Trojaner-Board

Trojaner-Board (https://www.trojaner-board.de/)
-   Log-Analyse und Auswertung (https://www.trojaner-board.de/log-analyse-auswertung/)
-   -   Ordner auf externer Festplatte werden nur noch als Verknüpfungen angezeigt, die sich nicht öffnen (https://www.trojaner-board.de/103821-ordner-externer-festplatte-nur-noch-verknuepfungen-angezeigt-oeffnen.html)

DieTrojanPlz 12.10.2011 10:54

So, hier sind die nächsten Scan-logs:

GMER:
Code:

GMER 1.0.15.15641 - hxxp://www.gmer.net
Rootkit scan 2011-10-12 00:50:23
Windows 6.1.7601 Service Pack 1 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 WDC_WD50 rev.01.0
Running: 85z17txq.exe; Driver: C:\Users\Medion\AppData\Local\Temp\ugriypod.sys


---- Kernel code sections - GMER 1.0.15 ----

.text          ntkrnlpa.exe!ZwSaveKey + 13D1                                                                                                        82C81349 1 Byte  [06]
.text          ntkrnlpa.exe!KiDispatchInterrupt + 5A2                                                                                              82CBAD52 19 Bytes  [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
.text          peauth.sys                                                                                                                          9B94FC9D 28 Bytes  [8F, E9, FB, FF, BE, 69, 3C, ...]
.text          peauth.sys                                                                                                                          9B94FCC1 28 Bytes  [8F, E9, FB, FF, BE, 69, 3C, ...]

---- User IAT/EAT - GMER 1.0.15 ----

IAT            C:\Program Files\BullGuard Ltd\BullGuard\BullGuardUpdate.exe[1800] @ C:\Windows\system32\GDI32.dll [KERNEL32.dll!GetProcAddress]    [75A6FFF6] C:\Windows\system32\apphelp.dll (Clientbibliothek für Anwendungskompatibilität/Microsoft Corporation)
IAT            C:\Program Files\BullGuard Ltd\BullGuard\BullGuardUpdate.exe[1800] @ C:\Windows\system32\USER32.dll [KERNEL32.dll!GetProcAddress]    [75A6FFF6] C:\Windows\system32\apphelp.dll (Clientbibliothek für Anwendungskompatibilität/Microsoft Corporation)
IAT            C:\Program Files\BullGuard Ltd\BullGuard\BullGuardUpdate.exe[1800] @ C:\Windows\system32\ADVAPI32.dll [KERNEL32.dll!GetProcAddress]  [75A6FFF6] C:\Windows\system32\apphelp.dll (Clientbibliothek für Anwendungskompatibilität/Microsoft Corporation)
IAT            C:\Program Files\BullGuard Ltd\BullGuard\BullGuardUpdate.exe[1800] @ C:\Windows\system32\WININET.dll [KERNEL32.dll!GetProcAddress]  [75A6FFF6] C:\Windows\system32\apphelp.dll (Clientbibliothek für Anwendungskompatibilität/Microsoft Corporation)
IAT            C:\Program Files\BullGuard Ltd\BullGuard\BullGuardUpdate.exe[1800] @ C:\Windows\system32\SHLWAPI.dll [KERNEL32.dll!GetProcAddress]  [75A6FFF6] C:\Windows\system32\apphelp.dll (Clientbibliothek für Anwendungskompatibilität/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice  \FileSystem\Ntfs \Ntfs                                                                                                              BdFileSpy.sys
AttachedDevice  \Driver\kbdclass \Device\KeyboardClass0                                                                                              Wdf01000.sys (Kernelmodustreiber-Frameworklaufzeit/Microsoft Corporation)

Device          \Driver\ACPI_HAL \Device\00000046                                                                                                    halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)

AttachedDevice  \Driver\volmgr \Device\HarddiskVolume1                                                                                              fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume1                                                                                              rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume2                                                                                              fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume2                                                                                              rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume3                                                                                              fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume3                                                                                              rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume4                                                                                              fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume4                                                                                              rdyboost.sys (ReadyBoost Driver/Microsoft Corporation)

---- EOF - GMER 1.0.15 ----

Osam:
Code:

Report of OSAM: Autorun Manager v5.0.11926.0
hxxp://www.online-solutions.ru/en/
Saved at 11:32:45 on 12.10.2011

OS: Windows 7 Home Premium Edition Service Pack 1 (Build 7601), 32-bit
Default Browser: Mozilla Corporation Firefox 7.0.1

Scanner Settings
[x] Rootkits detection (hidden registry)
[x] Rootkits detection (hidden files)
[x] Retrieve files information
[x] Check Microsoft signatures

Filters
[ ] Trusted entries
[ ] Empty entries
[x] Hidden registry entries (rootkit activity)
[x] Exclusively opened files
[x] Not found files
[x] Files without detailed information
[x] Existing files
[ ] Non-startable services
[ ] Non-startable drivers
[x] Active entries
[x] Disabled entries


[Common]
-----( %SystemRoot%\Tasks )-----
"GoogleUpdateTaskMachineCore.job" - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"GoogleUpdateTaskMachineUA.job" - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"GoogleUpdateTaskUserS-1-5-21-3571920699-3839743047-2692850820-1000Core.job" - "Google Inc." - C:\Users\Medion\AppData\Local\Google\Update\GoogleUpdate.exe
"GoogleUpdateTaskUserS-1-5-21-3571920699-3839743047-2692850820-1000UA.job" - "Google Inc." - C:\Users\Medion\AppData\Local\Google\Update\GoogleUpdate.exe

[Control Panel Objects]
-----( %SystemRoot%\system32 )-----
"FlashPlayerCPLApp.cpl" - "Adobe Systems Incorporated" - C:\Windows\system32\FlashPlayerCPLApp.cpl

[Drivers]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
"BullGuard File Monitor Driver" (BdFileSpy) - "BullGuard Ltd." - C:\Windows\system32\drivers\BdFileSpy.sys
"catchme" (catchme) - ? - C:\Users\Medion\AppData\Local\Temp\catchme.sys  (File not found)
"Dynamically loaded UxdDrv" (uxddrv) - ? - E:\DIAGNOSE\WSTGER32\2PART\uxddrv86.sys  (File not found)
"MBAMProtector" (MBAMProtector) - "Malwarebytes Corporation" - C:\Windows\system32\drivers\mbam.sys
"Realtek IR Driver" (RtsUIR) - ? - C:\Windows\System32\DRIVERS\Rts516xIR.sys  (File not found)
"Realtek Smartcard Reader Driver" (USBCCID) - ? - C:\Windows\System32\DRIVERS\RtsUCcid.sys  (File not found)

[Explorer]
-----( HKLM\Software\Classes\Folder\shellex\ColumnHandlers )-----
{F9DB5320-233E-11D1-9F84-707F02C10627} "PDF Shell Extension" - "Adobe Systems, Inc." - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll
-----( HKLM\Software\Classes\Protocols\Filter )-----
{807563E5-5146-11D5-A672-00B0D022E945} "Microsoft Office InfoPath XML Mime Filter" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\MSOXMLMF.DLL
-----( HKLM\Software\Classes\Protocols\Handler )-----
{314111c7-a502-11d2-bbca-00c04f8ec294} "HxProtocol Class" - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll
{828030A1-22C1-4009-854F-8E305202313F} "livecall" - "Microsoft Corporation" - C:\PROGRA~1\WIC4A1~1\MESSEN~1\MSGRAP~1.DLL
{0A9007C0-4076-11D3-8789-0000F8105754} "Microsoft Infotech Storage Protocol for IE 4.0" - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Information Retrieval\msitss.dll
{828030A1-22C1-4009-854F-8E305202313F} "msnim" - "Microsoft Corporation" - C:\PROGRA~1\WIC4A1~1\MESSEN~1\MSGRAP~1.DLL
{03C514A3-1EFB-4856-9F99-10D7BE1653C0} "Windows Live Mail HTML Asynchronous Pluggable Protocol Handler" - "Microsoft Corporation" - C:\Program Files\Windows Live\Mail\mailcomm.dll
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved )-----
{653DCCC2-13DB-45B2-A389-427885776CFE} "Activities Property Page" - "Microsoft Corporation" - c:\Program Files\Microsoft IntelliPoint\ipcplact.dll
{9458E603-FF43-4134-9036-04B4C71791E3} "BackupCopyHook Class" - "BullGuard Ltd." - C:\Program Files\BullGuard Ltd\BullGuard\BackupShellHook.dll
{1F25C6E4-E60D-421A-863F-D0C76F6AB211} "BullGuard Online-Laufwerk" - "BullGuard Ltd." - C:\Program Files\BullGuard Ltd\BullGuard\BackupShellNamespace.dll
{124597D8-850A-41AE-849C-017A4FA99CA2} "Buttons Property Page" - "Microsoft Corporation" - c:\Program Files\Microsoft IntelliPoint\ipcplbtn.dll
{DE902992-61FC-4A01-8091-53E1895C9775} "CDR Icon Handler" - "Corel Corporation" - c:\Program Files\Common Files\Corel\Shared\Shell Extension\ShellXP.dll
{7AD101F2-0B93-4D66-A1CA-DF73F3C4377B} "CDR preview provider" - "Corel Corporation" - c:\Program Files\Common Files\Corel\Shared\Shell Extension\ShellVista.dll
{7FA63AC0-F5BC-4F3B-A9CF-94328D812B62} "CDR Property Handler" - "Corel Corporation" - c:\Program Files\Common Files\Corel\Shared\Shell Extension\ShellVista.dll
{1462EBAA-96E7-4D93-9A66-0E4068DE4FCF} "CDR Thumbnail provider" - "Corel Corporation" - c:\Program Files\Common Files\Corel\Shared\Shell Extension\ShellXP.dll
{0563DB41-F538-4B37-A92D-4659049B7766} "CLSID_WLMCMimeFilter" - "Microsoft Corporation" - C:\Program Files\Windows Live\Mail\mailcomm.dll
{DE902994-61FC-4A01-8091-53E1895C9775} "CMX Icon Handler" - "Corel Corporation" - c:\Program Files\Common Files\Corel\Shared\Shell Extension\ShellXP.dll
{1462EBAC-96E7-4D93-9A66-0E4068DE4FCF} "CMX Thumbnail provider" - "Corel Corporation" - c:\Program Files\Common Files\Corel\Shared\Shell Extension\ShellXP.dll
{DE902993-61FC-4A01-8091-53E1895C9775} "CPT Icon Handler" - "Corel Corporation" - c:\Program Files\Common Files\Corel\Shared\Shell Extension\ShellXP.dll
{7FA63AC1-F5BC-4F3B-A9CF-94328D812B62} "CPT Property Handler" - "Corel Corporation" - c:\Program Files\Common Files\Corel\Shared\Shell Extension\ShellVista.dll
{1462EBAB-96E7-4D93-9A66-0E4068DE4FCF} "CPT Thumbnail provider" - "Corel Corporation" - c:\Program Files\Common Files\Corel\Shared\Shell Extension\ShellXP.dll
{3BEABCC1-BF31-42df-88D9-A2955D6B8528} "IntelliPoint Sensitivity Property Page" - "Microsoft Corporation" - c:\Program Files\Microsoft IntelliPoint\ipcplsens.dll
{42042206-2D85-11D3-8CFF-005004838597} "Microsoft Office HTML Icon Handler" - "Microsoft Corporation" - C:\Program Files\Microsoft Office\Office12\msohevi.dll
{993BE281-6695-4BA5-8A2A-7AACBFAAB69E} "Microsoft Office Metadata Handler" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\msoshext.dll
{5858A72C-C2B4-4dd7-B2BF-B76DB1BD9F6C} "Microsoft Office OneNote Namespace Extension for Windows Desktop Search" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~3\Office12\ONFILTER.DLL
{C41662BB-1FA0-4CE0-8DC5-9B7F8279FF97} "Microsoft Office Thumbnail Handler" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\msoshext.dll
{C533AB49-9805-4972-8326-A084696B00F0} "Touch Mouse Property Page" - "Microsoft Corporation" - c:\Program Files\Microsoft IntelliPoint\ipcpltouchmouse.dll
{1184D0ED-DBCE-4170-8DBB-4D0C3905DA85} "Touch Property Page" - "Microsoft Corporation" - c:\Program Files\Microsoft IntelliPoint\ipcpltouch.dll
{7834E880-F0CC-4FA7-B4F3-FDB0F4E816A5} "Touch Property Page" - "Microsoft Corporation" - c:\Program Files\Microsoft IntelliPoint\ipcpltouchstrip.dll
{AF90F543-6A3A-4C1B-8B16-ECEC073E69BE} "Wheel Property Page" - "Microsoft Corporation" - c:\Program Files\Microsoft IntelliPoint\ipcplwhl.dll
{2BE99FD4-A181-4996-BFA9-58C5FFD11F6C} "Windows Live Photo Gallery Autoplay Drop Target" - "Microsoft Corporation" - C:\Program Files\Windows Live\Photo Gallery\WLXPhotoGallery.exe
{00F30F64-AC33-42F5-8FD1-5DC2D3FDE06C} "Windows Live Photo Gallery Editor Drop Target" - "Microsoft Corporation" - C:\Program Files\Windows Live\Photo Gallery\WLXPhotoGallery.exe
{00F3712A-CA79-45B4-9E4D-D7891E7F8B9D} "Windows Live Photo Gallery Editor Shim" - "Microsoft Corporation" - C:\Program Files\Windows Live\Photo Gallery\PhotoViewerShim.dll
{00F30F90-3E96-453B-AFCD-D71989ECC2C7} "Windows Live Photo Gallery Viewer Autoplay Shim" - "Microsoft Corporation" - C:\Program Files\Windows Live\Photo Gallery\PhotoViewerShim.dll
{00F33137-EE26-412F-8D71-F84E4C2C6625} "Windows Live Photo Gallery Viewer Autoplay Shim" - "Microsoft Corporation" - C:\Program Files\Windows Live\Photo Gallery\PhotoViewerShim.dll
{00F374B7-B390-4884-B372-2FC349F2172B} "Windows Live Photo Gallery Viewer Drop Target" - "Microsoft Corporation" - C:\Program Files\Windows Live\Photo Gallery\WLXPhotoGallery.exe
{00F346CB-35A4-465B-8B8F-65A29DBAB1F6} "Windows Live Photo Gallery Viewer Shim" - "Microsoft Corporation" - C:\Program Files\Windows Live\Photo Gallery\PhotoViewerShim.dll
{B41DB860-8EE4-11D2-9906-E49FADC173CA} "WinRAR" - "Alexander Roshal" - C:\Program Files\WinRAR\rarext.dll
{20082881-FC36-4E47-9A7A-644C95FF749F} "Wireless Property Page" - "Microsoft Corporation" - c:\Program Files\Microsoft IntelliPoint\ipcplwir.dll
{06A2568A-CED6-4187-BB20-400B8C02BE5A} "{06A2568A-CED6-4187-BB20-400B8C02BE5A}" - "Microsoft Corporation" - C:\Program Files\Windows Live\Photo Gallery\WLXPhotoAcquireWizard.exe

[Internet Explorer]
-----( HKCU\SOFTWARE\Microsoft\Internet Explorer\Extensions )-----
"eBay - Der weltweite Online-Marktplatz" - ? - hxxp://rover.ebay.com/rover/1/707-37276-17534-31/4  (HTTP value)
-----( HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser )-----
<binary data> "&Windows Live Toolbar" - "Microsoft Corporation" - C:\Program Files\Windows Live\Toolbar\wltcore.dll
<binary data> "Google Toolbar" - "Google Inc." - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
ITBar7Height "ITBar7Height" - ? -  (File not found | COM-object registry key not found)
<binary data> "ITBar7Layout" - ? -  (File not found | COM-object registry key not found)
-----( HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units )-----
{8AD9C840-044E-11D1-B3E9-00805F499D93} "Java Plug-in 1.6.0_18" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} "Java Plug-in 1.6.0_18" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} "Java Plug-in 1.6.0_18" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\npjpi160_18.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_18-windows-i586.cab
-----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions )-----
{48E73304-E1D6-4330-914C-F5F514E3486C} "An OneNote senden" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll
"eBay - Der weltweite Online-Marktplatz" - ? - hxxp://rover.ebay.com/rover/1/707-37276-17534-31/4  (HTTP value)
{5F7B1267-94A9-47F5-98DB-E99415F33AEC} "In Blog veröffentlichen" - "Microsoft Corporation" - C:\Program Files\Windows Live\Writer\WriterBrowserExtension.dll
{FF059E31-CC5A-4E2E-BF3B-96E929D65503} "Research" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL
-----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar )-----
<binary data> "&Windows Live Toolbar" - "Microsoft Corporation" - C:\Program Files\Windows Live\Toolbar\wltcore.dll
<binary data> "Google Toolbar" - "Google Inc." - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
{DFEFCDEE-CF1A-4FC8-88AD-18272BE37E29} "xplugin" - ? - C:\Users\Medion\AppData\Roaming\xplugin\toolbar.dll  (File found, but it contains no detailed information)
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects )-----
{18DF081C-E8AD-4283-A596-FA578C2EBDC3} "Adobe PDF Link Helper" - "Adobe Systems Incorporated" - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
{AA58ED58-01DD-4d91-8333-CF10577473F7} "Google Toolbar Helper" - "Google Inc." - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
{DBC80044-A445-435b-BC74-9C25C1C588A9} "Java(tm) Plug-In 2 SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2ssv.dll
{6EBF7485-159F-4bff-A14F-B9E3AAC4465B} "Search Helper" - "Microsoft Corporation" - C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll
{9030D464-4C02-4ABF-8ECC-5164760863C6} "Windows Live ID-Anmelde-Hilfsprogramm" - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
{E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} "Windows Live Toolbar Helper" - "Microsoft Corporation" - C:\Program Files\Windows Live\Toolbar\wltcore.dll
{5C255C8A-E604-49b4-9D64-90988571CECB} "{5C255C8A-E604-49b4-9D64-90988571CECB}" - ? -  (File not found | COM-object registry key not found)

[LSA Providers]
-----( HKLM\SYSTEM\CurrentControlSet\Control\Lsa )-----
"Security Packages" - "Microsoft Corporation" - C:\Windows\system32\livessp.dll

[Logon]
-----( %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup )-----
"desktop.ini" - ? - C:\Users\Medion\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
-----( %AllUsersProfile%\Microsoft\Windows\Start Menu\Programs\Startup )-----
"desktop.ini" - ? - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
-----( HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run )-----
"BullGuard" - "BullGuard Ltd." - "C:\Program Files\BullGuard Ltd\BullGuard\BullGuard.exe"
"swg" - "Google Inc." - "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
-----( HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd )-----
"StartupPrograms" - ? - rdpclip  (File not found)
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Run )-----
"Adobe ARM" - "Adobe Systems Incorporated" - "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
"BullGuard" - "BullGuard Ltd." - "C:\Program Files\BullGuard Ltd\BullGuard\bullguard.exe" -boot
"CLMLServer" - "CyberLink" - "C:\Program Files\CyberLink\Power2Go\CLMLSvc.exe"
"HotkeyApp" - "Wistron" - "C:\Program Files\Launch Manager\HotkeyApp.exe"
"IntelliPoint" - "Microsoft Corporation" - "c:\Program Files\Microsoft IntelliPoint\ipoint.exe"
"LMgrVolOSD" - "Wistron Corp." - "C:\Program Files\Launch Manager\OSD.exe"
"Malwarebytes' Anti-Malware" - "Malwarebytes Corporation" - "C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
"Wbutton" - "Wistron Corp." - "C:\Program Files\Launch Manager\Wbutton.exe"

[Print Monitors]
-----( HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors )-----
"Microsoft Document Imaging Writer Monitor" - "Microsoft Corporation" - C:\Windows\system32\mdimon.dll
"Send To Microsoft OneNote Monitor" - "Microsoft Corporation" - C:\Windows\system32\msonpmon.dll

[Services]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
"Adobe Acrobat Update Service" (AdobeARMservice) - "Adobe Systems Incorporated" - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
"BullGuard Email Monitoring Service" (BsMailProxy) - "BullGuard Ltd." - C:\Program Files\BullGuard Ltd\BullGuard\BsMailProxy.dll
"BullGuard File Scan Service" (BsFileScan) - "BullGuard Ltd." - C:\Program Files\BullGuard Ltd\BullGuard\BsFileScan.dll
"BullGuard LiveUpdate" (BgLiveSvc) - "BullGuard Ltd." - C:\Program Files\BullGuard Ltd\BullGuard\BullGuardUpdate.exe
"BullGuard Main Service" (BgMainSvc) - "BullGuard Ltd." - C:\Program Files\BullGuard Ltd\BullGuard\BsMain.dll
"Cyberlink RichVideo Service(CRVS)" (RichVideo) - ? - C:\Program Files\CyberLink\Shared files\RichVideo.exe
"FABS - Helping agent for MAGIX media database" (Fabs) - "MAGIX AG" - C:\Program Files\Common Files\MAGIX Services\Database\bin\FABS.exe
"Firebird Server - MAGIX Instance" (FirebirdServerMAGIXInstance) - "MAGIX®" - C:\Program Files\Common Files\MAGIX Services\Database\bin\fbserver.exe
"Google Software Updater" (gusvc) - "Google" - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
"Google Update Service (gupdate)" (gupdate) - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"Google Update-Dienst (gupdatem)" (gupdatem) - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"Intel(R) Management & Security Application User Notification Service" (UNS) - "Intel Corporation" - C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe
"Intel(R) Management and Security Application Local Management Service" (LMS) - "Intel Corporation" - C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
"Intel(R) Rapid Storage Technology" (IAStorDataMgrSvc) - "Intel Corporation" - C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe
"MBAMService" (MBAMService) - "Malwarebytes Corporation" - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
"Microsoft .NET Framework NGEN v4.0.30319_X86" (clr_optimization_v4.0.30319_32) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
"Microsoft Office Diagnostics Service" (odserv) - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\OFFICE12\ODSERV.EXE
"Office Source Engine" (ose) - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
"Protexis Licensing V2" (PSI_SVC_2) - "Protexis Inc." - c:\Program Files\Common Files\Protexis\License Service\PsiService_2.exe
"SeaPort" (SeaPort) - "Microsoft Corporation" - C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe
"Windows Live ID Sign-in Assistant" (wlidsvc) - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
"WisLMSvc" (WisLMSvc) - "Wistron Corp." - C:\Program Files\Launch Manager\WisLMSvc.exe
"X10 Device Network Service" (x10nets) - "X10" - C:\PROGRA~1\COMMON~1\X10\Common\x10nets.exe

[Winsock Providers]
-----( HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries )-----
"WindowsLive Local NSP" - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
"WindowsLive NSP" - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
-----( HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries )-----
"BGLsp" - "BullGuard Ltd." - C:\Windows\system32\BGLsp.dll

===[ Logfile end ]=========================================[ Logfile end ]===

If You have questions or want to get some help, You can visit hxxp://forum.online-solutions.ru

aswMBR:
Code:

aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-10-12 11:34:47
-----------------------------
11:34:47.775    OS Version: Windows 6.1.7601 Service Pack 1
11:34:47.775    Number of processors: 4 586 0x2502
11:34:47.775    ComputerName: MEDION-PC  UserName: Medion
11:34:49.445    Initialize success
11:35:34.686    AVAST engine defs: 11101200
11:36:04.623    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
11:36:04.638    Disk 0 Vendor: WDC_WD50 01.0 Size: 476940MB BusType: 3
11:36:04.654    Disk 0 MBR read successfully
11:36:04.669    Disk 0 MBR scan
11:36:04.669    Disk 0 unknown MBR code
11:36:04.669    Disk 0 scanning sectors +976771120
11:36:04.779    Disk 0 scanning C:\Windows\system32\drivers
11:36:15.636    Service scanning
11:36:16.151    Service uxddrv E:\DIAGNOSE\WSTGER32\2PART\uxddrv86.sys **LOCKED** 21
11:36:16.697    Modules scanning
11:36:24.949    Disk 0 trace - called modules:
11:36:24.981    ntkrnlpa.exe CLASSPNP.SYS disk.sys iaStor.sys halmacpi.dll
11:36:24.981    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x88139948]
11:36:24.996    3 CLASSPNP.SYS[8c7a959e] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0x865d1028]
11:36:26.821    AVAST engine scan C:\Windows
11:36:30.082    AVAST engine scan C:\Windows\system32
11:38:09.064    AVAST engine scan C:\Windows\system32\drivers
11:38:20.842    AVAST engine scan C:\Users\Medion
11:47:03.506    Disk 0 MBR has been saved successfully to "C:\Users\Medion\Desktop\MBR.dat"
11:47:03.506    The log file has been saved successfully to "C:\Users\Medion\Desktop\aswMBR.txt"


aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-10-12 11:34:47
-----------------------------
11:34:47.775    OS Version: Windows 6.1.7601 Service Pack 1
11:34:47.775    Number of processors: 4 586 0x2502
11:34:47.775    ComputerName: MEDION-PC  UserName: Medion
11:34:49.445    Initialize success
11:35:34.686    AVAST engine defs: 11101200
11:36:04.623    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
11:36:04.638    Disk 0 Vendor: WDC_WD50 01.0 Size: 476940MB BusType: 3
11:36:04.654    Disk 0 MBR read successfully
11:36:04.669    Disk 0 MBR scan
11:36:04.669    Disk 0 unknown MBR code
11:36:04.669    Disk 0 scanning sectors +976771120
11:36:04.779    Disk 0 scanning C:\Windows\system32\drivers
11:36:15.636    Service scanning
11:36:16.151    Service uxddrv E:\DIAGNOSE\WSTGER32\2PART\uxddrv86.sys **LOCKED** 21
11:36:16.697    Modules scanning
11:36:24.949    Disk 0 trace - called modules:
11:36:24.981    ntkrnlpa.exe CLASSPNP.SYS disk.sys iaStor.sys halmacpi.dll
11:36:24.981    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x88139948]
11:36:24.996    3 CLASSPNP.SYS[8c7a959e] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0x865d1028]
11:36:26.821    AVAST engine scan C:\Windows
11:36:30.082    AVAST engine scan C:\Windows\system32
11:38:09.064    AVAST engine scan C:\Windows\system32\drivers
11:38:20.842    AVAST engine scan C:\Users\Medion
11:47:03.506    Disk 0 MBR has been saved successfully to "C:\Users\Medion\Desktop\MBR.dat"
11:47:03.506    The log file has been saved successfully to "C:\Users\Medion\Desktop\aswMBR.txt"
11:48:59.322    AVAST engine scan C:\ProgramData
11:49:26.056    Scan finished successfully
11:49:39.129    Disk 0 MBR has been saved successfully to "C:\Users\Medion\Desktop\MBR.dat"
11:49:39.129    The log file has been saved successfully to "C:\Users\Medion\Desktop\aswMBR.txt"


aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-10-12 11:34:47
-----------------------------
11:34:47.775    OS Version: Windows 6.1.7601 Service Pack 1
11:34:47.775    Number of processors: 4 586 0x2502
11:34:47.775    ComputerName: MEDION-PC  UserName: Medion
11:34:49.445    Initialize success
11:35:34.686    AVAST engine defs: 11101200
11:36:04.623    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
11:36:04.638    Disk 0 Vendor: WDC_WD50 01.0 Size: 476940MB BusType: 3
11:36:04.654    Disk 0 MBR read successfully
11:36:04.669    Disk 0 MBR scan
11:36:04.669    Disk 0 unknown MBR code
11:36:04.669    Disk 0 scanning sectors +976771120
11:36:04.779    Disk 0 scanning C:\Windows\system32\drivers
11:36:15.636    Service scanning
11:36:16.151    Service uxddrv E:\DIAGNOSE\WSTGER32\2PART\uxddrv86.sys **LOCKED** 21
11:36:16.697    Modules scanning
11:36:24.949    Disk 0 trace - called modules:
11:36:24.981    ntkrnlpa.exe CLASSPNP.SYS disk.sys iaStor.sys halmacpi.dll
11:36:24.981    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x88139948]
11:36:24.996    3 CLASSPNP.SYS[8c7a959e] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0x865d1028]
11:36:26.821    AVAST engine scan C:\Windows
11:36:30.082    AVAST engine scan C:\Windows\system32
11:38:09.064    AVAST engine scan C:\Windows\system32\drivers
11:38:20.842    AVAST engine scan C:\Users\Medion
11:47:03.506    Disk 0 MBR has been saved successfully to "C:\Users\Medion\Desktop\MBR.dat"
11:47:03.506    The log file has been saved successfully to "C:\Users\Medion\Desktop\aswMBR.txt"
11:48:59.322    AVAST engine scan C:\ProgramData
11:49:26.056    Scan finished successfully
11:49:39.129    Disk 0 MBR has been saved successfully to "C:\Users\Medion\Desktop\MBR.dat"
11:49:39.129    The log file has been saved successfully to "C:\Users\Medion\Desktop\aswMBR.txt"
11:49:47.551    Disk 0 MBR has been saved successfully to "C:\Users\Medion\Desktop\MBR.dat"
11:49:47.551    The log file has been saved successfully to "C:\Users\Medion\Desktop\aswMBR.txt"

Gruß

cosinus 12.10.2011 17:18

Wir sollten den MBR fixen, sichere für den Fall der Fälle ALLE wichtigen Daten, auch wenn meistens alles glatt geht.
Starte nach der Datensicherung aswmbr erneut und klick auf den Button FIXMBR.
Anschließend Windows neu starten und ein neues Log mit aswMBR machen.

DieTrojanPlz 12.10.2011 23:14

Zum Glück hat das alles ohne Probleme funktioniert. Hier ist das Log:

Code:

aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-10-12 20:27:36
-----------------------------
20:27:36.064    OS Version: Windows 6.1.7601 Service Pack 1
20:27:36.064    Number of processors: 4 586 0x2502
20:27:36.064    ComputerName: MEDION-PC  UserName: Medion
20:27:54.925    Initialize success
20:28:00.026    AVAST engine defs: 11101200
20:28:04.644    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
20:28:04.644    Disk 0 Vendor: WDC_WD50 01.0 Size: 476940MB BusType: 3
20:28:04.659    Disk 0 MBR read successfully
20:28:04.659    Disk 0 MBR scan
20:28:04.722    Disk 0 Windows 7 default MBR code
20:28:04.737    Disk 0 scanning sectors +976771120
20:28:04.815    Disk 0 scanning C:\Windows\system32\drivers
20:28:20.431    Service scanning
20:28:22.241    Service uxddrv E:\DIAGNOSE\WSTGER32\2PART\uxddrv86.sys **LOCKED** 21
20:28:22.787    Modules scanning
20:28:53.441    Disk 0 trace - called modules:
20:28:53.472    ntkrnlpa.exe CLASSPNP.SYS disk.sys iaStor.sys halmacpi.dll
20:28:53.472    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x88139920]
20:28:53.487    3 CLASSPNP.SYS[8c79e59e] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0x86591028]
20:28:54.767    AVAST engine scan C:\Windows
20:29:00.227    AVAST engine scan C:\Windows\system32
20:31:38.473    AVAST engine scan C:\Windows\system32\drivers
20:31:53.823    AVAST engine scan C:\Users\Medion
20:40:24.116    AVAST engine scan C:\ProgramData
20:40:48.764    Scan finished successfully
00:11:34.610    Disk 0 MBR has been saved successfully to "C:\Users\Medion\Desktop\MBR.dat"
00:11:34.610    The log file has been saved successfully to "C:\Users\Medion\Desktop\aswMBRend.txt"

Dank und Gruß

cosinus 14.10.2011 00:37

Sieht ok aus. Mach bitte zur Kontrolle Vollscans mit Malwarebytes und SASW und poste die Logs.
Denk dran beide Tools zu updaten vor dem Scan!!


Anschließend über den OnlineScanner von ESET eine zusätzliche Meinung zu holen ist auch nicht verkehrt:


ESET Online Scanner

  • Hier findest du eine bebilderte Anleitung zu ESET Online Scanner
  • Lade und starte Eset Online Scanner
  • Setze einen Haken bei Ja, ich bin mit den Nutzungsbedingungen einverstanden und klicke auf Starten.
  • Aktiviere die "Erkennung von eventuell unerwünschten Anwendungen" und wähle folgende Einstellungen.
  • Klicke auf Starten.
  • Die Signaturen werden heruntergeladen, der Scan beginnt automatisch.
  • Klicke am Ende des Suchlaufs auf Fertig stellen.
  • Schließe das Fenster von ESET.
  • Explorer öffnen.
  • C:\Programme\Eset\EsetOnlineScanner\log.txt (bei 64 Bit auch C:\Programme (x86)\Eset\EsetOnlineScanner\log.txt) suchen und mit Deinem Editor öffnen (bebildert).
  • Logfile hier posten.
  • Deinstallation: Systemsteuerung => Software / Programme deinstallieren => Eset Online Scanner V3 entfernen.
  • Manuell folgenden Ordner löschen und Papierkorb leeren => C:\Programme\Eset


DieTrojanPlz 16.10.2011 19:33

Hier sind die Logs:

Eset:

Code:

ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6528
# api_version=3.0.2
# EOSSerial=214e84369b7152429774f5198d43c240
# end=finished
# remove_checked=false
# archives_checked=false
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2011-10-04 02:27:17
# local_time=2011-10-04 04:27:17 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1033
# osver=6.1.7600 NT
# compatibility_mode=4609 16776893 80 91 239321 98598568 0 0
# compatibility_mode=5893 16776573 100 94 9714 70174897 0 0
# compatibility_mode=8192 67108863 100 0 95 95 0 0
# scanned=169924
# found=21
# cleaned=0
# scan_time=2283
C:\Users\Medion\Desktop\fest\Konstantin.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\SIMTOWER.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\Jenny.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\tob.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\Ulli.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\Neuer Ordner.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\813809c985b79b70f0a1.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\5b2ed145bff984cda97ef240.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\statistik 2.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\flash-disinfector-.exe        a variant of Win32/UpToDown.B application (unable to clean)        00000000000000000000000000000000        I
F:\FOUND.000.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\.Trashes.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\System Volume Information.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\Recycled.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\.Spotlight-V100.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\Konstantin.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\$RECYCLE.BIN.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\Bilder Christa.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\Gemeinsame Bilder.lnk        Win32/Dorkbot.D worm (unable to clean)        00000000000000000000000000000000        I
F:\System Volume Information\_restore{E5C0502A-7E6B-48C6-820F-393B7EB00463}\RP473\A0110318.exe        a variant of Win32/Inject.NDT trojan (unable to clean)        00000000000000000000000000000000        I
F:\System Volume Information\_restore{E5C0502A-7E6B-48C6-820F-393B7EB00463}\RP473\A0110321.exe        a variant of Win32/Inject.NDT trojan (unable to clean)        00000000000000000000000000000000        I

SuperAntiSpyware:
Code:

SUPERAntiSpyware Scan Log
hxxp://www.superantispyware.com

Generated 10/16/2011 at 04:33 PM

Application Version : 5.0.1132

Core Rules Database Version : 7801
Trace Rules Database Version: 5613

Scan type      : Complete Scan
Total Scan Time : 03:34:58

Operating System Information
Windows 7 Home Premium 32-bit, Service Pack 1 (Build 6.01.7601)
UAC On - Limited User

Memory items scanned      : 656
Memory threats detected  : 0
Registry items scanned    : 37989
Registry threats detected : 0
File items scanned        : 144649
File threats detected    : 149

Adware.Tracking Cookie
        C:\Users\Medion\AppData\Roaming\Microsoft\Windows\Cookies\09FSGJRK.txt [ /partypoker.com ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\OQMGNNAF.txt [ Cookie:medion@imrworldwide.com/cgi-bin ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\1MS1GLNT.txt [ Cookie:medion@adfarm1.adition.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\4FT8NAEW.txt [ Cookie:medion@guj.122.2o7.net/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\6FDGC62V.txt [ Cookie:medion@track.effiliation.com/servlet/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\HEPE83Q4.txt [ Cookie:medion@de.sitestat.com/ndr/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\WNC11X8K.txt [ Cookie:medion@ad.adnet.de/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\TESZ635I.txt [ Cookie:medion@unitymedia.de/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\MJPBNFIN.txt [ Cookie:medion@tradedoubler.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\YLHBT9ND.txt [ Cookie:medion@smartadserver.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\HI5UZ3SZ.txt [ Cookie:medion@content.yieldmanager.com/ak/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\QNMKJ288.txt [ Cookie:medion@aim4media.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\FU5R1U79.txt [ Cookie:medion@questionmarket.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\J6LE7S9Z.txt [ Cookie:medion@mediabrandsww.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\IL1P6D9O.txt [ Cookie:medion@de.partypoker.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\8FOYNV23.txt [ Cookie:medion@ad1.adfarm1.adition.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\JTREN4VN.txt [ Cookie:medion@delivery.atkmedia.de/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\LUV0HNA6.txt [ Cookie:medion@fastclick.net/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\P1TMDPJH.txt [ Cookie:medion@msnportal.112.2o7.net/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\VIKRGFEO.txt [ Cookie:medion@specificclick.net/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\J0YV21GL.txt [ Cookie:medion@track.webtrekk.net/523478367474333/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\TL5AAENL.txt [ Cookie:medion@apmebf.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\IM8P1G8C.txt [ Cookie:medion@invitemedia.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\BSIBFS1X.txt [ Cookie:medion@2o7.net/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\LYIVM3VD.txt [ Cookie:medion@revsci.net/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\EUESHZ2I.txt [ Cookie:medion@serving-sys.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\YGOOY743.txt [ Cookie:medion@content.yieldmanager.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\MYV03X70.txt [ Cookie:medion@rts.pgmediaserve.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\FBC6EWCU.txt [ Cookie:medion@ad.zanox.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\T1QLJ6VX.txt [ Cookie:medion@zanox.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\S4R7C0IS.txt [ Cookie:medion@ads.addynamix.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\RVXQWGS9.txt [ Cookie:medion@ad.adition.net/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\GSPBU3Y4.txt [ Cookie:medion@overture.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\3HERM0OG.txt [ Cookie:medion@yieldmanager.net/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\DJAGULGS.txt [ Cookie:medion@partypoker.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\7Q0VHZXC.txt [ Cookie:medion@studivz.adfarm1.adition.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\MSMBEX5C.txt [ Cookie:medion@adtech.de/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\6EGXOPRQ.txt [ Cookie:medion@a.revenuemax.de/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\12ZLSG8H.txt [ Cookie:medion@bs.serving-sys.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\GHJOXJ8H.txt [ Cookie:medion@media6degrees.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\MPQC41OD.txt [ Cookie:medion@traffictrack.de/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\88QNKQT5.txt [ Cookie:medion@tracking.mlsat02.de/tmobile/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\NWU9WSKT.txt [ Cookie:medion@ad4.adfarm1.adition.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\3UZMOT8S.txt [ Cookie:medion@www.etracker.de/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\NBRQ9SAD.txt [ Cookie:medion@webmasterplan.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\HQ8BE03T.txt [ Cookie:medion@adx.chip.de/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\BYXU8PBI.txt [ Cookie:medion@atdmt.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\LYSWJHYF.txt [ Cookie:medion@ich.adscale.de/adserver-ich/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\LC29PNMF.txt [ Cookie:medion@ad.yieldmanager.com/ ]
        C:\USERS\MEDION\AppData\Roaming\Microsoft\Windows\Cookies\Low\XWWX42NB.txt [ Cookie:medion@track.effiliation.com/ ]
        C:\USERS\MEDION\Cookies\09FSGJRK.txt [ Cookie:medion@partypoker.com/ ]
        .specificclick.net [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .doubleclick.net [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .serving-sys.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .serving-sys.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .serving-sys.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .serving-sys.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .atdmt.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .atdmt.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .invitemedia.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .revsci.net [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .content.yieldmanager.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .adxpose.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        ad1.adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .webmasterplan.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .webmasterplan.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .webmasterplan.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .webmasterplan.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .webmasterplan.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .ads.addynamix.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .zanox.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .webmasterplan.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .mediaplex.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .mediaplex.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .apmebf.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        ad2.adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .aim4media.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .aim4media.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .fastclick.net [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        .content.yieldmanager.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
        counter.cam-content.com [ C:\USERS\MEDION\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\RZEA6WSR ]
        delivery.ibanner.de [ C:\USERS\MEDION\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\RZEA6WSR ]
        media.adxpansion.com [ C:\USERS\MEDION\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\RZEA6WSR ]
        www.sexkiste.com [ C:\USERS\MEDION\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\RZEA6WSR ]
        .doubleclick.net [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .questionmarket.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .zanox.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        ad.zanox.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .content.yieldmanager.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .atdmt.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .atdmt.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        rts.pgmediaserve.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        rts.pgmediaserve.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        rts.pgmediaserve.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .partypoker.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .partypoker.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .partypoker.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .partypoker.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .partypoker.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .de.partypoker.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .de.partypoker.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .partypoker.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .zedo.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .content.yieldmanager.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .2o7.net [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .2o7.net [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .doubleclick.net [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        de.sitestat.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .tradedoubler.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .tradedoubler.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .tradedoubler.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .webmasterplan.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .webmasterplan.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .clickbank.net [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .clickbank.net [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        ad4.adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        ad2.adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .serving-sys.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .serving-sys.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]
        .serving-sys.com [ C:\USERS\MEDION\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\C9AL74JL.DEFAULT\COOKIES.SQLITE ]

Malware:
Code:

Malwarebytes' Anti-Malware 1.51.2.1300
www.malwarebytes.org

Datenbank Version: 7946

Windows 6.1.7601 Service Pack 1
Internet Explorer 9.0.8112.16421

14.10.2011 19:00:57
mbam-log-2011-10-14 (19-00-57).txt

Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|F:\|)
Durchsuchte Objekte: 359614
Laufzeit: 1 Stunde(n), 42 Minute(n), 32 Sekunde(n)

Infizierte Speicherprozesse: 0
Infizierte Speichermodule: 0
Infizierte Registrierungsschlüssel: 0
Infizierte Registrierungswerte: 0
Infizierte Dateiobjekte der Registrierung: 0
Infizierte Verzeichnisse: 0
Infizierte Dateien: 0

Infizierte Speicherprozesse:
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule:
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel:
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte:
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung:
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse:
(Keine bösartigen Objekte gefunden)

Infizierte Dateien:
(Keine bösartigen Objekte gefunden)

Dank und Gruß!

cosinus 16.10.2011 20:04

Wird Zeit, dass wir die Verknüpfungen löschen:

Mach einen OTL-Fix, beende alle evtl. geöffneten Programme, auch Virenscanner deaktivieren (!), starte OTL und kopiere folgenden Text in die "Custom Scan/Fixes" Box (unten in OTL): (das ":Files" muss mitkopiert werden!!!)

Code:

:Files
F:\*.lnk
:Commands
[emptytemp]
[resethosts]

Klick dann oben links auf den Button Fix!
Das Logfile müsste geöffnet werden, wenn Du nach dem Fixen auf ok klickst, poste das bitte. Evtl. wird der Rechner neu gestartet.

Die mit diesem Script gefixten Einträge, Dateien und Ordner werden zur Sicherheit nicht vollständig gelöscht, es wird eine Sicherheitskopie auf der Systempartition im Ordner "_OTL" erstellt.

Hinweis: Das obige Script ist nur für diesen einen User in dieser Situtation erstellt worden. Es ist auf keinen anderen Rechner portierbar und darf nicht anderweitig verwandt werden, da es das System nachhaltig schädigen kann!

DieTrojanPlz 16.10.2011 20:39

Otl-Log:

Code:

All processes killed
========== FILES ==========
F:\SIMTOWER.lnk moved successfully.
F:\Jenny.lnk moved successfully.
F:\tob.lnk moved successfully.
F:\Ulli.lnk moved successfully.
F:\Neuer Ordner.lnk moved successfully.
F:\813809c985b79b70f0a1.lnk moved successfully.
F:\5b2ed145bff984cda97ef240.lnk moved successfully.
F:\statistik 2.lnk moved successfully.
F:\FOUND.000.lnk moved successfully.
F:\.Trashes.lnk moved successfully.
F:\System Volume Information.lnk moved successfully.
F:\Recycled.lnk moved successfully.
F:\.Spotlight-V100.lnk moved successfully.
F:\Konstantin.lnk moved successfully.
F:\$RECYCLE.BIN.lnk moved successfully.
F:\Bilder Christa.lnk moved successfully.
F:\Gemeinsame Bilder.lnk moved successfully.
========== COMMANDS ==========
 
[EMPTYTEMP]
 
User: All Users
 
User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
 
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
 
User: Medion
->Temp folder emptied: 58814048 bytes
->Temporary Internet Files folder emptied: 669818714 bytes
->FireFox cache emptied: 69435318 bytes
->Google Chrome cache emptied: 856432 bytes
->Flash cache emptied: 4632 bytes
 
User: Public
->Temp folder emptied: 0 bytes
 
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 41697698 bytes
RecycleBin emptied: 0 bytes
 
Total Files Cleaned = 802,00 mb
 
C:\Windows\System32\drivers\etc\Hosts moved successfully.
HOSTS file reset successfully
 
OTL by OldTimer - Version 3.2.29.1 log created on 10162011_213411

Files\Folders moved on Reboot...

Registry entries deleted on Reboot...

:abklatsch:

Gruß

cosinus 16.10.2011 20:45

Schön, wären die auch weg :D
Rechner wieder soweit ok? Du kannst die Ordner auch alle wieder sehen?

DieTrojanPlz 17.10.2011 14:23

Ja alles Bestens! :taenzer:

Vielen, vielen Dank noch mal! :abklatsch:

cosinus 17.10.2011 17:24

Dann wären wir durch! :abklatsch:

Die Programme, die hier zum Einsatz kamen, können alle wieder runter. CF kann über Start, Ausführen mit combofix /uninstall entfernt werden. Melde dich falls es da Fehlermeldungen zu gibt.
Malwarebytes zu behalten ist kein Fehler. Kannst ja 1x im Monat damit scannen, aber immer vorher ans Update denken.

Bitte abschließend die Updates prüfen, unten mein Leitfaden dazu. Um in Zukunft die Aktualität der installierten Programme besser im Überblick zu halten, kannst du zB Secunia PSI verwenden.
Für noch mehr Sicherheit solltest Du nach der beseitigten Infektion auch möglichst alle Passwörter ändern.


Microsoftupdate

Windows XP: Besuch mit dem IE die MS-Updateseite und lass Dir alle wichtigen Updates installieren.

Windows Vista/7: Anleitung Windows-Update


PDF-Reader aktualisieren
Ein veralteter AdobeReader stellt ein großes Sicherheitsrisiko dar. Du solltest daher besser alte Versionen vom AdobeReader über Systemsteuerung => Software bzw. Programme und Funktionen deinstallieren, indem Du dort auf "Adobe Reader x.0" klickst und das Programm entfernst. (falls du AdobeReader installiert hast)

Ich empfehle einen alternativen PDF-Reader wie PDF Xchange Viewer, SumatraPDF oder Foxit PDF Reader, die sind sehr viel schlanker und flotter als der AdobeReader.

Bitte überprüf bei der Gelegenheit auch die Aktualität des Flashplayers, hier der direkte Downloadlink:

Mozilla und andere Browser => http://filepony.de/?q=Flash+Player
Internet Explorer => http://fpdownload.adobe.com/get/flas..._player_ax.exe

Natürlich auch darauf achten, dass andere installierte Browser wie zB Firefox, Opera oder Chrome aktuell sind.


Java-Update
Veraltete Java-Installationen sind ein Sicherheitsrisiko, daher solltest Du die alten Versionen löschen (falls vorhanden, am besten mit JavaRa) und auf die neuste aktualisieren. Beende dazu alle Programme (v.a. die Browser), klick danach auf Start, Systemsteuerung, Software und deinstalliere darüber alle aufgelisteten Java-Versionen. Lad Dir danach von hier das aktuelle Java SE Runtime Environment (JRE) herunter und installiere es.


Alle Zeitangaben in WEZ +1. Es ist jetzt 01:21 Uhr.

Copyright ©2000-2024, Trojaner-Board


Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130