VIRUS ALERT! - Seit Virus mindestens 3 Fehler

Thema ist geschlossen!
Thema ist geschlossen!
#0
14.07.2008, 11:02
Ehrenmitglied
Avatar Sabina

Beiträge: 29434
#46 Hallo Spook18191

««
wende cleaner an + lösche die temp-Dateien
http://www.ccleaner.de/?protecus.de

««
mit dem HijackThis löschen ("fixen")
Klicke: "Do a system scan only"
Setze ein Häckchen in das Kästchen vor den genannten Eintrag
und wähle fix checked.

Zitat

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = //search.bearshare./sidebar.html?src=ssb

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = //softwarereferral./jump.php?wmid=6010&mid=MjI6Ojg5&lid=2

R3 - URLSearchHook: (no name) - {855F3B16-6D32-4fe6-8A56-BBB695989046} - (no file)

R3 - URLSearchHook: BearShare MediaBar - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - C:\Programme\BearShare applications\BearShare MediaBar\MediaBar.dll (file missing)

O3 - Toolbar: (no name) - {855F3B16-6D32-4fe6-8A56-BBB695989046} - (no file)
O3 - Toolbar: BearShare MediaBar - {D3DEE18F-DB64-4BEB-9FF1-E1F0A5033E4A} - C:\Programme\BearShare applications\BearShare MediaBar\MediaBar.dll (file missing)

O3 - Toolbar: RX Toolbar - {25D8BACF-3DE2-4B48-AE22-D659B8D835B0} - C:\Programme\RXToolBar\RXToolBar.dll (file missing)

O3 - Toolbar: (no name) - {37B85A29-692B-4205-9CAD-2626E4993404} - (no file)

O3 - Toolbar: sqvgnrpx - {874AE4BD-B9D0-410D-ABE3-CAA3F2DBD219} - C:\WINDOWS\sqvgnrpx.dll (file missing)

O3 - Toolbar: (no name) - {07AA283A-43D7-4CBE-A064-32A21112D94D} - (no file)

O3 - Toolbar: (no name) - {41F6170D-6AF8-4188-8D92-9DDAB3C71A78} - (no file)

O4 - HKLM\..\Run: [P2P Networking] C:\WINDOWS\system32\P2P Networking\P2P Networking.exe /AUTOSTART

O4 - HKLM\..\Run: [AutoSys] C:\WINDOWS\system32\autosys.exe

O4 - HKLM\..\Run: [kxumjmz] c:\windows\system32\kxumjmz.exe kxumjmz

O4 - HKLM\..\Run: [VVSN] C:\Programme\VVSN\VVSN.exe

O4 - HKLM\..\Run: [wdmlgyfraw] c:\windows\system32\wdmlgyfraw.exe wdmlgyfraw

O4 - HKLM\..\Run: [Antivirus] C:\Programme\VAV\vav.exe

O4 - HKLM\..\Run: [c8fc0e5b] rundll32.exe "C:\WINDOWS\system32\pbcpntcr.dll",b

O4 - HKLM\..\Run: [DllRunning] rundll32.exe "C:\WINDOWS\system32\upccspoh.dll",setvm

O4 - HKCU\..\Run: [Antivirus] C:\Programme\VAV\vav.exe

O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Restrictions present

O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programme\PartyGaming\PartyPoker\RunApp.exe (file missing)

O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programme\PartyGaming\PartyPoker\RunApp.exe (file missing)

O9 - Extra button: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Programme\ICQLite\ICQLite.exe (file missing)

O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Programme\ICQLite\ICQLite.exe (file missing)

O21 - SSODL: fsrpknov - {288DE9DE-DB00-4A9F-8843-C20F5A06F187} - C:\WINDOWS\fsrpknov.dll (file missing)

O21 - SSODL: fdxbameg - {B8D88255-547B-4023-8877-C278006B430C} - C:\WINDOWS\fdxbameg.dll (file missing)

«
Avenger
http://virus-protect.org/artikel/tools/avenger.html
kopiere in das weisse Feld:

Zitat

Files to delete:
c:\windows\system32\wdmlgyfraw.exe
C:\WINDOWS\system32\pbcpntcr.dll
C:\WINDOWS\system32\upccspoh.dll
Folders to delete:
C:\Programme\VAV
C:\Programme\VVSN
C:\Programme\BearShare applications
C:\Programme\RXToolBar
C:\WINDOWS\system32\P2P Networking
schliesse alle offenen Programme (denn nach Anwendung des Avengers wird der Rechner neustarten)

Klicke: Execute

bestätige, dass der Rechner neu gestartet wird - klicke "yes"

«
scanne mit navilog, erst Option 1 , dann Option 2
http://virus-protect.org/artikel/tools/navilog.html

«
scannen mit Malwarebytes und alles entfernen lassen, was gefunden wird + poste den report
http://virus-protect.org/artikel/tools/malwarebytes.html

«
wende combofix an , warnmeldung wegklicken + poste hier den report
http://virus-protect.org/artikel/tools/combofix.html
__________
MfG Sabina

rund um die PC-Sicherheit
Seitenanfang Seitenende
14.07.2008, 11:45
...neu hier

Beiträge: 9
#47 ok, bin grade bei der ersten option von navilog, ich hoffe mal dass das alles klappt.... danke schon mal, die reports kommen gleich...
Seitenanfang Seitenende
14.07.2008, 12:58
Ehrenmitglied
Avatar Sabina

Beiträge: 29434
#48 o.k. poste dann hier die logs....
__________
MfG Sabina

rund um die PC-Sicherheit
Seitenanfang Seitenende
14.07.2008, 14:06
...neu hier

Beiträge: 9
#49 so, das hat jetz gedauert...

Also hier das Ergebnis von Malwarebytes:

Malwarebytes' Anti-Malware 1.20
Datenbank Version: 930
Windows 5.1.2600 Service Pack 2

14:05:34 14.07.2008
mbam-log-7-14-2008 (14-05-34).txt

Scan Art: Komplett Scan (C:\|D:\|)
Objekte gescannt: 351211
Scan Dauer: 2 hour(s), 0 minute(s), 0 second(s)

Infizierte Speicher Prozesse: 1
Infizierte Speicher Module: 2
Infizierte Registrierungsschlüssel: 24
Infizierte Registrierungswerte: 6
Infizierte Datei Objekte der Registrierung: 12
Infizierte Verzeichnisse: 40
Infizierte Dateien: 60

Infizierte Speicher Prozesse:
C:\Programme\Seekmo\bin\10.0.406.0\OEAddOn.exe (Adware.Seekmo) -> Unloaded process successfully.

Infizierte Speicher Module:
C:\WINDOWS\system32\sSmjHBRJ.dll (Trojan.Vundo) -> Unloaded module successfully.
C:\WINDOWS\system32\xxyvvsrR.dll (Trojan.Vundo) -> Unloaded module successfully.

Infizierte Registrierungsschlüssel:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{656acfda-0be0-4a41-9b7b-d17e104245ae} (Trojan.Vundo) -> Delete on reboot.
HKEY_CLASSES_ROOT\CLSID\{656acfda-0be0-4a41-9b7b-d17e104245ae} (Trojan.Vundo) -> Delete on reboot.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{41f6170d-6af8-4188-8d92-9ddab3c71a78} (Trojan.Zlob) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{37b85a2b-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\9ee2330ae5f4470cac801baac83818c9 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\568267acfc5644dab06f058006ddbae3 (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winrkp32 (Dialer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\VAV (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\rxtoolbar.tbinfo (Adware.RXToolbar) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\rxtoolbar.tbinfo.1 (Adware.RXToolbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RXToolBar (Adware.RXToolbar) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\RX ToolBar (Adware.RXToolbar) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{1b44e59c-165c-4ee2-b3cd-4dfd348be123} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1b44e59c-165c-4ee2-b3cd-4dfd348be123} (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\xxyvvsrr (Trojan.Vundo) -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{23156882-ff98-4d21-980c-e30021c97fed} (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\sqvgnrpx.bnpr (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\sqvgnrpx.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully.

Infizierte Registrierungswerte:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seekmooe (Adware.Seekmo) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seekmosa (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.SoftMate) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{1b44e59c-165c-4ee2-b3cd-4dfd348be123} (Trojan.Vundo) -> Delete on reboot.

Infizierte Datei Objekte der Registrierung:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\ssmjhbrj -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (76497-OEM-0011903-00803) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (HH:mm:ss) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\StartMenuLogOff (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives (Hijack.Drives) -> Bad: (12) Good: (0) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoToolbarCustomize (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Infizierte Verzeichnisse:
C:\Programme\Seekmo (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0 (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\firefox (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\components (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\plugins (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\IESkins (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0 (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\HostOI (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\HostOI\dynamic (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\HostOL (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\HostOL\dynamic (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\dynamic (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\static (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\1 (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\2 (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\DownLoad (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0 (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0\HostOI (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0\HostOI\static (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0\HostOI\static\1 (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0\HostOI\static\DownLoad (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\IESkins (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0 (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\HostOI (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\HostOI\dynamic (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\HostOL (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\HostOL\dynamic (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\dynamic (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\static (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\1 (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\2 (AdWare.Agent) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\DownLoad (AdWare.Agent) -> Quarantined and deleted successfully.

Infizierte Dateien:
C:\WINDOWS\system32\sSmjHBRJ.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\JRBHjmSs.ini (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\system32\JRBHjmSs.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\OEAddOn.exe (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\SeekmoSA.exe (Adware.Zango) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\2.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\4.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\CoreSrv.dll (Adware.Zango) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\HostIE.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\HostOE.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\HostOL.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\SeekmoSAAX.dll (Adware.Zango) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\SeekmoSADF.exe (Adware.Zango) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\SeekmoSAHook.dll (Adware.Zango) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\Srv.exe (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\Toolbar.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\Wallpaper.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\plugins\npclntax_SeekmoSA.dll (Adware.Zango) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP412\A0132398.dll (Adware.Seekmo) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP464\A0140489.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP464\A0140490.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140553.dll (Adware.Zango) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140555.exe (Rogue.AntiSpywareShield) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140557.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140558.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140559.dll (Rogue.Multiple) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140561.exe (Rogue.VirusHeat) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140827.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140828.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Sys67.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\Sys68.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\arrow.ico (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\copyright.txt (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\link.ico (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\chrome.manifest (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\install.rdf (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\components\npclntax.xpt (Adware.180Solutions) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\0.exe (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\0.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\1.exe (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\1.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\2.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\3.gif (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\5.exe (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\sc.html (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\sex1.ico (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\Programme\PCHealthCenter\sex2.ico (Trojan.Fakealert) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\winrkp32.dll (Dialer) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\vav.cpl (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully.
C:\WINDOWS\HOSTS (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xxyvuRIA.dll (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\xxyvvsrR.dll (Trojan.Vundo) -> Delete on reboot.
C:\WINDOWS\gpefaowr.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\WINDOWS\wbxdpgfefml.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Desktop\Vista Antivirus 2008.lnk (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\addon.dat (Malware.Trace) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Favoriten\Online Security Test.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Favoriten\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Favoriten\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully.
C:\Dokumente und Einstellungen\Jonas\Favoriten\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully.


sooo... hier der logfile von combofix:

ComboFix 08-07-13.9 - HP_Administrator 2008-07-14 14:25:54.1 - NTFSx86
Microsoft Windows XP Professional 5.1.2600.2.1252.1.1031.18.536 [GMT 2:00]
ausgeführt von:: C:\Dokumente und Einstellungen\HP_Administrator\Desktop\ComboFix.exe
* Neuer Wiederherstellungspunkt wurde erstellt
.

(((((((((((((((((((((((((((((((((((( Weitere L”schungen ))))))))))))))))))))))))))))))))))))))))))))))))
.

C:\Dokumente und Einstellungen\Administrator\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows Media\10.0\WMSDKNSD.XML
C:\Dokumente und Einstellungen\Gast\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows Media\10.0\WMSDKNSD.XML
C:\Dokumente und Einstellungen\Hannah\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows Media\10.0\WMSDKNSD.XML
C:\WINDOWS\eone.exe
C:\WINDOWS\Sys66.exe
C:\WINDOWS\system32\Cfx32.lic
C:\WINDOWS\system32\cfx32.ocx
C:\WINDOWS\system32\cyeyxy.dll
C:\WINDOWS\system32\egjlm.bak1
C:\WINDOWS\system32\egjlm.bak2
C:\WINDOWS\system32\egjlm.ini
C:\WINDOWS\system32\egjlm.ini2
C:\WINDOWS\system32\egjlm.tmp
C:\WINDOWS\system32\hopsccpu.ini
C:\WINDOWS\system32\mcrh.tmp
C:\WINDOWS\system32\mkgbdkex.ini
C:\WINDOWS\system32\mLExUoom.dll
C:\WINDOWS\system32\rctnpcbp.ini
C:\WINDOWS\system32\rohjobim.dll
C:\WINDOWS\system32\vTlmNGaW.dll
D:\Autorun.inf

.
((((((((((((((((((((((( Dateien erstellt von 2008-06-14 bis 2008-07-14 ))))))))))))))))))))))))))))))
.

2008-07-14 11:43 . 2008-07-14 11:43 <DIR> d-------- C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Malwarebytes
2008-07-14 11:42 . 2008-07-14 11:43 <DIR> d-------- C:\Programme\Malwarebytes' Anti-Malware
2008-07-14 11:42 . 2008-07-14 11:42 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Malwarebytes
2008-07-14 11:42 . 2008-07-07 17:35 34,296 --a------ C:\WINDOWS\system32\drivers\mbamcatchme.sys
2008-07-14 11:42 . 2008-07-07 17:35 17,144 --a------ C:\WINDOWS\system32\drivers\mbam.sys
2008-07-14 11:41 . 2008-07-14 12:01 <DIR> d-------- C:\Programme\Navilog1
2008-07-14 09:05 . 2008-07-14 09:05 <DIR> d-------- C:\Programme\Trend Micro
2008-07-14 09:02 . 2008-07-14 09:02 <DIR> d-------- C:\Deckard
2008-07-14 08:49 . 2008-07-14 08:49 <DIR> d-------- C:\Programme\CCleaner
2008-07-13 19:18 . 2008-07-13 20:09 <DIR> d-------- C:\Programme\SpywareStop
2008-07-13 19:18 . 2008-07-13 20:09 <DIR> d-------- C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\SpywareStop
2008-07-13 12:51 . 2008-07-13 12:51 <DIR> d-------- C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\TmpRecentIcons
2008-07-06 17:17 . 2008-07-06 17:17 <DIR> dr-h----- C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\SecuROM
2008-07-05 20:42 . 2008-07-05 20:42 <DIR> d-------- C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\vlc
2008-07-05 20:40 . 2008-07-05 20:40 <DIR> d-------- C:\Programme\VideoLAN
2008-06-28 18:10 . 2008-06-28 18:10 <DIR> dr-h----- C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\SecuROM
2008-06-22 13:59 . 2008-06-22 13:59 <DIR> d-------- C:\Programme\Techland
2008-06-22 13:14 . 2008-06-22 13:14 <DIR> d-------- C:\Gamigo Games
2008-06-16 20:41 . 2008-06-22 18:38 <DIR> d-------- C:\Programme\Zylom Games
2008-06-16 20:41 . 2008-06-22 18:40 <DIR> d-------- C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Zylom
2008-06-16 20:41 . 2008-06-16 20:41 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Zylom
2008-06-16 20:41 . 2008-06-22 18:40 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\JollyBear

.
(((((((((((((((((((((((((((((((((((( Find3M Bericht ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-03-25 17:38 166,142 ----a-w C:\Programme\schalke1024x768pd5.jpg
2008-07-14 12:11 --------- d-----w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\OpenOffice.org2
2008-07-14 06:47 --------- d-----w C:\Programme\Spybot - Search & Destroy
2008-07-14 06:47 --------- d-----w C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Spybot - Search & Destroy
2008-07-13 17:11 --------- d-----w C:\Programme\ICQToolbar
2008-07-13 16:57 --------- d-----w C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Google Updater
2008-07-13 11:20 --------- d-----w C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\OpenOffice.org2
2008-07-13 11:05 --------- d-----w C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TrackMania
2008-07-11 09:57 --------- d-----w C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\OpenOffice.org2
2008-07-08 19:28 --------- d-----w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Skype
2008-07-06 04:17 --------- d-----w C:\Programme\MumboJumbo
2008-07-06 04:15 --------- d-----w C:\Programme\ZC2.10
2008-07-06 04:11 --------- d-----w C:\Programme\Maxis
2008-07-06 04:11 --------- d-----w C:\Programme\Firefly Studios
2008-07-06 04:10 --------- d-----w C:\Programme\Electronic Arts
2008-07-06 04:10 --------- d-----w C:\Programme\EA GAMES
2008-07-06 04:09 --------- d-----w C:\Programme\Activision
2008-07-05 23:31 10,240 --sha-w C:\Programme\Thumbs.db
2008-06-21 19:15 --------- d--h--w C:\Programme\InstallShield Installation Information
2008-06-20 10:45 360,320 ----a-w C:\WINDOWS\system32\drivers\tcpip.sys
2008-06-20 10:44 138,368 ----a-w C:\WINDOWS\system32\drivers\afd.sys
2008-06-20 09:52 225,920 ----a-w C:\WINDOWS\system32\drivers\tcpip6.sys
2008-06-14 17:57 273,024 ------w C:\WINDOWS\system32\drivers\bthport.sys
2008-05-31 11:35 --------- d-----w C:\Programme\Pegasys Inc
2008-05-26 12:29 --------- d-----w C:\Programme\Gemeinsame Dateien\Adobe
2008-05-26 12:28 --------- d-----w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\AdobeUM
2008-05-25 16:22 --------- d-----w C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\ICQ
2008-01-08 16:40 22,328 ----a-w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\PnkBstrK.sys
2007-08-01 21:11 0 ----a-w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\TORplugin.dat
2006-12-28 00:56 36 ----a-w C:\Dokumente und Einstellungen\HP_Administrator\klextlock.dat
2007-08-01 21:11 0 --sha-w C:\WINDOWS\system32\Windows\klog.dat
.

(((((((((((((((((((((((((((( Autostart Punkte der Registrierung ))))))))))))))))))))))))))))))))))))))))
.
.
REGEDIT4
*Hinweis* leere Eintrage & legitime Standardeintrage werden nicht angezeigt.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-10 06:00 15360]
"BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMBgMonitor.exe" [2007-01-15 17:14 147456]
"MsnMsgr"="C:\Programme\MSN Messenger\MsnMsgr.Exe" [2007-01-19 12:55 5674352]
"SpywareStop"="C:\Programme\SpywareStop\SpywareStop.exe" [2008-07-10 21:34 7754992]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray"="C:\WINDOWS\ehome\ehtray.exe" [2005-08-05 21:34 64512]
"ATICCC"="C:\Programme\ATI Technologies\ATI.ACE\CLIStart.exe" [2006-05-10 19:12 90112]
"DMAScheduler"="c:\Programme\HP DigitalMedia Archive\DMAScheduler.exe" [2006-04-13 10:05 90112]
"Recguard"="C:\WINDOWS\SMINST\RECGUARD.EXE" [2005-07-22 23:14 237568]
"HPBootOp"="C:\Programme\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2006-02-15 23:34 249856]
"Reminder"="C:\Windows\Creator\Remind_XP.exe" [2004-12-14 03:23 663552]
"TkBellExe"="C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe" [2006-01-02 22:48 180269]
"QuickTime Task"="C:\Programme\QuickTime\qttask.exe" [2006-10-25 19:58 282624]
"avgnt"="C:\Programme\AntiVir PersonalEdition Classic\avgnt.exe" [2008-04-20 09:03 262401]
"NeroFilterCheck"="C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroCheck.exe" [2006-01-12 16:40 155648]
"SunJavaUpdateSched"="C:\Programme\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 04:25 144784]
"TrayServer"="C:\Programme\MAGIX\Video_deluxe_2007_e-version\TrayServer.exe" [2006-10-04 16:41 86016]
"Sony Ericsson PC Suite"="C:\Programme\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" [2006-11-24 02:06 487424]
"WinampAgent"="C:\Programme\Winamp\winampa.exe" [2007-10-10 07:28 36352]
"RTHDCPL"="RTHDCPL.EXE" [2006-07-22 01:56 16261632 C:\WINDOWS\RTHDCPL.EXE]
"AlwaysReady Power Message APP"="ARPWRMSG.EXE" [2005-08-03 00:19 77312 C:\WINDOWS\arpwrmsg.exe]

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"InstallVisualStyle"= C:\WINDOWS\Resources\Themes\Royale\Royale.msstyles
"InstallTheme"= C:\WINDOWS\Resources\Themes\Royale.theme

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon]
"UIHost"="C:\\Programme\\CronoSoft\\XP Visual Tools\\Packs\\WatercolourPack\\LOGONUI.EXE"

[HKLM\~\startupfolder\C:^Dokumente und Einstellungen^All Users^Startmenü^Programme^Autostart^hp psc 1000 series.lnk]
path=C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\hp psc 1000 series.lnk
backup=C:\WINDOWS\pss\hp psc 1000 series.lnkCommon Startup

[HKLM\~\startupfolder\C:^Dokumente und Einstellungen^HP_Administrator^Startmenü^Programme^Autostart^Registration DIE SIEDLER - Das Erbe der Könige.LNK]
path=C:\Dokumente und Einstellungen\HP_Administrator\Startmenü\Programme\Autostart\Registration DIE SIEDLER - Das Erbe der Könige.LNK
backup=C:\WINDOWS\pss\Registration DIE SIEDLER - Das Erbe der Könige.LNKStartup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools]
--a------ 2007-08-29 17:09 171464 C:\Programme\DAEMON Tools\daemon.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
--a------ 2007-01-29 16:36 25370152 C:\Programme\Skype\Phone\Skype.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
--a------ 2007-05-19 18:16 68856 C:\Programme\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ftutil2]
--a------ 2004-06-07 14:05 106496 C:\WINDOWS\system32\ftutil2.dll

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services]
"iPod Service"=3 (0x3)
"gusvc"=3 (0x3)
"FirebirdServerMAGIXInstance"=3 (0x3)
"Adobe LM Service"=3 (0x3)
"LightScribeService"=2 (0x2)

[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusDisableNotify"=dword:00000001

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"DisableNotifications"= 1 (0x1)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"C:\\Programme\\iTunes\\iTunes.exe"=
"C:\\Programme\\Activision\\Call of Duty 2\\CoD2MP_s.exe"=
"C:\\Programme\\Mozilla Firefox\\firefox.exe"=
"C:\\Programme\\Anno 1701\\Anno1701.exe"=
"C:\\Programme\\EA GAMES\\Die Schlacht um Mittelerde(tm)\\game.dat"=
"C:\\Programme\\mIRC\\mirc.exe"=
"C:\\Programme\\ICQ6\\ICQ.exe"=
"C:\\Programme\\MSN Messenger\\msnmsgr.exe"=
"C:\\Programme\\MSN Messenger\\livecall.exe"=
"C:\\Programme\\devolo\\informer\\devinf.exe"=
"C:\\Programme\\devolo\\easyshare\\easyshare.exe"=
"C:\\WINDOWS\\system32\\PnkBstrA.exe"=
"C:\\WINDOWS\\system32\\PnkBstrB.exe"=
"C:\\Programme\\Activision\\Call of Duty 4 - Modern Warfare\\iw3mp.exe"=
"C:\\Programme\\Skype\\Phone\\Skype.exe"=

R2 Automatisches LiveUpdate - Scheduler;Automatisches LiveUpdate - Scheduler;C:\Programme\Symantec\LiveUpdate\ALUSchedulerSvc.exe [2006-08-03 18:34]
R2 PLCNDIS5;PLCNDIS5 NDIS Protocol Driver;C:\WINDOWS\system32\plcndis5.sys [2004-05-17 12:21]
R3 WN5301;LIteon Wireless PCI Network Adapter Service;C:\WINDOWS\system32\DRIVERS\wn5301.sys [2005-10-05 19:44]
S3 pfsvgae;pfsvgae;C:\DOKUME~1\HP_ADM~1\LOKALE~1\Temp\pfsvgae.sys []
S4 FirebirdServerMAGIXInstance;Firebird Server - MAGIX Instance;C:\Programme\MAGIX\Common\Database\bin\fbserver.exe [2005-11-17 15:18]


[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{550E8D6F-F6B4-4FB2-9ED8-D264ABD1A798}]
C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\crack.exe s
.
- - - - ORPHANS REMOVED - - - -

BHO-{EC089516-2407-4B98-843C-71827B02AAE4} - C:\WINDOWS\system32\mljge.dll
HKCU-Run-Orb - C:\Programme\Winamp Remote\bin\OrbTray.exe
HKLM-Run-PCDrProfiler - (no file)
Notify-mljge - C:\WINDOWS\system32\mljge.dll
MSConfigStartUp-BearShare - C:\Programme\BearShare\BearShare.exe
MSConfigStartUp-ICQ Lite - C:\Programme\ICQLite\ICQLite.exe
MSConfigStartUp-KAZAA - C:\Programme\Kazaa\kazaa.exe


**************************************************************************

catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-07-14 14:37:31
Windows 5.1.2600 Service Pack 2 NTFS

Scanne versteckte Prozesse...

Scanne versteckte Autostart Eintr„ge...

Scanne versteckte Dateien...


**************************************************************************
.
------------------------ Other Running Processes ------------------------
.
C:\WINDOWS\system32\ati2evxx.exe
C:\WINDOWS\system32\ati2evxx.exe
C:\Programme\AntiVir PersonalEdition Classic\sched.exe
C:\Programme\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\arservice.exe
C:\WINDOWS\ehome\ehrecvr.exe
C:\WINDOWS\ehome\ehSched.exe
C:\Programme\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\ehome\mcrdsvc.exe
C:\WINDOWS\system32\dllhost.exe
C:\Programme\HP\HP Software Update\hpwuSchd2.exe
C:\WINDOWS\ehome\ehmsas.exe
C:\Programme\ATI Technologies\ATI.ACE\CLI.exe
C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMIndexingService.exe
C:\Programme\ATI Technologies\ATI.ACE\CLI.exe
C:\WINDOWS\system32\verclsid.exe
.
**************************************************************************
.
Zeit der Fertigstellung: 2008-07-14 14:47:37 - machine was rebooted
ComboFix-quarantined-files.txt 2008-07-14 12:46:32

25 Verzeichnis(se), 11,389,005,824 Bytes frei
31 Verzeichnis(se), 13,294,325,760 Bytes frei

215 --- E O F --- 2008-07-09 20:23:42[/b]
Dieser Beitrag wurde am 14.07.2008 um 15:03 Uhr von Spook18191 editiert.
Seitenanfang Seitenende
14.07.2008, 18:48
Ehrenmitglied
Avatar Sabina

Beiträge: 29434
#50 Hallo,

««
kopiere in den avenger

Zitat

Folders to delete:
C:\Programme\SpywareStop
C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\SpywareStop
««
scanne mit Counterspy ...lasse ALLES entfernen, was angezeigt wird + poste den report
http://virus-protect.org/counterspy1.html

««
poste ein neues log vom HijackThis
__________
MfG Sabina

rund um die PC-Sicherheit
Seitenanfang Seitenende
15.07.2008, 13:23
...neu hier

Beiträge: 9
#51 so, hatte gestern nich meh die zeit dazu dass hier zu machen, hier is der logfile von Hijackthis:


Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 13:22:32, on 15.07.2008
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v7.00 (7.00.6000.16674)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Programme\AntiVir PersonalEdition Classic\sched.exe
C:\Programme\AntiVir PersonalEdition Classic\avguard.exe
C:\WINDOWS\arservice.exe
C:\Programme\Symantec\LiveUpdate\ALUSchedulerSvc.exe
C:\WINDOWS\eHome\ehRecvr.exe
C:\WINDOWS\eHome\ehSched.exe
C:\Programme\Google\Common\Google Updater\GoogleUpdaterService.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\dllhost.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\RTHDCPL.EXE
C:\WINDOWS\ARPWRMSG.EXE
C:\WINDOWS\eHome\ehmsas.exe
C:\Programme\ATI Technologies\ATI.ACE\CLI.EXE
C:\Programme\HP DigitalMedia Archive\DMAScheduler.exe
C:\Programme\HP\HP Software Update\HPwuSchd2.exe
C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe
C:\Programme\AntiVir PersonalEdition Classic\avgnt.exe
C:\Programme\Java\jre1.6.0_05\bin\jusched.exe
C:\Programme\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe
C:\Programme\Winamp\winampa.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMIndexingService.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Programme\ATI Technologies\ATI.ACE\cli.exe
C:\HP\KBD\KBD.EXE
C:\Programme\Gemeinsame Dateien\Teleca Shared\Generic.exe
c:\windows\system\hpsysdrv.exe
C:\Programme\Sunbelt Software\CounterSpy\SBCSSvc.exe
C:\Programme\Sunbelt Software\CounterSpy\SBCSTray.exe
C:\Programme\ICQ6\ICQ.exe
c:\windows\ehome\ehtray.exe
C:\Programme\Winamp\winamp.exe
C:\Programme\Mozilla Firefox\firefox.exe
C:\Programme\Trend Micro\HijackThis\HijackThis.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=DE_DE&c=64&bd=PAVILION&pf=desktop
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=DE_DE&c=64&bd=PAVILION&pf=desktop
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157
R3 - URLSearchHook: Yahoo! Toolbar mit Pop-Up-Blocker - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Programme\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Programme\Yahoo!\Companion\Installs\cpn\yt.dll
O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre1.6.0_05\bin\ssv.dll
O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Programme\Google\GoogleToolbarNotifier\2.1.1119.1736\swg.dll
O3 - Toolbar: Yahoo! Toolbar mit Pop-Up-Blocker - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Programme\Yahoo!\Companion\Installs\cpn\yt.dll
O3 - Toolbar: Winamp Toolbar - {EBF2BA02-9094-4c5a-858B-BB198F3D8DE2} - C:\Programme\Winamp Toolbar\winamptb.dll
O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [AlwaysReady Power Message APP] ARPWRMSG.EXE
O4 - HKLM\..\Run: [ATICCC] "C:\Programme\ATI Technologies\ATI.ACE\CLIStart.exe"
O4 - HKLM\..\Run: [DMAScheduler] "c:\Programme\HP DigitalMedia Archive\DMAScheduler.exe"
O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE
O4 - HKLM\..\Run: [HPBootOp] "C:\Programme\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" /run
O4 - HKLM\..\Run: [Reminder] "C:\Windows\Creator\Remind_XP.exe"
O4 - HKLM\..\Run: [HP Software Update] C:\Programme\HP\HP Software Update\HPwuSchd2.exe
O4 - HKLM\..\Run: [TkBellExe] "C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe" -osboot
O4 - HKLM\..\Run: [QuickTime Task] "C:\Programme\QuickTime\qttask.exe" -atboottime
O4 - HKLM\..\Run: [avgnt] "C:\Programme\AntiVir PersonalEdition Classic\avgnt.exe" /min
O4 - HKLM\..\Run: [NeroFilterCheck] C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroCheck.exe
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Programme\Java\jre1.6.0_05\bin\jusched.exe"
O4 - HKLM\..\Run: [TrayServer] C:\Programme\MAGIX\Video_deluxe_2007_e-version\TrayServer.exe
O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Programme\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions
O4 - HKLM\..\Run: [WinampAgent] C:\Programme\Winamp\winampa.exe
O4 - HKLM\..\Run: [SBCSTray] C:\Programme\Sunbelt Software\CounterSpy\SBCSTray.exe
O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMBgMonitor.exe"
O4 - HKCU\..\Run: [MsnMsgr] "C:\Programme\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [SpywareStop] C:\Programme\SpywareStop\SpywareStop.exe -boot
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKALER DIENST')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETZWERKDIENST')
O8 - Extra context menu item: &Winamp Toolbar Search - C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Winamp Toolbar\ieToolbar\resources\en-US\local\search.html
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_05\bin\ssv.dll
O9 - Extra button: Hilfe zu Verbindungen - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra 'Tools' menuitem: Hilfe zu Verbindungen - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6\ICQ.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe (file missing)
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe (file missing)
O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Programme\Yahoo!\Common\yinsthelper.dll
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\GEMEIN~1\Skype\SKYPE4~1.DLL
O23 - Service: AntiVir PersonalEdition Classic Planer (AntiVirScheduler) - Avira GmbH - C:\Programme\AntiVir PersonalEdition Classic\sched.exe
O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Programme\AntiVir PersonalEdition Classic\avguard.exe
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: Automatisches LiveUpdate - Scheduler - Symantec Corporation - C:\Programme\Symantec\LiveUpdate\ALUSchedulerSvc.exe
O23 - Service: Google Updater Service (gusvc) - Google - C:\Programme\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\1150\Intel 32\IDriverT.exe
O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE
O23 - Service: NBService - Nero AG - C:\Programme\Nero\Nero 7\Nero BackItUp\NBService.exe
O23 - Service: NMIndexingService - Nero AG - C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMIndexingService.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: Sunbelt CounterSpy Antispyware (SBCSSvc) - Sunbelt Software - C:\Programme\Sunbelt Software\CounterSpy\SBCSSvc.exe
O23 - Service: SF FrontLine Drivers Auto Removal (v1) (sfrem01) - Protection Technology (StarForce) - C:\WINDOWS\system32\sfrem01.exe

--
End of file - 9025 bytes
Seitenanfang Seitenende
15.07.2008, 13:32
Ehrenmitglied
Avatar Sabina

Beiträge: 29434
#52 Fixe mit HijacktHis

Zitat

O4 - HKCU\..\Run: [SpywareStop] C:\Programme\SpywareStop\SpywareStop.exe -boot
+
PC neustarten

»»
kannst du hier den report von Counterspy posten ?
__________
MfG Sabina

rund um die PC-Sicherheit
Seitenanfang Seitenende
15.07.2008, 19:19
...neu hier

Beiträge: 9
#53 weiß nich ob das der richtige is....








Scan History Details
Start Date: 15.07.2008 10:49:27
End Date: 15.07.2008 13:19:33
Total Time: 150 Min 6 Sec
Detected security risks

BearShare P2P Program more information...
Details: BearShare is a peer-to-peer (P2P) application that allows its users to join together in a network via the Internet and share files from each other's hard drives.
Status: Deleted

Registry entries detected
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\InprocServer32
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\ProgID
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\ProgID
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\Programmable
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\TypeLib
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\TypeLib
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\VersionIndependentProgID
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\VersionIndependentProgID
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\BEARSHARE
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\BEARSHARE
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\BEARSHARE
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{F97DA966-F09D-4CAB-BF29-75A0026986EA}
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BEARSHARE
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BEARSHARE
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BEARSHARE
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\EVENTLABELS\BEARSHARECHATNOTIFYMSG
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\EVENTLABELS\BEARSHARECHATNOTIFYMSG
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE\BearShareChatNotifyMsg
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE\BearShareChatNotifyMsg
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE\BearShareChatNotifyMsg\.Current
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE\BearShareChatNotifyMsg\.Current


Cydoor Adware (General) more information...
Details: Cydoor is an adware program that downloads advertisements from a server and displays them on your computer.
Status: Deleted

Registry entries detected
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}\ProxyStubClsid32


KaZaA P2P Program more information...
Details: KaZaA is a peer-to-peer (P2P) application that allows its users to join together in a network via the Internet and share files from each other's hard drives.
Status: Deleted

Registry entries detected
HKEY_LOCAL_MACHINE\SOFTWARE\SHARMAN NETWORKS LTD
HKEY_LOCAL_MACHINE\SOFTWARE\SHARMAN NETWORKS LTD\Kazaa 3.2.7
HKEY_LOCAL_MACHINE\SOFTWARE\SHARMAN NETWORKS LTD\Kazaa 3.2.7\3.2.7
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\KAZAA
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\KAZAA\LocalContent


Altnet P2P Networking Low Risk Adware more information...
Details: Altnet P2P Networking is a program that uses peer-to-peer functionality to enable the delivery of content, including advertising, to PC desktops. This content may be used by other programs.
Status: Deleted

Files detected
C:\Deckard\System Scanner\backup\WINDOWS\Downloaded Program Files\WebP2PInstaller.dll
C:\WINDOWS\system32\P2P Networking v126.cpl

Registry entries detected
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\InProcServer32
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\InProcServer32
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\InProcServer32
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\LocalServer32
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\LocalServer32
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\ProgID
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\ProgID
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\Programmable
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\VersionIndependentProgID
HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\VersionIndependentProgID
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}\NumMethods
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}\ProxyStubClsid32
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK.1
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK.1
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK.1\CLSID
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK.1\CLSID
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK\CLSID
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK\CLSID
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK\CurVer
HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK\CurVer
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\Contains
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\Contains\Files
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\Contains\Files
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\DownloadInformation
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\DownloadInformation
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\DownloadInformation
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\InstalledVersion
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\InstalledVersion
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\P2P NETWORKING
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\P2P NETWORKING
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\P2P NETWORKING
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\P2P NETWORKING
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\P2P NETWORKING
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\P2P NETWORKING
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\P2P NETWORKING
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Dirs
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Dirs
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Dirs
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Dirs
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks
HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Channels
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Channels\Channel10
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Channels\Channel10
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Firewall
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Firewall
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Firewall
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Firewall
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Uptime
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Uptime
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Uptime
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager\Downloads
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI\DownloadHistory
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI


Bifrost Backdoor more information...
Details: Bifrost is an advanced remote administration tool that allows users to remotely control computers that are behind firewalls and routers.
Status: Deleted

Registry entries detected
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\WGET


My Freeze/YourScreen Adware Bundler more information...
Details: My Freeze/YourScreen .com is a website which contains many screen savers , this site also bundled with many adwares such as Whenu.com, Save now etc
Status: Deleted

Files detected
C:\WINDOWS\~GLH0014.TMP


MyGlobalSearch.Toolbar Potentially Unwanted Program more information...
Details: MyGlobalSearch.Toolbar is an IE plugin with its own Search Field.
Status: Deleted

Registry entries detected
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\MY GLOBAL SEARCH UNINSTALL
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\MY GLOBAL SEARCH UNINSTALL
HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\MY GLOBAL SEARCH UNINSTALL


DollarRevenue Adware (General) more information...
Details: DollarRevenue is an adware program that spawns pop-up advertising on the desktop and downloads other adware.

Files detected
C:\Dokumente und Einstellungen\Jonas\Eigene Dateien\ICQ\468847837\ReceivedFiles\368491087 metin2 gamer\Yang und Exp Hack.exe


CoolOnlineOffers.ScreenSaver Adware Bundler more information...
Details: CoolOnlineOffers.ScreenSaver is a program which delivers advertisiment on you computer depending on your surfing behaviour.
Status: Deleted

Files detected
C:\WINDOWS\system32\Pirates dir\expire.scf


PartyPoker Potentially Unwanted Program more information...
Details: PartyPoker is an online gambling application that requires the user to download its software in order to play.
Status: Deleted

Registry entries detected
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER
HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER


Joke Program Joke Program more information...

Files detected
C:\Dokumente und Einstellungen\HP_Administrator\Eigene Dateien\Nützliches\Langeweile1_1.exe


Trojan-Downloader.Win32.Agent.aww Trojan Downloader more information...
Status: Deleted

Files detected
C:\WINDOWS\swxcacls.exe


Trojan.MouseCrazy.A Trojan more information...
Status: Deleted

Files detected
C:\Dokumente und Einstellungen\HP_Administrator\Eigene Dateien\ICQ Lite\190924629\master0101_484796539\Block 27 - Hey boy.exe


BadJoke.Win32.Autoit.a Joke Program more information...
Status: Ignored

Files detected
C:\Dokumente und Einstellungen\HP_Administrator\Eigene Dateien\ICQ Lite\190924629\master0101_484796539\karneval.exe
C:\Dokumente und Einstellungen\Jonas\Eigene Dateien\crazy.exe


Cookie: Tracking Cookies Cookie (General) more information...
Details: Cookies are small "data tags" that web sites store on PCs in order to recognize unique visitors. Cookies are used to identify returning visitors who have registered for special services; to measure and analyze visitors' use of web site features; to count unique visitors to web pages; and to allow web surfers to use virtual "shopping carts." Online advertising networks use cookies to track users across web sites and to measure ad impressions and click-throughs.
Status: Deleted

Cookies detected
c:\dokumente und einstellungen\gast\cookies\gast@2o7[2].txt
c:\dokumente und einstellungen\gast\cookies\gast@ad.yieldmanager[1].txt
c:\dokumente und einstellungen\gast\cookies\gast@overture[2].txt
c:\dokumente und einstellungen\hannah\cookies\hannah@2o7[2].txt
c:\dokumente und einstellungen\hannah\cookies\hannah@ad.yieldmanager[2].txt
c:\dokumente und einstellungen\hannah\cookies\hannah@advertising[1].txt
c:\dokumente und einstellungen\hannah\cookies\hannah@banner.joylandcasino[2].txt
c:\dokumente und einstellungen\hannah\cookies\hannah@cts.metricsdirect[2].txt
c:\dokumente und einstellungen\hannah\cookies\hannah@hotbar[2].txt
c:\dokumente und einstellungen\hannah\cookies\hannah@joylandcasino[1].txt
c:\dokumente und einstellungen\hannah\cookies\hannah@tradedoubler[2].txt
c:\dokumente und einstellungen\hp_administrator\cookies\hp_administrator@2o7[1].txt
c:\dokumente und einstellungen\hp_administrator\cookies\hp_administrator@2o7[2].txt
c:\dokumente und einstellungen\hp_administrator\cookies\hp_administrator@tradedoubler[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@2o7[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@ad.yieldmanager[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@advertising[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@apmebf[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@bs.serving-sys[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@clickbank[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@com[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@cts.metricsdirect[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@doubleclick[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@emjcd[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@findwhat[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@geocities[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@hitbox[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@hotbar[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@lycos[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@myglobalsearch[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@partygaming.122.2o7[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@partypoker[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@revsci[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@serving-sys[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@statcounter[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@tradedoubler[2].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@xiti[1].txt
c:\dokumente und einstellungen\jonas\cookies\jonas@zedo[1].txt
Seitenanfang Seitenende
15.07.2008, 22:38
Ehrenmitglied
Avatar Sabina

Beiträge: 29434
#54 BadJoke.Win32.Autoit.a Joke Program more information...
Status: Ignored

scanne noch mal - lasse alles entfernen
dann sollte der Rechner wieder clean sein.
Wenn es noch Probleme geben sollte, melde dich
__________
MfG Sabina

rund um die PC-Sicherheit
Seitenanfang Seitenende