4CA3-802D-289331779CDE}" = protocol=58 | dir=in | name=@firewallapi.dll,-28545 | 
"{9BAC1132-5503-4192-9FE8-88AE03F3EA61}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpofxs08.exe | 
"{A3B99E39-858F-4391-A101-8CE69E4FA5D7}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpqgplgtupl.exe | 
"{A49DFA86-7FCE-49E9-A6EE-CE88EEFD4BE6}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpoews01.exe | 
"{A5352DF6-5EC9-4A43-A187-EDA46786C801}" = protocol=6 | dir=in | app=c:\windows\syswow64\msiexec.exe | 
"{A97EE654-F572-498E-84B2-97CA1A0B321E}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpofxm08.exe | 
"{AA9246AE-2ABF-4316-BC35-C411356780FC}" = protocol=17 | dir=in | app=%programfiles(x86)%\windows media player\wmplayer.exe | 
"{AAD633F0-AA29-4EA8-8E02-44D8A456C1BE}" = protocol=6 | dir=out | app=system | 
"{AF9DDF50-F219-46B5-BF9E-E56AB86FBBBF}" = protocol=1 | dir=in | name=@firewallapi.dll,-28543 | 
"{B2DDCFBA-2F8B-487C-87DC-ECA14E3959AB}" = dir=in | app=c:\program files (x86)\hp\hp software update\hpwucli.exe | 
"{BAC559D1-0E3E-4D04-B4F2-5466B53BA8B6}" = dir=in | app=c:\program files (x86)\hp\digital imaging\smart web printing\smartwebprintexe.exe | 
"{BE27C855-CBBC-47AB-B187-C2DD98AD1A8B}" = protocol=58 | dir=out | name=@firewallapi.dll,-28546 | 
"{C0D1689C-F02E-4634-84A8-5EDA669E8B64}" = protocol=17 | dir=out | app=%programfiles%\windows media player\wmplayer.exe | 
"{C23A66AE-F02C-4AAD-A470-FED8493C2FBA}" = protocol=6 | dir=in | app=c:\program files (x86)\sweetim\communicator\sweetpacksupdatemanager.exe | 
"{C454B5EA-85EC-4388-822F-D44CD76EB337}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpfccopy.exe | 
"{C4E751C5-965D-4B38-858E-06ABA4C704EC}" = protocol=17 | dir=out | app=%programfiles%\windows media player\wmpnetwk.exe | 
"{C6844D68-1087-42CB-9043-C566D0067BC2}" = protocol=17 | dir=out | app=%programfiles%\windows media player\wmplayer.exe | 
"{DB8128A0-AC86-46BA-95B1-5525FF0AE5AA}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpqusgm.exe | 
"{DCF2B1D9-9D58-4363-89C9-B6FBE8523464}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpiscnapp.exe | 
"{E3B6F0E0-324E-48ED-9631-79271FC07D35}" = protocol=17 | dir=in | app=%programfiles%\windows media player\wmplayer.exe | 
"{E4D7A615-B224-4DED-AF9E-D20C3D87464F}" = protocol=17 | dir=in | app=c:\windows\syswow64\msiexec.exe | 
"{E7CF4A69-0E24-464B-899A-F1F249DBFFA6}" = protocol=6 | dir=out | app=%programfiles(x86)%\windows media player\wmplayer.exe | 
"{E83304E3-C0FE-4C30-86E7-0F8EF36E3834}" = dir=in | app=c:\program files (x86)\skype\phone\skype.exe | 
"{EA9018FE-F0F0-42D4-AFA4-82FC7D01A5E5}" = protocol=6 | dir=out | app=%programfiles%\windows media player\wmpnetwk.exe | 
"{F0F28D26-85ED-4357-8F8A-793607803AD9}" = protocol=6 | dir=out | app=%programfiles%\windows media player\wmplayer.exe | 
"{F3A666EF-E8BB-4E41-A0FA-F255E3D4D573}" = protocol=17 | dir=in | app=%programfiles%\windows media player\wmpnetwk.exe | 
"{F988AFB9-8382-43AF-A97B-3D9FA49A4E64}" = dir=in | app=c:\program files (x86)\hp\digital imaging\bin\hpqste08.exe | 
"TCP Query User{16FF4684-6F19-4ABA-9AAD-D06B84DA34BD}C:\program files (x86)\google\google earth\plugin\geplugin.exe" = protocol=6 | dir=in | app=c:\program files (x86)\google\google earth\plugin\geplugin.exe | 
"TCP Query User{349FF936-2285-40BD-8F7A-CDE5799CDCA6}C:\program files (x86)\bittorrent\bittorrent.exe" = protocol=6 | dir=in | app=c:\program files (x86)\bittorrent\bittorrent.exe | 
"TCP Query User{81D9CE08-717A-4B18-AA65-EAFBC21634D5}C:\users\log\appdata\roaming\ytogw\niuvo.exe" = protocol=6 | dir=in | app=c:\users\log\appdata\roaming\ytogw\niuvo.exe | 
"TCP Query User{ACBA567B-9B5B-4EFB-B245-1BBA5287FC9D}C:\program files (x86)\ubisoft\related designs\anno 1404\tools\anno4web.exe" = protocol=6 | dir=in | app=c:\program files (x86)\ubisoft\related designs\anno 1404\tools\anno4web.exe | 
"TCP Query User{B912247E-65B3-4968-ABFF-AB1BF53DF43F}C:\program files (x86)\google\google earth\client\googleearth.exe" = protocol=6 | dir=in | app=c:\program files (x86)\google\google earth\client\googleearth.exe | 
"TCP Query User{C4BC916C-CDF6-4856-85FF-7B57FDFE0D52}C:\users\log\appdata\roaming\spotify\spotify.exe" = protocol=6 | dir=in | app=c:\users\log\appdata\roaming\spotify\spotify.exe | 
"TCP Query User{EAF74426-50CD-43E2-ABAE-336436F6C1E5}D:\stephan\anno1701\anno1701addon.exe" = protocol=6 | dir=in | app=d:\stephan\anno1701\anno1701addon.exe | 
"TCP Query User{F979A8FD-5A97-4A8A-B1C8-819121D00BAC}C:\program files (x86)\winamp\winamp.exe" = protocol=6 | dir=in | app=c:\program files (x86)\winamp\winamp.exe | 
"TCP Query User{FD3A3357-E76D-4E5F-8CE6-752D41577420}D:\stephan\anno1701\anno1701.exe" = protocol=6 | dir=in | app=d:\stephan\anno1701\anno1701.exe | 
"UDP Query User{2AA5D913-6F03-460D-97C3-AA2E5CA3BA1B}C:\program files (x86)\bittorrent\bittorrent.exe" = protocol=17 | dir=in | app=c:\program files (x86)\bittorrent\bittorrent.exe | 
"UDP Query User{2DF535EF-DF9C-4F85-ADA4-FD4DD82C4BAD}C:\program files (x86)\google\google earth\client\googleearth.exe" = protocol=17 | dir=in | app=c:\program files (x86)\google\google earth\client\googleearth.exe | 
"UDP Query User{608D7D21-0ED9-473E-B284-6B9E551C8C05}D:\stephan\anno1701\anno1701.exe" = protocol=17 | dir=in | app=d:\stephan\anno1701\anno1701.exe | 
"UDP Query User{71BB8388-80FD-4A2C-8DB9-5952995F5CDC}C:\program files (x86)\google\google earth\plugin\geplugin.exe" = protocol=17 | dir=in | app=c:\program files (x86)\google\google earth\plugin\geplugin.exe | 
"UDP Query User{76A84395-8F7A-404F-A161-B0BF4E1F85D8}C:\users\log\appdata\roaming\spotify\spotify.exe" = protocol=17 | dir=in | app=c:\users\log\appdata\roaming\spotify\spotify.exe | 
"UDP Query User{AD05F89F-59EE-41AC-9634-FD1447E71100}C:\program files (x86)\ubisoft\related designs\anno 1404\tools\anno4web.exe" = protocol=17 | dir=in | app=c:\program files (x86)\ubisoft\related designs\anno 1404\tools\anno4web.exe | 
"UDP Query User{B00D677D-65D1-4D3C-823F-CDE4C8274175}D:\stephan\anno1701\anno1701addon.exe" = protocol=17 | dir=in | app=d:\stephan\anno1701\anno1701addon.exe | 
"UDP Query User{E5F8509E-2625-448A-BB9C-3C58C98174EE}C:\program files (x86)\winamp\winamp.exe" = protocol=17 | dir=in | app=c:\program files (x86)\winamp\winamp.exe | 
"UDP Query User{FBDD190A-1656-4697-BB3F-016CC35D33AD}C:\users\log\appdata\roaming\ytogw\niuvo.exe" = protocol=17 | dir=in | app=c:\users\log\appdata\roaming\ytogw\niuvo.exe | 
 
========== HKEY_LOCAL_MACHINE Uninstall List ==========
 
64bit: [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{05EFBF37-0E52-4579-875C-7EEF0DFB4FCB}" = Network64
"{071c9b48-7c32-4621-a0ac-3f809523288f}" = Microsoft Visual C++ 2005 Redistributable (x64)
"{2E1B4B42-069F-4F53-9966-9B9B938D7FE5}" = HP Officejet 6500 E709 Series
"{37A62E96-D157-487E-9954-84E8557DE9ED}" = ATI Catalyst Install Manager
"{4B6C7001-C7D6-3710-913E-5BC23FCE91E6}" = Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148
"{4D668D4F-FAA2-4726-834C-31F4614F312E}" = MSVC80_x64_v2
"{55D55008-E5F6-47D6-B16F-B2A40D4D145F}" = 64 Bit HP CIO Components Installer
"{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}" = Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161
"{8220EEFE-38CD-377E-8595-13398D740ACE}" = Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17
"{8338783A-0968-3B85-AFC7-BAAE0A63DC50}" = Microsoft Visual C++ 2008 Redistributable - KB2467174 - x64 9.0.30729.5570
"{aac9fcc4-dd9e-4add-901c-b5496a07ab2e}" = Microsoft Visual C++ 2005 Redistributable (x64) - KB2467175
"{AB071C8B-873C-459F-ACA9-9EBE03C3E89B}" = MSVC90_x64
"{ad8a2fa1-06e7-4b0d-927d-6e54b3d31028}" = Microsoft Visual C++ 2005 Redistributable (x64)
"{B6E3757B-5E77-3915-866A-CCFC4B8D194C}" = Microsoft Visual C++ 2005 ATL Update kb973923 - x64 8.0.50727.4053
"{F250A44A-10C6-CF88-275C-899C259B1321}" = ccc-utility64
"{F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4}" = Microsoft .NET Framework 4 Client Profile
"FCEC33AD40CEA5E0FC4CEE6E42041A0DA189652D" = Windows-Treiberpaket - Nokia pccsmcfd  (08/22/2008 7.0.0.0)
"HP Document Manager" = HP Document Manager 2.0
"HP Imaging Device Functions" = HP Imaging Device Functions 13.0
"HP Smart Web Printing" = HP Smart Web Printing 4.51
"HP Solution Center & Imaging Support Tools" = HP Solution Center 13.0
"HPExtendedCapabilities" = HP Customer Participation Program 13.0
"HPOCR" = OCR Software by I.R.I.S. 13.0
"Microsoft .NET Framework 4 Client Profile" = Microsoft .NET Framework 4 Client Profile
"Redirection Port Monitor" = RedMon - Redirection Port Monitor
"Shop for HP Supplies" = Shop for HP Supplies
 
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{002D9D5E-29BA-3E6D-9BC4-3D7D6DBC735C}" = Microsoft Visual C++ 2008 ATL Update kb973924 - x86 9.0.30729.4148
"{06A1D88C-E102-4527-AF70-29FFD7AF215A}" = Scan
"{0AFC55D4-9CDF-B140-2E4F-0B818B9B8C0E}" = CCC Help Italian
"{0DE39AB6-D1BF-535C-F342-2F9986801936}" = CCC Help Japanese
"{0EF5BEA9-B9D3-46d7-8958-FB69A0BAEACC}" = Status
"{1111706F-666A-4037-7777-210328764D10}" = JavaFX 2.1.0
"{13F3917B56CD4C25848BDC69916971BB}" = DivX Converter
"{17283B95-21A8-4996-97DA-547A48DB266F}" = Easy Display Manager
"{175F0111-2968-4935-8F70-33108C6A4DE3}" = MarketResearch
"{18D10072035C4515918F7E37EAFAACFC}" = AutoUpdate
"{196467F1-C11F-4F76-858B-5812ADC83B94}" = MSXML 4.0 SP3 Parser
"{1EC71BFB-01A3-4239-B6AF-B1AE656B15C0}" = TrayApp
"{226EA3C9-0EAF-9546-46C4-F2FF55F7A6F1}" = CCC Help Dutch
"{22980C46-EBB6-C22C-016A-E0CFAC15118B}" = CCC Help Czech
"{250755EE-312C-3B38-1BAF-501A71A3851D}" = CCC Help Turkish
"{26A24AE4-039D-4CA4-87B4-2F83216020FF}" = Java(TM) 6 Update 29
"{29F563F4-8807-4496-8463-441EAA0E96AB}" = PC Connectivity Solution
"{2EEA7AA4-C203-4b90-A34F-19FB7EF1C81C}" = BufferChm
"{2FF8C687-DB7D-4adc-A5DC-57983EC25046}" = DeviceDiscovery
"{30D71FC9-E909-330C-57F9-C649C8837AA5}" = CCC Help Greek
"{3154CFC9-2E4F-B839-2944-2A27200B4D64}" = CCC Help Swedish
"{361D8754-326D-B7CC-8DC7-95966DD01ED4}" = Catalyst Control Center Graphics Previews Common
"{36E89A40-DD04-239B-A69E-532A27547089}" = CCC Help English
"{37EC24B2-2E75-0AEB-F8A1-12A0C7EB5EED}" = Catalyst Control Center InstallProxy
"{37FD8D84-7B88-6B5A-376A-34E2B7C28816}" = ccc-core-static
"{38DAE5F5-EC70-4aa5-801B-D11CA0A33B41}" = BPDSoftware
"{3FC7CBBC4C1E11DCA1A752EA55D89593}" = DivX Version Checker
"{43CDF946-F5D9-4292-B006-BA0D92013021}" = WebReg
"{440B915A-0C85-45DB-92AE-75AE14704A64}" = Fax
"{47FA2C44-D148-4DBC-AF60-B91934AA4842}" = Adobe AIR
"{4807FDA4-7AF3-66CA-C167-779A333D6FFC}" = Catalyst Control Center Localization All
"{4A03706F-666A-4037-7777-5F2748764D10}" = Java Auto Updater
"{4A70EF07-7F88-4434-BB61-D1DE8AE93DD4}" = SolutionCenter
"{57F60D52-630B-43C5-BD20-176F5CD4EED6}" = bpd_scan
"{5A154586-7AEB-4305-3B12-D73F0886B839}" = Catalyst Control Center HydraVision Full
"{5DF79887-598B-DE65-9755-4B7D8C3D87BE}" = CCC Help Chinese Standard
"{5EE7D259-D137-4438-9A5F-42F432EC0421}" = VC80CRTRedist - 8.0.50727.4053
"{61A0F92B-89A0-F7AD-4CA2-97991862EB10}" = CCC Help Hungarian
"{63FF21C9-A810-464F-B60A-3111747B1A6D}" = GPBaseService2
"{687E8557-CBF3-A7FF-33EC-00BE6266BFAA}" = CCC Help Russian
"{6A1ACC15-7632-45ba-A3AB-0250EBD4B7DD}" = 6500_E709a
"{6A44A28A-5D79-8100-7BDF-FB637E62715B}" = CCC Help Polish
"{6B2FFB21-AC88-45C3-9A7D-4BB3E744EC91}" = HPSSupply
"{6BBA26E9-AB03-4FE7-831A-3535584CA002}" = Toolbox
"{6CC080F1-2E00-41D5-BE47-A3BC784E9DFB}" = BPDSoftware_Ini
"{6D3245B1-8DB8-4A23-9CD2-2C90F40ABAF6}" = MSVC80_x86_v2
"{7059BDA7-E1DB-442C-B7A1-6144596720A4}" = HP Update
"{72FA4B28-3A99-1533-0E7C-94E6D20CD1A8}" = CCC Help Chinese Traditional
"{7B63B2922B174135AFC0E1377DD81EC2}" = DivX Codec
"{7CA26B08-BEFD-D4D2-52E1-24E730284594}" = Catalyst Control Center Graphics Light
"{7E265513-8CDA-4631-B696-F40D983F3B07}_is1" = CDBurnerXP
"{81A6F461-0DBA-4F12-B56F-0E977EC10576}_is1" = PDF24 Creator 3.2.0
"{844BD550-45F4-AD73-412F-CF40CFAFA5E9}" = Catalyst Control Center InstallProxy
"{86B3F2D6-AC2B-4E88-8AE1-F2F77F781B0C}" = EndNote X3
"{86CE85E6-DBAC-3FFD-B977-E4B79F83C909}" = Microsoft Visual C++ 2008 Redistributable - KB2467174 - x86 9.0.30729.5570
"{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}" = Microsoft Silverlight
"{8ADFC4160D694100B5B8A22DE9DCABD9}" = DivX Player
"{8E5CDC9B-CB0A-6E78-5BBE-C3D3F67B50E3}" = CCC Help Norwegian
"{91120407-6000-11D3-8CFE-0150048383C9}" = Microsoft Office Standard Edition 2003
"{9129B46A-51F0-431b-9838-DF7272F3204E}" = ProductContext
"{92A51949-EE4C-466D-AAF0-99E74A49A63F}" = DocMgr
"{96A8FABC-AADB-F299-0826-AF2246CE012F}" = CCC Help Danish
"{9A25302D-30C0-39D9-BD6F-21E6EC160475}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
"{9B362566-EC1B-4700-BB9C-EC661BDE2175}" = DocProc
"{9BE518E6-ECC6-35A9-88E4-87755C07200F}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
"{9D98630B-BD50-3C44-58D2-1571AEA889D3}" = CCC Help Portuguese
"{9E4EFA2A-4344-4C56-F927-7F7C53845BE2}" = CCC Help German
"{A37CA3F0-B0C6-8256-02BA-B06CEE1E5BEB}" = CCC Help Korean
"{A724AEC6-494E-6BD5-C12A-9F51AF6C1123}" = Skins
"{A96E97134CA649888820BCDE5E300BBD}" = H.264 Decoder
"{AAC389499AEF40428987B3D30CFC76C9}" = MKV Splitter
"{AC76BA86-7AD7-1031-7B44-A94000000001}" = Adobe Reader 9.4.0 - Deutsch
"{AC814121-74BA-A025-358E-B706354ED7F5}" = Catalyst Control Center Graphics Full New
"{AEF9DC35ADDF4825B049ACBFD1C6EB37}" = AAC Decoder
"{AF111648-99A1-453E-81DD-80DBBF6DAD0D}" = MSVC90_x86
"{B13A7C41581B411290FBC0395694E2A9}" = DivX Converter
"{B7050CBDB2504B34BC2A9CA0A692CC29}" = DivX Plus Web Player
"{BD7204BA-DD64-499E-9B55-6A282CDF4FA4}" = Destinations
"{C43326F5-F135-4551-8270-7F7ABA0462E1}" = HPProductAssistant
"{CC2B3907-3DEA-6E0E-E5A5-C6FCF876ECD5}" = CCC Help French
"{D103C4BA-F905-437A-8049-DB24763BBE36}" = Skype™ 4.2
"{D1F9CD55-A15A-846F-B2B1-D73F37C65B3E}" = CCC Help Spanish
"{D9D93D74-107D-4BD3-87D0-AABCF7C98BD5}" = Catalyst Control Center - Branding
"{DA703982C580418795BF4001AA9D7061}" = DivX Plus Media Foundation Components
"{DC635845-46D3-404B-BCB1-FC4A91091AFA}" = SmartWebPrinting
"{DE13432E-F0C1-4842-A5BA-CC997DA72A70}" = 6500_E709_eDocs
"{DEAC1EEB-48FD-36A6-B87B-58E365C92EFB}" = Catalyst Control Center Graphics Previews Vista
"{E9E871B9-4E1D-38D7-7ECF-4DFD3708CC67}" = Catalyst Control Center Core Implementation
"{EF7F8782-0E8D-A566-195F-8FF2360CA6C8}" = CCC Help Thai
"{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}" = Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219
"{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}" = Realtek High Definition Audio Driver
"{F15DDD54-CA1A-6764-2CF4-1C601725E96C}" = Catalyst Control Center Graphics Full Existing
"{F185B35D-38E5-4D88-B275-15C8C7FC4357}" = 6500_E709_Help
"{F3C2ECAA-1B4D-4B75-9105-106B0D03EF02}" = Lexware Info Service
"{F9A4662C-775D-32CF-4B6B-DEC701FDD516}" = CCC Help Finnish
"Adobe AIR" = Adobe AIR
"Adobe Flash Player ActiveX" = Adobe Flash Player 10 ActiveX
"Adobe Flash Player Plugin" = Adobe Flash Player 11 Plugin
"Avira AntiVir Desktop" = Avira Free Antivirus
"DivX Plus DirectShow Filters" = DivX Plus DirectShow Filters
"Free M4a to MP3 Converter_is1" = Free M4a to MP3 Converter 6.2
"ImageJ_is1" = ImageJ 1.43u
"Malwarebytes' Anti-Malware_is1" = Malwarebytes Anti-Malware Version 1.62.0.1300
"MediaMonkey_is1" = MediaMonkey 4.0
"Mobile Partner" = Mobile Partner
"Mozilla Firefox 14.0.1 (x86 en-US)" = Mozilla Firefox 14.0.1 (x86 en-US)
"Origin 6.0G" = Origin 6.0G
"ResearchSoft Direct Export Helper" = ResearchSoft Direct Export Helper
"Winamp" = Winamp
"WinGimp-2.0_is1" = GIMP 2.6.8
"Xvid_is1" = Xvid 1.2.2 final uninstall
"zebNet Windows Keyfinder 2012 R24.0.0" = zebNet Windows Keyfinder 2012 R2
 
========== HKEY_USERS Uninstall List ==========
 
[HKEY_USERS\S-1-5-21-948820188-2401921178-1341083259-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"Winamp Detect" = Winamp Erkennungs-Plug-in
 
========== Last 20 Event Log Errors ==========
 
[ Application Events ]
Error - 02.05.2011 14:56:42 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
Error - 05.05.2011 16:55:30 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
Error - 07.05.2011 07:17:52 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
Error - 09.05.2011 15:48:43 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
Error - 10.05.2011 15:34:19 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
Error - 10.05.2011 18:09:13 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
Error - 12.05.2011 17:10:19 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
Error - 14.05.2011 06:42:59 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
Error - 16.05.2011 17:29:47 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
Error - 17.05.2011 17:22:57 | Computer Name = Lotta | Source = EventSystem | ID = 4621
Description = 
 
[ System Events ]
Error - 13.08.2012 13:12:26 | Computer Name = Lotta | Source = Service Control Manager | ID = 7026
Description = Das Laden folgender Boot- oder Systemstarttreiber ist fehlgeschlagen:
   AFD  avipbb  avkmgr  CSC  DfsC  discache  NetBIOS  NetBT  nsiproxy  Psched  rdbss  SABI  spldr  tdx  vwififlt
Wanarpv6
WfpLwf
 
Error - 13.08.2012 13:24:58 | Computer Name = Lotta | Source = DCOM | ID = 10005
Description = 
 
Error - 13.08.2012 13:34:21 | Computer Name = Lotta | Source = EventLog | ID = 6008
Description = Das System wurde zuvor am ?13.?08.?2012 um 19:25:13 unerwartet heruntergefahren.
 
Error - 13.08.2012 20:38:46 | Computer Name = Lotta | Source = Service Control Manager | ID = 7011
Description = Das Zeitlimit (30000 ms) wurde beim Warten auf eine Transaktionsrückmeldung
 von Dienst Netman erreicht.
 
Error - 19.08.2012 13:41:28 | Computer Name = Lotta | Source = DCOM | ID = 10010
Description = 
 
Error - 19.08.2012 14:00:37 | Computer Name = Lotta | Source = volsnap | ID = 393252
Description = Die Schattenkopien von Volume "C:" wurden abgebrochen, weil der Schattenkopiespeicher
 nicht auf ein benutzerdefiniertes Limit vergrößert werden konnte.
 
Error - 19.08.2012 17:36:23 | Computer Name = Lotta | Source = DCOM | ID = 10010
Description = 
 
Error - 20.08.2012 15:48:18 | Computer Name = Lotta | Source = Service Control Manager | ID = 7011
Description = Das Zeitlimit (30000 ms) wurde beim Warten auf eine Transaktionsrückmeldung
 von Dienst ShellHWDetection erreicht.
 
Error - 20.08.2012 15:49:44 | Computer Name = Lotta | Source = DCOM | ID = 10010
Description = 
 
Error - 20.08.2012 16:35:13 | Computer Name = Lotta | Source = DCOM | ID = 10010
Description = 
 
 
< End of report >
         
--- --- ---

[/CODE]

...und das extra-logfile


Geändert von tacyttik (21.08.2012 um 21:02 Uhr) Grund: edit wegen unvermögen

Alt 22.08.2012, 00:03   #6
t'john
/// Helfer-Team
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Fixen mit OTL

Lade (falls noch nicht vorhanden) OTL von Oldtimer herunter und speichere es auf Deinem Desktop (nicht woanders hin).

  • Deaktiviere etwaige Virenscanner wie Avira, Kaspersky etc.
  • Starte die OTL.exe.
    Vista- und Windows 7-User starten mit Rechtsklick auf das Programm-Icon und wählen "Als Administrator ausführen".
  • Kopiere folgendes Skript in das Textfeld unterhalb von Benuterdefinierte Scans/Fixes:


Code:
ATTFilter
:OTL
IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} 
IE:64bit: - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC 
IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} 
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC 
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 
IE - HKU\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 
IE - HKU\S-1-5-21-948820188-2401921178-1341083259-1000\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} 
IE - HKU\S-1-5-21-948820188-2401921178-1341083259-1000\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC 
IE - HKU\S-1-5-21-948820188-2401921178-1341083259-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 
FF - user.js - File not found 
FF:64bit: - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\system32\Macromed\Flash\NPSWF64_11_4_400_231.dll File not found 
CHR - homepage: http://home.sweetim.com/?barid={FECE890E-EA05-11E1-8D9D-0013776043FF} 
O4 - HKU\S-1-5-21-948820188-2401921178-1341083259-1000..\Run: [niuvo.exe] C:\Users\log\AppData\Roaming\Ytogw\niuvo.exe File not found 
O4 - HKU\S-1-5-19..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found 
O4 - HKU\S-1-5-20..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found 
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1 
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1 
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3 
O8:64bit: - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~2\MICROS~1\OFFICE11\EXCEL.EXE/3000 File not found 
O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://C:\PROGRA~2\MICROS~1\OFFICE11\EXCEL.EXE/3000 File not found 
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab (Java Plug-in 10.4.1) 
O16 - DPF: {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab (Java Plug-in 1.6.0_29) 
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_29-windows-i586.cab (Java Plug-in 10.4.1) 
O20:64bit: - HKLM Winlogon: VMApplet - (/pagefile) - File not found 
O20 - HKLM Winlogon: VMApplet - (/pagefile) - File not found 
O21:64bit: - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. 
O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. 
O32 - HKLM CDRom: AutoRun - 1 
O33 - MountPoints2\{0b26efcd-54ce-11e0-acd0-001e101fe70e}\Shell - "" = AutoRun 
O33 - MountPoints2\{0b26efcd-54ce-11e0-acd0-001e101fe70e}\Shell\AutoRun\command - "" = H:\AutoRun.exe 
O33 - MountPoints2\{175fb637-b378-11df-9c63-001e101f82a7}\Shell - "" = AutoRun 
O33 - MountPoints2\{175fb637-b378-11df-9c63-001e101f82a7}\Shell\AutoRun\command - "" = J:\AutoRun.exe 
O33 - MountPoints2\{397ed14d-53e4-11e0-a372-001e101fa1f5}\Shell - "" = AutoRun 
O33 - MountPoints2\{397ed14d-53e4-11e0-a372-001e101fa1f5}\Shell\AutoRun\command - "" = K:\AutoRun.exe 
O33 - MountPoints2\{d04321cd-a3c7-11df-9297-0013776043ff}\Shell - "" = AutoRun 
O33 - MountPoints2\{d04321cd-a3c7-11df-9297-0013776043ff}\Shell\AutoRun\command - "" = F:\AutoRun.exe 
O33 - MountPoints2\{d04321ee-a3c7-11df-9297-0013776043ff}\Shell - "" = AutoRun 
O33 - MountPoints2\{d04321ee-a3c7-11df-9297-0013776043ff}\Shell\AutoRun\command - "" = F:\AutoRun.exe 
O33 - MountPoints2\{d0432210-a3c7-11df-9297-0013776043ff}\Shell - "" = AutoRun 
O33 - MountPoints2\{d0432210-a3c7-11df-9297-0013776043ff}\Shell\AutoRun\command - "" = F:\AutoRun.exe 
O33 - MountPoints2\{db6a7325-a3ca-11df-8b89-0013776043ff}\Shell - "" = AutoRun 
O33 - MountPoints2\{db6a7325-a3ca-11df-8b89-0013776043ff}\Shell\AutoRun\command - "" = F:\AutoRun.exe 
O33 - MountPoints2\F\Shell - "" = AutoRun 
O33 - MountPoints2\F\Shell\AutoRun\command - "" = F:\AutoRun.exe 

[2012.08.19 15:57:25 | 002,774,400 | ---- | M] () -- C:\Users\log\Desktop\de_windows_keyfinder_2012_x86.exe 
[2012.08.13 19:10:53 | 004,503,728 | ---- | M] () -- C:\ProgramData\ism_0_llatsni.pad 
[2012.08.13 19:05:50 | 000,003,704 | ---- | M] () -- C:\ProgramData\erolpxei.pad 
[2012.08.13 15:26:42 | 004,503,728 | ---- | M] () -- C:\ProgramData\23lldnur.pad 


[2012.08.19 15:58:28 | 000,000,000 | ---D | C] -- C:\Program Files (x86)\zebNet Windows Keyfinder 2012 R2 
[2012.08.19 15:58:29 | 000,002,194 | ---- | C] () -- C:\Users\log\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\zebNet Windows Keyfinder 2012 R2.lnk 
:Files

ipconfig /flushdns /c
:Commands
[purity]
[emptytemp]
         
  • Schließe alle Programme.
  • Klicke auf den Fix Button.
  • Wenn OTL einen Neustart verlangt, bitte zulassen.
  • Kopiere den Inhalt des Logfiles hier in Code-Tags in Deinen Thread.
    Nachträglich kannst Du das Logfile hier einsehen => C:\_OTL\MovedFiles\<datum_nummer.log>

Hinweis für Mitleser: Obiges OTL-Script ist ausschließlich für diesen User in dieser Situtation erstellt worden.
Auf keinen Fall auf anderen Rechnern anwenden, das kann andere Systeme nachhaltig schädigen!
__________________
--> GVU-Trojaner weg dank malwarebytes?

Alt 22.08.2012, 16:47   #7
tacyttik
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Hallo t´john, hier das Ergebnis. Ist er jetzt wieder sauber, der rechner? Vielen Dank! Gruß tacyttik

Code:
ATTFilter
All processes killed
========== OTL ==========
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found.
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKU\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKEY_USERS\S-1-5-21-948820188-2401921178-1341083259-1000\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
Registry key HKEY_USERS\S-1-5-21-948820188-2401921178-1341083259-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found.
HKU\S-1-5-21-948820188-2401921178-1341083259-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
64bit-Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@adobe.com/FlashPlayer\ deleted successfully.
Use Chrome's Settings page to change the HomePage.
Registry value HKEY_USERS\S-1-5-21-948820188-2401921178-1341083259-1000\Software\Microsoft\Windows\CurrentVersion\Run\\niuvo.exe deleted successfully.
Registry value HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\RunOnce\\mctadmin deleted successfully.
Registry value HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\RunOnce\\mctadmin deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoActiveDesktop deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoActiveDesktopChanges deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorUser deleted successfully.
64bit-Registry key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Nach Microsoft &Excel exportieren\ deleted successfully.
Registry key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Nach Microsoft &Excel exportieren\ not found.
Starting removal of ActiveX control {8AD9C840-044E-11D1-B3E9-00805F499D93}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_USERS\.DEFAULT\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found.
Starting removal of ActiveX control {CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_USERS\.DEFAULT\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0029-ABCDEFFEDCBA}\ not found.
Starting removal of ActiveX control {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_USERS\.DEFAULT\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found.
64bit-Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\VMApplet:/pagefile deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\VMApplet:/pagefile deleted successfully.
64bit-Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully!
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0b26efcd-54ce-11e0-acd0-001e101fe70e}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0b26efcd-54ce-11e0-acd0-001e101fe70e}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{0b26efcd-54ce-11e0-acd0-001e101fe70e}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0b26efcd-54ce-11e0-acd0-001e101fe70e}\ not found.
File H:\AutoRun.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{175fb637-b378-11df-9c63-001e101f82a7}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{175fb637-b378-11df-9c63-001e101f82a7}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{175fb637-b378-11df-9c63-001e101f82a7}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{175fb637-b378-11df-9c63-001e101f82a7}\ not found.
File J:\AutoRun.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{397ed14d-53e4-11e0-a372-001e101fa1f5}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{397ed14d-53e4-11e0-a372-001e101fa1f5}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{397ed14d-53e4-11e0-a372-001e101fa1f5}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{397ed14d-53e4-11e0-a372-001e101fa1f5}\ not found.
File K:\AutoRun.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d04321cd-a3c7-11df-9297-0013776043ff}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d04321cd-a3c7-11df-9297-0013776043ff}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d04321cd-a3c7-11df-9297-0013776043ff}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d04321cd-a3c7-11df-9297-0013776043ff}\ not found.
File F:\AutoRun.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d04321ee-a3c7-11df-9297-0013776043ff}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d04321ee-a3c7-11df-9297-0013776043ff}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d04321ee-a3c7-11df-9297-0013776043ff}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d04321ee-a3c7-11df-9297-0013776043ff}\ not found.
File F:\AutoRun.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0432210-a3c7-11df-9297-0013776043ff}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d0432210-a3c7-11df-9297-0013776043ff}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0432210-a3c7-11df-9297-0013776043ff}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d0432210-a3c7-11df-9297-0013776043ff}\ not found.
File F:\AutoRun.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{db6a7325-a3ca-11df-8b89-0013776043ff}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{db6a7325-a3ca-11df-8b89-0013776043ff}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{db6a7325-a3ca-11df-8b89-0013776043ff}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{db6a7325-a3ca-11df-8b89-0013776043ff}\ not found.
File F:\AutoRun.exe not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\F\ deleted successfully.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\F\ not found.
File F:\AutoRun.exe not found.
C:\Users\log\Desktop\de_windows_keyfinder_2012_x86.exe moved successfully.
C:\ProgramData\ism_0_llatsni.pad moved successfully.
C:\ProgramData\erolpxei.pad moved successfully.
C:\ProgramData\23lldnur.pad moved successfully.
C:\Program Files (x86)\zebNet Windows Keyfinder 2012 R2\Uninstall folder moved successfully.
C:\Program Files (x86)\zebNet Windows Keyfinder 2012 R2 folder moved successfully.
C:\Users\log\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\zebNet Windows Keyfinder 2012 R2.lnk moved successfully.
========== FILES ==========
< ipconfig /flushdns /c >
Windows-IP-Konfiguration
Der DNS-Aufl”sungscache wurde geleert.
C:\Users\log\Desktop\cmd.bat deleted successfully.
C:\Users\log\Desktop\cmd.txt deleted successfully.
========== COMMANDS ==========
 
[EMPTYTEMP]
 
User: All Users
 
User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 56466 bytes
 
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 0 bytes
 
User: log
->Temp folder emptied: 1974538306 bytes
->Temporary Internet Files folder emptied: 53311205 bytes
->Java cache emptied: 4290001 bytes
->FireFox cache emptied: 93430492 bytes
->Google Chrome cache emptied: 10199231 bytes
->Flash cache emptied: 3071833 bytes
 
User: Public
 
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32 (64bit) .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 110147342 bytes
%systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 46356772 bytes
RecycleBin emptied: 3236581946 bytes
 
Total Files Cleaned = 5.276,00 mb
 
 
OTL by OldTimer - Version 3.2.55.0 log created on 08222012_173436

Files\Folders moved on Reboot...
C:\Users\log\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.

PendingFileRenameOperations files...
File C:\Users\log\AppData\Local\Temp\FXSAPIDebugLogFile.txt not found!

Registry entries deleted on Reboot...
         

Alt 22.08.2012, 17:32   #8
t'john
/// Helfer-Team
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Sehr gut!

Wie laeuft der Rechner?

1. Schritt
Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten.
Denk daran, dass Malwarebytes vor jedem Scan manuell aktualisiert werden muss!

Malwarebytes Anti-Malware
- Anwendbar auf Windows 2000, XP, Vista und 7.
- Installiere das Programm in den vorgegebenen Pfad.
- Aktualisiere die Datenbank!
- Aktiviere "Komplett Scan durchführen" => Scan.
- Wähle alle verfügbaren Laufwerke (ausser CD/DVD) aus und starte den Scan.
- Funde bitte löschen lassen oder in Quarantäne.
- Wenn der Scan beendet ist, klicke auf "Zeige Resultate".
danach:

2. Schritt

Downloade Dir bitte AdwCleaner auf deinen Desktop.

  • Starte die adwcleaner.exe mit einem Doppelklick.
  • Klicke auf Search.
  • Nach Ende des Suchlaufs öffnet sich eine Textdatei.
  • Poste mir den Inhalt mit deiner nächsten Antwort.
  • Die Logdatei findest du auch unter C:\AdwCleaner[R1].txt.
__________________
Mfg, t'john
Das TB unterstützen

Alt 22.08.2012, 20:11   #9
tacyttik
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Hi, hier das logfile von Malwarebytes und vom adwcleaner

Code:
ATTFilter
 Malwarebytes Anti-Malware  (Test) 1.62.0.1300
www.malwarebytes.org

Datenbank Version: v2012.08.22.05

Windows 7 x64 NTFS
Internet Explorer 9.0.8112.16421
log :: LOTTA [Administrator]

Schutz: Aktiviert

22.08.2012 18:38:58
mbam-log-2012-08-22 (18-38-58).txt

Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|)
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 344463
Laufzeit: 1 Stunde(n), 32 Minute(n), 46 Sekunde(n)

Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateien: 0
(Keine bösartigen Objekte gefunden)

(Ende)
         

Code:
ATTFilter
# AdwCleaner v1.801 - Logfile created 08/22/2012 at 21:07:24
# Updated 14/08/2012 by Xplode
# Operating system : Windows 7 Professional  (64 bits)
# User : log - LOTTA
# Boot Mode : Normal
# Running from : C:\Users\log\Downloads\adwcleaner.exe
# Option [Search]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Found : HKCU\Software\SweetIm
Key Found : HKLM\SOFTWARE\Software
Key Found : HKLM\SOFTWARE\SweetIM
[x64] Key Found : HKCU\Software\SweetIm

***** [Registre - GUID] *****


***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16421

[OK] Registry is clean.

-\\ Mozilla Firefox v14.0.1 (en-US)

Profile name : default 
File : C:\Users\log\AppData\Roaming\Mozilla\Firefox\Profiles\vbe2ij88.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v [Unable to get version]

File : C:\Users\log\AppData\Local\Google\Chrome\User Data\Default\Preferences

Found :    "homepage": "hxxp://home.sweetim.com/?barid={FECE890E-EA05-11E1-8D9D-0013776043FF}",
Found :          "name": "Winamp Application Detector",
Found :          "name": "Winamp Application Detector"

*************************

AdwCleaner[R1].txt - [1197 octets] - [22/08/2012 21:07:24]

########## EOF - C:\AdwCleaner[R1].txt - [1325 octets] ##########
         
Gruss!

Alt 22.08.2012, 22:09   #10
t'john
/// Helfer-Team
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Sehr gut!


  • Schließe alle offenen Programme und Browser.
  • Starte die adwcleaner.exe mit einem Doppelklick.
  • Klicke auf Delete.
  • Bestätige jeweils mit Ok.
  • Dein Rechner wird neu gestartet. Nach dem Neustart öffnet sich eine Textdatei.
  • Poste mir den Inhalt mit deiner nächsten Antwort.
  • Die Logdatei findest du auch unter C:\AdwCleaner[S1].txt.




danach:


Malware-Scan mit Emsisoft Anti-Malware

Lade die Gratisversion von => Emsisoft Anti-Malware herunter und installiere das Programm.
Lade über Jetzt Updaten die aktuellen Signaturen herunter.
Wähle den Freeware-Modus aus.

Wähle Detail Scan und starte über den Button Scan die Überprüfung des Computers.
Am Ende des Scans nichts loeschen lassen!. Mit Klick auf Bericht speichern das Logfile auf dem Desktop speichern und hier in den Thread posten.

Anleitung: http://www.trojaner-board.de/103809-...i-malware.html
__________________
Mfg, t'john
Das TB unterstützen

Alt 22.08.2012, 22:36   #11
tacyttik
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



hey, beim emsisoft kriege ich eine fehlermeldung. siehe Anhang. Ich brauche bei win 7 das servicepack 1 oder so. was kann ich tun?

hier aber der code von adwcleaner:
Code:
ATTFilter
# AdwCleaner v1.801 - Logfile created 08/22/2012 at 23:16:34
# Updated 14/08/2012 by Xplode
# Operating system : Windows 7 Professional  (64 bits)
# User : log - LOTTA
# Boot Mode : Normal
# Running from : C:\Users\log\Downloads\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Deleted : HKCU\Software\SweetIm
Key Deleted : HKLM\SOFTWARE\Software
Key Deleted : HKLM\SOFTWARE\SweetIM

***** [Registre - GUID] *****


***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16421

[OK] Registry is clean.

-\\ Mozilla Firefox v14.0.1 (en-US)

Profile name : default 
File : C:\Users\log\AppData\Roaming\Mozilla\Firefox\Profiles\vbe2ij88.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v [Unable to get version]

File : C:\Users\log\AppData\Local\Google\Chrome\User Data\Default\Preferences

Deleted :    "homepage": "hxxp://home.sweetim.com/?barid={FECE890E-EA05-11E1-8D9D-0013776043FF}",
Deleted :          "name": "Winamp Application Detector",
Deleted :          "name": "Winamp Application Detector"

*************************

AdwCleaner[R1].txt - [1324 octets] - [22/08/2012 21:07:24]
AdwCleaner[S1].txt - [1226 octets] - [22/08/2012 23:16:34]

########## EOF - C:\AdwCleaner[S1].txt - [1354 octets] ##########
         
Miniaturansicht angehängter Grafiken
GVU-Trojaner weg dank malwarebytes?-emsisoft_fehler.jpg  

Alt 22.08.2012, 23:22   #12
t'john
/// Helfer-Team
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Alles Windows Updates einspielen, inkl. Service Pack!
__________________
Mfg, t'john
Das TB unterstützen

Alt 24.08.2012, 18:01   #13
tacyttik
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



HI, sorry, hatnen Tag länger gedauert. Sieht gut aus, oder? Gruß


Code:
ATTFilter
Emsisoft Anti-Malware - Version 6.6
Letztes Update: 23.08.2012 20:02:55

Scan Einstellungen:

Scan Methode: Detail Scan
Objekte: Rootkits, Speicher, Traces, C:\, D:\
Archiv Scan: An
ADS Scan: An

Scan Beginn:	23.08.2012 20:03:30


Gescannt	602583
Gefunden	0

Scan Ende:	23.08.2012 23:15:25
Scan Zeit:	3:11:55
         

Alt 24.08.2012, 18:47   #14
t'john
/// Helfer-Team
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Sehr gut!


Deinstalliere:
Emsisoft Anti-Malware


ESET Online Scanner

Vorbereitung

  • Schließe evtl. vorhandene externe Festplatten und/oder sonstigen Wechselmedien (z. B. evtl. vorhandene USB-Sticks) an den Rechner an.
  • Bitte während des Online-Scans Anti-Virus-Programm und Firewall deaktivieren.
  • Vista/Win7-User: Bitte den Browser unbedingt als Administrator starten.
Los geht's

  • Lade und starte Eset Smartinstaller
  • Haken setzen bei YES, I accept the Terms of Use.
  • Klick auf Start.
  • Haken setzen bei Remove found threads und Scan archives.
  • Klick auf Start.
  • Signaturen werden heruntergeladen, der Scan beginnt automatisch.
  • Finish drücken.
  • Browser schließen.
  • Explorer öffnen.
  • C:\Programme\Eset\EsetOnlineScanner\log.txt (manchmal auch C:\Programme\Eset\log.txt) suchen und mit Deinem Editor öffnen.
  • Logfile hier posten.
  • Deinstallation: Systemsteuerung => Software => Eset Online Scanner V3 entfernen.
  • Manuell folgenden Ordner löschen und Papierkorb leeren => C:\Programme\Eset
__________________
Mfg, t'john
Das TB unterstützen

Alt 27.08.2012, 05:37   #15
tacyttik
 
GVU-Trojaner weg dank malwarebytes? - Standard

GVU-Trojaner weg dank malwarebytes?



Code:
ATTFilter
ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6583
# api_version=3.0.2
# EOSSerial=6c9c116a778f314993a7a3b784f8455b
# end=stopped
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2012-08-26 11:13:22
# local_time=2012-08-26 01:13:22 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode=768 16777215 100 0 79041603 79041603 0 0
# compatibility_mode=1792 16777215 100 0 7845012 7845012 0 0
# compatibility_mode=5893 16776574 100 94 234757 97607979 0 0
# compatibility_mode=8192 67108863 100 0 200 200 0 0
# scanned=19816
# found=0
# cleaned=0
# scan_time=1473
ESETSmartInstaller@High as downloader log:
all ok
esets_scanner_update returned -1 esets_gle=53251
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6583
# api_version=3.0.2
# EOSSerial=6c9c116a778f314993a7a3b784f8455b
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2012-08-26 12:53:22
# local_time=2012-08-26 02:53:22 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1033
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode=768 16777215 100 0 79043143 79043143 0 0
# compatibility_mode=1792 16777215 100 0 7846552 7846552 0 0
# compatibility_mode=5893 16776574 100 94 236297 97609519 0 0
# compatibility_mode=8192 67108863 100 0 1740 1740 0 0
# scanned=164079
# found=0
# cleaned=0
# scan_time=5933
         
hier das eset-logfile. danke

Antwort

Themen zu GVU-Trojaner weg dank malwarebytes?
anhang, blöde, code, compu, file, forum, frage, gestern, gvu-trojaner, heute, hilfe!, malwarebytes, runtergeladen, scan, schritt, troja, warum




Ähnliche Themen: GVU-Trojaner weg dank malwarebytes?


  1. Windows 10 Trojaner mit Malwarebytes?
    Log-Analyse und Auswertung - 22.09.2015 (5)
  2. Malwarebytes Suchergebnis, Trojaner?
    Smartphone, Tablet & Handy Security - 09.09.2014 (1)
  3. Virus blockt Malwarebytes und Malwarebytes Chameleon
    Log-Analyse und Auswertung - 23.08.2014 (19)
  4. Vielen Dank an Cosinus, vielen Dank an Trojaner-Board
    Lob, Kritik und Wünsche - 29.11.2013 (0)
  5. Ich bin wieder frei von Malware dank M-K-T-B. Vielen Dank!
    Lob, Kritik und Wünsche - 19.10.2013 (1)
  6. MalwareBytes findet Trojaner(PUP)
    Log-Analyse und Auswertung - 04.10.2013 (5)
  7. Erfolgreich vom Trojaner befreit - Vielen Dank Cosinus & Trojaner Board
    Lob, Kritik und Wünsche - 14.09.2013 (1)
  8. Erfolgreich vom Trojaner befreit - Vielen Dank Cosinus & Trojaner Board
    Lob, Kritik und Wünsche - 10.09.2013 (0)
  9. GVU-Trojaner in Malwarebytes-Quarantäne - PC nun Trojaner-frei?
    Plagegeister aller Art und deren Bekämpfung - 25.11.2012 (9)
  10. GVU-Trojaner (Malwarebytes und OTL Log inside)
    Log-Analyse und Auswertung - 13.11.2012 (2)
  11. GUV Trojaner mit Malwarebytes deaktiviert. Was nun?
    Plagegeister aller Art und deren Bekämpfung - 07.11.2012 (14)
  12. GVU Trojaner - OTL & Malwarebytes gescannt!
    Plagegeister aller Art und deren Bekämpfung - 03.11.2012 (1)
  13. Virus dank Malwarebytes weg - alle Dateien noch da, aber kein Zugriff möglich
    Plagegeister aller Art und deren Bekämpfung - 02.11.2011 (10)
  14. BKA-Trojaner und Meldungen von Malwarebytes
    Plagegeister aller Art und deren Bekämpfung - 15.09.2011 (3)
  15. Log von Malwarebytes, Trojaner
    Plagegeister aller Art und deren Bekämpfung - 17.09.2010 (17)
  16. Malwarebytes findet Trojaner
    Log-Analyse und Auswertung - 13.09.2010 (25)
  17. Malwarebytes meldet Trojaner?
    Plagegeister aller Art und deren Bekämpfung - 10.01.2010 (3)

Zum Thema GVU-Trojaner weg dank malwarebytes? - Hallo Trojaner-Jäger, toll, dass es dieses Forum gibt! Ich habe einen GVU-Trojaner (gehabt), habe dann Malwarebytes runtergeladen und gestern einen scan gemacht und heute (siehe Anhang). Dann habe ich noch - GVU-Trojaner weg dank malwarebytes?...
Archiv
Du betrachtest: GVU-Trojaner weg dank malwarebytes? auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.