Trojaner-Board

Trojaner-Board (https://www.trojaner-board.de/)
-   Log-Analyse und Auswertung (https://www.trojaner-board.de/log-analyse-auswertung/)
-   -   Windowsfirewall blockt eingehende Verbindungen - Fund von TR/Crypt.EPACK.Gen5 und JAVA/Agent.U (https://www.trojaner-board.de/106148-windowsfirewall-blockt-eingehende-verbindungen-fund-tr-crypt-epack-gen5-java-agent-u.html)

cosinus 17.12.2011 20:19

Combofix - Scripten

1. Starte das Notepad (Start / Ausführen / notepad[Enter])

2. Jetzt füge mit copy/paste den ganzen Inhalt der untenstehenden Codebox in das Notepad Fenster ein.

Code:

File::
c:\windows\system32\ShellManager310E2D762.dll
c:\windows\system32\6A19.tmp

Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\UEAFOverlay]
@=-
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\UEAFOverlayOpen]
@=-

Driver::
MEMSWEEP2

3. Speichere im Notepad als CFScript.txt auf dem Desktop.

4. Deaktivere den Guard Deines Antivirenprogramms und eine eventuell vorhandene Software Firewall.
(Auch Guards von Ad-, Spyware Programmen und den Tea Timer (wenn vorhanden) !)

5. Dann ziehe die CFScript.txt auf die cofi.exe, so wie es im unteren Bild zu sehen ist. Damit wird Combofix neu gestartet.

http://users.pandora.be/bluepatchy/m...s/CFScript.gif

6. Nach dem Neustart (es wird gefragt ob Du neustarten willst), poste bitte die folgenden Log Dateien:
Combofix.txt

Hinweis: Das obige Script ist nur für diesen einen User in dieser Situtation erstellt worden. Es ist auf keinen anderen Rechner portierbar und darf nicht anderweitig verwandt werden, da es das System nachhaltig schädigen kann!

Olorin 18.12.2011 10:57

Combofix Logfile:
Code:

ComboFix 11-12-16.01 - Tommy 18.12.2011  10:28:28.2.2 - x86
Microsoft® Windows Vista™ Business  6.0.6002.2.1252.49.1031.18.3581.2491 [GMT 1:00]
ausgeführt von:: c:\users\Tommy\Desktop\ComboFix.exe
Benutzte Befehlsschalter :: c:\users\Tommy\Desktop\CFScript.txt.txt
AV: Microsoft Security Essentials *Disabled/Updated* {108DAC43-C256-20B7-BB05-914135DA5160}
SP: Microsoft Security Essentials *Disabled/Updated* {ABEC4DA7-E46C-2F39-81B5-AA334E5D1BDD}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
FILE ::
"c:\windows\system32\6A19.tmp"
"c:\windows\system32\ShellManager310E2D762.dll"
.
.
((((((((((((((((((((((((((((((((((((  Weitere Löschungen  ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\ShellManager310E2D762.dll
.
.
(((((((((((((((((((((((((((((((((((((((  Treiber/Dienste  )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Service_MEMSWEEP2
.
.
(((((((((((((((((((((((  Dateien erstellt von 2011-11-18 bis 2011-12-18  ))))))))))))))))))))))))))))))
.
.
2011-12-18 09:33 . 2011-12-18 09:33        56200        ----a-w-        c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{5C413B74-217B-4800-A891-7B97DDC648D2}\offreg.dll
2011-12-18 09:32 . 2011-12-18 09:34        --------        d-----w-        c:\users\Tommy\AppData\Local\temp
2011-12-18 09:32 . 2011-12-18 09:32        --------        d-----w-        c:\users\Default\AppData\Local\temp
2011-12-18 09:10 . 2011-11-21 01:47        6823496        ----a-w-        c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2011-12-18 09:10 . 2011-11-21 01:47        6823496        ----a-w-        c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{5C413B74-217B-4800-A891-7B97DDC648D2}\mpengine.dll
2011-12-17 11:36 . 2011-10-04 16:22        703824        ------w-        c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{FD3BFF74-B737-4D3B-BF19-FCF691FE69A9}\gapaengine.dll
2011-12-17 11:09 . 2011-12-17 11:10        --------        d-----w-        c:\program files\Microsoft Security Client
2011-12-17 11:09 . 2010-04-05 20:00        221568        ----a-w-        c:\windows\system32\drivers\netio.sys
2011-12-16 19:27 . 2011-12-16 19:27        --------        d-----r-        C:\Sandbox
2011-12-16 19:25 . 2011-12-16 19:25        --------        d-----w-        c:\program files\Sandboxie
2011-12-16 17:11 . 2011-11-21 10:47        6823496        ----a-w-        c:\programdata\Microsoft\Windows Defender\Definition Updates\{13871F78-3997-46E5-9440-9A62840E36CA}\mpengine.dll
2011-12-15 17:33 . 2011-12-15 17:33        --------        d-----w-        C:\_OTL
2011-12-14 19:27 . 2011-12-14 19:27        --------        d-----w-        c:\program files\ESET
2011-12-12 16:11 . 2011-12-12 16:11        --------        d-----w-        c:\program files\CCleaner
2011-12-11 20:04 . 2011-08-31 16:00        22216        ----a-w-        c:\windows\system32\drivers\mbam.sys
2011-11-30 18:58 . 2011-11-30 19:58        --------        d-----w-        c:\users\Tommy\AppData\Roaming\Crayon Physics Deluxe
2011-11-30 16:40 . 2011-11-30 16:45        --------        d-----w-        c:\users\Tommy\.KoalaNext
.
.
.
((((((((((((((((((((((((((((((((((((  Find3M Bericht  ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-12-16 19:50 . 2010-04-19 14:19        472808        ----a-w-        c:\windows\system32\deployJava1.dll
2011-12-07 16:23 . 2009-10-06 09:01        222080        ------w-        c:\windows\system32\MpSigStub.exe
2011-11-21 19:21 . 2011-05-16 06:02        414368        ----a-w-        c:\windows\system32\FlashPlayerCPLApp.cpl
2011-10-20 23:26 . 2011-10-20 23:26        94208        ----a-w-        c:\windows\system32\dpl100.dll
2011-09-20 21:02 . 2011-11-08 21:10        913280        ----a-w-        c:\windows\system32\drivers\tcpip.sys
2011-09-20 13:44 . 2011-11-08 21:10        31232        ----a-w-        c:\windows\system32\drivers\tcpipreg.sys
2009-05-01 21:02 . 2009-05-01 21:02        1044480        ----a-w-        c:\program files\opera\program\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02        200704        ----a-w-        c:\program files\opera\program\plugins\ssldivx.dll
2011-12-16 20:17 . 2011-05-15 10:55        134104        ----a-w-        c:\program files\mozilla firefox\components\browsercomps.dll
.
.
((((((((((((((((((((((((((((  Autostartpunkte der Registrierung  ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt.
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RMClock"="c:\progs\RMClock\RMClockLauncher.exe" [2008-02-29 61440]
"SandboxieControl"="c:\program files\Sandboxie\SbieCtrl.exe" [2011-11-23 442640]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PSQLLauncher"="c:\program files\Protector Suite QL\launcher.exe" [2007-03-28 49168]
"Broadcom Wireless Manager UI"="c:\windows\system32\WLTRAY.exe" [2007-08-07 1548288]
"Apoint"="c:\program files\DellTPad\Apoint.exe" [2007-10-25 167936]
"SysTrayApp"="c:\program files\IDT\WDM\sttray.exe" [2008-08-14 442460]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2011-06-09 254696]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2011-06-15 997920]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\AutorunsDisabled
QuickSet.lnk - c:\program files\Dell\QuickSet\quickset.exe [2007-9-7 1180952]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"DisableCAD"= 1 (0x1)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"NoAutorun"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\psfus]
2007-03-28 17:46        90112        ----a-w-        c:\windows\System32\psqlpwd.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute        REG_MULTI_SZ          autocheck autochk *\0OODBS
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa]
Notification Packages        REG_MULTI_SZ          scecli psqlpwd
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NvMediaCenter]
2010-07-09 14:20        110696        ----a-w-        c:\windows\System32\nvmctray.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PCMService]
2007-11-01 13:39        189736        ------w-        c:\program files\Dell\MediaDirect\PCMService.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-1401606794-160134412-1321032927-1000]
"EnableNotificationsRef"=dword:00000002
.
R1 MpKslf95273d0;MpKslf95273d0;c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{5C413B74-217B-4800-A891-7B97DDC648D2}\MpKslf95273d0.sys [x]
R2 AESTFilters;Andrea ST Filters Service;c:\windows\system32\aestsrv.exe [x]
R2 gupdate;Google Update Service (gupdate);c:\program files\Google\Update\GoogleUpdate.exe [x]
R3 ASPI;Advanced SCSI Programming Interface Driver;c:\windows\System32\DRIVERS\ASPI32.sys [2002-07-17 84832]
R3 EverestDriver;Lavalys EVEREST Kernel Driver;c:\program files\Lavalys\EVEREST Corporate Edition\kerneld.wnt [x]
R3 IPSECEXT;Nortel Extranet Access Protocol;c:\windows\system32\DRIVERS\ipsecw2k.sys [2007-04-09 148232]
R3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\DRIVERS\MpNWMon.sys [2011-04-18 43392]
R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [2011-04-27 65024]
R3 NisSrv;Microsoft-Netzwerkinspektion;c:\program files\Microsoft Security Client\Antimalware\NisSrv.exe [2011-04-27 208944]
R3 teamviewervpn;TeamViewer VPN Adapter;c:\windows\system32\DRIVERS\teamviewervpn.sys [2010-03-11 25088]
R3 UDXTTM6010;Cinergy Hybrid XE BDA service;c:\windows\system32\DRIVERS\UDXTTM6010.sys [2008-03-31 596896]
R4 sptd;sptd;c:\windows\System32\Drivers\sptd.sys [2008-07-31 717296]
R4 vmserverdWin32;VMware Registration Service;c:\program files\VMware\VMware Server\vmserverdWin32.exe [x]
S2 HssWd;Hotspot Shield Monitoring Service;c:\program files\Hotspot Shield\bin\hsswd.exe [2010-10-15 326704]
S2 NvcRpcServer;Nortel CVC Service;c:\program files\Nortel Networks\NvcRpcSvr.exe [2007-04-09 71176]
S3 Eacfilt;Eacfilt Miniport;c:\windows\system32\DRIVERS\eacfilt.sys [2007-04-09 31784]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork        REG_MULTI_SZ          PLA DPS BFE mpssvc
bthsvcs        REG_MULTI_SZ          BthServ
LocalServiceAndNoImpersonation        REG_MULTI_SZ          FontCache
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{9C450606-ED24-4958-92BA-B8940C99D441}]
2009-03-04 15:32        8192        ----a-w-        c:\program files\PixiePack Codec Pack\InstallerHelper.exe
.
.
------- Zusätzlicher Suchlauf -------
.
uStart Page = about:blank
IE: Bild an &Bluetooth-Gerät senden... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm
IE: Seite an &Bluetooth-Gerät senden... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
Trusted Zone: microsoft.com\www.update
TCP: DhcpNameServer = 192.168.11.1
TCP: Interfaces\{C5DA2D11-279B-43DE-ACE2-F1D3DD0A5D22}: NameServer = 10.90.24.1
FF - ProfilePath - c:\users\Tommy\AppData\Roaming\Mozilla\Firefox\Profiles\0w1774ub.default\
FF - prefs.js: browser.startup.homepage - about:blank
FF - prefs.js: keyword.URL - chrome://browser-region/locale/region.properties
.
- - - - Entfernte verwaiste Registrierungseinträge - - - -
.
SafeBoot-Wdf01000.sys
.
.
.
**************************************************************************
Scanne versteckte Prozesse...
.
Scanne versteckte Autostarteinträge...
.
Scanne versteckte Dateien...
.
Scan erfolgreich abgeschlossen
versteckte Dateien:
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EverestDriver]
"ImagePath"="\??\c:\program files\Lavalys\EVEREST Corporate Edition\kerneld.wnt"
.
--------------------- Gesperrte Registrierungsschluessel ---------------------
.
[HKEY_USERS\S-1-5-21-1401606794-160134412-1321032927-1000\Software\SecuROM\License information*]
@Allowed: (Read) (RestrictedCode)
"datasecu"=hex:3f,0c,a6,36,13,e4,68,82,df,12,0b,5f,0d,97,88,49,f1,34,65,0a,65,
  fd,be,07,f0,c5,d0,6b,40,d5,47,74,c5,f2,a5,1d,b1,09,1b,94,97,62,8d,e3,1c,c6,\
"rkeysecu"=hex:97,eb,72,85,c4,53,b4,95,53,a7,f1,72,45,77,cc,40
.
--------------------- Durch laufende Prozesse gestartete DLLs ---------------------
.
- - - - - - - > 'lsass.exe'(704)
c:\windows\system32\psqlpwd.dll
c:\program files\Protector Suite QL\homefus2.dll
c:\program files\Protector Suite QL\infra.dll
.
- - - - - - - > 'Explorer.exe'(2384)
c:\windows\system32\btncopy.dll
.
------------------------ Weitere laufende Prozesse ------------------------
.
c:\windows\system32\nvvsvc.exe
c:\program files\Microsoft Security Client\Antimalware\MsMpEng.exe
c:\windows\system32\nvvsvc.exe
c:\program files\Sandboxie\SbieSvc.exe
c:\program files\Protector Suite QL\upeksvr.exe
c:\windows\System32\WLTRYSVC.EXE
c:\windows\System32\bcmwltry.exe
c:\windows\system32\WLANExt.exe
c:\program files\Common Files\InterVideo\DeviceService\DevSvc.exe
c:\program files\Intel\Wireless\Bin\EvtEng.exe
c:\program files\Hotspot Shield\bin\openvpnas.exe
c:\program files\Hotspot Shield\HssWPR\hsssrv.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\Intel\Wireless\Bin\RegSrvc.exe
c:\windows\system32\spool\DRIVERS\W32X86\3\HP2014MC.EXE
c:\windows\system32\conime.exe
c:\program files\Protector Suite QL\psqltray.exe
c:\\?\c:\windows\system32\wbem\WMIADAP.EXE
.
**************************************************************************
.
Zeit der Fertigstellung: 2011-12-18  10:38:53 - PC wurde neu gestartet
ComboFix-quarantined-files.txt  2011-12-18 09:38
ComboFix2.txt  2011-12-16 17:27
.
Vor Suchlauf: 14 Verzeichnis(se), 21.194.514.432 Bytes frei
Nach Suchlauf: 16 Verzeichnis(se), 20.896.342.016 Bytes frei
.
- - End Of File - - 4723BB621E5AE47D5520BEE82D185E7C

--- --- ---


Kannst du mich ein bisschen einweihen, warum die Daten gelöscht werden sollen? Hab die Datei bei Virustotal hochgeladen. Keine Treffer. Hat ne Signatur von Nero...
Wenn das wirklich Malware ist, wäre es dann nicht sinnvoll, den Leuten diverser Antimalwaresoftwarehersteller die Datei nochmal zur Überprüfung mitzugeben?

Wir löschen jetzt seit fast ner Woche Dateien und Einträge, aber Malware hab ich dabei nicht mehr gefunden (jedenfalls soweit ich Virustotal bei nicht 100% bekannten Dateien trauen kann). Nochmal die Frage: Wie viele Scans sind etwa noch geplant?

cosinus 18.12.2011 13:32

Ok. Bitte nun Logs mit GMER und OSAM erstellen und posten.
GMER stürzt häufiger ab, wenn das Tool auch beim 2. Mal nicht will, lass es einfach weg und führ nur OSAM aus - die Online-Abfrage durch OSAM bitte überspringen.
Bei OSAM bitte darauf auch achten, dass Du das Log auch als *.log und nicht *.html oder so abspeicherst.

Hinweis: Zum Entpacken von OSAM bitte WinRAR oder 7zip verwenden! Stell auch unbedingt den Virenscanner ab, besonders der Scanner von McAfee meldet oft einen Fehalarm in OSAM!

Downloade dir bitte aswMBR.exe und speichere die Datei auf deinem Desktop.
  • Starte die aswMBR.exe - (aswMBR.exe Anleitung)
    Ab Windows Vista (oder höher) bitte mit Rechtsklick "als Administrator ausführen" starten".
  • Das Tool wird dich fragen, ob Du mit der aktuellen Virendefinition von AVAST! dein System scannen willst. Beantworte diese Frage bitte mit Ja. (Sollte deine Firewall fragen, bitte den Zugriff auf das Internet zulassen )
    Der Download der Definitionen kann je nach Verbindung eine Weile dauern.
  • Klicke auf Scan.
  • Warte bitte bis Scan finished successfully im DOS-Fenster steht.
  • Drücke auf Save Log und speichere diese auf dem Desktop.
Poste mir die aswMBR.txt in deiner nächsten Antwort.

Wichtig: Drücke keinesfalls einen der Fix Buttons ohne Anweisung

Hinweis: Sollte der Scan Button ausgeblendet sein, schließe das Tool und starte es erneut. Sollte der Scan abbrechen und das Programm abstürzen, dann teile mir das mit und wähle unter AV Scan die Einstellung (none).


Olorin 18.12.2011 16:32

Code:

GMER 1.0.15.15641 - hxxp://www.gmer.net
Rootkit scan 2011-12-18 15:17:00
Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP1T0L0-2 ST9200420ASG rev.3.ADD
Running: 6iztf7qt.exe; Driver: C:\Users\Tommy\AppData\Local\Temp\pxldipod.sys


---- System - GMER 1.0.15 ----

Code            8E07EBFC                                                                                                            ZwTraceEvent
Code            8E07EBFB                                                                                                            NtTraceEvent

---- Kernel code sections - GMER 1.0.15 ----

.text          ntkrnlpa.exe!NtTraceEvent                                                                                            8266D326 5 Bytes  JMP 8E07EC00
PAGE            ntkrnlpa.exe!NtRequestPort + 2                                                                                      8284E2A8 3 Bytes  JMP 8E07ECA0
PAGE            ntkrnlpa.exe!NtRequestPort + 6                                                                                      8284E2AC 1 Byte  [0B]
PAGE            ntkrnlpa.exe!ZwAlpcSendWaitReceivePort + 2                                                                          8287F9BD 5 Bytes  JMP 8E07EDE0
PAGE            ntkrnlpa.exe!NtRequestWaitReplyPort + 2                                                                              82885F92 5 Bytes  JMP 8E07ED40

---- User IAT/EAT - GMER 1.0.15 ----

IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusShutdown]                                [745F7817] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCloneImage]                                [7464A86D] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDrawImageRectI]                            [745FBB22] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetInterpolationMode]                      [745EF695] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusStartup]                                [745F75E9] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateFromHDC]                              [745EE7CA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStreamICM]                  [74628395] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStream]                    [745FDA60] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageHeight]                            [745EFFFA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageWidth]                              [745EFF61] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDisposeImage]                              [745E71CF] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFileICM]                      [7467CAE2] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFile]                          [7461C8D8] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDeleteGraphics]                            [745ED968] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipFree]                                      [745E6853] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipAlloc]                                      [745E687E] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT            C:\Windows\Explorer.EXE[3568] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetCompositingMode]                        [745F2AD1] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)

---- Devices - GMER 1.0.15 ----

AttachedDevice  \FileSystem\fastfat \Fat                                                                                            fltmgr.sys (Microsoft Dateisystem-Filter-Manager/Microsoft Corporation)

---- Registry - GMER 1.0.15 ----

Reg            HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\001fe1f1eba9                                         
Reg            HKLM\SYSTEM\CurrentControlSet\Services\BTHPORT\Parameters\Keys\001fe1f1eba9@001ca4bd8cd5                            0x6B 0x80 0x68 0xCC ...
Reg            HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4                                   
Reg            HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0                                  C:\Progs\DAEMON Tools Lite\
Reg            HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0                                  0
Reg            HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh                              0x78 0x6C 0x52 0xE8 ...
Reg            HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001                           
Reg            HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0                        0x20 0x01 0x00 0x00 ...
Reg            HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh                      0xD6 0xA2 0xB5 0xD9 ...
Reg            HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40                     
Reg            HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh                0xF9 0xC6 0x10 0x32 ...
Reg            HKLM\SYSTEM\ControlSet003\Services\BTHPORT\Parameters\Keys\001fe1f1eba9 (not active ControlSet)                     
Reg            HKLM\SYSTEM\ControlSet003\Services\BTHPORT\Parameters\Keys\001fe1f1eba9@001ca4bd8cd5                                0x6B 0x80 0x68 0xCC ...
Reg            HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4 (not active ControlSet)               
Reg            HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0                                      C:\Progs\DAEMON Tools Lite\
Reg            HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0                                      0
Reg            HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh                                  0x78 0x6C 0x52 0xE8 ...
Reg            HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001 (not active ControlSet)       
Reg            HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0                            0x20 0x01 0x00 0x00 ...
Reg            HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh                          0xD6 0xA2 0xB5 0xD9 ...
Reg            HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40 (not active ControlSet) 
Reg            HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh                    0xF9 0xC6 0x10 0x32 ...
Reg            HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\System                                                               
Reg            HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\System@OODEFRAG10.00.00.01WORKSTATION                               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
Reg            HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\System@OOCC06.00.00.01WSSV                                           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

---- EOF - GMER 1.0.15 ----

OSAM Logfile:
Code:

Report of OSAM: Autorun Manager v5.0.11926.0
hxxp://www.online-solutions.ru/en/
Saved at 15:20:53 on 18.12.2011

OS: Windows Vista Business Edition Service Pack 2 (Build 6002), 32-bit
Default Browser: Opera Software Opera Internet Browser 11.60

Scanner Settings
[x] Rootkits detection (hidden registry)
[x] Rootkits detection (hidden files)
[x] Retrieve files information
[x] Check Microsoft signatures

Filters
[ ] Trusted entries
[ ] Empty entries
[x] Hidden registry entries (rootkit activity)
[x] Exclusively opened files
[x] Not found files
[x] Files without detailed information
[x] Existing files
[ ] Non-startable services
[ ] Non-startable drivers
[x] Active entries
[x] Disabled entries


[Boot Execute]
-----( HKLM\SYSTEM\CurrentControlSet\Control\Session Manager )-----
"BootExecute" - ? - OODBS  (File not found)

[Control Panel Objects]
-----( %SystemRoot%\system32 )-----
"BCMWLCPL.CPL" - "Dell Inc." - C:\Windows\system32\BCMWLCPL.CPL
"DivXControlPanelApplet.cpl" - "DivX, Inc." - C:\Windows\system32\DivXControlPanelApplet.cpl
"FlashPlayerCPLApp.cpl" - "Adobe Systems Incorporated" - C:\Windows\system32\FlashPlayerCPLApp.cpl
"iPROSet.cpl" - "Intel Corporation" - C:\Windows\system32\iPROSet.cpl
"nvcpl.cpl" - "NVIDIA Corporation" - C:\Windows\system32\nvcpl.cpl
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls )-----
"bcmwlcpl.cpl" - "Dell Inc." - C:\Windows\System32\bcmwlcpl.cpl
"Pando" - "Pando Networks" - C:\Program Files\Pando Networks\Media Booster\PMB.cpl
"PROSet Tools" - "Intel Corporation" - C:\Windows\System32\iPROSet.cpl
"ProtectorSuiteInfoPanel" - "UPEK Inc." - C:\Program Files\Protector Suite QL\infopnl.cpl

[Drivers]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
"Acronis True Image Backup Archive Explorer" (timounter) - "Acronis" - C:\Windows\System32\DRIVERS\timntr.sys
"Acronis True Image FS Filter" (tifsfilter) - "Acronis" - C:\Windows\System32\DRIVERS\tifsfilt.sys
"Advanced SCSI Programming Interface Driver" (ASPI) - ? - C:\Windows\System32\DRIVERS\ASPI32.sys
"catchme" (catchme) - ? - C:\ComboFix\catchme.sys  (File not found)
"cpuz132" (cpuz132) - "Windows (R) Codename Longhorn DDK provider" - C:\Windows\system32\drivers\cpuz132_x32.sys
"ENTECH" (ENTECH) - "EnTech Taiwan" - C:\Windows\system32\DRIVERS\ENTECH.sys
"Hamachi Network Interface" (hamachi) - "LogMeIn, Inc." - C:\Windows\System32\DRIVERS\hamachi.sys
"Hotspot Shield Helper Miniport" (HssDrv) - "AnchorFree Inc." - C:\Windows\System32\DRIVERS\HssDrv.sys
"IP in IP Tunnel Driver" (IpInIp) - ? - C:\Windows\System32\DRIVERS\ipinip.sys  (File not found)
"IPX Traffic Filter Driver" (NwlnkFlt) - ? - C:\Windows\System32\DRIVERS\nwlnkflt.sys  (File not found)
"IPX Traffic Forwarder Driver" (NwlnkFwd) - ? - C:\Windows\System32\DRIVERS\nwlnkfwd.sys  (File not found)
"Lavalys EVEREST Kernel Driver" (EverestDriver) - ? - C:\Program Files\Lavalys\EVEREST Corporate Edition\kerneld.wnt  (File not found)
"MpKslb59a814a" (MpKslb59a814a) - "Microsoft Corporation" - C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{47AB4C2D-DE0A-440E-B0E1-22861D6BDC43}\MpKslb59a814a.sys
"MpKslf95273d0" (MpKslf95273d0) - ? - C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{5C413B74-217B-4800-A891-7B97DDC648D2}\MpKslf95273d0.sys  (File not found)
"NSNDIS5 NDIS Protocol Driver" (NSNDIS5) - ? - C:\Windows\system32\NSNDIS5.SYS  (File not found)
"pxldipod" (pxldipod) - ? - C:\Users\Tommy\AppData\Local\Temp\pxldipod.sys  (Hidden registry entry, rootkit activity | File not found)
"RTCore32" (RTCore32) - ? - C:\Progs\RMClock\RTCore32.sys  (File found, but it contains no detailed information)
"SbieDrv" (SbieDrv) - "SANDBOXIE L.T.D" - C:\Program Files\Sandboxie\SbieDrv.sys
"ssmdrv" (ssmdrv) - "Avira GmbH" - C:\Windows\System32\DRIVERS\ssmdrv.sys
"TAP VPN Adapter" (tapvpn) - "The OpenVPN Project" - C:\Windows\System32\DRIVERS\tapvpn.sys
"VMware hcmon" (hcmon) - ? - C:\Windows\system32\Drivers\hcmon.sys  (File not found)
"VMware Virtual Ethernet Adapter Driver" (VMnetAdapter) - ? - C:\Windows\System32\DRIVERS\vmnetadapter.sys  (File not found)
"VMware vmx86" (vmx86) - ? - C:\Windows\system32\Drivers\vmx86.sys  (File not found)

[Explorer]
-----( HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components )-----
{9C450606-ED24-4958-92BA-B8940C99D441} "PixiePack Codec Pack 1.1.400.0" - ? - C:\Program Files\PixiePack Codec Pack\InstallerHelper.exe
-----( HKLM\Software\Classes\Folder\shellex\ColumnHandlers )-----
{C52AF81D-F7A0-4AAB-8E87-F80A60CCD396} "{C52AF81D-F7A0-4AAB-8E87-F80A60CCD396}" - ? - C:\Program Files\OpenOffice.org 3\Basis\program\shlxthdl\shlxthdl.dll
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved )-----
{911051fa-c21c-4246-b470-070cd8df6dc4} ".cab or .zip files" - ? -  (File not found | COM-object registry key not found)
{23170F69-40C1-278A-1000-000100020000} "7-Zip Shell Extension" - "Igor Pavlov" - C:\Program Files\7-Zip\7-zip.dll
{1b24a030-9b20-49bc-97ac-1be4426f9e59} "ActiveDirectory Folder" - ? -  (File not found | COM-object registry key not found)
{34449847-FD14-4fc8-A75A-7432F5181EFB} "ActiveDirectory Folder" - ? -  (File not found | COM-object registry key not found)
{0F8604A5-4ECE-4DE1-BA7D-CF10F8AA4F48} "Contacts folder" - ? -  (File not found | COM-object registry key not found)
{A70C977A-BF00-412C-90B7-034C51DA2439} "DesktopContext Class" - "NVIDIA Corporation" - C:\Windows\system32\nvcpl.dll
{09A47860-11B0-4DA5-AFA5-26D86198A780} "EPP" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~2\shellext.dll
{2C2577C2-63A7-40e3-9B7F-586602617ECB} "Explorer Query Band" - ? -  (File not found | COM-object registry key not found)
{FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75} "IE User Assist" - ? -  (File not found | COM-object registry key not found)
{00020d75-0000-0000-c000-000000000046} "lnkfile" - ? -  (File not found | COM-object registry key not found)
{993BE281-6695-4BA5-8A2A-7AACBFAAB69E} "Microsoft Office Metadata Handler" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\msoshext.dll
{C41662BB-1FA0-4CE0-8DC5-9B7F8279FF97} "Microsoft Office Thumbnail Handler" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\msoshext.dll
{7842554E-6BED-11D2-8CDB-B05550C10000} "Monitor Class" - "Broadcom Corporation." - C:\Windows\system32\btncopy.dll
{3D1975AF-48C6-4f8e-A182-BE0E08FA86A9} "NVIDIA CPL Context Menu Extension" - "NVIDIA Corporation" - C:\Windows\system32\nvshext.dll
{C52AF81D-F7A0-4AAB-8E87-F80A60CCD396} "OpenOffice.org Column Handler" - ? - C:\Program Files\OpenOffice.org 3\Basis\program\shlxthdl\shlxthdl.dll
{087B3AE3-E237-4467-B8DB-5A38AB959AC9} "OpenOffice.org Infotip Handler" - ? - C:\Program Files\OpenOffice.org 3\Basis\program\shlxthdl\shlxthdl.dll
{63542C48-9552-494A-84F7-73AA6A7C99C1} "OpenOffice.org Property Sheet Handler" - ? - C:\Program Files\OpenOffice.org 3\Basis\program\shlxthdl\shlxthdl.dll
{3B092F0C-7696-40E3-A80F-68D74DA84210} "OpenOffice.org Thumbnail Viewer" - ? - C:\Program Files\OpenOffice.org 3\Basis\program\shlxthdl\shlxthdl.dll
{9AFDE8D6-200C-4b41-A5FC-B7251DFD1A8E} "Safearchive ContextMenu Class" - "UPEK Inc." - C:\Program Files\Protector Suite QL\farchns.dll
{E6D7D89A-2232-446d-8A0F-D0F9B06DB1CA} "Safearchive ExtractIcon Class" - "UPEK Inc." - C:\Program Files\Protector Suite QL\farchns.dll
{66C99756-1C92-4d3e-BA69-9400A6F731F5} "Safearchive PropertySheetHandler Class" - "UPEK Inc." - C:\Program Files\Protector Suite QL\farchns.dll
{055EF591-5C38-49a0-9BDA-51B1D69D0BF4} "Safearchive ShellFolder Class" - "UPEK Inc." - C:\Program Files\Protector Suite QL\farchns.dll
{C8494E42-ACDD-4739-B0FB-217361E4894F} "Sam Account Folder" - ? -  (File not found | COM-object registry key not found)
{E29F9716-5C08-4FCD-955A-119FDB5A522D} "Sam Account Folder" - ? -  (File not found | COM-object registry key not found)
{45AC2688-0253-4ED8-97DE-B5370FA7D48A} "Shell Extension for Malware scanning" - ? -  (File not found | COM-object registry key not found)
{BAF55D20-7BC0-4bcc-A91F-A5223FFFDC9D} "Sorcerer Shell Extension" - "Software 2000 Limited" - C:\Windows\system32\spool\DRIVERS\W32X86\3\HP2014SX.DLL
{da67b8ad-e81b-4c70-9b91b417b5e33527} "Windows Search Shell Service" - ? -  (File not found | COM-object registry key not found)

[Internet Explorer]
-----( HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser )-----
ITBar7Height "ITBar7Height" - ? -  (File not found | COM-object registry key not found)
<binary data> "ITBar7Layout" - ? -  (File not found | COM-object registry key not found)
-----( HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units )-----
{C1F8FC10-E5DB-4112-9DBF-6C3FF728D4E3} "DellSystemLite.Scanner" - ? - C:\Windows\Downloaded Program Files\DellSystemLite.ocx / hxxp://support.euro.dell.com/systemprofiler/DellSystemLite.CAB
{CAFEEFAC-0015-0000-0016-ABCDEFFEDCBA} "Java Plug-in 1.5.0_16" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_16-windows-i586.cab
{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} "Java Plug-in 1.6.0_07" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab
{8AD9C840-044E-11D1-B3E9-00805F499D93} "Java Plug-in 1.6.0_30" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
{CAFEEFAC-0016-0000-0030-ABCDEFFEDCBA} "Java Plug-in 1.6.0_30" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} "Java Plug-in 1.6.0_30" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\npjpi160_30.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
{E2883E8F-472F-4FB0-9522-AC9BF37916A7} "{E2883E8F-472F-4FB0-9522-AC9BF37916A7}" - ? -  (File not found | COM-object registry key not found) / hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
-----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions )-----
"@btrez.dll,-4015" - ? - C:\Program Files\WIDCOMM\Bluetooth Software\btsendto_ie.htm
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects )-----
{DBC80044-A445-435b-BC74-9C25C1C588A9} "Java(tm) Plug-In 2 SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2ssv.dll
{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} "Java(tm) Plug-In SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\ssv.dll

[LSA Providers]
-----( HKLM\SYSTEM\CurrentControlSet\Control\Lsa )-----
"Notification packages" - "UPEK Inc." - C:\Windows\system32\psqlpwd.dll

[Logon]
-----( %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup )-----
"desktop.ini" - ? - C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
-----( %AllUsersProfile%\Microsoft\Windows\Start Menu\Programs\Startup )-----
"desktop.ini" - ? - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
-----( HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run )-----
"RMClock" - "NGO Science Center "RightMark"" - C:\Progs\RMClock\RMClockLauncher.exe
"SandboxieControl" - "SANDBOXIE L.T.D" - "C:\Program Files\Sandboxie\SbieCtrl.exe"
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Run )-----
"Broadcom Wireless Manager UI" - "Dell Inc." - C:\Windows\system32\WLTRAY.exe
"MSC" - "Microsoft Corporation" - "C:\Program Files\Microsoft Security Client\msseces.exe" -hide -runkey
"PSQLLauncher" - "UPEK Inc." - "C:\Program Files\Protector Suite QL\launcher.exe" /startup
"SunJavaUpdateSched" - "Sun Microsystems, Inc." - "C:\Program Files\Common Files\Java\Java Update\jusched.exe"

[Network Providers]
-----( HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order )-----
"Dell Wireless WLAN Card Logon Provider" - "Dell Inc." - C:\Windows\System32\BCMLogon.dll

[Print Monitors]
-----( HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors )-----
"HP LaserJet P2014 Language Monitor" - "Software 2000 Limited" - C:\Windows\system32\HP2014LM.DLL
"PDFCreator" - ? - C:\Windows\system32\pdfcmnnt.dll  (File found, but it contains no detailed information)
"Redirected Port" - ? - C:\Windows\system32\redmonnt.dll  (File found, but it contains no detailed information)
"RICOH Language Monitor2" - "RICOH CO.,Ltd." - C:\Windows\system32\RC4MON.DLL

[Services]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
"@C:\Program Files\Microsoft Security Client\Antimalware\MpAsDesc.dll,-243" (NisSrv) - "Microsoft Corporation" - C:\Program Files\Microsoft Security Client\Antimalware\NisSrv.exe
"Andrea ST Filters Service" (AESTFilters) - ? - C:\Windows\system32\aestsrv.exe  (File not found)
"Capture Device Service" (Capture Device Service) - "InterVideo Inc." - C:\Program Files\Common Files\InterVideo\DeviceService\DevSvc.exe
"Dell Wireless WLAN Tray Service" (wltrysvc) - ? - C:\Windows\System32\WLTRYSVC.EXE  (File found, but it contains no detailed information)
"Google Update Service (gupdate)" (gupdate) - ? - "C:\Program Files\Google\Update\GoogleUpdate.exe" /svc  (File not found)
"Hotspot Shield Monitoring Service" (HssWd) - ? - C:\Program Files\Hotspot Shield\bin\hsswd.exe  (File found, but it contains no detailed information)
"Hotspot Shield Routing Service" (HssSrv) - ? - C:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe
"Hotspot Shield Service" (HotspotShieldService) - ? - C:\Program Files\Hotspot Shield\bin\openvpnas.exe  (File found, but it contains no detailed information)
"Hotspot Shield Tray Service" (HssTrayService) - ? - C:\Program Files\Hotspot Shield\bin\HssTrayService.EXE  (File found, but it contains no detailed information)
"Intel(R) PROSet/Wireless Event Log" (EvtEng) - "Intel Corporation" - C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
"Intel(R) PROSet/Wireless Registry Service" (RegSrvc) - "Intel Corporation" - C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
"LightScribeService Direct Disc Labeling Service" (LightScribeService) - "Hewlett-Packard Company" - C:\Program Files\Common Files\LightScribe\LSSrvc.exe
"Microsoft Antimalware Service" (MsMpSvc) - "Microsoft Corporation" - C:\Program Files\Microsoft Security Client\Antimalware\MsMpEng.exe
"Nortel CVC Service" (NvcRpcServer) - "Nortel Networks NA, Inc." - C:\Program Files\Nortel Networks\NvcRpcSvr.exe
"NVIDIA Display Driver Service" (nvsvc) - "NVIDIA Corporation" - C:\Windows\system32\nvvsvc.exe
"Sandboxie Service" (SbieSvc) - "SANDBOXIE L.T.D" - C:\Program Files\Sandboxie\SbieSvc.exe
"Steam Client Service" (Steam Client Service) - "Valve Corporation" - C:\Program Files\Common Files\Steam\SteamService.exe

[Winlogon]
-----( HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon )-----
"GinaDLL" - "UPEK Inc." - C:\Windows\system32\vrlogon.dll
-----( HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify )-----
"psfus" - "UPEK Inc." - C:\Windows\system32\psqlpwd.dll

===[ Logfile end ]=========================================[ Logfile end ]===

--- --- ---

If You have questions or want to get some help, You can visit hxxp://forum.online-solutions.ru[/code]

Code:

aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software
Run date: 2011-12-18 15:21:01
-----------------------------
15:21:01.530    OS Version: Windows 6.0.6002 Service Pack 2
15:21:01.530    Number of processors: 2 586 0x1706
15:21:01.530    ComputerName: TMSL  UserName:
15:21:23.219    Initialize success
15:34:40.781    AVAST engine defs: 11121800
15:39:03.390    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP1T0L0-2
15:39:03.394    Disk 0 Vendor: ST9200420ASG 3.ADD Size: 190782MB BusType: 3
15:39:05.664    Disk 0 MBR read successfully
15:39:05.726    Disk 0 MBR scan
15:39:05.801    Disk 0 unknown MBR code
15:39:05.939    Disk 0 scanning sectors +390716865
15:39:06.420    Disk 0 scanning C:\Windows\system32\drivers
15:40:37.307    Service scanning
15:40:38.138    Service MpKslb59a814a C:\ProgramData\Microsoft\Microsoft Antimalware\Definition Updates\{47AB4C2D-DE0A-440E-B0E1-22861D6BDC43}\MpKslb59a814a.sys **LOCKED** 32
15:40:38.143    Service MpNWMon C:\Windows\system32\DRIVERS\MpNWMon.sys **LOCKED** 32
15:40:38.724    Modules scanning
15:42:36.744    Disk 0 trace - called modules:
15:42:36.769    ntkrnlpa.exe CLASSPNP.SYS disk.sys ataport.SYS hal.dll PCIIDEX.SYS msahci.sys
15:42:36.779    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x86306738]
15:42:36.789    3 CLASSPNP.SYS[8c1a98b3] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP1T0L0-2[0x8531d390]
15:42:37.534    AVAST engine scan C:\Windows
15:43:05.677    AVAST engine scan C:\Windows\system32
15:54:18.942    AVAST engine scan C:\Windows\system32\drivers
15:56:01.197    AVAST engine scan C:\Users\Tommy
16:21:52.093    AVAST engine scan C:\ProgramData
16:27:21.190    Scan finished successfully
16:29:42.323    Disk 0 MBR has been saved successfully to "C:\Users\Tommy\Desktop\MBR.dat"
16:29:42.339    The log file has been saved successfully to "C:\Users\Tommy\Desktop\aswMBR.txt"


cosinus 18.12.2011 17:00

Wir sollten den MBR fixen, sichere für den Fall der Fälle ALLE wichtigen Daten, auch wenn meistens alles glatt geht.

Hinweis: Mach bitte NICHT den MBR-Fix, wenn du noch andere Betriebssysteme wie zB Ubuntu installiert hast, ein MBR-Fix mit Windows-Tools macht ein parallel installiertes (Dualboot) Linux unbootbar.

Starte nach der Datensicherung aswmbr erneut und klick auf den Button FIXMBR.
Anschließend Windows neu starten und ein neues Log mit aswMBR machen.

Olorin 18.12.2011 17:16

Liest du eigentlich was ich schreibe? :)

Zitat:

Zitat von Olorin (Beitrag 733123)

Edith meinte: Ich habe auf dem Rechner noch eine laufen Kubuntu Installation, falls es der Diagnose / Reparatur dient.


cosinus 19.12.2011 10:16

Nee, das mit Kubuntu hab ich irgendwie verdrängt :balla: :lach:
Ist aber die Frage ob es nativ installiert wurde oder über wubi :pfeiff:

Olorin 19.12.2011 10:23

Weiß nicht genau, was Wubi ist :) (grad nachgeschaut, das ist es nicht)
Ist ne native Installation auf ner eigenen Partition. Gab damals Probleme, deshalb hab ich den MBR mit ner SuperGrub Disc neu beschrieben. Das dürfte der Code sein, den aswMBR da nicht kennt.

cosinus 19.12.2011 13:07

Ok, dann natürlich nicht den MBR-Fix machen ;)

Mach bitte zur Kontrolle Vollscans mit Malwarebytes und SASW und poste die Logs.
Denk dran beide Tools zu updaten vor dem Scan!!


Anschließend über den OnlineScanner von ESET eine zusätzliche Meinung zu holen ist auch nicht verkehrt:


ESET Online Scanner

  • Hier findest du eine bebilderte Anleitung zu ESET Online Scanner
  • Lade und starte Eset Online Scanner
  • Setze einen Haken bei Ja, ich bin mit den Nutzungsbedingungen einverstanden und klicke auf Starten.
  • Aktiviere die "Erkennung von eventuell unerwünschten Anwendungen" und wähle folgende Einstellungen.
  • Klicke auf Starten.
  • Die Signaturen werden heruntergeladen, der Scan beginnt automatisch.
  • Klicke am Ende des Suchlaufs auf Fertig stellen.
  • Schließe das Fenster von ESET.
  • Explorer öffnen.
  • C:\Programme\Eset\EsetOnlineScanner\log.txt (bei 64 Bit auch C:\Programme (x86)\Eset\EsetOnlineScanner\log.txt) suchen und mit Deinem Editor öffnen (bebildert).
  • Logfile hier posten.
  • Deinstallation: Systemsteuerung => Software / Programme deinstallieren => Eset Online Scanner V3 entfernen.
  • Manuell folgenden Ordner löschen und Papierkorb leeren => C:\Programme\Eset


Olorin 19.12.2011 16:25

Hi,

von mir aus können wir den Thread schließen.
Hab nochmal mit SASW gescannt:

Code:

SUPERAntiSpyware Scan Log
hxxp://www.superantispyware.com

Generated 12/19/2011 at 04:08 PM

Application Version : 5.0.1142

Core Rules Database Version : 8064
Trace Rules Database Version: 5876

Scan type      : Complete Scan
Total Scan Time : 02:10:05

Operating System Information
Windows Vista Business 32-bit, Service Pack 2 (Build 6.00.6002)
UAC On - Administrator

Memory items scanned      : 623
Memory threats detected  : 0
Registry items scanned    : 37567
Registry threats detected : 0
File items scanned        : 330073
File threats detected    : 133

Adware.Tracking Cookie
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\tommy@ad.yieldmanager[2].txt [ /ad.yieldmanager ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\tommy@ads.ad4game[1].txt [ /ads.ad4game ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\tommy@adserver.unitedcolo[1].txt [ /adserver.unitedcolo ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\tommy@adviva[1].txt [ /adviva ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\tommy@adx.chip[1].txt [ /adx.chip ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\tommy@content.yieldmanager[1].txt [ /content.yieldmanager ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\tommy@invitemedia[2].txt [ /invitemedia ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\tommy@serving-sys[2].txt [ /serving-sys ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\tommy@smartadserver[2].txt [ /smartadserver ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\EBCT1C1M.txt [ /c.atdmt.com ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\870UYSFJ.txt [ /atdmt.com ]
        C:\Users\Tommy\AppData\Roaming\Microsoft\Windows\Cookies\EYIKG0UP.txt [ /doubleclick.net ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\tommy@eu.battle[1].txt [ Cookie:tommy@eu.battle.net/account ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\tommy@embedded.garena[1].txt [ Cookie:tommy@embedded.garena.com/ad/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@msnportal.112.2o7[1].txt [ Cookie:tommy@msnportal.112.2o7.net/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@ehg-gaddispartners.hitbox[1].txt [ Cookie:tommy@ehg-gaddispartners.hitbox.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@unitymedia[1].txt [ Cookie:tommy@unitymedia.de/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@atdmt[2].txt [ Cookie:tommy@atdmt.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@xiti[1].txt [ Cookie:tommy@xiti.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@admax.quisma[2].txt [ Cookie:tommy@admax.quisma.com/tracking/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@ad.yieldmanager[2].txt [ Cookie:tommy@ad.yieldmanager.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@panopticlick.eff[1].txt [ Cookie:tommy@panopticlick.eff.org/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@bs.serving-sys[1].txt [ Cookie:tommy@bs.serving-sys.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@collective-media[2].txt [ Cookie:tommy@collective-media.net/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@ads.neudesicmediagroup[1].txt [ Cookie:tommy@ads.neudesicmediagroup.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@tracking.quisma[2].txt [ Cookie:tommy@tracking.quisma.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@serving-sys[2].txt [ Cookie:tommy@serving-sys.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@ad2.adfarm1.adition[1].txt [ Cookie:tommy@ad2.adfarm1.adition.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@microsoftsto.112.2o7[1].txt [ Cookie:tommy@microsoftsto.112.2o7.net/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@legolas-media[1].txt [ Cookie:tommy@legolas-media.com/ ]
        C:\USERS\TOMMY\AppData\Roaming\Microsoft\Windows\Cookies\Low\tommy@adfarm1.adition[2].txt [ Cookie:tommy@adfarm1.adition.com/ ]
        C:\USERS\TOMMY\Cookies\tommy@invitemedia[2].txt [ Cookie:tommy@invitemedia.com/ ]
        C:\USERS\TOMMY\Cookies\EBCT1C1M.txt [ Cookie:tommy@c.atdmt.com/ ]
        C:\USERS\TOMMY\Cookies\tommy@eu.battle[1].txt [ Cookie:tommy@eu.battle.net/account ]
        C:\USERS\TOMMY\Cookies\870UYSFJ.txt [ Cookie:tommy@atdmt.com/ ]
        C:\USERS\TOMMY\Cookies\tommy@embedded.garena[1].txt [ Cookie:tommy@embedded.garena.com/ad/ ]
        C:\USERS\TOMMY\Cookies\tommy@ad.yieldmanager[2].txt [ Cookie:tommy@ad.yieldmanager.com/ ]
        C:\USERS\TOMMY\Cookies\tommy@serving-sys[2].txt [ Cookie:tommy@serving-sys.com/ ]
        C:\USERS\TOMMY\Cookies\tommy@adx.chip[1].txt [ Cookie:tommy@adx.chip.de/ ]
        C:\USERS\TOMMY\Cookies\tommy@adserver.unitedcolo[1].txt [ Cookie:tommy@adserver.unitedcolo.de/ ]
        C:\USERS\TOMMY\Cookies\tommy@content.yieldmanager[1].txt [ Cookie:tommy@content.yieldmanager.com/ ]
        C:\USERS\TOMMY\Cookies\tommy@adviva[1].txt [ Cookie:tommy@adviva.net/ ]
        stats.shimanoweb.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .doubleclick.net [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        www.bike-discount.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .bike-discount.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .bike-discount.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .bike-discount.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .invitemedia.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .webmasterplan.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .webmasterplan.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .tradedoubler.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .tradedoubler.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .tradedoubler.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .traffictrack.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .pro-market.net [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .socialmedia.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .webmasterplan.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .ad.adnet.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        eas.apm.emediate.eu [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        eas.apm.emediate.eu [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .apmebf.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .mediaplex.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        ad3.adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        eas.apm.emediate.eu [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adxvalue.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .ad.adnet.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .dmtracker.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .revsci.net [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .atdmt.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .atdmt.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        ad.yieldmanager.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .invitemedia.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .invitemedia.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .invitemedia.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .invitemedia.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .invitemedia.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .invitemedia.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .invitemedia.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .serving-sys.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .serving-sys.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .serving-sys.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .serving-sys.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .tribalfusion.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .microsoftsto.112.2o7.net [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .smartadserver.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .smartadserver.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .smartadserver.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        ad.zanox.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        ad4.adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .tracking.quisma.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        ad2.adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .adfarm1.adition.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .tracking.quisma.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        tracking.quisma.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        tracking.quisma.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .doubleclick.net [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .googleads.g.doubleclick.net [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .zanox.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .zanox-affiliate.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .tracking.quisma.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .unitymedia.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .unitymedia.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .tracking.quisma.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .smartadserver.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        .smartadserver.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        statse.webtrendslive.com [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        www.etracker.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        www.etracker.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        www.etracker.de [ C:\SANDBOX\TOMMY\DEFAULTBOX\USER\CURRENT\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\0W1774UB.DEFAULT\COOKIES.SQLITE ]
        C:\USERS\TOMMY\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOMMY@ADS.HEIAS[2].TXT [ /ADS.HEIAS ]
        C:\USERS\TOMMY\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOMMY@HITBOX[1].TXT [ /HITBOX ]
        C:\USERS\TOMMY\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOMMY@ADTECH[1].TXT [ /ADTECH ]
        C:\USERS\TOMMY\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOMMY@STATSE.WEBTRENDSLIVE[1].TXT [ /STATSE.WEBTRENDSLIVE ]
        C:\USERS\TOMMY\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\TOMMY@DOUBLECLICK[1].TXT [ /DOUBLECLICK ]

Der findet aber auch nur Cookies. MWB und ESET hab' ich jetzt nicht nochmal gemacht, weil seit dem Fixen mit Antivir keine Malware mehr aufgetaucht ist. Danke für die Programmvorschläge :) .

cosinus 19.12.2011 18:49

Ja, die Cookies sind harmlos.

Rechner sollte wieder im Lot wenn ich dich richtig verstanden habe?

Olorin 19.12.2011 19:39

Das war er wahrscheinlich schon bevor ich hier gepostet hatte.
Ich wollte einfach nur ein wenig Unterstützung beim Auswerten der diversen Logs, weil ich mit den Programmen zum Teil nicht vertraut bin/war.
Besten Dank :)

cosinus 19.12.2011 20:13

Dann wären wir durch! :abklatsch:

Die Programme, die hier zum Einsatz kamen, können alle wieder runter. CF kann über Start, Ausführen mit combofix /uninstall entfernt werden. Melde dich falls es da Fehlermeldungen zu gibt.
Malwarebytes zu behalten ist kein Fehler. Kannst ja 1x im Monat damit scannen, aber immer vorher ans Update denken.

Bitte abschließend die Updates prüfen, unten mein Leitfaden dazu. Um in Zukunft die Aktualität der installierten Programme besser im Überblick zu halten, kannst du zB Secunia PSI verwenden.
Für noch mehr Sicherheit solltest Du nach der (möglichen) beseitigten Infektion auch möglichst alle Passwörter ändern.


Microsoftupdate

Windows XP: Besuch mit dem IE die MS-Updateseite und lass Dir alle wichtigen Updates installieren.

Windows Vista/7: Anleitung Windows-Update


PDF-Reader aktualisieren
Ein veralteter AdobeReader stellt ein großes Sicherheitsrisiko dar. Du solltest daher besser alte Versionen vom AdobeReader über Systemsteuerung => Software bzw. Programme und Funktionen deinstallieren, indem Du dort auf "Adobe Reader x.0" klickst und das Programm entfernst. (falls du AdobeReader installiert hast)

Ich empfehle einen alternativen PDF-Reader wie PDF Xchange Viewer, SumatraPDF oder Foxit PDF Reader, die sind sehr viel schlanker und flotter als der AdobeReader.

Bitte überprüf bei der Gelegenheit auch die Aktualität des Flashplayers:

Adobe - Andere Version des Adobe Flash Player installieren

Notfalls kann man auch von Chip.de runterladen => http://filepony.de/?q=Flash+Player

Natürlich auch darauf achten, dass andere installierte Browser wie zB Firefox, Opera oder Chrome aktuell sind.


Java-Update
Veraltete Java-Installationen sind ein Sicherheitsrisiko, daher solltest Du die alten Versionen löschen (falls vorhanden, am besten mit JavaRa) und auf die neuste aktualisieren. Beende dazu alle Programme (v.a. die Browser), klick danach auf Start, Systemsteuerung, Software und deinstalliere darüber alle aufgelisteten Java-Versionen. Lad Dir danach von hier das aktuelle Java SE Runtime Environment (JRE) herunter und installiere es.


Alle Zeitangaben in WEZ +1. Es ist jetzt 09:04 Uhr.

Copyright ©2000-2024, Trojaner-Board


Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58