VIRUS ALERT! - Seit Virus mindestens 3 FehlerThema ist geschlossen! |
||
---|---|---|
Thema ist geschlossen! |
||
#0
| ||
14.07.2008, 11:02
Ehrenmitglied
Beiträge: 29434 |
||
|
||
14.07.2008, 11:45
...neu hier
Beiträge: 9 |
#47
ok, bin grade bei der ersten option von navilog, ich hoffe mal dass das alles klappt.... danke schon mal, die reports kommen gleich...
|
|
|
||
14.07.2008, 12:58
Ehrenmitglied
Beiträge: 29434 |
||
|
||
14.07.2008, 14:06
...neu hier
Beiträge: 9 |
#49
so, das hat jetz gedauert...
Also hier das Ergebnis von Malwarebytes: Malwarebytes' Anti-Malware 1.20 Datenbank Version: 930 Windows 5.1.2600 Service Pack 2 14:05:34 14.07.2008 mbam-log-7-14-2008 (14-05-34).txt Scan Art: Komplett Scan (C:\|D:\|) Objekte gescannt: 351211 Scan Dauer: 2 hour(s), 0 minute(s), 0 second(s) Infizierte Speicher Prozesse: 1 Infizierte Speicher Module: 2 Infizierte Registrierungsschlüssel: 24 Infizierte Registrierungswerte: 6 Infizierte Datei Objekte der Registrierung: 12 Infizierte Verzeichnisse: 40 Infizierte Dateien: 60 Infizierte Speicher Prozesse: C:\Programme\Seekmo\bin\10.0.406.0\OEAddOn.exe (Adware.Seekmo) -> Unloaded process successfully. Infizierte Speicher Module: C:\WINDOWS\system32\sSmjHBRJ.dll (Trojan.Vundo) -> Unloaded module successfully. C:\WINDOWS\system32\xxyvvsrR.dll (Trojan.Vundo) -> Unloaded module successfully. Infizierte Registrierungsschlüssel: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{656acfda-0be0-4a41-9b7b-d17e104245ae} (Trojan.Vundo) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{656acfda-0be0-4a41-9b7b-d17e104245ae} (Trojan.Vundo) -> Delete on reboot. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars\{41f6170d-6af8-4188-8d92-9ddab3c71a78} (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{37b85a2b-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Features\9ee2330ae5f4470cac801baac83818c9 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Installer\Products\568267acfc5644dab06f058006ddbae3 (Adware.Zango) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\winrkp32 (Dialer) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\VAV (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\rxtoolbar.tbinfo (Adware.RXToolbar) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\rxtoolbar.tbinfo.1 (Adware.RXToolbar) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RXToolBar (Adware.RXToolbar) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\RX ToolBar (Adware.RXToolbar) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\aoprndtws (Malware.Trace) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\rdfa (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MS Juan (Malware.Trace) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{1b44e59c-165c-4ee2-b3cd-4dfd348be123} (Trojan.Vundo) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1b44e59c-165c-4ee2-b3cd-4dfd348be123} (Trojan.Vundo) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\xxyvvsrr (Trojan.Vundo) -> Delete on reboot. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\FCOVM (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\RemoveRP (Trojan.Vundo) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\TypeLib\{23156882-ff98-4d21-980c-e30021c97fed} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VSPlugin (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\sqvgnrpx.bnpr (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\sqvgnrpx.toolbar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seekmooe (Adware.Seekmo) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\seekmosa (Adware.Zango) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{b7d3e479-cc68-42b5-a338-938ece35f419} (Adware.SoftMate) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{37b85a29-692b-4205-9cad-2626e4993404} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\{07aa283a-43d7-4cbe-a064-32a21112d94d} (Adware.Zango) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{1b44e59c-165c-4ee2-b3cd-4dfd348be123} (Trojan.Vundo) -> Delete on reboot. Infizierte Datei Objekte der Registrierung: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\Notification Packages (Trojan.Vundo) -> Data: c:\windows\system32\ssmjhbrj -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProductId (Trojan.FakeAlert) -> Bad: (VIRUS ALERT!) Good: (76497-OEM-0011903-00803) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Control Panel\International\sTimeFormat (Trojan.FakeAlert) -> Bad: (HH:mm: VIRUS ALERT!) Good: (HH:mm:ss) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowControlPanel (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowRun (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowSearch (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowHelp (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyDocs (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Start_ShowMyComputer (Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\StartMenuLogOff (Hijack.StartMenu) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives (Hijack.Drives) -> Bad: (12) Good: (0) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoToolbarCustomize (Hijack.Explorer) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully. Infizierte Verzeichnisse: C:\Programme\Seekmo (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0 (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\firefox (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\components (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\plugins (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\IESkins (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0 (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\HostOI (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\HostOI\dynamic (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\HostOL (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\HostOL\dynamic (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\dynamic (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\static (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\1 (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\2 (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\DownLoad (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0 (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0\HostOI (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0\HostOI\static (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0\HostOI\static\1 (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Seekmo\v3.0\HostOI\static\DownLoad (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\IESkins (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0 (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\HostOI (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\HostOI\dynamic (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\HostOL (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\HostOL\dynamic (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\dynamic (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\static (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\1 (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\2 (AdWare.Agent) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Seekmo\v3.0\Seekmo\static\DownLoad (AdWare.Agent) -> Quarantined and deleted successfully. Infizierte Dateien: C:\WINDOWS\system32\sSmjHBRJ.dll (Trojan.Vundo) -> Delete on reboot. C:\WINDOWS\system32\JRBHjmSs.ini (Trojan.Vundo) -> Delete on reboot. C:\WINDOWS\system32\JRBHjmSs.ini2 (Trojan.Vundo) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\OEAddOn.exe (Adware.Seekmo) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\SeekmoSA.exe (Adware.Zango) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\2.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\4.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\CoreSrv.dll (Adware.Zango) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\HostIE.dll (Adware.Seekmo) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\HostOE.dll (Adware.Seekmo) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\HostOL.dll (Adware.Seekmo) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\SeekmoSAAX.dll (Adware.Zango) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\SeekmoSADF.exe (Adware.Zango) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\SeekmoSAHook.dll (Adware.Zango) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\Srv.exe (Adware.Seekmo) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\Toolbar.dll (Adware.Seekmo) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\Wallpaper.dll (Adware.Seekmo) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\plugins\npclntax_SeekmoSA.dll (Adware.Zango) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP412\A0132398.dll (Adware.Seekmo) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP464\A0140489.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP464\A0140490.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140553.dll (Adware.Zango) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140555.exe (Rogue.AntiSpywareShield) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140557.dll (Rogue.Multiple) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140558.dll (Rogue.Multiple) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140559.dll (Rogue.Multiple) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140561.exe (Rogue.VirusHeat) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140827.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{95AA7020-C223-40A7-9DC0-6E2923ED53CC}\RP468\A0140828.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\Sys67.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\Sys68.exe (Trojan.Agent) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\arrow.ico (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\copyright.txt (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\link.ico (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\chrome.manifest (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\install.rdf (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\Seekmo\bin\10.0.406.0\firefox\extensions\components\npclntax.xpt (Adware.180Solutions) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\0.exe (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\0.gif (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\1.exe (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\1.gif (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\2.gif (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\3.gif (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\5.exe (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\sc.html (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\sex1.ico (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\Programme\PCHealthCenter\sex2.ico (Trojan.Fakealert) -> Quarantined and deleted successfully. C:\WINDOWS\system32\winrkp32.dll (Dialer) -> Quarantined and deleted successfully. C:\WINDOWS\system32\vav.cpl (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully. C:\WINDOWS\HOSTS (Trojan.Agent) -> Quarantined and deleted successfully. C:\WINDOWS\system32\xxyvuRIA.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\xxyvvsrR.dll (Trojan.Vundo) -> Delete on reboot. C:\WINDOWS\gpefaowr.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\WINDOWS\wbxdpgfefml.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Desktop\Vista Antivirus 2008.lnk (Rogue.VistaAntivirus2008) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\addon.dat (Malware.Trace) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Favoriten\Online Security Test.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Favoriten\Error Cleaner.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Favoriten\Privacy Protector.url (Rogue.Link) -> Quarantined and deleted successfully. C:\Dokumente und Einstellungen\Jonas\Favoriten\Spyware&Malware Protection.url (Rogue.Link) -> Quarantined and deleted successfully. sooo... hier der logfile von combofix: ComboFix 08-07-13.9 - HP_Administrator 2008-07-14 14:25:54.1 - NTFSx86 Microsoft Windows XP Professional 5.1.2600.2.1252.1.1031.18.536 [GMT 2:00] ausgeführt von:: C:\Dokumente und Einstellungen\HP_Administrator\Desktop\ComboFix.exe * Neuer Wiederherstellungspunkt wurde erstellt . (((((((((((((((((((((((((((((((((((( Weitere L”schungen )))))))))))))))))))))))))))))))))))))))))))))))) . C:\Dokumente und Einstellungen\Administrator\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows Media\10.0\WMSDKNSD.XML C:\Dokumente und Einstellungen\Gast\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows Media\10.0\WMSDKNSD.XML C:\Dokumente und Einstellungen\Hannah\Lokale Einstellungen\Anwendungsdaten\Microsoft\Windows Media\10.0\WMSDKNSD.XML C:\WINDOWS\eone.exe C:\WINDOWS\Sys66.exe C:\WINDOWS\system32\Cfx32.lic C:\WINDOWS\system32\cfx32.ocx C:\WINDOWS\system32\cyeyxy.dll C:\WINDOWS\system32\egjlm.bak1 C:\WINDOWS\system32\egjlm.bak2 C:\WINDOWS\system32\egjlm.ini C:\WINDOWS\system32\egjlm.ini2 C:\WINDOWS\system32\egjlm.tmp C:\WINDOWS\system32\hopsccpu.ini C:\WINDOWS\system32\mcrh.tmp C:\WINDOWS\system32\mkgbdkex.ini C:\WINDOWS\system32\mLExUoom.dll C:\WINDOWS\system32\rctnpcbp.ini C:\WINDOWS\system32\rohjobim.dll C:\WINDOWS\system32\vTlmNGaW.dll D:\Autorun.inf . ((((((((((((((((((((((( Dateien erstellt von 2008-06-14 bis 2008-07-14 )))))))))))))))))))))))))))))) . 2008-07-14 11:43 . 2008-07-14 11:43 <DIR> d-------- C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Malwarebytes 2008-07-14 11:42 . 2008-07-14 11:43 <DIR> d-------- C:\Programme\Malwarebytes' Anti-Malware 2008-07-14 11:42 . 2008-07-14 11:42 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Malwarebytes 2008-07-14 11:42 . 2008-07-07 17:35 34,296 --a------ C:\WINDOWS\system32\drivers\mbamcatchme.sys 2008-07-14 11:42 . 2008-07-07 17:35 17,144 --a------ C:\WINDOWS\system32\drivers\mbam.sys 2008-07-14 11:41 . 2008-07-14 12:01 <DIR> d-------- C:\Programme\Navilog1 2008-07-14 09:05 . 2008-07-14 09:05 <DIR> d-------- C:\Programme\Trend Micro 2008-07-14 09:02 . 2008-07-14 09:02 <DIR> d-------- C:\Deckard 2008-07-14 08:49 . 2008-07-14 08:49 <DIR> d-------- C:\Programme\CCleaner 2008-07-13 19:18 . 2008-07-13 20:09 <DIR> d-------- C:\Programme\SpywareStop 2008-07-13 19:18 . 2008-07-13 20:09 <DIR> d-------- C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\SpywareStop 2008-07-13 12:51 . 2008-07-13 12:51 <DIR> d-------- C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\TmpRecentIcons 2008-07-06 17:17 . 2008-07-06 17:17 <DIR> dr-h----- C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\SecuROM 2008-07-05 20:42 . 2008-07-05 20:42 <DIR> d-------- C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\vlc 2008-07-05 20:40 . 2008-07-05 20:40 <DIR> d-------- C:\Programme\VideoLAN 2008-06-28 18:10 . 2008-06-28 18:10 <DIR> dr-h----- C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\SecuROM 2008-06-22 13:59 . 2008-06-22 13:59 <DIR> d-------- C:\Programme\Techland 2008-06-22 13:14 . 2008-06-22 13:14 <DIR> d-------- C:\Gamigo Games 2008-06-16 20:41 . 2008-06-22 18:38 <DIR> d-------- C:\Programme\Zylom Games 2008-06-16 20:41 . 2008-06-22 18:40 <DIR> d-------- C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\Zylom 2008-06-16 20:41 . 2008-06-16 20:41 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Zylom 2008-06-16 20:41 . 2008-06-22 18:40 <DIR> d-------- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\JollyBear . (((((((((((((((((((((((((((((((((((( Find3M Bericht )))))))))))))))))))))))))))))))))))))))))))))))))))))) . 2010-03-25 17:38 166,142 ----a-w C:\Programme\schalke1024x768pd5.jpg 2008-07-14 12:11 --------- d-----w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\OpenOffice.org2 2008-07-14 06:47 --------- d-----w C:\Programme\Spybot - Search & Destroy 2008-07-14 06:47 --------- d-----w C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Spybot - Search & Destroy 2008-07-13 17:11 --------- d-----w C:\Programme\ICQToolbar 2008-07-13 16:57 --------- d-----w C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Google Updater 2008-07-13 11:20 --------- d-----w C:\Dokumente und Einstellungen\Jonas\Anwendungsdaten\OpenOffice.org2 2008-07-13 11:05 --------- d-----w C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TrackMania 2008-07-11 09:57 --------- d-----w C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\OpenOffice.org2 2008-07-08 19:28 --------- d-----w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\Skype 2008-07-06 04:17 --------- d-----w C:\Programme\MumboJumbo 2008-07-06 04:15 --------- d-----w C:\Programme\ZC2.10 2008-07-06 04:11 --------- d-----w C:\Programme\Maxis 2008-07-06 04:11 --------- d-----w C:\Programme\Firefly Studios 2008-07-06 04:10 --------- d-----w C:\Programme\Electronic Arts 2008-07-06 04:10 --------- d-----w C:\Programme\EA GAMES 2008-07-06 04:09 --------- d-----w C:\Programme\Activision 2008-07-05 23:31 10,240 --sha-w C:\Programme\Thumbs.db 2008-06-21 19:15 --------- d--h--w C:\Programme\InstallShield Installation Information 2008-06-20 10:45 360,320 ----a-w C:\WINDOWS\system32\drivers\tcpip.sys 2008-06-20 10:44 138,368 ----a-w C:\WINDOWS\system32\drivers\afd.sys 2008-06-20 09:52 225,920 ----a-w C:\WINDOWS\system32\drivers\tcpip6.sys 2008-06-14 17:57 273,024 ------w C:\WINDOWS\system32\drivers\bthport.sys 2008-05-31 11:35 --------- d-----w C:\Programme\Pegasys Inc 2008-05-26 12:29 --------- d-----w C:\Programme\Gemeinsame Dateien\Adobe 2008-05-26 12:28 --------- d-----w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\AdobeUM 2008-05-25 16:22 --------- d-----w C:\Dokumente und Einstellungen\Hannah\Anwendungsdaten\ICQ 2008-01-08 16:40 22,328 ----a-w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\PnkBstrK.sys 2007-08-01 21:11 0 ----a-w C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\TORplugin.dat 2006-12-28 00:56 36 ----a-w C:\Dokumente und Einstellungen\HP_Administrator\klextlock.dat 2007-08-01 21:11 0 --sha-w C:\WINDOWS\system32\Windows\klog.dat . (((((((((((((((((((((((((((( Autostart Punkte der Registrierung )))))))))))))))))))))))))))))))))))))))) . . REGEDIT4 *Hinweis* leere Eintrage & legitime Standardeintrage werden nicht angezeigt. [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "ctfmon.exe"="C:\WINDOWS\system32\ctfmon.exe" [2004-08-10 06:00 15360] "BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}"="C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMBgMonitor.exe" [2007-01-15 17:14 147456] "MsnMsgr"="C:\Programme\MSN Messenger\MsnMsgr.Exe" [2007-01-19 12:55 5674352] "SpywareStop"="C:\Programme\SpywareStop\SpywareStop.exe" [2008-07-10 21:34 7754992] [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "ehTray"="C:\WINDOWS\ehome\ehtray.exe" [2005-08-05 21:34 64512] "ATICCC"="C:\Programme\ATI Technologies\ATI.ACE\CLIStart.exe" [2006-05-10 19:12 90112] "DMAScheduler"="c:\Programme\HP DigitalMedia Archive\DMAScheduler.exe" [2006-04-13 10:05 90112] "Recguard"="C:\WINDOWS\SMINST\RECGUARD.EXE" [2005-07-22 23:14 237568] "HPBootOp"="C:\Programme\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" [2006-02-15 23:34 249856] "Reminder"="C:\Windows\Creator\Remind_XP.exe" [2004-12-14 03:23 663552] "TkBellExe"="C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe" [2006-01-02 22:48 180269] "QuickTime Task"="C:\Programme\QuickTime\qttask.exe" [2006-10-25 19:58 282624] "avgnt"="C:\Programme\AntiVir PersonalEdition Classic\avgnt.exe" [2008-04-20 09:03 262401] "NeroFilterCheck"="C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroCheck.exe" [2006-01-12 16:40 155648] "SunJavaUpdateSched"="C:\Programme\Java\jre1.6.0_05\bin\jusched.exe" [2008-02-22 04:25 144784] "TrayServer"="C:\Programme\MAGIX\Video_deluxe_2007_e-version\TrayServer.exe" [2006-10-04 16:41 86016] "Sony Ericsson PC Suite"="C:\Programme\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" [2006-11-24 02:06 487424] "WinampAgent"="C:\Programme\Winamp\winampa.exe" [2007-10-10 07:28 36352] "RTHDCPL"="RTHDCPL.EXE" [2006-07-22 01:56 16261632 C:\WINDOWS\RTHDCPL.EXE] "AlwaysReady Power Message APP"="ARPWRMSG.EXE" [2005-08-03 00:19 77312 C:\WINDOWS\arpwrmsg.exe] [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system] "InstallVisualStyle"= C:\WINDOWS\Resources\Themes\Royale\Royale.msstyles "InstallTheme"= C:\WINDOWS\Resources\Themes\Royale.theme [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon] "UIHost"="C:\\Programme\\CronoSoft\\XP Visual Tools\\Packs\\WatercolourPack\\LOGONUI.EXE" [HKLM\~\startupfolder\C:^Dokumente und Einstellungen^All Users^Startmenü^Programme^Autostart^hp psc 1000 series.lnk] path=C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\hp psc 1000 series.lnk backup=C:\WINDOWS\pss\hp psc 1000 series.lnkCommon Startup [HKLM\~\startupfolder\C:^Dokumente und Einstellungen^HP_Administrator^Startmenü^Programme^Autostart^Registration DIE SIEDLER - Das Erbe der Könige.LNK] path=C:\Dokumente und Einstellungen\HP_Administrator\Startmenü\Programme\Autostart\Registration DIE SIEDLER - Das Erbe der Könige.LNK backup=C:\WINDOWS\pss\Registration DIE SIEDLER - Das Erbe der Könige.LNKStartup [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DAEMON Tools] --a------ 2007-08-29 17:09 171464 C:\Programme\DAEMON Tools\daemon.exe [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype] --a------ 2007-01-29 16:36 25370152 C:\Programme\Skype\Phone\Skype.exe [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg] --a------ 2007-05-19 18:16 68856 C:\Programme\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ftutil2] --a------ 2004-06-07 14:05 106496 C:\WINDOWS\system32\ftutil2.dll [HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\services] "iPod Service"=3 (0x3) "gusvc"=3 (0x3) "FirebirdServerMAGIXInstance"=3 (0x3) "Adobe LM Service"=3 (0x3) "LightScribeService"=2 (0x2) [HKEY_LOCAL_MACHINE\software\microsoft\security center] "AntiVirusDisableNotify"=dword:00000001 [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall] "DisableMonitoring"=dword:00000001 [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile] "DisableNotifications"= 1 (0x1) [HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List] "%windir%\\system32\\sessmgr.exe"= "%windir%\\Network Diagnostic\\xpnetdiag.exe"= "C:\\Programme\\iTunes\\iTunes.exe"= "C:\\Programme\\Activision\\Call of Duty 2\\CoD2MP_s.exe"= "C:\\Programme\\Mozilla Firefox\\firefox.exe"= "C:\\Programme\\Anno 1701\\Anno1701.exe"= "C:\\Programme\\EA GAMES\\Die Schlacht um Mittelerde(tm)\\game.dat"= "C:\\Programme\\mIRC\\mirc.exe"= "C:\\Programme\\ICQ6\\ICQ.exe"= "C:\\Programme\\MSN Messenger\\msnmsgr.exe"= "C:\\Programme\\MSN Messenger\\livecall.exe"= "C:\\Programme\\devolo\\informer\\devinf.exe"= "C:\\Programme\\devolo\\easyshare\\easyshare.exe"= "C:\\WINDOWS\\system32\\PnkBstrA.exe"= "C:\\WINDOWS\\system32\\PnkBstrB.exe"= "C:\\Programme\\Activision\\Call of Duty 4 - Modern Warfare\\iw3mp.exe"= "C:\\Programme\\Skype\\Phone\\Skype.exe"= R2 Automatisches LiveUpdate - Scheduler;Automatisches LiveUpdate - Scheduler;C:\Programme\Symantec\LiveUpdate\ALUSchedulerSvc.exe [2006-08-03 18:34] R2 PLCNDIS5;PLCNDIS5 NDIS Protocol Driver;C:\WINDOWS\system32\plcndis5.sys [2004-05-17 12:21] R3 WN5301;LIteon Wireless PCI Network Adapter Service;C:\WINDOWS\system32\DRIVERS\wn5301.sys [2005-10-05 19:44] S3 pfsvgae;pfsvgae;C:\DOKUME~1\HP_ADM~1\LOKALE~1\Temp\pfsvgae.sys [] S4 FirebirdServerMAGIXInstance;Firebird Server - MAGIX Instance;C:\Programme\MAGIX\Common\Database\bin\fbserver.exe [2005-11-17 15:18] [HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{550E8D6F-F6B4-4FB2-9ED8-D264ABD1A798}] C:\Dokumente und Einstellungen\HP_Administrator\Anwendungsdaten\crack.exe s . - - - - ORPHANS REMOVED - - - - BHO-{EC089516-2407-4B98-843C-71827B02AAE4} - C:\WINDOWS\system32\mljge.dll HKCU-Run-Orb - C:\Programme\Winamp Remote\bin\OrbTray.exe HKLM-Run-PCDrProfiler - (no file) Notify-mljge - C:\WINDOWS\system32\mljge.dll MSConfigStartUp-BearShare - C:\Programme\BearShare\BearShare.exe MSConfigStartUp-ICQ Lite - C:\Programme\ICQLite\ICQLite.exe MSConfigStartUp-KAZAA - C:\Programme\Kazaa\kazaa.exe ************************************************************************** catchme 0.3.1361 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net Rootkit scan 2008-07-14 14:37:31 Windows 5.1.2600 Service Pack 2 NTFS Scanne versteckte Prozesse... Scanne versteckte Autostart Eintr„ge... Scanne versteckte Dateien... ************************************************************************** . ------------------------ Other Running Processes ------------------------ . C:\WINDOWS\system32\ati2evxx.exe C:\WINDOWS\system32\ati2evxx.exe C:\Programme\AntiVir PersonalEdition Classic\sched.exe C:\Programme\AntiVir PersonalEdition Classic\avguard.exe C:\WINDOWS\arservice.exe C:\WINDOWS\ehome\ehrecvr.exe C:\WINDOWS\ehome\ehSched.exe C:\Programme\Google\Common\Google Updater\GoogleUpdaterService.exe C:\WINDOWS\system32\PnkBstrA.exe C:\WINDOWS\ehome\mcrdsvc.exe C:\WINDOWS\system32\dllhost.exe C:\Programme\HP\HP Software Update\hpwuSchd2.exe C:\WINDOWS\ehome\ehmsas.exe C:\Programme\ATI Technologies\ATI.ACE\CLI.exe C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMIndexingService.exe C:\Programme\ATI Technologies\ATI.ACE\CLI.exe C:\WINDOWS\system32\verclsid.exe . ************************************************************************** . Zeit der Fertigstellung: 2008-07-14 14:47:37 - machine was rebooted ComboFix-quarantined-files.txt 2008-07-14 12:46:32 25 Verzeichnis(se), 11,389,005,824 Bytes frei 31 Verzeichnis(se), 13,294,325,760 Bytes frei 215 --- E O F --- 2008-07-09 20:23:42[/b] Dieser Beitrag wurde am 14.07.2008 um 15:03 Uhr von Spook18191 editiert.
|
|
|
||
14.07.2008, 18:48
Ehrenmitglied
Beiträge: 29434 |
#50
Hallo,
«« kopiere in den avenger Zitat Folders to delete:«« scanne mit Counterspy ...lasse ALLES entfernen, was angezeigt wird + poste den report http://virus-protect.org/counterspy1.html «« poste ein neues log vom HijackThis __________ MfG Sabina rund um die PC-Sicherheit |
|
|
||
15.07.2008, 13:23
...neu hier
Beiträge: 9 |
#51
so, hatte gestern nich meh die zeit dazu dass hier zu machen, hier is der logfile von Hijackthis:
Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 13:22:32, on 15.07.2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16674) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\Ati2evxx.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\Ati2evxx.exe C:\WINDOWS\system32\spoolsv.exe C:\Programme\AntiVir PersonalEdition Classic\sched.exe C:\Programme\AntiVir PersonalEdition Classic\avguard.exe C:\WINDOWS\arservice.exe C:\Programme\Symantec\LiveUpdate\ALUSchedulerSvc.exe C:\WINDOWS\eHome\ehRecvr.exe C:\WINDOWS\eHome\ehSched.exe C:\Programme\Google\Common\Google Updater\GoogleUpdaterService.exe C:\WINDOWS\system32\PnkBstrA.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\dllhost.exe C:\WINDOWS\Explorer.EXE C:\WINDOWS\RTHDCPL.EXE C:\WINDOWS\ARPWRMSG.EXE C:\WINDOWS\eHome\ehmsas.exe C:\Programme\ATI Technologies\ATI.ACE\CLI.EXE C:\Programme\HP DigitalMedia Archive\DMAScheduler.exe C:\Programme\HP\HP Software Update\HPwuSchd2.exe C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe C:\Programme\AntiVir PersonalEdition Classic\avgnt.exe C:\Programme\Java\jre1.6.0_05\bin\jusched.exe C:\Programme\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe C:\Programme\Winamp\winampa.exe C:\WINDOWS\system32\ctfmon.exe C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMIndexingService.exe C:\WINDOWS\system32\wuauclt.exe C:\Programme\ATI Technologies\ATI.ACE\cli.exe C:\HP\KBD\KBD.EXE C:\Programme\Gemeinsame Dateien\Teleca Shared\Generic.exe c:\windows\system\hpsysdrv.exe C:\Programme\Sunbelt Software\CounterSpy\SBCSSvc.exe C:\Programme\Sunbelt Software\CounterSpy\SBCSTray.exe C:\Programme\ICQ6\ICQ.exe c:\windows\ehome\ehtray.exe C:\Programme\Winamp\winamp.exe C:\Programme\Mozilla Firefox\firefox.exe C:\Programme\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=DE_DE&c=64&bd=PAVILION&pf=desktop R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Bar = http://ie.redirect.hp.com/svs/rdr?TYPE=3&tp=iesearch&locale=DE_DE&c=64&bd=PAVILION&pf=desktop R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R3 - URLSearchHook: Yahoo! Toolbar mit Pop-Up-Blocker - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Programme\Yahoo!\Companion\Installs\cpn\yt.dll O2 - BHO: Yahoo! Toolbar Helper - {02478D38-C3F9-4EFB-9B51-7695ECA05670} - C:\Programme\Yahoo!\Companion\Installs\cpn\yt.dll O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre1.6.0_05\bin\ssv.dll O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Programme\Google\GoogleToolbarNotifier\2.1.1119.1736\swg.dll O3 - Toolbar: Yahoo! Toolbar mit Pop-Up-Blocker - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - C:\Programme\Yahoo!\Companion\Installs\cpn\yt.dll O3 - Toolbar: Winamp Toolbar - {EBF2BA02-9094-4c5a-858B-BB198F3D8DE2} - C:\Programme\Winamp Toolbar\winamptb.dll O4 - HKLM\..\Run: [ehTray] C:\WINDOWS\ehome\ehtray.exe O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE O4 - HKLM\..\Run: [AlwaysReady Power Message APP] ARPWRMSG.EXE O4 - HKLM\..\Run: [ATICCC] "C:\Programme\ATI Technologies\ATI.ACE\CLIStart.exe" O4 - HKLM\..\Run: [DMAScheduler] "c:\Programme\HP DigitalMedia Archive\DMAScheduler.exe" O4 - HKLM\..\Run: [Recguard] C:\WINDOWS\SMINST\RECGUARD.EXE O4 - HKLM\..\Run: [HPBootOp] "C:\Programme\Hewlett-Packard\HP Boot Optimizer\HPBootOp.exe" /run O4 - HKLM\..\Run: [Reminder] "C:\Windows\Creator\Remind_XP.exe" O4 - HKLM\..\Run: [HP Software Update] C:\Programme\HP\HP Software Update\HPwuSchd2.exe O4 - HKLM\..\Run: [TkBellExe] "C:\Programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe" -osboot O4 - HKLM\..\Run: [QuickTime Task] "C:\Programme\QuickTime\qttask.exe" -atboottime O4 - HKLM\..\Run: [avgnt] "C:\Programme\AntiVir PersonalEdition Classic\avgnt.exe" /min O4 - HKLM\..\Run: [NeroFilterCheck] C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroCheck.exe O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Programme\Java\jre1.6.0_05\bin\jusched.exe" O4 - HKLM\..\Run: [TrayServer] C:\Programme\MAGIX\Video_deluxe_2007_e-version\TrayServer.exe O4 - HKLM\..\Run: [Sony Ericsson PC Suite] "C:\Programme\Sony Ericsson\Mobile2\Application Launcher\Application Launcher.exe" /startoptions O4 - HKLM\..\Run: [WinampAgent] C:\Programme\Winamp\winampa.exe O4 - HKLM\..\Run: [SBCSTray] C:\Programme\Sunbelt Software\CounterSpy\SBCSTray.exe O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe O4 - HKCU\..\Run: [BgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMBgMonitor.exe" O4 - HKCU\..\Run: [MsnMsgr] "C:\Programme\MSN Messenger\MsnMsgr.Exe" /background O4 - HKCU\..\Run: [SpywareStop] C:\Programme\SpywareStop\SpywareStop.exe -boot O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETZWERKDIENST') O8 - Extra context menu item: &Winamp Toolbar Search - C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Winamp Toolbar\ieToolbar\resources\en-US\local\search.html O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_05\bin\ssv.dll O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Programme\Java\jre1.6.0_05\bin\ssv.dll O9 - Extra button: Hilfe zu Verbindungen - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm O9 - Extra 'Tools' menuitem: Hilfe zu Verbindungen - {E2D4D26B-0180-43a4-B05F-462D6D54C789} - C:\WINDOWS\PCHEALTH\HELPCTR\Vendors\CN=Hewlett-Packard,L=Cupertino,S=Ca,C=US\IEButton\support.htm O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe O9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6\ICQ.exe O9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - C:\Programme\ICQ6\ICQ.exe O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe (file missing) O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe (file missing) O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - C:\Programme\Yahoo!\Common\yinsthelper.dll O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\GEMEIN~1\Skype\SKYPE4~1.DLL O23 - Service: AntiVir PersonalEdition Classic Planer (AntiVirScheduler) - Avira GmbH - C:\Programme\AntiVir PersonalEdition Classic\sched.exe O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Programme\AntiVir PersonalEdition Classic\avguard.exe O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe O23 - Service: Automatisches LiveUpdate - Scheduler - Symantec Corporation - C:\Programme\Symantec\LiveUpdate\ALUSchedulerSvc.exe O23 - Service: Google Updater Service (gusvc) - Google - C:\Programme\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\1150\Intel 32\IDriverT.exe O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE O23 - Service: NBService - Nero AG - C:\Programme\Nero\Nero 7\Nero BackItUp\NBService.exe O23 - Service: NMIndexingService - Nero AG - C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMIndexingService.exe O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe O23 - Service: Sunbelt CounterSpy Antispyware (SBCSSvc) - Sunbelt Software - C:\Programme\Sunbelt Software\CounterSpy\SBCSSvc.exe O23 - Service: SF FrontLine Drivers Auto Removal (v1) (sfrem01) - Protection Technology (StarForce) - C:\WINDOWS\system32\sfrem01.exe -- End of file - 9025 bytes |
|
|
||
15.07.2008, 13:32
Ehrenmitglied
Beiträge: 29434 |
#52
Fixe mit HijacktHis
Zitat O4 - HKCU\..\Run: [SpywareStop] C:\Programme\SpywareStop\SpywareStop.exe -boot+ PC neustarten »» kannst du hier den report von Counterspy posten ? __________ MfG Sabina rund um die PC-Sicherheit |
|
|
||
15.07.2008, 19:19
...neu hier
Beiträge: 9 |
#53
weiß nich ob das der richtige is....
Scan History Details Start Date: 15.07.2008 10:49:27 End Date: 15.07.2008 13:19:33 Total Time: 150 Min 6 Sec Detected security risks BearShare P2P Program more information... Details: BearShare is a peer-to-peer (P2P) application that allows its users to join together in a network via the Internet and share files from each other's hard drives. Status: Deleted Registry entries detected HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA} HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA} HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\InprocServer32 HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\InprocServer32 HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\InprocServer32 HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\ProgID HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\ProgID HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\Programmable HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\TypeLib HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\TypeLib HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\VersionIndependentProgID HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{F97DA966-F09D-4CAB-BF29-75A0026986EA}\VersionIndependentProgID HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\BEARSHARE HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\BEARSHARE HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\BEARSHARE HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{F97DA966-F09D-4CAB-BF29-75A0026986EA} HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BEARSHARE HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BEARSHARE HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BEARSHARE HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\EVENTLABELS\BEARSHARECHATNOTIFYMSG HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\EVENTLABELS\BEARSHARECHATNOTIFYMSG HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE\BearShareChatNotifyMsg HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE\BearShareChatNotifyMsg HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE\BearShareChatNotifyMsg\.Current HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\APPEVENTS\SCHEMES\APPS\BEARSHARE\BearShareChatNotifyMsg\.Current Cydoor Adware (General) more information... Details: Cydoor is an adware program that downloads advertisements from a server and displays them on your computer. Status: Deleted Registry entries detected HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{16097036-894C-4C00-A61F-93CA0D49A70E}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{1B540D44-3F61-4394-AE30-25FDC3649405}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{2ED5AF98-9258-45BA-B79B-06625C92F662}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{700DC0DD-F409-42E0-9DE5-21EE1A2BA9FD}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{FD42F6D3-7AB1-470C-979B-7996EDC99099}\ProxyStubClsid32 KaZaA P2P Program more information... Details: KaZaA is a peer-to-peer (P2P) application that allows its users to join together in a network via the Internet and share files from each other's hard drives. Status: Deleted Registry entries detected HKEY_LOCAL_MACHINE\SOFTWARE\SHARMAN NETWORKS LTD HKEY_LOCAL_MACHINE\SOFTWARE\SHARMAN NETWORKS LTD\Kazaa 3.2.7 HKEY_LOCAL_MACHINE\SOFTWARE\SHARMAN NETWORKS LTD\Kazaa 3.2.7\3.2.7 HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\KAZAA HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\KAZAA\LocalContent Altnet P2P Networking Low Risk Adware more information... Details: Altnet P2P Networking is a program that uses peer-to-peer functionality to enable the delivery of content, including advertising, to PC desktops. This content may be used by other programs. Status: Deleted Files detected C:\Deckard\System Scanner\backup\WINDOWS\Downloaded Program Files\WebP2PInstaller.dll C:\WINDOWS\system32\P2P Networking v126.cpl Registry entries detected HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0} HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0} HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\InProcServer32 HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\InProcServer32 HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\InProcServer32 HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2} HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2} HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\LocalServer32 HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\LocalServer32 HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\ProgID HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\ProgID HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\Programmable HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\VersionIndependentProgID HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{CC7A6223-3759-4075-8CEA-971F5CFC0ED2}\VersionIndependentProgID HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{C91E8926-D4BE-4685-99F4-0D996B96BAC0}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193} HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}\NumMethods HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\INTERFACE\{CE9B37EC-D243-47A2-83DB-3A8350175193}\ProxyStubClsid32 HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK.1 HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK.1 HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK.1\CLSID HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK.1\CLSID HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK\CLSID HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK\CLSID HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK\CurVer HKEY_LOCAL_MACHINE\Software\Classes\JCDE_STACK\CurVer HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF} HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\Contains HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\Contains\Files HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\Contains\Files HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\DownloadInformation HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\DownloadInformation HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\DownloadInformation HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\InstalledVersion HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF}\InstalledVersion HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF} HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\CODE STORE DATABASE\DISTRIBUTION UNITS\{1D6711C8-7154-40BB-8380-3DEA45B69CBF} HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\P2P NETWORKING HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\P2P NETWORKING HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\P2P NETWORKING HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\P2P NETWORKING HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\P2P NETWORKING HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\P2P NETWORKING HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\P2P NETWORKING HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Clients HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Dirs HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Dirs HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Dirs HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Dirs HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\Files HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks HKEY_LOCAL_MACHINE\SOFTWARE\P2P NETWORKING\Installation History\P2P Chunks HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Channels HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Channels\Channel10 HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Channels\Channel10 HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Bandwidth HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Firewall HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Firewall HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Firewall HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Firewall HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Uptime HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Uptime HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\Connection\Uptime HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager\Downloads HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\FileManager HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI\DownloadHistory HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\P2P NETWORKING\JcdeAgent\P2PNetworkingGUI Bifrost Backdoor more information... Details: Bifrost is an advanced remote administration tool that allows users to remotely control computers that are behind firewalls and routers. Status: Deleted Registry entries detected HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\WGET My Freeze/YourScreen Adware Bundler more information... Details: My Freeze/YourScreen .com is a website which contains many screen savers , this site also bundled with many adwares such as Whenu.com, Save now etc Status: Deleted Files detected C:\WINDOWS\~GLH0014.TMP MyGlobalSearch.Toolbar Potentially Unwanted Program more information... Details: MyGlobalSearch.Toolbar is an IE plugin with its own Search Field. Status: Deleted Registry entries detected HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\MY GLOBAL SEARCH UNINSTALL HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\MY GLOBAL SEARCH UNINSTALL HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP MANAGEMENT\ARPCACHE\MY GLOBAL SEARCH UNINSTALL DollarRevenue Adware (General) more information... Details: DollarRevenue is an adware program that spawns pop-up advertising on the desktop and downloads other adware. Files detected C:\Dokumente und Einstellungen\Jonas\Eigene Dateien\ICQ\468847837\ReceivedFiles\368491087 metin2 gamer\Yang und Exp Hack.exe CoolOnlineOffers.ScreenSaver Adware Bundler more information... Details: CoolOnlineOffers.ScreenSaver is a program which delivers advertisiment on you computer depending on your surfing behaviour. Status: Deleted Files detected C:\WINDOWS\system32\Pirates dir\expire.scf PartyPoker Potentially Unwanted Program more information... Details: PartyPoker is an online gambling application that requires the user to download its software in order to play. Status: Deleted Registry entries detected HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER HKEY_USERS\S-1-5-21-3044122455-509670133-2572657985-1007\SOFTWARE\PARTYGAMING\PARTYPOKER Joke Program Joke Program more information... Files detected C:\Dokumente und Einstellungen\HP_Administrator\Eigene Dateien\Nützliches\Langeweile1_1.exe Trojan-Downloader.Win32.Agent.aww Trojan Downloader more information... Status: Deleted Files detected C:\WINDOWS\swxcacls.exe Trojan.MouseCrazy.A Trojan more information... Status: Deleted Files detected C:\Dokumente und Einstellungen\HP_Administrator\Eigene Dateien\ICQ Lite\190924629\master0101_484796539\Block 27 - Hey boy.exe BadJoke.Win32.Autoit.a Joke Program more information... Status: Ignored Files detected C:\Dokumente und Einstellungen\HP_Administrator\Eigene Dateien\ICQ Lite\190924629\master0101_484796539\karneval.exe C:\Dokumente und Einstellungen\Jonas\Eigene Dateien\crazy.exe Cookie: Tracking Cookies Cookie (General) more information... Details: Cookies are small "data tags" that web sites store on PCs in order to recognize unique visitors. Cookies are used to identify returning visitors who have registered for special services; to measure and analyze visitors' use of web site features; to count unique visitors to web pages; and to allow web surfers to use virtual "shopping carts." Online advertising networks use cookies to track users across web sites and to measure ad impressions and click-throughs. Status: Deleted Cookies detected c:\dokumente und einstellungen\gast\cookies\gast@2o7[2].txt c:\dokumente und einstellungen\gast\cookies\gast@ad.yieldmanager[1].txt c:\dokumente und einstellungen\gast\cookies\gast@overture[2].txt c:\dokumente und einstellungen\hannah\cookies\hannah@2o7[2].txt c:\dokumente und einstellungen\hannah\cookies\hannah@ad.yieldmanager[2].txt c:\dokumente und einstellungen\hannah\cookies\hannah@advertising[1].txt c:\dokumente und einstellungen\hannah\cookies\hannah@banner.joylandcasino[2].txt c:\dokumente und einstellungen\hannah\cookies\hannah@cts.metricsdirect[2].txt c:\dokumente und einstellungen\hannah\cookies\hannah@hotbar[2].txt c:\dokumente und einstellungen\hannah\cookies\hannah@joylandcasino[1].txt c:\dokumente und einstellungen\hannah\cookies\hannah@tradedoubler[2].txt c:\dokumente und einstellungen\hp_administrator\cookies\hp_administrator@2o7[1].txt c:\dokumente und einstellungen\hp_administrator\cookies\hp_administrator@2o7[2].txt c:\dokumente und einstellungen\hp_administrator\cookies\hp_administrator@tradedoubler[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@2o7[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@ad.yieldmanager[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@advertising[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@apmebf[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@bs.serving-sys[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@clickbank[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@com[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@cts.metricsdirect[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@doubleclick[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@emjcd[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@findwhat[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@geocities[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@hitbox[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@hotbar[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@lycos[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@myglobalsearch[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@partygaming.122.2o7[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@partypoker[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@revsci[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@serving-sys[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@statcounter[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@tradedoubler[2].txt c:\dokumente und einstellungen\jonas\cookies\jonas@xiti[1].txt c:\dokumente und einstellungen\jonas\cookies\jonas@zedo[1].txt |
|
|
||
15.07.2008, 22:38
Ehrenmitglied
Beiträge: 29434 |
#54
BadJoke.Win32.Autoit.a Joke Program more information...
Status: Ignored scanne noch mal - lasse alles entfernen dann sollte der Rechner wieder clean sein. Wenn es noch Probleme geben sollte, melde dich __________ MfG Sabina rund um die PC-Sicherheit |
|
|
||
««
wende cleaner an + lösche die temp-Dateien
http://www.ccleaner.de/?protecus.de
««
mit dem HijackThis löschen ("fixen")
Klicke: "Do a system scan only"
Setze ein Häckchen in das Kästchen vor den genannten Eintrag
und wähle fix checked.
Zitat
«Avenger
http://virus-protect.org/artikel/tools/avenger.html
kopiere in das weisse Feld:
Zitat
schliesse alle offenen Programme (denn nach Anwendung des Avengers wird der Rechner neustarten)Klicke: Execute
bestätige, dass der Rechner neu gestartet wird - klicke "yes"
«
scanne mit navilog, erst Option 1 , dann Option 2
http://virus-protect.org/artikel/tools/navilog.html
«
scannen mit Malwarebytes und alles entfernen lassen, was gefunden wird + poste den report
http://virus-protect.org/artikel/tools/malwarebytes.html
«
wende combofix an , warnmeldung wegklicken + poste hier den report
http://virus-protect.org/artikel/tools/combofix.html
__________
MfG Sabina
rund um die PC-Sicherheit