PDA

View Full Version : Vituamonde infected i think



Elensar
2008-08-10, 12:22
Hi,
I think my pc is infected with Virtuamonde. Spybot S&D detects it, but when i remove it with Spybot, it is on the next scan again there. After reading some of the other Threads i made a HijackThis-Scan. Here the Log:
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 11:12:22, on 10.08.2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe
C:\WINDOWS\system32\svchost.exe
C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
C:\Programme\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Programme\Canon\MyPrinter\BJMyPrt.exe
C:\Programme\G DATA AntiVirus\AVKTray\AVKTray.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\rundll32.exe
C:\Programme\Mozilla Firefox\firefox.exe
C:\WINDOWS\system32\rundll32.exe
C:\Programme\Trend Micro\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.web.de/home
O3 - Toolbar: (no name) - {0124123D-61B4-456f-AF86-78C53A0790C5} - (no file)
O4 - HKLM\..\Run: [ATIPTA] C:\Programme\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [CanonMyPrinter] C:\Programme\Canon\MyPrinter\BJMyPrt.exe /logon
O4 - HKLM\..\Run: [AVKTray] "C:\Programme\G DATA AntiVirus\AVKTray\AVKTray.exe"
O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Programme\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [BM7be8d853] Rundll32.exe "C:\WINDOWS\system32\hcbqlkjh.dll",s
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://go.web.de/home
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: G DATA AntiVirus Proxy (AVKProxy) - G DATA Software AG - C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
O23 - Service: G DATA Scheduler (AVKService) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
O23 - Service: AntiVirus Wächter (AVKWCtl) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe
O23 - Service: FCI (fci) - Unknown owner - C:\WINDOWS\system32\svchost.exe:exe.exe

--
End of file - 3726 bytes

I would be pleased for Help

Shaba
2008-08-12, 11:24
Hi Elensar

Rename HijackThis.exe to Elensar.exe and post back a fresh HijackThis log, please :)

Elensar
2008-08-16, 16:05
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 15:04:44, on 16.08.2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe
C:\WINDOWS\system32\svchost.exe
C:\Programme\ATI Technologies\ATI Control Panel\atiptaxx.exe
C:\Programme\Canon\MyPrinter\BJMyPrt.exe
C:\Programme\G DATA AntiVirus\AVKTray\AVKTray.exe
C:\WINDOWS\system32\RunDll32.exe
C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\Rundll32.exe
C:\WINDOWS\system32\ctfmon.exe
C:\WINDOWS\system32\wscntfy.exe
C:\Programme\Mozilla Firefox\firefox.exe
C:\Programme\Trend Micro\HijackThis\Elensar.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.web.de/home
O2 - BHO: {90fcfa21-1ca7-c87a-1704-3995709dcdc4} - {4cdcd907-5993-4071-a78c-7ac112afcf09} - C:\WINDOWS\system32\mxnycy.dll
O2 - BHO: Spybot-S&D IE Protection - {53707962-6f74-2d53-2644-206d7942484f} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: (no name) - {843bb6b9-21c7-44a0-a9f1-c8118743ef3b} - C:\WINDOWS\system32\wvUmnkhi.dll
O2 - BHO: (no name) - {b429cd9f-6b80-4195-81ee-fe965ba52aa6} - C:\WINDOWS\system32\efccDuUM.dll
O3 - Toolbar: (no name) - {0124123D-61B4-456f-AF86-78C53A0790C5} - (no file)
O4 - HKLM\..\Run: [ATIPTA] C:\Programme\ATI Technologies\ATI Control Panel\atiptaxx.exe
O4 - HKLM\..\Run: [CanonMyPrinter] C:\Programme\Canon\MyPrinter\BJMyPrt.exe /logon
O4 - HKLM\..\Run: [AVKTray] "C:\Programme\G DATA AntiVirus\AVKTray\AVKTray.exe"
O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Programme\Adobe\Reader 9.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [BM7be8d853] Rundll32.exe "C:\WINDOWS\system32\hcbqlkjh.dll",s
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://go.web.de/home
O20 - Winlogon Notify: winzzd32 - C:\WINDOWS\SYSTEM32\winzzd32.dll
O20 - Winlogon Notify: wvUmnkhi - C:\WINDOWS\SYSTEM32\wvUmnkhi.dll
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: G DATA AntiVirus Proxy (AVKProxy) - G DATA Software AG - C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
O23 - Service: G DATA Scheduler (AVKService) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
O23 - Service: AntiVirus Wächter (AVKWCtl) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe
O23 - Service: FCI (fci) - Unknown owner - C:\WINDOWS\system32\svchost.exe:exe.exe

--
End of file - 4290 bytes


Sry, was on a boarding school, so i could answer now

Shaba
2008-08-16, 16:19
We will begin with ComboFix. Please visit this webpage for download links, and instructions for running the tool:

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Please ensure you read this guide carefully and install the Recovery Console first.

The Windows Recovery Console will allow you to boot up into a special recovery (repair) mode. This allows us to more easily help you should your computer have a problem after an attempted removal of malware. It is a simple procedure that will only take a few moments of your time.

Once installed, you should see a blue screen prompt that says:

The Recovery Console was successfully installed.

Please continue as follows:


Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix, link (http://www.bleepingcomputer.com/forums/topic114351.html)
Remember to re-enable them afterwards.


Click Yes to allow ComboFix to continue scanning for malware.


When the tool is finished, it will produce a report for you.

Please include the following reports for further review, and so we may continue cleansing the system:

C:\ComboFix.txt
New HijackThis log.

A word of warning: Please do not run ComboFix on your own. This tool is not a toy and not for everyday use.

Elensar
2008-08-16, 19:12
ComboFix 08-08-15.04 - Thorben 2008-08-16 17:36:54.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.3.1252.1.1031.18.247 [GMT 2:00]
ausgeführt von:: C:\Dokumente und Einstellungen\Thorben\Desktop\ComboFix.exe
Command switches used :: C:\Dokumente und Einstellungen\Thorben\Desktop\WindowsXP-KB310994-SP2-Pro-BootDisk-DEU.exe
* Neuer Wiederherstellungspunkt wurde erstellt
.
ADS - svchost.exe: deleted 25088 bytes in 1 streams.

(((((((((((((((((((((((((((((((((((( Weitere L”schungen ))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Dokumente und Einstellungen\Thorben\Cookies\thorben@eu.wowarmory[1].txt
C:\Dokumente und Einstellungen\Thorben\Cookies\thorben@pub.softonic[2].txt
C:\WINDOWS\BM7be8d853.txt
C:\WINDOWS\pskt.ini
C:\WINDOWS\system32\drivers\11331e0d.sys
C:\WINDOWS\system32\drivers\cynm79.sys
C:\WINDOWS\system32\efccDuUM.dll
C:\WINDOWS\system32\fegmynqf.dll
C:\WINDOWS\system32\fftqbltr.dll
C:\WINDOWS\system32\fqnymgef.ini
C:\WINDOWS\system32\hcbqlkjh.dll
C:\WINDOWS\system32\hkviehyt.dll
C:\WINDOWS\system32\hvjoywte.dll
C:\WINDOWS\system32\ihcxcbek.dll
C:\WINDOWS\system32\jnkjbxug.exe
C:\WINDOWS\system32\kxtnntip.ini
C:\WINDOWS\system32\ledkcmfw.dll
C:\WINDOWS\system32\ljqdnhpq.ini
C:\WINDOWS\system32\lywtgmbm.dll
C:\WINDOWS\system32\mbphne.dll
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\MUuDccfe.ini
C:\WINDOWS\system32\MUuDccfe.ini2
C:\WINDOWS\system32\mxnycy.dll
C:\WINDOWS\system32\pitnntxk.dll
C:\WINDOWS\system32\qiwuicfo.exe
C:\WINDOWS\system32\qmbbqgdy.dll
C:\WINDOWS\system32\qphndqjl.dll
C:\WINDOWS\system32\rtlbqtff.ini
C:\WINDOWS\system32\ttbkpl.dll
C:\WINDOWS\system32\uihfmaip.exe
C:\WINDOWS\system32\wflxbdpw.exe
C:\WINDOWS\system32\wfmckdel.ini
C:\WINDOWS\system32\winzzd32.dll
C:\WINDOWS\system32\wvUmnkhi.dll
C:\WINDOWS\system32\xfecuc.dll

.
((((((((((((((((((((((((((((((((((((((( Treiber/Dienste )))))))))))))))))))))))))))))))))))))))))))))))))
.

-------\Legacy_cynm79
-------\Legacy_fci
-------\Service_11331e0d
-------\Service_cynm79
-------\Service_fci


((((((((((((((((((((((( Dateien erstellt von 2008-07-16 bis 2008-08-16 ))))))))))))))))))))))))))))))
.

2008-08-10 11:06 . 2008-08-10 11:06 <DIR> d-------- C:\Programme\Trend Micro
2008-08-08 20:40 . 2008-08-08 21:19 <DIR> d-------- C:\armybuilder
2008-08-08 19:44 . 2008-08-09 14:19 257 --a------ C:\WINDOWS\wininit.ini
2008-08-08 18:20 . 2008-08-08 18:55 <DIR> d-------- C:\Programme\Spybot - Search & Destroy
2008-08-08 18:20 . 2008-08-08 19:39 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Spybot - Search & Destroy
2008-08-08 18:05 . 2008-08-08 18:05 0 --a------ C:\WINDOWS\BM7be8d853.xml
2008-08-07 21:02 . 2008-08-07 21:02 29 --a------ C:\WINDOWS\system32\gydqthua.tmp
2008-08-06 13:11 . 2008-08-06 13:11 2,500 --a------ C:\WINDOWS\system32\wpa.bak
2008-08-06 12:43 . 2008-08-06 12:43 165,376 --a------ C:\WINDOWS\system32\drivers\atksgt.sys
2008-08-06 12:43 . 2008-08-06 12:43 18,048 --a------ C:\WINDOWS\system32\drivers\lirsgt.sys
2008-08-02 10:51 . 2008-08-02 10:51 1,144 --a------ C:\WINDOWS\mozver.dat
2008-08-01 13:56 . 2008-08-01 14:42 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\Mount&Blade
2008-07-31 20:00 . 2003-03-19 01:20 1,060,864 --a------ C:\WINDOWS\system32\mfc71.dll
2008-07-31 20:00 . 2006-04-29 14:25 40,960 --a------ C:\WINDOWS\system32\psfind.dll
2008-07-31 10:33 . 2008-07-31 10:42 698 --a------ C:\WINDOWS\EF2.INI
2008-07-29 20:12 . 2008-07-29 20:54 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\vlc
2008-07-29 20:07 . 2008-07-29 20:07 <DIR> d-------- C:\Programme\VideoLAN
2008-07-29 19:53 . 2005-01-28 08:53 5,525,504 --a------ C:\WINDOWS\system32\setb0.tmp
2008-07-29 19:08 . 2008-07-29 19:08 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\Talkback
2008-07-29 19:08 . 2008-07-29 19:08 0 --a------ C:\WINDOWS\nsreg.dat
2008-07-29 19:07 . 2008-07-29 19:08 <DIR> d-------- C:\Programme\MobMapUpdater
2008-07-29 19:01 . 2008-07-30 22:27 <DIR> d-------- C:\Programme\Google
2008-07-29 10:28 . 2008-07-29 10:28 <DIR> d-------- C:\Programme\TSO
2008-07-28 23:50 . 2008-07-28 23:50 <DIR> d-------- C:\Logs
2008-07-28 22:52 . 2008-07-28 22:53 <DIR> d--h----- C:\WINDOWS\msdownld.tmp
2008-07-28 22:52 . 2008-07-28 22:52 <DIR> d-------- C:\WINDOWS\ieakcust
2008-07-28 17:27 . 2008-07-28 17:27 <DIR> d-------- C:\Programme\Gemeinsame Dateien\Blizzard Entertainment
2008-07-28 13:48 . 2008-07-28 13:49 <DIR> d-------- C:\581c53057aaf170634
2008-07-28 13:40 . 2008-08-04 18:51 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\teamspeak2
2008-07-28 09:35 . 2008-07-28 13:40 <DIR> d-------- C:\Programme\Teamspeak2_RC2
2008-07-28 09:35 . 2008-07-28 09:35 34,064 --a------ C:\WINDOWS\system32\lhacm.acm
2008-07-28 00:14 . 2008-07-28 00:14 <DIR> d-------- C:\WINDOWS\Applian FLV Player
2008-07-28 00:14 . 2008-07-28 00:14 <DIR> d-------- C:\Programme\FLV Player
2008-07-27 21:10 . 2008-07-27 22:13 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\My Battle for Middle-earth Files
2008-07-27 21:09 . 2008-07-27 21:09 <DIR> d---s---- C:\Dokumente und Einstellungen\Thorben\UserData
2008-07-27 20:43 . 2008-07-27 20:43 <DIR> d-------- C:\Programme\EA GAMES
2008-07-27 19:04 . 2008-07-27 19:04 <DIR> d-------- C:\Programme\Windows Desktop Search
2008-07-27 18:36 . 2007-07-30 19:19 271,224 --a------ C:\WINDOWS\system32\mucltui.dll
2008-07-27 18:36 . 2007-07-30 19:19 207,736 --a------ C:\WINDOWS\system32\muweb.dll
2008-07-27 18:36 . 2007-07-30 19:18 30,072 --a------ C:\WINDOWS\system32\mucltui.dll.mui
2008-07-25 20:33 . 2008-08-01 12:55 1,063 --a------ C:\WINDOWS\EFXP.ini
2008-07-25 20:29 . 2008-07-25 20:29 <DIR> d-------- C:\Programme\Raven
2008-07-25 20:28 . 2008-07-26 22:12 1,054 --a------ C:\WINDOWS\ef.ini
2008-07-24 22:06 . 2008-07-24 22:06 <DIR> d-------- C:\Programme\Activision
2008-07-24 22:01 . 2008-07-27 12:26 992 --a------ C:\WINDOWS\STA2.ini
2008-07-24 17:44 . 2008-07-24 19:00 <DIR> d-------- C:\Programme\EGOSOFT
2008-07-24 17:44 . 2001-05-24 15:02 328,704 --a------ C:\WINDOWS\IsUn0407.exe
2008-07-24 17:42 . 2008-07-24 17:42 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\WINDOWS
2008-07-24 16:07 . 2008-07-24 16:07 <DIR> d--hs---- C:\WINDOWS\ftpcache
2008-07-24 14:08 . 2008-07-24 14:08 <DIR> d-------- C:\Program Files
2008-07-24 13:40 . 2008-07-24 13:40 <DIR> d-------- C:\Programme\Microsoft Works
2008-07-24 13:36 . 2008-07-24 13:36 <DIR> d-------- C:\Programme\Microsoft.NET
2008-07-24 13:31 . 2008-07-24 13:38 <DIR> d-------- C:\WINDOWS\SHELLNEW
2008-07-24 13:26 . 2008-07-24 13:26 <DIR> dr-h----- C:\MSOCache
2008-07-24 13:23 . 2008-07-28 22:45 276 --a------ C:\WINDOWS\system\cmicnfg.ini
2008-07-24 12:17 . 2008-07-27 19:18 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Microsoft Help
2008-07-24 12:04 . 2008-07-24 12:04 <DIR> d-------- C:\Dokumente und Einstellungen\LocalService\Startmen
2008-07-24 11:47 . 2008-07-27 19:04 <DIR> d-------- C:\WINDOWS\system32\de-de
2008-07-24 11:42 . 2008-07-24 11:42 <DIR> d-------- C:\WINDOWS\ServicePackFiles
2008-07-24 11:31 . 2006-12-29 00:31 19,569 --a------ C:\WINDOWS\002948_.tmp
2008-07-24 11:30 . 2007-08-10 20:44 26,488 --a------ C:\WINDOWS\system32\spupdsvc.exe
2008-07-24 10:58 . 2007-07-30 19:19 216,408 --a------ C:\WINDOWS\system32\wuaucpl.cpl
2008-07-24 10:54 . 2008-07-24 10:57 <DIR> d-------- C:\Programme\Gemeinsame Dateien\Adobe
2008-07-24 10:52 . 2008-07-24 12:06 <DIR> d-------- C:\Programme\NOS
2008-07-24 10:52 . 2008-07-24 12:06 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\NOS
2008-07-24 10:44 . 2008-07-24 10:45 <DIR> d-------- C:\WUTemp
2008-07-24 10:44 . 2008-04-14 07:52 191,488 --a------ C:\WINDOWS\system32\iuengine.dll
2008-07-24 10:44 . 2008-04-14 00:49 146,048 --a------ C:\WINDOWS\system32\drivers\portcls.sys
2008-07-24 10:44 . 2008-04-14 00:46 141,056 --a------ C:\WINDOWS\system32\drivers\ks.sys
2008-07-24 10:44 . 2008-04-14 07:53 129,536 --a------ C:\WINDOWS\system32\ksproxy.ax
2008-07-24 10:44 . 2008-04-14 00:15 60,160 --a------ C:\WINDOWS\system32\drivers\drmk.sys
2008-07-24 10:44 . 2008-04-14 00:15 49,408 --a------ C:\WINDOWS\system32\drivers\stream.sys
2008-07-24 10:44 . 2008-04-14 07:53 23,552 --a------ C:\WINDOWS\system32\wdmaud.drv
2008-07-24 10:44 . 2008-04-14 07:52 4,096 --a------ C:\WINDOWS\system32\ksuser.dll
2008-07-24 10:35 . 2008-07-24 10:35 41,928 --a------ C:\WINDOWS\system32\drivers\GDTdiIcpt.sys
2008-07-24 10:29 . 2008-07-30 11:33 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\G DATA
2008-07-24 10:29 . 2008-07-24 10:29 46,536 --a------ C:\WINDOWS\system32\drivers\MiniIcpt.sys
2008-07-24 10:29 . 2008-07-24 10:29 32,200 --a------ C:\WINDOWS\system32\drivers\HookCentre.sys
2008-07-24 10:26 . 2008-07-24 10:27 <DIR> d-------- C:\Programme\Gemeinsame Dateien\G DATA
2008-07-24 10:26 . 2008-07-24 10:27 <DIR> d-------- C:\Programme\G DATA AntiVirus
2008-07-24 10:25 . 2008-07-24 10:25 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\InstallShield
2008-07-24 10:14 . 2008-07-24 10:14 <DIR> d--hs---- C:\found.000
2008-07-24 10:11 . 2003-04-02 14:00 1,875,968 --a--c--- C:\WINDOWS\system32\dllcache\msir3jp.lex
2008-07-24 10:10 . 2008-04-14 07:50 13,463,552 --a--c--- C:\WINDOWS\system32\dllcache\hwxjpn.dll
2008-07-24 10:09 . 2001-08-18 04:54 2,134,528 --a--c--- C:\WINDOWS\system32\dllcache\EXCH_smtpsnap.dll
2008-07-24 10:08 . 2008-07-24 10:08 299,552 --a------ C:\WINDOWS\WMSysPrx.prx
2008-07-24 10:08 . 2003-04-02 14:00 172,032 --a--c--- C:\WINDOWS\system32\dllcache\iisui.dll
2008-07-24 10:08 . 2003-04-02 14:00 96,768 --a--c--- C:\WINDOWS\system32\dllcache\certmap.ocx
2008-07-24 10:08 . 2008-07-24 10:08 25,065 --a------ C:\WINDOWS\system32\wmpscheme.xml
2008-07-24 10:08 . 2003-04-02 14:00 19,968 --a--c--- C:\WINDOWS\system32\dllcache\inetsloc.dll
2008-07-24 10:08 . 2003-04-02 14:00 15,360 --a--c--- C:\WINDOWS\system32\dllcache\iisreset.exe
2008-07-24 10:08 . 2003-04-02 14:00 7,680 --a--c--- C:\WINDOWS\system32\dllcache\inetmgr.exe
2008-07-24 10:08 . 2003-04-02 14:00 6,144 --a--c--- C:\WINDOWS\system32\dllcache\ftpsapi2.dll
2008-07-24 10:08 . 2003-04-02 14:00 5,632 --a--c--- C:\WINDOWS\system32\dllcache\iisrstap.dll
2008-07-24 10:07 . 2008-04-14 00:15 52,864 --a------ C:\WINDOWS\system32\drivers\dmusic.sys
2008-07-24 10:07 . 2008-04-14 00:15 6,272 --a------ C:\WINDOWS\system32\drivers\splitter.sys
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\WindowsShell.Manifest
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\system32\wuaucpl.cpl.manifest
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\system32\sapi.cpl.manifest
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\system32\nwc.cpl.manifest
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\system32\ncpa.cpl.manifest
2008-07-24 10:06 . 2008-07-24 10:06 488 -rah----- C:\WINDOWS\system32\logonui.exe.manifest
2008-07-24 10:04 . 2008-04-14 07:52 691,712 --a------ C:\WINDOWS\system32\inetcomm.dll
2008-07-24 10:02 . 2008-04-14 07:52 2,061,824 --a------ C:\WINDOWS\system32\mstscax.dll
2008-07-24 10:01 . 2008-04-14 07:52 58,880 --a------ C:\WINDOWS\system32\licwmi.dll
2008-07-24 09:54 . 2003-04-02 14:00 1,086,182 -ra------ C:\WINDOWS\SET1C.tmp
2008-07-24 09:54 . 2003-04-02 14:00 13,898 -ra------ C:\WINDOWS\SET28.tmp
2008-07-24 09:49 . 2008-04-14 07:22 57,728 --a------ C:\WINDOWS\system32\drivers\redbook.sys
2008-07-24 09:48 . 2001-08-17 12:13 27,165 --a------ C:\WINDOWS\system32\drivers\fetnd5.sys
2008-07-24 09:46 . 2008-04-14 00:02 196,224 --a------ C:\WINDOWS\system32\drivers\rdpdr.sys
2008-07-24 09:46 . 2008-04-14 07:53 40,840 --a------ C:\WINDOWS\system32\drivers\termdd.sys
2008-07-24 09:44 . 2008-04-14 07:53 146,944 --a------ C:\WINDOWS\system\winspool.drv
2008-07-24 09:44 . 2008-04-14 07:52 76,288 --a------ C:\WINDOWS\system32\storprop.dll
2008-07-24 09:44 . 2003-04-02 14:00 24,661 --a------ C:\WINDOWS\system32\spxcoins.dll
2008-07-24 09:44 . 2003-04-02 14:00 24,661 --a--c--- C:\WINDOWS\system32\dllcache\spxcoins.dll
2008-07-24 09:44 . 2003-04-02 14:00 13,824 --a------ C:\WINDOWS\system32\irclass.dll
2008-07-24 09:44 . 2003-04-02 14:00 13,824 --a--c--- C:\WINDOWS\system32\dllcache\irclass.dll
2008-07-24 09:44 . 2008-04-14 00:24 11,264 --a------ C:\WINDOWS\system32\drivers\irenum.sys
2008-07-24 09:43 . 2003-04-02 14:00 1,086,182 -ra------ C:\WINDOWS\SET31.tmp
2008-07-24 09:43 . 2003-04-02 14:00 817,199 --a--c--- C:\WINDOWS\system32\dllcache\NT5IIS.CAT
2008-07-24 09:43 . 2003-04-02 14:00 399,645 --a--c--- C:\WINDOWS\system32\dllcache\MAPIMIG.CAT

.
(((((((((((((((((((((((((((((((((((( Find3M Bericht ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-07 19:01 14,336 ----a-w C:\WINDOWS\system32\svchost.exe
2008-07-23 21:10 122 ----a-w C:\Programme\INSTALL.LOG
2008-07-23 10:42 --------- d-----w C:\Programme\Die Römer
2008-07-22 20:22 --------- d-----w C:\Programme\microsoft frontpage
2008-07-22 20:18 --------- d-----w C:\Programme\Online-Dienste
2008-07-22 20:17 --------- d-----w C:\Programme\Gemeinsame Dateien\Dienste
.

(((((((((((((((((((((((((((( Autostart Punkte der Registrierung ))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Hinweis* leere Eintrage & legitime Standardeintrage werden nicht angezeigt.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\CTFMON.EXE" [2008-04-14 07:52 15360]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "C:\Programme\Windows Desktop Search\MSNLNamespaceMgr.dll" [2007-02-05 15:39 294400]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=xfecuc.dll

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Programme\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"C:\\Programme\\Raven\\Star Trek Voyager Elite Force\\stvoyHM.exe"=
"C:\\Programme\\EA GAMES\\The Battle for Middle-earth (tm)\\game.dat"=
"F:\\World of Warcraft\\Repair.exe"=
"F:\\Activision\\EF2\\EF2.exe"=
"F:\\Programme\\Atari\\Act of War - Direct Action\\ACTOFWAR.EXE"=
"F:\\Programme\\Atari\\Act of War - High Treason\\ActOfWar_HighTreason.exe"=
"C:\\WINDOWS\\system32\\winver.exe"=

R2 AVKProxy;G DATA AntiVirus Proxy;C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe [2008-02-19 11:45]
R2 AVKService;G DATA Scheduler;C:\Programme\G DATA AntiVirus\AVK\AVKService.exe [2008-02-07 05:26]
R2 AVKWCtl;AntiVirus Wächter;C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe [2008-02-05 12:26]
R2 GDTdiInterceptor;GDTdiInterceptor;C:\WINDOWS\System32\drivers\GDTdiIcpt.sys [2008-07-24 10:35]
R3 GDMnIcpt;GDMnIcpt;C:\WINDOWS\System32\drivers\MiniIcpt.sys [2008-07-24 10:29]
R3 HookCentre;HookCentre;C:\WINDOWS\System32\drivers\HookCentre.sys [2008-07-24 10:29]
S3 bDMusicb;bDMusicb;C:\DOKUME~1\Thorben\LOKALE~1\Temp\bDMusicb.sys []
.
- - - - Entfernte verwaiste Registrierungseintr„ge - - - -

Notify-winzzd32 - winzzd32.dll


.
------- Zus„tzlicher Scan -------
.
FireFox -: Profile - C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\Mozilla\Firefox\Profiles\130d6kgz.default\


**************************************************************************

catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-16 17:57:27
Windows 5.1.2600 Service Pack 3 NTFS

Scanne versteckte Prozesse...

C:\WINDOWS\explorer.exe [1800] 0x821BF430

Scanne versteckte Autostart Eintr„ge...

Scanne versteckte Dateien...

Scan erfolgreich abgeschlossen
versteckte Dateien: 0

**************************************************************************
.
--------------------- Durch laufende Prozesse gestartete DLLs ---------------------

Prozess: C:\WINDOWS\system32\winlogon.exe
-> C:\WINDOWS\system32\Ati2evxx.dll
.
------------------------ Weitere, laufende Prozesse ------------------------
.
C:\WINDOWS\system32\ati2evxx.exe
C:\WINDOWS\system32\ati2evxx.exe
C:\WINDOWS\system32\wdfmgr.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\imapi.exe
.
**************************************************************************
.
Zeit der Fertigstellung: 2008-08-16 18:07:10 - PC wurde neu gestartet
ComboFix-quarantined-files.txt 2008-08-16 16:06:24

Pre-Run: 4,997,406,720 Bytes frei
Post-Run: 5,752,115,200 Bytes frei

WindowsXP-KB310994-SP2-Pro-BootDisk-DEU.exe
[boot loader]
timeout=2
default=multi(0)disk(0)rdisk(0)partition(1)\WINDOWS
[operating systems]
C:\CMDCONS\BOOTSECT.DAT="Microsoft Windows Recovery Console" /cmdcons
multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft Windows XP Professional" /fastdetect /NoExecute=OptIn

268 --- E O F --- 2008-08-07 01:05:48




Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:11:41, on 16.08.2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe
C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Programme\Mozilla Firefox\firefox.exe
C:\Programme\Trend Micro\HijackThis\Elensar.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
O2 - BHO: Spybot-S&D IE Protection - {53707962-6f74-2d53-2644-206d7942484f} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: (no name) - {0124123D-61B4-456f-AF86-78C53A0790C5} - (no file)
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKALER DIENST')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETZWERKDIENST')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://go.web.de/home
O20 - AppInit_DLLs: xfecuc.dll
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: G DATA AntiVirus Proxy (AVKProxy) - G DATA Software AG - C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
O23 - Service: G DATA Scheduler (AVKService) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
O23 - Service: AntiVirus Wächter (AVKWCtl) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe

--
End of file - 3501 bytes

Shaba
2008-08-16, 19:16
Open notepad and copy/paste the text in the codebox below into it:


File::
C:\WINDOWS\BM7be8d853.xml
C:\WINDOWS\system32\gydqthua.tmp

Registry::
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows]
"AppInit_DLLs"=-


Save this as "CFScript"

Then drag the CFScript into ComboFix.exe as you see in the screenshot below.

http://img.photobucket.com/albums/v666/sUBs/CFScriptB-4.gif

This will start ComboFix again. After reboot, (in case it asks to reboot), post the contents of Combofix.txt in your next reply together with a new HijackThis log.

Combofix should never take more that 20 minutes including the reboot if malware is detected.
If it does, open Task Manager then Processes tab (press ctrl, alt and del at the same time) and end any processes of findstr, find, sed or swreg, then combofix should continue.
If that happened we want to know, and also what process you had to end.

Elensar
2008-08-16, 19:48
ComboFix 08-08-15.04 - Thorben 2008-08-16 18:40:09.2 - NTFSx86
ausgeführt von:: C:\Dokumente und Einstellungen\Thorben\Desktop\ComboFix.exe
Command switches used :: C:\Dokumente und Einstellungen\Thorben\Desktop\CFScript.txt
* Neuer Wiederherstellungspunkt wurde erstellt
* Resident AV is active


FILE ::
C:\WINDOWS\BM7be8d853.xml
C:\WINDOWS\system32\gydqthua.tmp
.

(((((((((((((((((((((((((((((((((((( Weitere Löschungen ))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\WINDOWS\BM7be8d853.xml
C:\WINDOWS\system32\gydqthua.tmp

.
((((((((((((((((((((((( Dateien erstellt von 2008-07-16 bis 2008-08-16 ))))))))))))))))))))))))))))))
.

2008-08-10 11:06 . 2008-08-10 11:06 <DIR> d-------- C:\Programme\Trend Micro
2008-08-08 20:40 . 2008-08-08 21:19 <DIR> d-------- C:\armybuilder
2008-08-08 19:44 . 2008-08-09 14:19 257 --a------ C:\WINDOWS\wininit.ini
2008-08-08 18:20 . 2008-08-08 18:55 <DIR> d-------- C:\Programme\Spybot - Search & Destroy
2008-08-08 18:20 . 2008-08-08 19:39 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Spybot - Search & Destroy
2008-08-06 13:11 . 2008-08-06 13:11 2,500 --a------ C:\WINDOWS\system32\wpa.bak
2008-08-06 12:43 . 2008-08-06 12:43 165,376 --a------ C:\WINDOWS\system32\drivers\atksgt.sys
2008-08-06 12:43 . 2008-08-06 12:43 18,048 --a------ C:\WINDOWS\system32\drivers\lirsgt.sys
2008-08-02 10:51 . 2008-08-02 10:51 1,144 --a------ C:\WINDOWS\mozver.dat
2008-08-01 13:56 . 2008-08-01 14:42 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\Mount&Blade
2008-07-31 20:00 . 2003-03-19 01:20 1,060,864 --a------ C:\WINDOWS\system32\mfc71.dll
2008-07-31 20:00 . 2006-04-29 14:25 40,960 --a------ C:\WINDOWS\system32\psfind.dll
2008-07-31 10:33 . 2008-07-31 10:42 698 --a------ C:\WINDOWS\EF2.INI
2008-07-29 20:12 . 2008-07-29 20:54 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\vlc
2008-07-29 20:07 . 2008-07-29 20:07 <DIR> d-------- C:\Programme\VideoLAN
2008-07-29 19:53 . 2005-01-28 08:53 5,525,504 --a------ C:\WINDOWS\system32\setb0.tmp
2008-07-29 19:08 . 2008-07-29 19:08 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\Talkback
2008-07-29 19:08 . 2008-07-29 19:08 0 --a------ C:\WINDOWS\nsreg.dat
2008-07-29 19:07 . 2008-07-29 19:08 <DIR> d-------- C:\Programme\MobMapUpdater
2008-07-29 19:01 . 2008-07-30 22:27 <DIR> d-------- C:\Programme\Google
2008-07-29 10:28 . 2008-07-29 10:28 <DIR> d-------- C:\Programme\TSO
2008-07-28 23:50 . 2008-07-28 23:50 <DIR> d-------- C:\Logs
2008-07-28 22:52 . 2008-07-28 22:53 <DIR> d--h----- C:\WINDOWS\msdownld.tmp
2008-07-28 22:52 . 2008-07-28 22:52 <DIR> d-------- C:\WINDOWS\ieakcust
2008-07-28 17:27 . 2008-07-28 17:27 <DIR> d-------- C:\Programme\Gemeinsame Dateien\Blizzard Entertainment
2008-07-28 13:48 . 2008-07-28 13:49 <DIR> d-------- C:\581c53057aaf170634
2008-07-28 13:40 . 2008-08-04 18:51 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\teamspeak2
2008-07-28 09:35 . 2008-07-28 13:40 <DIR> d-------- C:\Programme\Teamspeak2_RC2
2008-07-28 09:35 . 2008-07-28 09:35 34,064 --a------ C:\WINDOWS\system32\lhacm.acm
2008-07-28 00:14 . 2008-07-28 00:14 <DIR> d-------- C:\WINDOWS\Applian FLV Player
2008-07-28 00:14 . 2008-07-28 00:14 <DIR> d-------- C:\Programme\FLV Player
2008-07-27 21:10 . 2008-07-27 22:13 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\My Battle for Middle-earth Files
2008-07-27 21:09 . 2008-07-27 21:09 <DIR> d---s---- C:\Dokumente und Einstellungen\Thorben\UserData
2008-07-27 20:43 . 2008-07-27 20:43 <DIR> d-------- C:\Programme\EA GAMES
2008-07-27 19:04 . 2008-07-27 19:04 <DIR> d-------- C:\Programme\Windows Desktop Search
2008-07-27 18:36 . 2007-07-30 19:19 271,224 --a------ C:\WINDOWS\system32\mucltui.dll
2008-07-27 18:36 . 2007-07-30 19:19 207,736 --a------ C:\WINDOWS\system32\muweb.dll
2008-07-27 18:36 . 2007-07-30 19:18 30,072 --a------ C:\WINDOWS\system32\mucltui.dll.mui
2008-07-25 20:33 . 2008-08-01 12:55 1,063 --a------ C:\WINDOWS\EFXP.ini
2008-07-25 20:29 . 2008-07-25 20:29 <DIR> d-------- C:\Programme\Raven
2008-07-25 20:28 . 2008-07-26 22:12 1,054 --a------ C:\WINDOWS\ef.ini
2008-07-24 22:06 . 2008-07-24 22:06 <DIR> d-------- C:\Programme\Activision
2008-07-24 22:01 . 2008-07-27 12:26 992 --a------ C:\WINDOWS\STA2.ini
2008-07-24 17:44 . 2008-07-24 19:00 <DIR> d-------- C:\Programme\EGOSOFT
2008-07-24 17:44 . 2001-05-24 15:02 328,704 --a------ C:\WINDOWS\IsUn0407.exe
2008-07-24 17:42 . 2008-07-24 17:42 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\WINDOWS
2008-07-24 16:07 . 2008-07-24 16:07 <DIR> d--hs---- C:\WINDOWS\ftpcache
2008-07-24 14:08 . 2008-07-24 14:08 <DIR> d-------- C:\Program Files
2008-07-24 13:40 . 2008-07-24 13:40 <DIR> d-------- C:\Programme\Microsoft Works
2008-07-24 13:36 . 2008-07-24 13:36 <DIR> d-------- C:\Programme\Microsoft.NET
2008-07-24 13:31 . 2008-07-24 13:38 <DIR> d-------- C:\WINDOWS\SHELLNEW
2008-07-24 13:26 . 2008-07-24 13:26 <DIR> dr-h----- C:\MSOCache
2008-07-24 13:23 . 2008-07-28 22:45 276 --a------ C:\WINDOWS\system\cmicnfg.ini
2008-07-24 12:17 . 2008-07-27 19:18 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Microsoft Help
2008-07-24 12:04 . 2008-07-24 12:04 <DIR> d-------- C:\Dokumente und Einstellungen\LocalService\Startmenü
2008-07-24 11:47 . 2008-07-27 19:04 <DIR> d-------- C:\WINDOWS\system32\de-de
2008-07-24 11:42 . 2008-07-24 11:42 <DIR> d-------- C:\WINDOWS\ServicePackFiles
2008-07-24 11:31 . 2006-12-29 00:31 19,569 --a------ C:\WINDOWS\002948_.tmp
2008-07-24 11:30 . 2007-08-10 20:44 26,488 --a------ C:\WINDOWS\system32\spupdsvc.exe
2008-07-24 10:58 . 2007-07-30 19:19 216,408 --a------ C:\WINDOWS\system32\wuaucpl.cpl
2008-07-24 10:54 . 2008-07-24 10:57 <DIR> d-------- C:\Programme\Gemeinsame Dateien\Adobe
2008-07-24 10:52 . 2008-07-24 12:06 <DIR> d-------- C:\Programme\NOS
2008-07-24 10:52 . 2008-07-24 12:06 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\NOS
2008-07-24 10:44 . 2008-07-24 10:45 <DIR> d-------- C:\WUTemp
2008-07-24 10:44 . 2008-04-14 07:52 191,488 --a------ C:\WINDOWS\system32\iuengine.dll
2008-07-24 10:44 . 2008-04-14 00:49 146,048 --a------ C:\WINDOWS\system32\drivers\portcls.sys
2008-07-24 10:44 . 2008-04-14 00:46 141,056 --a------ C:\WINDOWS\system32\drivers\ks.sys
2008-07-24 10:44 . 2008-04-14 07:53 129,536 --a------ C:\WINDOWS\system32\ksproxy.ax
2008-07-24 10:44 . 2008-04-14 00:15 60,160 --a------ C:\WINDOWS\system32\drivers\drmk.sys
2008-07-24 10:44 . 2008-04-14 00:15 49,408 --a------ C:\WINDOWS\system32\drivers\stream.sys
2008-07-24 10:44 . 2008-04-14 07:53 23,552 --a------ C:\WINDOWS\system32\wdmaud.drv
2008-07-24 10:44 . 2008-04-14 07:52 4,096 --a------ C:\WINDOWS\system32\ksuser.dll
2008-07-24 10:35 . 2008-07-24 10:35 41,928 --a------ C:\WINDOWS\system32\drivers\GDTdiIcpt.sys
2008-07-24 10:29 . 2008-07-30 11:33 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\G DATA
2008-07-24 10:29 . 2008-07-24 10:29 46,536 --a------ C:\WINDOWS\system32\drivers\MiniIcpt.sys
2008-07-24 10:29 . 2008-07-24 10:29 32,200 --a------ C:\WINDOWS\system32\drivers\HookCentre.sys
2008-07-24 10:26 . 2008-07-24 10:27 <DIR> d-------- C:\Programme\Gemeinsame Dateien\G DATA
2008-07-24 10:26 . 2008-07-24 10:27 <DIR> d-------- C:\Programme\G DATA AntiVirus
2008-07-24 10:25 . 2008-07-24 10:25 <DIR> d-------- C:\Dokumente und Einstellungen\Thorben\Anwendungsdaten\InstallShield
2008-07-24 10:14 . 2008-07-24 10:14 <DIR> d--hs---- C:\found.000
2008-07-24 10:11 . 2003-04-02 14:00 1,875,968 --a--c--- C:\WINDOWS\system32\dllcache\msir3jp.lex
2008-07-24 10:10 . 2008-04-14 07:50 13,463,552 --a--c--- C:\WINDOWS\system32\dllcache\hwxjpn.dll
2008-07-24 10:09 . 2001-08-18 04:54 2,134,528 --a--c--- C:\WINDOWS\system32\dllcache\EXCH_smtpsnap.dll
2008-07-24 10:08 . 2008-07-24 10:08 299,552 --a------ C:\WINDOWS\WMSysPrx.prx
2008-07-24 10:08 . 2003-04-02 14:00 172,032 --a--c--- C:\WINDOWS\system32\dllcache\iisui.dll
2008-07-24 10:08 . 2003-04-02 14:00 96,768 --a--c--- C:\WINDOWS\system32\dllcache\certmap.ocx
2008-07-24 10:08 . 2008-07-24 10:08 25,065 --a------ C:\WINDOWS\system32\wmpscheme.xml
2008-07-24 10:08 . 2003-04-02 14:00 19,968 --a--c--- C:\WINDOWS\system32\dllcache\inetsloc.dll
2008-07-24 10:08 . 2003-04-02 14:00 15,360 --a--c--- C:\WINDOWS\system32\dllcache\iisreset.exe
2008-07-24 10:08 . 2003-04-02 14:00 7,680 --a--c--- C:\WINDOWS\system32\dllcache\inetmgr.exe
2008-07-24 10:08 . 2003-04-02 14:00 6,144 --a--c--- C:\WINDOWS\system32\dllcache\ftpsapi2.dll
2008-07-24 10:08 . 2003-04-02 14:00 5,632 --a--c--- C:\WINDOWS\system32\dllcache\iisrstap.dll
2008-07-24 10:07 . 2008-04-14 00:15 52,864 --a------ C:\WINDOWS\system32\drivers\dmusic.sys
2008-07-24 10:07 . 2008-04-14 00:15 6,272 --a------ C:\WINDOWS\system32\drivers\splitter.sys
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\WindowsShell.Manifest
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\system32\wuaucpl.cpl.manifest
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\system32\sapi.cpl.manifest
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\system32\nwc.cpl.manifest
2008-07-24 10:06 . 2008-07-24 10:06 749 -rah----- C:\WINDOWS\system32\ncpa.cpl.manifest
2008-07-24 10:06 . 2008-07-24 10:06 488 -rah----- C:\WINDOWS\system32\logonui.exe.manifest
2008-07-24 10:04 . 2008-04-14 07:52 691,712 --a------ C:\WINDOWS\system32\inetcomm.dll
2008-07-24 10:02 . 2008-04-14 07:52 2,061,824 --a------ C:\WINDOWS\system32\mstscax.dll
2008-07-24 10:01 . 2008-04-14 07:52 58,880 --a------ C:\WINDOWS\system32\licwmi.dll
2008-07-24 09:54 . 2003-04-02 14:00 1,086,182 -ra------ C:\WINDOWS\SET1C.tmp
2008-07-24 09:54 . 2003-04-02 14:00 13,898 -ra------ C:\WINDOWS\SET28.tmp
2008-07-24 09:49 . 2008-04-14 07:22 57,728 --a------ C:\WINDOWS\system32\drivers\redbook.sys
2008-07-24 09:48 . 2001-08-17 12:13 27,165 --a------ C:\WINDOWS\system32\drivers\fetnd5.sys
2008-07-24 09:46 . 2008-04-14 00:02 196,224 --a------ C:\WINDOWS\system32\drivers\rdpdr.sys
2008-07-24 09:46 . 2008-04-14 07:53 40,840 --a------ C:\WINDOWS\system32\drivers\termdd.sys
2008-07-24 09:44 . 2008-04-14 07:53 146,944 --a------ C:\WINDOWS\system\winspool.drv
2008-07-24 09:44 . 2008-04-14 07:52 76,288 --a------ C:\WINDOWS\system32\storprop.dll
2008-07-24 09:44 . 2003-04-02 14:00 24,661 --a------ C:\WINDOWS\system32\spxcoins.dll
2008-07-24 09:44 . 2003-04-02 14:00 24,661 --a--c--- C:\WINDOWS\system32\dllcache\spxcoins.dll
2008-07-24 09:44 . 2003-04-02 14:00 13,824 --a------ C:\WINDOWS\system32\irclass.dll
2008-07-24 09:44 . 2003-04-02 14:00 13,824 --a--c--- C:\WINDOWS\system32\dllcache\irclass.dll
2008-07-24 09:44 . 2008-04-14 00:24 11,264 --a------ C:\WINDOWS\system32\drivers\irenum.sys
2008-07-24 09:43 . 2003-04-02 14:00 1,086,182 -ra------ C:\WINDOWS\SET31.tmp
2008-07-24 09:43 . 2003-04-02 14:00 817,199 --a--c--- C:\WINDOWS\system32\dllcache\NT5IIS.CAT
2008-07-24 09:43 . 2003-04-02 14:00 399,645 --a--c--- C:\WINDOWS\system32\dllcache\MAPIMIG.CAT
2008-07-24 09:43 . 2003-04-02 14:00 41,270 --a--c--- C:\WINDOWS\system32\dllcache\MW770.CAT
2008-07-24 09:43 . 2003-04-02 14:00 13,898 -ra------ C:\WINDOWS\SET3D.tmp

.
(((((((((((((((((((((((((((((((((((( Find3M Bericht ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2008-08-07 19:01 14,336 ----a-w C:\WINDOWS\system32\svchost.exe
2008-07-23 21:10 122 ----a-w C:\Programme\INSTALL.LOG
2008-07-22 20:22 --------- d-----w C:\Programme\microsoft frontpage
2008-07-22 20:18 --------- d-----w C:\Programme\Online-Dienste
2008-07-22 20:17 --------- d-----w C:\Programme\Gemeinsame Dateien\Dienste
.

(((((((((((((((((((((((((((( Autostart Punkte der Registrierung ))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Hinweis* leere Eintrage & legitime Standardeintrage werden nicht angezeigt.

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="C:\WINDOWS\system32\CTFMON.EXE" [2008-04-14 07:52 15360]

[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{56F9679E-7826-4C84-81F3-532071A8BCC5}"= "C:\Programme\Windows Desktop Search\MSNLNamespaceMgr.dll" [2007-02-05 15:39 294400]

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Programme\\Microsoft Office\\Office12\\OUTLOOK.EXE"=
"C:\\Programme\\Raven\\Star Trek Voyager Elite Force\\stvoyHM.exe"=
"C:\\Programme\\EA GAMES\\The Battle for Middle-earth (tm)\\game.dat"=
"F:\\World of Warcraft\\Repair.exe"=
"F:\\Activision\\EF2\\EF2.exe"=
"F:\\Programme\\Atari\\Act of War - Direct Action\\ACTOFWAR.EXE"=
"F:\\Programme\\Atari\\Act of War - High Treason\\ActOfWar_HighTreason.exe"=
"C:\\WINDOWS\\system32\\winver.exe"=

R2 AVKProxy;G DATA AntiVirus Proxy;C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe [2008-02-19 11:45]
R2 AVKService;G DATA Scheduler;C:\Programme\G DATA AntiVirus\AVK\AVKService.exe [2008-02-07 05:26]
R2 AVKWCtl;AntiVirus Wächter;C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe [2008-02-05 12:26]
R2 GDTdiInterceptor;GDTdiInterceptor;C:\WINDOWS\System32\drivers\GDTdiIcpt.sys [2008-07-24 10:35]
R3 GDMnIcpt;GDMnIcpt;C:\WINDOWS\System32\drivers\MiniIcpt.sys [2008-07-24 10:29]
R3 HookCentre;HookCentre;C:\WINDOWS\System32\drivers\HookCentre.sys [2008-07-24 10:29]
S3 bDMusicb;bDMusicb;C:\DOKUME~1\Thorben\LOKALE~1\Temp\bDMusicb.sys []
.
**************************************************************************

catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-08-16 18:43:44
Windows 5.1.2600 Service Pack 3 NTFS

Scanne versteckte Prozesse...

Scanne versteckte Autostart Einträge...

Scanne versteckte Dateien...

Scan erfolgreich abgeschlossen
versteckte Dateien: 0

**************************************************************************
.
--------------------- Durch laufende Prozesse gestartete DLLs ---------------------

Prozess: C:\WINDOWS\system32\winlogon.exe
-> C:\WINDOWS\system32\Ati2evxx.dll
.
Zeit der Fertigstellung: 2008-08-16 18:45:23
ComboFix-quarantined-files.txt 2008-08-16 16:45:06
ComboFix2.txt 2008-08-16 16:07:14

Pre-Run: 5,736,239,104 Bytes frei
Post-Run: 5,727,203,328 Bytes frei

200 --- E O F --- 2008-08-07 01:05:48




Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 18:47:53, on 16.08.2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe
C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\WINDOWS\explorer.exe
C:\Programme\Mozilla Firefox\firefox.exe
C:\Programme\Trend Micro\HijackThis\Elensar.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
O2 - BHO: Spybot-S&D IE Protection - {53707962-6f74-2d53-2644-206d7942484f} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O3 - Toolbar: (no name) - {0124123D-61B4-456f-AF86-78C53A0790C5} - (no file)
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKALER DIENST')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETZWERKDIENST')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://go.web.de/home
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: G DATA AntiVirus Proxy (AVKProxy) - G DATA Software AG - C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
O23 - Service: G DATA Scheduler (AVKService) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
O23 - Service: AntiVirus Wächter (AVKWCtl) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe

--
End of file - 3436 bytes

Shaba
2008-08-16, 19:52
Open HijackThis, click do a system scan only and checkmark these:


R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank (only if you haven't set it)
O3 - Toolbar: (no name) - {0124123D-61B4-456f-AF86-78C53A0790C5} - (no file)

Close all windows including browser and press fix checked.

Reboot.

Please make sure that all programs are closed when installing Java.

Click here (http://java.sun.com/javase/downloads/index.jsp) to visit Java's website.
Scroll down to Java Runtime Environment (JRE) 6 Update 7. Click on Download.
Select Windows from the drop-down list for Platform.
Select Multi-language from the drop-down list for Language.
Check (tick) I agree to the Java SE Runtime Environment 6 License Agreement box and click on Continue.
Click on jre-6u7-windows-i586-p.exe link to download it and save this to a convenient location.
Double click on jre-6u7-windows-i586-p.exe to install Java.
After the Java installation has finished, please go to Kaspersky website (http://www.kaspersky.com/kos/eng/partner/default/kavwebscan.html) and perform an online antivirus scan.
Read through the requirements and privacy statement and click on Accept button.
It will start downloading and installing the scanner and virus definitions. You will be prompted to install an application from Kaspersky. Click Run.
When the downloads have finished, click on Settings.
Make sure these boxes are checked (ticked). If they are not, please tick them and click on the Save button: Spyware, Adware, Dialers, and other potentially dangerous programs
Archives
Click on My Computer under Scan.
Once the scan is complete, it will display the results. Click on View Scan Report.
You will see a list of infected items there. Click on Save Report As....
Save this report to a convenient place. Change the Files of type to Text file (.txt) before clicking on the Save button.
Please post this log in your next reply along with a fresh HijackThis log.

Elensar
2008-08-17, 09:39
Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 08:35:57, on 17.08.2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\Explorer.EXE
C:\Programme\Java\jre1.6.0_07\bin\jusched.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe
C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
C:\WINDOWS\system32\wscntfy.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Programme\Trend Micro\HijackThis\Elensar.exe
C:\Programme\Mozilla Firefox\firefox.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
O2 - BHO: Spybot-S&D IE Protection - {53707962-6f74-2d53-2644-206d7942484f} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre1.6.0_07\bin\ssv.dll
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Programme\Java\jre1.6.0_07\bin\jusched.exe"
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKALER DIENST')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETZWERKDIENST')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_07\bin\ssv.dll
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O9 - Extra button: (no name) - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {dfb852a3-47f8-48c4-a200-58cab36fd2a2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O14 - IERESET.INF: START_PAGE_URL=http://go.web.de/home
O23 - Service: Ati HotKey Poller - Unknown owner - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: G DATA AntiVirus Proxy (AVKProxy) - G DATA Software AG - C:\Programme\Gemeinsame Dateien\G DATA\AVKProxy\AVKProxy.exe
O23 - Service: G DATA Scheduler (AVKService) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKService.exe
O23 - Service: AntiVirus Wächter (AVKWCtl) - G DATA Software AG - C:\Programme\G DATA AntiVirus\AVK\AVKWCtl.exe

--
End of file - 3931 bytes



--------------------------------------------------------------------------------
KASPERSKY ONLINE SCANNER 7 REPORT
Saturday, August 16, 2008
Operating System: Microsoft Windows XP Professional Service Pack 3 (build 2600)
Kaspersky Online Scanner 7 version: 7.0.25.0
Program database last update: Saturday, August 16, 2008 17:48:07
Records in database: 1098711
--------------------------------------------------------------------------------

Scan settings:
Scan using the following database: extended
Scan archives: yes
Scan mail databases: yes

Scan area - My Computer:
C:\
D:\
E:\
F:\

Scan statistics:
Files scanned: 57808
Threat name: 9
Infected objects: 13
Suspicious objects: 0
Duration of the scan: 02:49:28


File name / Threat name / Threats count
C:\QooBox\Quarantine\C\WINDOWS\system32\drivers\cynm79.sys.vir Infected: Rootkit.Win32.Qandr.hl 1
C:\QooBox\Quarantine\C\WINDOWS\system32\fegmynqf.dll.vir Infected: Trojan.Win32.Monder.eha 1
C:\QooBox\Quarantine\C\WINDOWS\system32\fftqbltr.dll.vir Infected: Trojan.Win32.Monder.duz 1
C:\QooBox\Quarantine\C\WINDOWS\system32\hkviehyt.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.chj 1
C:\QooBox\Quarantine\C\WINDOWS\system32\ihcxcbek.dll.vir Infected: Trojan.Win32.Monder.eic 1
C:\QooBox\Quarantine\C\WINDOWS\system32\lywtgmbm.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.cgu 1
C:\QooBox\Quarantine\C\WINDOWS\system32\mbphne.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.cgu 1
C:\QooBox\Quarantine\C\WINDOWS\system32\mxnycy.dll.vir Infected: Trojan.Win32.Monder.eic 1
C:\QooBox\Quarantine\C\WINDOWS\system32\qphndqjl.dll.vir Infected: Trojan.Win32.Monder.eha 1
C:\QooBox\Quarantine\C\WINDOWS\system32\ttbkpl.dll.vir Infected: not-a-virus:AdWare.Win32.SuperJuan.chj 1
C:\QooBox\Quarantine\C\WINDOWS\system32\winzzd32.dll.vir Infected: Trojan-Downloader.Win32.FraudLoad.vaxe 1
C:\QooBox\Quarantine\C\WINDOWS\system32\wvUmnkhi.dll.vir Infected: Trojan.Win32.Monder.dxu 1
C:\QooBox\Quarantine\catchme2008-08-16_175335,22.zip Infected: Trojan.Win32.Pakes.jzf 1

The selected area was scanned.

Shaba
2008-08-17, 11:40
Empty this folder:

C:\QooBox\Quarantine\

Empty Recycle Bin.

Still problems?

Elensar
2008-08-17, 13:35
no it looks like my pc is clean

Shaba
2008-08-17, 14:10
Great :)

Now that you are clean, please follow these simple steps in order to keep your computer clean and secure:

Looking over your log, it seems you don't have any evidence of a third party firewall.

As the term conveys, a firewall is an extra layer of security installed onto computers, which restricts access to systems from the outside world. Firewalls protect against hackers and malicious intruders. I want you to download a free firewall NOW from one of these excellent vendors:

1) Comodo (http://www.personalfirewall.comodo.com/) (Uncheck during installation "Install Comodo SafeSurf..", Make Comodo my default search provider" and "Make Comodo Search my homepage")
2) Online Armor (http://www.tallemu.com/online_armor_free.html)
3) Sunbelt/Kerio (http://www.sunbelt-software.com/Kerio-Download.cfm)
4) Agnitum (http://www.agnitum.com/products/outpostfree/download.php)
5) ZoneAlarm (http://www.zonelabs.com/store/content/catalog/products/sku_list_za.jsp?dc=12bms&ctry=US&lang=en&lid=nav_za) (uncheck ZoneAlarm Spy Blocker during installation if you choose this one)

If you are using the built-in Windows XP firewall, it is not recommended as it does not block outgoing connections. This means that any malware on your computer is free to "phone home" for more instructions. Simply put, Windows XP contains a mediocre firewall. This firewall is NO replacement for a dedicated software solution. Remember to use only one firewall at the same time.

Now lets uninstall ComboFix:

Click START then RUN
Now type Combofix /u in the runbox and click OK

Next we remove all used tools.

Please download OTCleanIt (http://download.bleepingcomputer.com/oldtimer/OTCleanIt.exe) and save it to desktop.

Double-click OTCleanIt.exe.
Click the CleanUp! button.
Select Yes when the "Begin cleanup Process?" prompt appears.
If you are prompted to Reboot during the cleanup, select Yes.
The tool will delete itself once it finishes, if not delete it by yourself.


Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

Disable and Enable System Restore. - If you are using Windows XP then you should disable and re-enable system restore to make sure there are no infected files found in a restore point.

You can find instructions on how to enable and re-enable system restore here:

Windows XP System Restore Guide (http://www.bleepingcomputer.com/forums/tutorial56.html)

Re-enable system restore with instructions from tutorial above

Make your Internet Explorer more secure - This can be done by following these simple instructions:
From within Internet Explorer click on the Tools menu and then click on Options.
Click once on the Security tab
Click once on the Internet icon so it becomes highlighted.
Click once on the Custom Level button.
Change the Download signed ActiveX controls to Prompt

Change the Download unsigned ActiveX controls to Disable

Change the Initialize and script ActiveX controls not marked as safe to Disable

Change the Installation of desktop items to Prompt

Change the Launching programs and files in an IFRAME to Prompt

Change the Navigate sub-frames across different domains to Prompt

When all these settings have been made, click on the OK button.

If it prompts you as to whether or not you want to save the settings, press the Yes button.
Next press the Apply button and then the OK to exit the Internet Properties page.

Update your AntiVirus Software - It is imperitive that you update your Antivirus software at least once a week (Even more if you wish). If you do not update your antivirus software then it will not be able to catch any of the new variants that may come out.


Visit Microsoft's Windows Update Site Frequently - It is important that you visit http://www.windowsupdate.com (http://www.windowsupdate.com) regularly. This will ensure your computer has always the latest security updates available installed on your computer. If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

Install Malwarebytes' Anti-Malware - Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
totally free but for real-time protection you will have to pay a small one-time fee. Tutorial on installing & using this product can be found below:

Malwarebytes' Anti-Malware Setup Guide (http://www.bfccomputers.com/forum/index.php?showtopic=1644)

Malwarebytes' Anti-Malware Scanning Guide (http://www.bfccomputers.com/forum/index.php?showtopic=1645)


Install SpywareBlaster - SpywareBlaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

A tutorial on installing & using this product can be found here:

Using SpywareBlaster to protect your computer from Spyware and Malware (http://www.bleepingcomputer.com/tutorials/tutorial49.html)


Update all these programs regularly - Make sure you update all the programs I have listed regularly. Without regular updates you WILL NOT be protected when new malicious programs are released.
Follow this list and your potential for being infected again will reduce dramatically.

Here are some additional utilities that will enhance your safety

MVPS Hosts file (http://mvps.org/winhelp2002/hosts.htm) <= The MVPS Hosts file replaces your current HOSTS file with one containing well know ad sites etc. Basically, this prevents your computer from connecting to those sites by redirecting them to 127.0.0.1 which is your local computer
Winpatrol (http://www.winpatrol.com/) <= Download and install the free version of Winpatrol. a tutorial for this product is located here:
Using Winpatrol to protect your computer from malicious software (http://www.winpatrol.com/features.html)

Stand Up and Be Counted ---> Malware Complaints (http://www.malwarecomplaints.info/index.php) <--- where you can make difference!

The site offers people who have been (or are) victims of malware the opportunity to document their story and, in that way, launch a complaint against the malware and the makers of the malware.

Also, please read this great article by Tony Klein So How Did I Get Infected In First Place (http://forums.spybot.info/showthread.php?t=279)

Happy surfing and stay clean! :bigthumb:

Shaba
2008-08-19, 09:15
Since this issue appears to be resolved ... this Topic has been closed. Glad I could help.

Note: If it has been five days or more since your last post, and the helper assisting you posted a response to that post to which you did not reply, your topic will not be reopened. At that point, if you still require help, please start a new topic and include a fresh HijackThis log and a link to your previous thread.

If it has been less than five days since your last response and you need the thread re-opened, please send me or your helper a private message (pm). A valid, working link to the closed topic is required.