Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.

Antwort
Alt 11.06.2012, 21:30   #1
CrisJano
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Hallo Zusammen,

auch ich habe leider eine Mail bekommen und die erst für echt gehalten und im Affekt den Anhang geöffnet.

Ich sitze seit 4 1/2 Stunden am PC und durchforste unser Forum, komme aber leider nicht weiter, deswegen hoffe ich auf eure Hilfe.

Ich habe bis jetzt zuerst einen Scan durchgeführt mit Malwarebytes Anti-Malware, der zwei Trojaner gefunden hat.

Im zweiten Schritt habe ich den Eset Online Scanner genutzt.

Gerade habe ich ein Problem mit der Verschlüsselung meiner Dateien. Der DecryptHelper 0.5.3. kann bei mir keinen Schlüßel generieren.

Es wäre sehr nett, wenn man mir da weiterhelfen könnte, da ich an meiner Bachelorarbeit schreibe und ich derzeit keinen Zugriff darauf habe.
(Werde mir in Zukunft ein Back-Up System bei mir einführen.)

Zur Info: Ich benutze Win 7 64-Bit

1.) Malwarebyte Anti-Malware Log:

Code:
ATTFilter
Malwarebytes Anti-Malware 1.61.0.1400
www.malwarebytes.org

Datenbank Version: v2012.06.11.06

Windows 7 x64 NTFS
Internet Explorer 9.0.8112.16421
Cris :: CRIS-PC [Administrator]

11.06.2012 18:40:37
mbam-log-2012-06-11 (18-40-37).txt

Art des Suchlaufs: Quick-Scan
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 251570
Laufzeit: 7 Minute(n), 6 Sekunde(n)

Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|847281CE (Trojan.Agent) -> Daten: C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe -> Erfolgreich gelöscht und in Quarantäne gestellt.

Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateien: 1
C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe (Trojan.Agent) -> Erfolgreich gelöscht und in Quarantäne gestellt.

(Ende)
         
2. ESET Online Scanner Log

Code:
ATTFilter
ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6583
# api_version=3.0.2
# EOSSerial=750c028c7c8b5c4ca1cd64198040b219
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2012-06-11 06:51:38
# local_time=2012-06-11 08:51:38 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1033
# osver=6.1.7600 NT 
# compatibility_mode=5893 16776573 100 94 32174 91839508 0 0
# compatibility_mode=8192 67108863 100 0 153 153 0 0
# scanned=353678
# found=24
# cleaned=24
# scan_time=6860
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\43296140-12e58071	a variant of Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\462d3f81-714c4ee6	Java/Exploit.CVE-2011-3544.X trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12\1187ad0c-358fa33b	a variant of Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\65e4bdce-436c1d29	Java/Agent.DN trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15\88743cf-213c5927	Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-766b2867	Java/Exploit.Agent.NAO trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\46f64b14-18b79fef	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22\29d74f16-65865ba0	Java/Agent.DN trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24\5062998-6e0e4f07	a variant of Java/Agent.DM trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\2474121b-1c16c826	Java/Exploit.CVE-2011-3544.AU trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29\21248e9d-6f545cc3	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\7e30b3c3-574f8301	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\a2ba8de-4453b21b	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\45d09521-18e592cd	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34\37db3fe2-58f099d5	Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\72503264-158ce69c	Java/Agent.DJ trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\517555e6-7c467fd7	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42\6ac5daea-39c6bcde	Java/Agent.DJ trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\3b21af6c-4cc13572	a variant of Java/Agent.DT trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\7402b232-69da5583	a variant of Java/Agent.DP trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\2aa71db6-70e7f497	Java/Exploit.Agent.NAO trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\16dbbcf7-619708cd	a variant of Java/Agent.DM trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\5e44d8b8-267882d6	a variant of Java/Agent.DT trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe	Win32/Trustezeb.B trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
         
Ich habe beim ersten Mal den ESET Online Scanner ganz normal gestartet.
Hier ist der Log, den ich als Admin ausgeführt habe.
Vllt enthält er zusätzliche Infos:

Code:
ATTFilter
ESETSmartInstaller@High as downloader log:
all ok
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6583
# api_version=3.0.2
# EOSSerial=750c028c7c8b5c4ca1cd64198040b219
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2012-06-11 06:51:38
# local_time=2012-06-11 08:51:38 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1033
# osver=6.1.7600 NT 
# compatibility_mode=5893 16776573 100 94 32174 91839508 0 0
# compatibility_mode=8192 67108863 100 0 153 153 0 0
# scanned=353678
# found=24
# cleaned=24
# scan_time=6860
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\43296140-12e58071	a variant of Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\462d3f81-714c4ee6	Java/Exploit.CVE-2011-3544.X trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12\1187ad0c-358fa33b	a variant of Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\65e4bdce-436c1d29	Java/Agent.DN trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15\88743cf-213c5927	Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-766b2867	Java/Exploit.Agent.NAO trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\46f64b14-18b79fef	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22\29d74f16-65865ba0	Java/Agent.DN trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24\5062998-6e0e4f07	a variant of Java/Agent.DM trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\2474121b-1c16c826	Java/Exploit.CVE-2011-3544.AU trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29\21248e9d-6f545cc3	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\7e30b3c3-574f8301	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\a2ba8de-4453b21b	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\45d09521-18e592cd	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34\37db3fe2-58f099d5	Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\72503264-158ce69c	Java/Agent.DJ trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\517555e6-7c467fd7	multiple threats (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42\6ac5daea-39c6bcde	Java/Agent.DJ trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\3b21af6c-4cc13572	a variant of Java/Agent.DT trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\7402b232-69da5583	a variant of Java/Agent.DP trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\2aa71db6-70e7f497	Java/Exploit.Agent.NAO trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\16dbbcf7-619708cd	a variant of Java/Agent.DM trojan (deleted - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\5e44d8b8-267882d6	a variant of Java/Agent.DT trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe	Win32/Trustezeb.B trojan (cleaned by deleting - quarantined)	00000000000000000000000000000000	C
ESETSmartInstaller@High as downloader log:
all ok
esets_scanner_update returned -1 esets_gle=53251
# version=7
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6583
# api_version=3.0.2
# EOSSerial=750c028c7c8b5c4ca1cd64198040b219
# end=finished
# remove_checked=true
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2012-06-11 10:52:07
# local_time=2012-06-12 12:52:07 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1033
# osver=6.1.7600 NT 
# compatibility_mode=5893 16776573 100 94 46445 91853779 0 0
# compatibility_mode=8192 67108863 100 0 14424 14424 0 0
# scanned=330997
# found=0
# cleaned=0
# scan_time=7018
         

Alt 13.06.2012, 15:19   #2
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Hinweise bzgl. der verschlüsselten Dateien:
Wann genau deine Daten entschlüsselt werden können wird dir niemand genau sagen können außer vllt einer es kann sein, dass du eine neuere Variante hast, deren Verschlüsselungsalgorithmus noch unbekannt ist. Sowas kann man (noch) nicht entschlüsseln und ohne Schlüssel schon garnicht - ist ja auch logisch, sonst wär es ja keine vernünftige Verschlüsselung
Einfach hier nochmal reinsehen in regelmäßigen Abständen, obige Hinweise beachten. 8 Tools mitsamt hunderten Diskussionsbeiträgen stehen da schon

Eine Notlösung für Vista und Win7-User => http://www.trojaner-board.de/115496-...erstellen.html

Entschlüsselungsversuche der verschlüsselten Dateien sind nur auf zusätzliche Kopien der verschlüsselten Dateien anzuwenden, sonst zerhackt man sich die noch weiter ohne die "original" verschlüsselte Datei mehr zu haben. Das willst du sicher nicht!

Man darf sich aber keine falschen Hoffnungen machen. Mittlerweile sieht es finster aus => Delphi-PRAXiS - Einzelnen Beitrag anzeigen - Verschlüsselungs-Trojaner, Hilfe benötigt


Und in Zukunft willst du sicher mal an ein besseres Backupkonzept denken. Hier ein Denkanstoß => http://www.trojaner-board.de/115678-...r-backups.html

----

Bitte erstmal routinemäßig einen Vollscan mit Malwarebytes machen und Log posten. =>ALLE lokalen Datenträger (außer CD/DVD) überprüfen lassen!
Denk daran, dass Malwarebytes vor jedem Scan manuell aktualisiert werden muss!

Die Funde mit Malwarebytes bitte alle entfernen, sodass sie in der Quarantäne von Malwarebytes aufgehoben werden! NICHTS voreilig aus der Quarantäne entfernen!

Falls Logs aus älteren Scans mit Malwarebytes vorhanden sind, bitte auch davon alle posten!



Bitte alles nach Möglichkeit hier in CODE-Tags posten.

Wird so gemacht:

[code] hier steht das Log [/code]

Und das ganze sieht dann so aus:

Code:
ATTFilter
 hier steht das Log
         
__________________

__________________

Alt 14.06.2012, 20:32   #3
CrisJano
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Ich kann leider nicht alle Logs posten, da der Trojaner bekanntermaßen die Dateien verschlüsselt hat, so auch 5 Logs aus früheren Zeiten von mir.

Hier die zwei letzten Logs:

Vom 11. Juni 2012

Code:
ATTFilter
Malwarebytes Anti-Malware 1.61.0.1400
www.malwarebytes.org

Datenbank Version: v2012.06.11.06

Windows 7 x64 NTFS
Internet Explorer 9.0.8112.16421
Cris :: CRIS-PC [Administrator]

11.06.2012 18:40:37
mbam-log-2012-06-11 (18-40-37).txt

Art des Suchlaufs: Quick-Scan
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 251570
Laufzeit: 7 Minute(n), 6 Sekunde(n)

Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|847281CE (Trojan.Agent) -> Daten: C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe -> Erfolgreich gelöscht und in Quarantäne gestellt.

Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateien: 1
C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe (Trojan.Agent) -> Erfolgreich gelöscht und in Quarantäne gestellt.

(Ende)
         
und von heute (14. Juni 2012):

edit: sorry, Log wird nachgereicht. Konnte den jetzigen iwie nicht abspeichern. Habe nichts entfernt bei diesem Scan und lasse gerade Maleware nochmal laufen.
Hatte von heute nur einen Log von heute Mittag, bei dem ich nach 15 Sek abgebrochen hab, weil ich fälschlicherweise einen Quick-Scan eingeleitet habe.

So hier der Log, der mir gefehlt hat:

Code:
ATTFilter
 Malwarebytes Anti-Malware  (Test) 1.61.0.1400
www.malwarebytes.org

Datenbank Version: v2012.06.14.07

Windows 7 x64 NTFS
Internet Explorer 9.0.8112.16421
Cris :: CRIS-PC [Administrator]

Schutz: Aktiviert

14.06.2012 21:34:43
mbam-log-2012-06-15 (20-53-27).txt

Art des Suchlaufs: Vollständiger Suchlauf
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 520336
Laufzeit: 1 Stunde(n), 13 Minute(n), 56 Sekunde(n)

Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateien: 2
C:\Users\Cris\Downloads\DecryptHelper-0.5.3.exe (Trojan.FakeAlert) -> Keine Aktion durchgeführt.
F:\Festplatte D\Windows.old\Windows\system32\MPK\MpkNetInstall.exe (PUP.KGBKeylogger) -> Keine Aktion durchgeführt.

(Ende)
         
__________________

Alt 09.07.2012, 08:56   #4
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Hätte da mal zwei Fragen bevor es weiter geht

1.) Geht der normale Modus von Windows (wieder) uneingeschränkt?
2.) Vermisst du irgendwas im Startmenü? Sind da leere Ordner unter alle Programme oder ist alles vorhanden?
__________________
"Die Wahrheit ist normalerweise nur eine Entschuldigung für einen Mangel an Fantasie." (Elim Garak)

Das Trojaner-Board unterstützen
Warum Linux besser als Windows ist!

Alt 13.07.2012, 17:02   #5
CrisJano
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



1.) ja
2.) nein, ich vermise nichts. Programme sind alle vorhanden, lassen sich auch öffnen, nur es ist so, wie wenn ich sie nie benutzt hätte. Bspw GoogleChrome: Es gibt keine Historie, Verlauf etc. OppenOffice muss ich auch neu konfigurieren usw


Alt 13.07.2012, 21:26   #6
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



adwCleaner - Toolbars und ungewollte Start-/Suchseiten aufspüren

Downloade Dir bitte AdwCleaner auf deinen Desktop.
  • Starte die adwcleaner.exe mit einem Doppelklick.
  • Klicke auf Search.
  • Nach Ende des Suchlaufs öffnet sich eine Textdatei.
  • Poste mir den Inhalt mit deiner nächsten Antwort.
  • Die Logdatei findest du auch unter C:\AdwCleaner[R1].txt.
__________________
--> Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log

Alt 15.07.2012, 13:06   #7
CrisJano
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Code:
ATTFilter
# AdwCleaner v1.702 - Logfile created 07/15/2012 at 14:06:04
# Updated 13/07/2012 by Xplode
# Operating system : Windows 7 Professional  (64 bits)
# User : Cris - CRIS-PC
# Running from : C:\Users\Cris\Downloads\adwcleaner.exe
# Option [Search]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Found : HKCU\Software\Softonic
[x64] Key Found : HKCU\Software\Softonic

***** [Registre - GUID] *****


***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16421

[OK] Registry is clean.

-\\ Mozilla Firefox v [Unable to get version]

Profile name : default 
File : C:\Users\Cris\AppData\Roaming\Mozilla\Firefox\Profiles\2n05c3xy.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v19.0.1084.52

File : C:\Users\Cris\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [921 octets] - [15/07/2012 14:06:04]

########## EOF - C:\AdwCleaner[R1].txt - [1048 octets] ##########
         

Alt 15.07.2012, 17:38   #8
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



adwCleaner - Toolbars und ungewollte Start-/Suchseiten entfernen
  • Schließe alle offenen Programme und Browser.
  • Starte die adwcleaner.exe mit einem Doppelklick.
  • Klicke auf Delete.
  • Bestätige jeweils mit Ok.
  • Dein Rechner wird neu gestartet. Nach dem Neustart öffnet sich eine Textdatei.
  • Poste mir den Inhalt mit deiner nächsten Antwort.
  • Die Logdatei findest du auch unter C:\AdwCleaner[S1].txt.
__________________
"Die Wahrheit ist normalerweise nur eine Entschuldigung für einen Mangel an Fantasie." (Elim Garak)

Das Trojaner-Board unterstützen
Warum Linux besser als Windows ist!

Alt 16.07.2012, 00:35   #9
CrisJano
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Code:
ATTFilter
# AdwCleaner v1.702 - Logfile created 07/16/2012 at 01:21:48
# Updated 13/07/2012 by Xplode
# Operating system : Windows 7 Professional  (64 bits)
# User : Cris - CRIS-PC
# Running from : C:\Users\Cris\Downloads\adwcleaner.exe
# Option [Delete]


***** [Services] *****


***** [Files / Folders] *****


***** [Registry] *****

Key Deleted : HKCU\Software\Softonic

***** [Registre - GUID] *****


***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16421

[OK] Registry is clean.

-\\ Mozilla Firefox v [Unable to get version]

Profile name : default 
File : C:\Users\Cris\AppData\Roaming\Mozilla\Firefox\Profiles\2n05c3xy.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v19.0.1084.52

File : C:\Users\Cris\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [1047 octets] - [15/07/2012 14:06:04]
AdwCleaner[S1].txt - [939 octets] - [16/07/2012 01:21:48]

########## EOF - C:\AdwCleaner[S1].txt - [1066 octets] ##########
         

Alt 16.07.2012, 16:01   #10
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Mach bitte ein neues OTL-Log. Bitte alles nach Möglichkeit hier in CODE-Tags posten.

Wird so gemacht:

[code] hier steht das Log [/code]

Und das ganze sieht dann so aus:

Code:
ATTFilter
 hier steht das Log
         
CustomScan mit OTL

Lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop. Falls schon vorhanden, bitte die ältere vorhandene Datei durch die neu heruntergeladene Datei ersetzen, damit du auch wirklich mit einer aktuellen Version von OTL arbeitest.
  • Starte bitte die OTL.exe.
    Vista und Win7 User mit Rechtsklick "als Administrator starten"
  • Setze oben mittig den Haken bei Scanne alle Benutzer
  • Kopiere nun den kompletten Inhalt aus der untenstehenden Codebox in die Textbox von OTL - wenn OTL auf deutsch ist wird sie mit beschriftet
Code:
ATTFilter
netsvcs
msconfig
safebootminimal
safebootnetwork
activex
drivers32
%ALLUSERSPROFILE%\Application Data\*.
%ALLUSERSPROFILE%\Application Data\*.exe /s
%APPDATA%\*.
%APPDATA%\*.exe /s
%SYSTEMDRIVE%\*.exe
/md5start
wininit.exe
userinit.exe
eventlog.dll
scecli.dll
netlogon.dll
cngaudit.dll
ws2ifsl.sys
sceclt.dll
ntelogon.dll
winlogon.exe
logevent.dll
user32.DLL
iaStor.sys
nvstor.sys
atapi.sys
IdeChnDr.sys
viasraid.sys
AGP440.sys
vaxscsi.sys
nvatabus.sys
viamraid.sys
nvata.sys
nvgts.sys
iastorv.sys
ViPrt.sys
eNetHook.dll
ahcix86.sys
KR10N.sys
nvstor32.sys
ahcix86s.sys
/md5stop
%systemroot%\system32\drivers\*.sys /lockedfiles
%systemroot%\System32\config\*.sav
%systemroot%\*. /mp /s
%systemroot%\system32\*.dll /lockedfiles
CREATERESTOREPOINT
         
  • Schliesse bitte nun alle Programme. (Wichtig)
  • Klicke nun bitte auf den Quick Scan Button.
  • Klick auf .
  • Kopiere nun den Inhalt aus OTL.txt hier in Deinen Thread
__________________
"Die Wahrheit ist normalerweise nur eine Entschuldigung für einen Mangel an Fantasie." (Elim Garak)

Das Trojaner-Board unterstützen
Warum Linux besser als Windows ist!

Alt 17.07.2012, 12:18   #11
CrisJano
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Code:
ATTFilter
OTL logfile created on: 17.07.2012 12:52:57 - Run 1
OTL by OldTimer - Version 3.2.53.1     Folder = C:\Users\Cris\Desktop
64bit- Professional Service Pack 1 (Version = 6.1.7601) - Type = NTWorkstation
Internet Explorer (Version = 9.0.8112.16421)
Locale: 00000407 | Country: Deutschland | Language: DEU | Date Format: dd.MM.yyyy
 
1,75 Gb Total Physical Memory | 0,92 Gb Available Physical Memory | 52,55% Memory free
3,50 Gb Paging File | 2,48 Gb Available in Paging File | 70,93% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files (x86)
Drive C: | 31,15 Gb Total Space | 2,62 Gb Free Space | 8,42% Space Free | Partition Type: NTFS
Drive D: | 19,53 Gb Total Space | 11,67 Gb Free Space | 59,77% Space Free | Partition Type: NTFS
Drive E: | 100,00 Mb Total Space | 84,74 Mb Free Space | 84,75% Space Free | Partition Type: NTFS
Drive G: | 931,51 Gb Total Space | 864,74 Gb Free Space | 92,83% Space Free | Partition Type: NTFS
 
Computer Name: CRIS-PC | User Name: Cris | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: All users | Quick Scan | Include 64bit Scans
Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days
 
========== Processes (SafeList) ==========
 
PRC - [2012.07.17 12:49:59 | 000,595,968 | ---- | M] (OldTimer Tools) -- C:\Users\Cris\Desktop\OTL.exe
PRC - [2012.05.24 01:15:25 | 004,348,008 | ---- | M] (Microsoft Corporation) -- C:\Windows\SoftwareDistribution\Download\Install\NDP40-KB2686827-x64.exe
PRC - [2012.04.04 15:56:40 | 000,654,408 | ---- | M] (Malwarebytes Corporation) -- D:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe
PRC - [2012.04.04 15:56:38 | 000,462,408 | ---- | M] (Malwarebytes Corporation) -- D:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe
PRC - [2012.03.15 13:12:02 | 000,079,112 | ---- | M] (Microsoft Corporation) -- g:\5e67167c1320cdc3db530d2cb0f72e\Setup.exe
PRC - [2010.03.18 13:16:28 | 000,130,384 | ---- | M] (Microsoft Corporation) -- C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
 
 
========== Modules (No Company Name) ==========
 
 
========== Win32 Services (SafeList) ==========
 
SRV:64bit: - [2009.07.14 03:40:01 | 000,193,536 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Windows\SysNative\appmgmts.dll -- (AppMgmt)
SRV - [2012.04.04 15:56:40 | 000,654,408 | ---- | M] (Malwarebytes Corporation) [Auto | Running] -- D:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe -- (MBAMService)
SRV - [2011.03.28 21:11:06 | 002,292,096 | ---- | M] (Microsoft Corp.) [Auto | Running] -- C:\Programme\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE -- (wlidsvc)
SRV - [2010.09.22 18:10:10 | 000,057,184 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Programme\Windows Live\Mesh\wlcrasvc.exe -- (wlcrasvc)
SRV - [2010.03.18 13:16:28 | 000,130,384 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -- (clr_optimization_v4.0.30319_32)
SRV - [2009.06.10 23:23:09 | 000,066,384 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe -- (clr_optimization_v2.0.50727_32)
SRV - [2007.05.31 17:11:54 | 000,443,784 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Windows\WindowsMobile\wcescomm.dll -- (WcesComm)
SRV - [2007.05.31 17:11:46 | 000,225,672 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Windows\WindowsMobile\rapimgr.dll -- (RapiMgr)
 
 
========== Driver Services (SafeList) ==========
 
DRV:64bit: - [2012.04.04 15:56:40 | 000,024,904 | ---- | M] (Malwarebytes Corporation) [File_System | On_Demand | Running] -- C:\Windows\SysNative\drivers\mbam.sys -- (MBAMProtector)
DRV:64bit: - [2012.03.01 08:46:16 | 000,023,408 | ---- | M] (Microsoft Corporation) [Recognizer | Boot | Unknown] -- C:\Windows\SysNative\drivers\fs_rec.sys -- (Fs_Rec)
DRV:64bit: - [2011.12.16 17:53:28 | 000,016,376 | ---- | M] (TeamViewer GmbH) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\TVMonitor.sys -- (MonitorFunction)
DRV:64bit: - [2011.03.11 08:41:12 | 000,107,904 | ---- | M] (Advanced Micro Devices) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\amdsata.sys -- (amdsata)
DRV:64bit: - [2011.03.11 08:41:12 | 000,027,008 | ---- | M] (Advanced Micro Devices) [Kernel | Boot | Running] -- C:\Windows\SysNative\drivers\amdxata.sys -- (amdxata)
DRV:64bit: - [2011.01.15 18:21:04 | 000,036,352 | ---- | M] (Elaborate Bytes AG) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\VClone.sys -- (VClone)
DRV:64bit: - [2010.11.20 15:33:35 | 000,078,720 | ---- | M] (Hewlett-Packard Company) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\HpSAMD.sys -- (HpSAMD)
DRV:64bit: - [2010.11.20 13:07:05 | 000,059,392 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\TsUsbFlt.sys -- (TsUsbFlt)
DRV:64bit: - [2010.04.29 06:55:42 | 000,032,768 | ---- | M] (Google Inc) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\androidusb.sys -- (androidusb)
DRV:64bit: - [2009.07.14 03:52:20 | 000,194,128 | ---- | M] (AMD Technologies Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\amdsbs.sys -- (amdsbs)
DRV:64bit: - [2009.07.14 03:48:04 | 000,065,600 | ---- | M] (LSI Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\lsi_sas2.sys -- (LSI_SAS2)
DRV:64bit: - [2009.07.14 03:45:55 | 000,024,656 | ---- | M] (Promise Technology) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\stexstor.sys -- (stexstor)
DRV:64bit: - [2009.07.14 02:09:50 | 000,019,968 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\usb8023x.sys -- (usb_rndisx)
DRV:64bit: - [2009.06.10 22:35:35 | 000,408,960 | ---- | M] (NVIDIA Corporation) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\nvm62x64.sys -- (NVENETFD)
DRV:64bit: - [2009.06.10 22:34:33 | 003,286,016 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\evbda.sys -- (ebdrv)
DRV:64bit: - [2009.06.10 22:34:28 | 000,468,480 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\bxvbda.sys -- (b06bdrv)
DRV:64bit: - [2009.06.10 22:34:23 | 000,270,848 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\b57nd60a.sys -- (b57nd60a)
DRV:64bit: - [2009.06.10 22:31:59 | 000,031,232 | ---- | M] (Hauppauge Computer Works, Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\hcw85cir.sys -- (hcw85cir)
DRV - [2009.07.14 03:19:10 | 000,019,008 | ---- | M] (Microsoft Corporation) [File_System | On_Demand | Stopped] -- C:\Windows\SysWOW64\drivers\wimmount.sys -- (WIMMount)
 
 
========== Standard Registry (SafeList) ==========
 
 
========== Internet Explorer ==========
 
IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE:64bit: - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
 
 
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
 
 
IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://de.msn.com/?ocid=iehp
IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de
IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 1F 80 A0 25 BE 7B CC 01  [binary data]
IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC
IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
 
========== FireFox ==========
 
FF:64bit: - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: C:\Program Files\Microsoft Silverlight\5.1.10411.0\npctrl.dll ( Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll ()
FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.)
FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: C:\Program Files (x86)\Microsoft Silverlight\5.1.10411.0\npctrl.dll ( Microsoft Corporation)
FF - HKCU\Software\MozillaPlugins\@Skype Limited.com/Facebook Video Calling Plugin: C:\Users\Cris\AppData\Local\Facebook\Video\Skype\npFacebookVideoCalling.dll File not found
FF - HKCU\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Users\Cris\AppData\Local\Google\Update\1.3.21.111\npGoogleUpdate3.dll File not found
FF - HKCU\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Users\Cris\AppData\Local\Google\Update\1.3.21.111\npGoogleUpdate3.dll File not found
 
 
 
========== Chrome  ==========
 
CHR - default_search_provider: Google (Enabled)
CHR - default_search_provider: search_url = {google:baseURL}search?{google:RLZ}{google:acceptedSuggestion}{google:originalQueryForSuggestion}{google:searchFieldtrialParameter}{google:instantFieldTrialGroupParameter}sourceid=chrome&ie={inputEncoding}&q={searchTerms}
CHR - default_search_provider: suggest_url = {google:baseSuggestURL}search?{google:searchFieldtrialParameter}{google:instantFieldTrialGroupParameter}client=chrome&hl={language}&q={searchTerms}
CHR - plugin: Remoting Viewer (Enabled) = internal-remoting-viewer
CHR - plugin: Native Client (Enabled) = C:\Users\Cris\AppData\Local\Google\Chrome\Application\19.0.1084.52\ppGoogleNaClPluginChrome.dll
CHR - plugin: Chrome PDF Viewer (Enabled) = C:\Users\Cris\AppData\Local\Google\Chrome\Application\19.0.1084.52\pdf.dll
CHR - plugin: Shockwave Flash (Enabled) = C:\Users\Cris\AppData\Local\Google\Chrome\Application\19.0.1084.52\gcswf32.dll
CHR - plugin: Shockwave Flash (Enabled) = C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll
CHR - plugin: Adobe Acrobat (Enabled) = C:\Program Files (x86)\Adobe\Reader 10.0\Reader\Browser\nppdf32.dll
CHR - plugin: Java Deployment Toolkit 6.0.300.12 (Enabled) = C:\Program Files (x86)\Java\jre6\bin\new_plugin\npdeployJava1.dll
CHR - plugin: Java(TM) Platform SE 6 U30 (Enabled) = C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll
CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin.dll
CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin2.dll
CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin3.dll
CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin4.dll
CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin5.dll
CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin6.dll
CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin7.dll
CHR - plugin: Silverlight Plug-In (Enabled) = C:\Program Files (x86)\Microsoft Silverlight\5.1.10411.0\npctrl.dll
CHR - Extension: Google Kalender = C:\Users\Cris\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjicmeblgpmajnghnpcppodonldlgfn\4.5.3_0\
 
O1 HOSTS File: ([2009.06.10 23:00:26 | 000,000,824 | ---- | M]) - C:\Windows\SysNative\drivers\etc\hosts
O2:64bit: - BHO: (Windows Live ID Sign-in Helper) - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
O2 - BHO: (Java(tm) Plug-In SSV Helper) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre6\bin\ssv.dll (Sun Microsystems, Inc.)
O4 - HKLM..\Run: [Malwarebytes' Anti-Malware] D:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe (Malwarebytes Corporation)
O4 - HKU\S-1-5-19..\Run: [Sidebar] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe (Microsoft Corporation)
O4 - HKU\S-1-5-20..\Run: [Sidebar] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe (Microsoft Corporation)
O4 - HKU\S-1-5-19..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found
O4 - HKU\S-1-5-20..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found
O4:64bit: - HKLM..\RunOnceEx: [Flags] Reg Error: Invalid data type. File not found
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3
O8:64bit: - Extra context menu item: Free YouTube Download - C:\Users\Cris\AppData\Roaming\DVDVideoSoftIEHelpers\freeyoutubedownload.htm File not found
O8 - Extra context menu item: Free YouTube Download - C:\Users\Cris\AppData\Roaming\DVDVideoSoftIEHelpers\freeyoutubedownload.htm File not found
O9 - Extra Button: ICQ7.5 - {7578ADEA-D65F-4C89-A249-B1C88B6FFC20} - D:\Program Files\ICQ7.5\ICQ.exe (ICQ, LLC.)
O9 - Extra 'Tools' menuitem : ICQ7.5 - {7578ADEA-D65F-4C89-A249-B1C88B6FFC20} - D:\Program Files\ICQ7.5\ICQ.exe (ICQ, LLC.)
O10:64bit: - NameSpace_Catalog5\Catalog_Entries64\000000000005 [] - C:\Programme\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL (Microsoft Corp.)
O10:64bit: - NameSpace_Catalog5\Catalog_Entries64\000000000006 [] - C:\Programme\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL (Microsoft Corp.)
O1364bit: - gopher Prefix: missing
O13 - gopher Prefix: missing
O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} hxxp://messenger.zone.msn.com/MessengerGamesContent/GameContent/de/uno1/GAME_UNO1.cab (UnoCtrl Class)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab (Java Plug-in 1.6.0_30)
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} hxxp://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab (MessengerStatsClient Class)
O16 - DPF: {CAFEEFAC-0016-0000-0030-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab (Java Plug-in 1.6.0_30)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab (Java Plug-in 1.6.0_30)
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} hxxp://fpdownload2.macromedia.com/pub/shockwave/cabs/flash/swflash.cab (Shockwave Flash Object)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 195.50.140.246 195.50.140.114
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{9D84441F-D31A-4D6B-8D16-9793877A567F}: DhcpNameServer = 195.50.140.246 195.50.140.114
O18:64bit: - Protocol\Handler\livecall - No CLSID value found
O18:64bit: - Protocol\Handler\msnim - No CLSID value found
O18:64bit: - Protocol\Handler\wlmailhtml - No CLSID value found
O20:64bit: - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) - C:\Windows\SysNative\userinit.exe (Microsoft Corporation)
O20:64bit: - HKLM Winlogon: VMApplet - (SystemPropertiesPerformance.exe) - C:\Windows\SysNative\SystemPropertiesPerformance.exe (Microsoft Corporation)
O20:64bit: - HKLM Winlogon: VMApplet - (/pagefile) -  File not found
O20 - HKLM Winlogon: Shell - (explorer.exe) - C:\Windows\SysWow64\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (userinit.exe) - C:\Windows\SysWow64\userinit.exe (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (/pagefile) -  File not found
O21:64bit: - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
O32 - HKLM CDRom: AutoRun - 1
O34 - HKLM BootExecute: (autocheck autochk *)
O35:64bit: - HKLM\..comfile [open] -- "%1" %*
O35:64bit: - HKLM\..exefile [open] -- "%1" %*
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37:64bit: - HKLM\...com [@ = comfile] -- "%1" %*
O37:64bit: - HKLM\...exe [@ = exefile] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3)
O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2)
O38 - SubSystems\\Windows: (ServerDll=sxssrv,4)
 
NetSvcs:64bit: AppMgmt - C:\Windows\SysNative\appmgmts.dll (Microsoft Corporation)
 
MsConfig:64bit - StartUpFolder: C:^Users^Cris^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Dropbox.lnk -  - File not found
MsConfig:64bit - StartUpFolder: C:^Users^Cris^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OpenOffice.org 3.3.lnk - D:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe - ()
MsConfig:64bit - StartUpReg: Adobe ARM - hkey= - key= - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe (Adobe Systems Incorporated)
MsConfig:64bit - StartUpReg: Adobe Reader Speed Launcher - hkey= - key= -  File not found
MsConfig:64bit - StartUpReg: Facebook Update - hkey= - key= -  File not found
MsConfig:64bit - StartUpReg: Google Update - hkey= - key= -  File not found
MsConfig:64bit - StartUpReg: ICQ - hkey= - key= - D:\Program Files\ICQ7.5\ICQ.exe (ICQ, LLC.)
MsConfig:64bit - StartUpReg:  Malwarebytes Anti-Malware  - hkey= - key= -  File not found
MsConfig:64bit - StartUpReg: Malwarebytes' Anti-Malware - hkey= - key= -  File not found
MsConfig:64bit - StartUpReg: msnmsgr - hkey= - key= - C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe (Microsoft Corporation)
MsConfig:64bit - StartUpReg: QuickTime Task - hkey= - key= - C:\Program Files (x86)\QuickTime\QTTask.exe (Apple Inc.)
MsConfig:64bit - StartUpReg: SkypePM - hkey= - key= -  File not found
MsConfig:64bit - StartUpReg: SunJavaUpdateSched - hkey= - key= - C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe (Sun Microsystems, Inc.)
MsConfig:64bit - StartUpReg: Windows Mobile Device Center - hkey= - key= -  File not found
MsConfig:64bit - StartUpReg: Windows Mobile-based device management - hkey= - key= - C:\Windows\WindowsMobile\wmdcBase.exe (Microsoft Corporation)
 
SafeBootMin:64bit: AppMgmt - C:\Windows\SysNative\appmgmts.dll (Microsoft Corporation)
SafeBootMin:64bit: Base - Driver Group
SafeBootMin:64bit: Boot Bus Extender - Driver Group
SafeBootMin:64bit: Boot file system - Driver Group
SafeBootMin:64bit: File system - Driver Group
SafeBootMin:64bit: Filter - Driver Group
SafeBootMin:64bit: HelpSvc - Service
SafeBootMin:64bit: PCI Configuration - Driver Group
SafeBootMin:64bit: PNP Filter - Driver Group
SafeBootMin:64bit: Primary disk - Driver Group
SafeBootMin:64bit: sacsvr - Service
SafeBootMin:64bit: SCSI Class - Driver Group
SafeBootMin:64bit: System Bus Extender - Driver Group
SafeBootMin:64bit: vmms - Service
SafeBootMin:64bit: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers
SafeBootMin:64bit: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive
SafeBootMin:64bit: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive
SafeBootMin:64bit: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller
SafeBootMin:64bit: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc
SafeBootMin:64bit: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard
SafeBootMin:64bit: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse
SafeBootMin:64bit: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters
SafeBootMin:64bit: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter
SafeBootMin:64bit: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System
SafeBootMin:64bit: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive
SafeBootMin:64bit: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy
SafeBootMin:64bit: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers
SafeBootMin:64bit: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume
SafeBootMin:64bit: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices
SafeBootMin:64bit: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices
SafeBootMin:64bit: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices
SafeBootMin: Base - Driver Group
SafeBootMin: Boot Bus Extender - Driver Group
SafeBootMin: Boot file system - Driver Group
SafeBootMin: File system - Driver Group
SafeBootMin: Filter - Driver Group
SafeBootMin: HelpSvc - Service
SafeBootMin: PCI Configuration - Driver Group
SafeBootMin: PNP Filter - Driver Group
SafeBootMin: Primary disk - Driver Group
SafeBootMin: sacsvr - Service
SafeBootMin: SCSI Class - Driver Group
SafeBootMin: System Bus Extender - Driver Group
SafeBootMin: vmms - Service
SafeBootMin: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers
SafeBootMin: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive
SafeBootMin: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive
SafeBootMin: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller
SafeBootMin: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc
SafeBootMin: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard
SafeBootMin: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse
SafeBootMin: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters
SafeBootMin: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter
SafeBootMin: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System
SafeBootMin: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive
SafeBootMin: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy
SafeBootMin: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers
SafeBootMin: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume
SafeBootMin: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices
SafeBootMin: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices
SafeBootMin: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices
 
SafeBootNet:64bit: AppMgmt - C:\Windows\SysNative\appmgmts.dll (Microsoft Corporation)
SafeBootNet:64bit: Base - Driver Group
SafeBootNet:64bit: Boot Bus Extender - Driver Group
SafeBootNet:64bit: Boot file system - Driver Group
SafeBootNet:64bit: File system - Driver Group
SafeBootNet:64bit: Filter - Driver Group
SafeBootNet:64bit: HelpSvc - Service
SafeBootNet:64bit: Messenger - Service
SafeBootNet:64bit: NDIS Wrapper - Driver Group
SafeBootNet:64bit: NetBIOSGroup - Driver Group
SafeBootNet:64bit: NetDDEGroup - Driver Group
SafeBootNet:64bit: Network - Driver Group
SafeBootNet:64bit: NetworkProvider - Driver Group
SafeBootNet:64bit: PCI Configuration - Driver Group
SafeBootNet:64bit: PNP Filter - Driver Group
SafeBootNet:64bit: PNP_TDI - Driver Group
SafeBootNet:64bit: Primary disk - Driver Group
SafeBootNet:64bit: rdsessmgr - Service
SafeBootNet:64bit: sacsvr - Service
SafeBootNet:64bit: SCSI Class - Driver Group
SafeBootNet:64bit: Streams Drivers - Driver Group
SafeBootNet:64bit: System Bus Extender - Driver Group
SafeBootNet:64bit: TDI - Driver Group
SafeBootNet:64bit: vmms - Service
SafeBootNet:64bit: WudfUsbccidDriver - Driver
SafeBootNet:64bit: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers
SafeBootNet:64bit: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive
SafeBootNet:64bit: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive
SafeBootNet:64bit: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller
SafeBootNet:64bit: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc
SafeBootNet:64bit: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard
SafeBootNet:64bit: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse
SafeBootNet:64bit: {4D36E972-E325-11CE-BFC1-08002BE10318} - Net
SafeBootNet:64bit: {4D36E973-E325-11CE-BFC1-08002BE10318} - NetClient
SafeBootNet:64bit: {4D36E974-E325-11CE-BFC1-08002BE10318} - NetService
SafeBootNet:64bit: {4D36E975-E325-11CE-BFC1-08002BE10318} - NetTrans
SafeBootNet:64bit: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters
SafeBootNet:64bit: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter
SafeBootNet:64bit: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System
SafeBootNet:64bit: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive
SafeBootNet:64bit: {50DD5230-BA8A-11D1-BF5D-0000F805F530} - Smart card readers
SafeBootNet:64bit: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy
SafeBootNet:64bit: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers
SafeBootNet:64bit: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume
SafeBootNet:64bit: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices
SafeBootNet:64bit: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices
SafeBootNet:64bit: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices
SafeBootNet: Base - Driver Group
SafeBootNet: Boot Bus Extender - Driver Group
SafeBootNet: Boot file system - Driver Group
SafeBootNet: File system - Driver Group
SafeBootNet: Filter - Driver Group
SafeBootNet: HelpSvc - Service
SafeBootNet: Messenger - Service
SafeBootNet: NDIS Wrapper - Driver Group
SafeBootNet: NetBIOSGroup - Driver Group
SafeBootNet: NetDDEGroup - Driver Group
SafeBootNet: Network - Driver Group
SafeBootNet: NetworkProvider - Driver Group
SafeBootNet: PCI Configuration - Driver Group
SafeBootNet: PNP Filter - Driver Group
SafeBootNet: PNP_TDI - Driver Group
SafeBootNet: Primary disk - Driver Group
SafeBootNet: rdsessmgr - Service
SafeBootNet: sacsvr - Service
SafeBootNet: SCSI Class - Driver Group
SafeBootNet: Streams Drivers - Driver Group
SafeBootNet: System Bus Extender - Driver Group
SafeBootNet: TDI - Driver Group
SafeBootNet: vmms - Service
SafeBootNet: WudfUsbccidDriver - Driver
SafeBootNet: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers
SafeBootNet: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive
SafeBootNet: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive
SafeBootNet: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller
SafeBootNet: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc
SafeBootNet: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard
SafeBootNet: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse
SafeBootNet: {4D36E972-E325-11CE-BFC1-08002BE10318} - Net
SafeBootNet: {4D36E973-E325-11CE-BFC1-08002BE10318} - NetClient
SafeBootNet: {4D36E974-E325-11CE-BFC1-08002BE10318} - NetService
SafeBootNet: {4D36E975-E325-11CE-BFC1-08002BE10318} - NetTrans
SafeBootNet: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters
SafeBootNet: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter
SafeBootNet: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System
SafeBootNet: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive
SafeBootNet: {50DD5230-BA8A-11D1-BF5D-0000F805F530} - Smart card readers
SafeBootNet: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy
SafeBootNet: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers
SafeBootNet: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume
SafeBootNet: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices
SafeBootNet: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices
SafeBootNet: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices
 
ActiveX:64bit: {22d6f312-b0f6-11d0-94ab-0080c74c7e95} - Microsoft Windows Media Player 12.0
ActiveX:64bit: {2C7339CF-2B09-4501-B3F3-F3508C9228ED} - %SystemRoot%\system32\regsvr32.exe /s /n /i:/UserInstall %SystemRoot%\system32\themeui.dll
ActiveX:64bit: {3af36230-a269-11d1-b5bf-0000f8051515} - Offline Browsing Pack
ActiveX:64bit: {44BBA840-CC51-11CF-AAFA-00AA00B6015C} - "%ProgramFiles%\Windows Mail\WinMail.exe" OCInstallUserConfigOE
ActiveX:64bit: {44BBA855-CC51-11CF-AAFA-00AA00B6015F} - DirectDrawEx
ActiveX:64bit: {45ea75a0-a269-11d1-b5bf-0000f8051515} - Internet Explorer Help
ActiveX:64bit: {4f645220-306d-11d2-995d-00c04f98bbc9} - Microsoft Windows Script 5.6
ActiveX:64bit: {5fd399c0-a70a-11d1-9948-00c04f98bbc9} - Internet Explorer Setup Tools
ActiveX:64bit: {630b1da0-b465-11d1-9948-00c04f98bbc9} - Browsing Enhancements
ActiveX:64bit: {6BF52A52-394A-11d3-B153-00C04F79FAA6} - Microsoft Windows Media Player
ActiveX:64bit: {6fab99d0-bab8-11d1-994a-00c04f98bbc9} - MSN Site Access
ActiveX:64bit: {7790769C-0471-11d2-AF11-00C04FA35D02} - Address Book 7
ActiveX:64bit: {89820200-ECBD-11cf-8B85-00AA005B4340} - regsvr32.exe /s /n /i:U shell32.dll
ActiveX:64bit: {89820200-ECBD-11cf-8B85-00AA005B4383} - C:\Windows\System32\ie4uinit.exe -BaseSettings
ActiveX:64bit: {89B4C1CD-B018-4511-B0A1-5476DBF70820} - C:\Windows\system32\Rundll32.exe C:\Windows\system32\mscories.dll,Install
ActiveX:64bit: {9381D8F2-0288-11D0-9501-00AA00B911A5} - Dynamic HTML Data Binding
ActiveX:64bit: {C9E9A340-D1F1-11D0-821E-444553540600} - Internet Explorer Core Fonts
ActiveX:64bit: {de5aed00-a4bf-11d1-9948-00c04f98bbc9} - HTML Help
ActiveX:64bit: {E92B03AB-B707-11d2-9CBD-0000F87A369E} - Active Directory Service Interface
ActiveX:64bit: {F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4} - .NET Framework
ActiveX:64bit: {FEBEF00C-046D-438D-8A88-BF94A6C9E703} - .NET Framework
ActiveX:64bit: >{22d6f312-b0f6-11d0-94ab-0080c74c7e95} - %SystemRoot%\system32\unregmp2.exe /ShowWMP
ActiveX:64bit: >{26923b43-4d38-484f-9b9e-de460746276c} - C:\Windows\System32\ie4uinit.exe -UserIconConfig
ActiveX:64bit: >{60B49E34-C7CC-11D0-8953-00A0C90347FF} - "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
ActiveX: {08B0E5C0-4FCB-11CF-AAA5-00401C608500} - Java (Sun)
ActiveX: {22d6f312-b0f6-11d0-94ab-0080c74c7e95} - Microsoft Windows Media Player 12.0
ActiveX: {25FFAAD0-F4A3-4164-95FF-4461E9F35D51} - .NET Framework
ActiveX: {2C7339CF-2B09-4501-B3F3-F3508C9228ED} - %SystemRoot%\system32\regsvr32.exe /s /n /i:/UserInstall %SystemRoot%\system32\themeui.dll
ActiveX: {3af36230-a269-11d1-b5bf-0000f8051515} - Offline Browsing Pack
ActiveX: {44BBA840-CC51-11CF-AAFA-00AA00B6015C} - "%ProgramFiles(x86)%\Windows Mail\WinMail.exe" OCInstallUserConfigOE
ActiveX: {44BBA855-CC51-11CF-AAFA-00AA00B6015F} - DirectDrawEx
ActiveX: {45ea75a0-a269-11d1-b5bf-0000f8051515} - Internet Explorer Help
ActiveX: {4f645220-306d-11d2-995d-00c04f98bbc9} - Microsoft Windows Script 5.6
ActiveX: {5fd399c0-a70a-11d1-9948-00c04f98bbc9} - Internet Explorer Setup Tools
ActiveX: {630b1da0-b465-11d1-9948-00c04f98bbc9} - Browsing Enhancements
ActiveX: {6BF52A52-394A-11d3-B153-00C04F79FAA6} - Microsoft Windows Media Player
ActiveX: {6fab99d0-bab8-11d1-994a-00c04f98bbc9} - MSN Site Access
ActiveX: {7790769C-0471-11d2-AF11-00C04FA35D02} - Address Book 7
ActiveX: {7C028AF8-F614-47B3-82DA-BA94E41B1089} - .NET Framework
ActiveX: {89820200-ECBD-11cf-8B85-00AA005B4340} - regsvr32.exe /s /n /i:U shell32.dll
ActiveX: {89820200-ECBD-11cf-8B85-00AA005B4383} - C:\Windows\SysWOW64\ie4uinit.exe -BaseSettings
ActiveX: {89B4C1CD-B018-4511-B0A1-5476DBF70820} - C:\Windows\SysWOW64\Rundll32.exe C:\Windows\SysWOW64\mscories.dll,Install
ActiveX: {9381D8F2-0288-11D0-9501-00AA00B911A5} - Dynamic HTML Data Binding
ActiveX: {C9E9A340-D1F1-11D0-821E-444553540600} - Internet Explorer Core Fonts
ActiveX: {de5aed00-a4bf-11d1-9948-00c04f98bbc9} - HTML Help
ActiveX: {E92B03AB-B707-11d2-9CBD-0000F87A369E} - Active Directory Service Interface
ActiveX: {F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4} - .NET Framework
ActiveX: >{22d6f312-b0f6-11d0-94ab-0080c74c7e95} - %SystemRoot%\system32\unregmp2.exe /ShowWMP
ActiveX: >{26923b43-4d38-484f-9b9e-de460746276c} - C:\Windows\SysWOW64\ie4uinit.exe -UserIconConfig
ActiveX: >{60B49E34-C7CC-11D0-8953-00A0C90347FF} - "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\iedkcs32.dll",BrandIEActiveSetup SIGNUP
 
Drivers32:64bit: msacm.l3acm - C:\Windows\System32\l3codeca.acm (Fraunhofer Institut Integrierte Schaltungen IIS)
Drivers32: msacm.l3acm - C:\Windows\SysWOW64\l3codeca.acm (Fraunhofer Institut Integrierte Schaltungen IIS)
Drivers32: vidc.cvid - C:\Windows\SysWow64\iccvid.dll (Radius Inc.)
 
CREATERESTOREPOINT
Restore point Set: OTL Restore Point
 
========== Files/Folders - Created Within 30 Days ==========
 
[2012.07.17 12:49:53 | 000,595,968 | ---- | C] (OldTimer Tools) -- C:\Users\Cris\Desktop\OTL.exe
[2012.07.17 08:37:22 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{8A3DD251-2393-41B7-8489-CEE2A0EF2906}
[2012.07.17 08:37:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{9E355A82-D985-4A4B-A0FA-C63F9E9C7F64}
[2012.07.17 00:14:08 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{65F4B8F2-A260-4D9A-B885-C3B201EF7C64}
[2012.07.17 00:13:55 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{A8D02268-18F2-4FBC-8DB4-E0C93D42F0B3}
[2012.07.16 22:52:46 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{561CC574-52FF-4D40-A082-8A8B45E76F82}
[2012.07.16 22:52:28 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{E16C2D2C-4150-4911-A59C-6D712AB7448C}
[2012.07.16 22:23:13 | 000,000,000 | ---D | C] -- C:\Windows\SysNative\SPReview
[2012.07.16 22:16:16 | 000,116,224 | ---- | C] (Windows (R) Codename Longhorn DDK provider) -- C:\Windows\SysNative\fms.dll
[2012.07.16 22:15:48 | 000,093,696 | ---- | C] (Windows (R) Codename Longhorn DDK provider) -- C:\Windows\SysWow64\fms.dll
[2012.07.16 15:10:10 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{33C1CAF5-AC91-444C-A912-63A383A6BD64}
[2012.07.16 15:09:59 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{682FB522-773F-4F8A-8607-FB24A493520A}
[2012.07.16 06:44:10 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EE539925-7048-45FC-A65A-5601B20F3D07}
[2012.07.16 06:43:59 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{86147753-E400-44E3-AACA-140EC4C4A448}
[2012.07.16 01:34:03 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EE143669-1B15-420D-B3BD-E66A6FE1895D}
[2012.07.16 01:33:52 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{23E9328D-BCBD-4B41-82E6-97A2A3A08947}
[2012.07.16 01:01:14 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{AAC62578-F8E6-4DAB-BA24-157C6D48D960}
[2012.07.16 01:01:02 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{7353D542-E281-49F9-917D-534C593967A8}
[2012.07.15 16:00:48 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{2B786EBA-6D9C-4A5D-A779-347BA9548955}
[2012.07.15 16:00:37 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5E0F4505-910F-4ED6-A180-C532D76EAA01}
[2012.07.15 15:51:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5C5FFAB7-E7DD-406D-AAD8-54E57E0820BD}
[2012.07.15 15:51:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{34E1E285-4671-4BF9-B628-0E551DB2C9C7}
[2012.07.15 14:04:52 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{3D97A957-57F8-4630-A1F7-C6F8995D40CB}
[2012.07.15 14:04:40 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{08E714D7-6C22-4257-9FAA-E1A588735184}
[2012.07.15 09:23:05 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{9E8D07E3-EB5A-4927-A42A-F0E1164F5557}
[2012.07.15 09:22:52 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{F5234CFE-AFCC-4264-9695-2FB64BFA7976}
[2012.07.14 22:42:08 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{35442443-D43C-499F-AE49-1272BEF58AAF}
[2012.07.14 22:41:57 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{668F1424-93F5-4C18-9E10-C404A07A7E9A}
[2012.07.14 12:44:56 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{52D1540E-980D-4BEA-B6AD-12468370C2FD}
[2012.07.14 12:44:45 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EDD0AD4B-49D3-4172-9958-D476E2C8EEC8}
[2012.07.14 09:57:18 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{113BEABD-1372-4FE6-BF5F-DD99D90C53F5}
[2012.07.14 09:57:04 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{97D8A040-7F89-48D3-9567-AD4E975F6842}
[2012.07.13 08:45:41 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{05647DDB-E55A-411A-800E-8106BB010907}
[2012.07.13 08:45:30 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5D7F58F2-A95E-4DC9-A3B1-CE4C6D7442F8}
[2012.07.12 17:53:50 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{BFBA13BA-4A0C-451E-953C-52BCF9528A73}
[2012.07.12 17:53:39 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{D220E39C-264E-4595-822C-26EF3B31863A}
[2012.07.12 00:00:38 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5812F087-E806-4CC2-82D3-4FAEB0B49242}
[2012.07.12 00:00:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{FC84E8FB-9B0B-48E7-869B-85C120E7BCA8}
[2012.07.11 14:54:23 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{FD5783AA-3FDD-4FD2-961C-29DB226C4476}
[2012.07.11 14:54:12 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{BF7E4A95-48B8-4C42-90EB-105F5D012B0C}
[2012.07.11 10:02:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{414CE7E4-4F9A-40E9-BB77-C1E89AAD5FA1}
[2012.07.11 10:01:58 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{9653867E-1EB7-4F10-9498-A63AA17E5F2B}
[2012.07.10 08:54:51 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{65BCE396-927D-4EBE-BD1D-481870AF8D9A}
[2012.07.10 08:54:38 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{74F7C429-1D15-40D9-A8FB-0B0C318994B5}
[2012.07.09 12:05:29 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{1D3AF251-BA9B-4E96-932E-D5F2DF0FFE81}
[2012.07.09 12:05:18 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{FF8ABEDC-DEDE-4842-8C1F-98A836F3CABF}
[2012.07.09 06:31:19 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{D7F4EF3F-04D9-4850-8F39-33B361427989}
[2012.07.09 06:31:08 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EB01D3A0-5F8E-487D-9155-9D4B803EFC2A}
[2012.07.08 17:20:56 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{7645F5DF-C276-4F3C-9C8E-12D68C338FBC}
[2012.07.08 17:20:45 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{A8773CA6-5694-40D9-9437-3C50D9F09B2B}
[2012.07.08 12:02:43 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{79FD47EE-EB65-471E-9B4F-6F784A4035F8}
[2012.07.08 12:02:30 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{641BDFFF-6E51-40E6-A0E0-5C557EC0F23C}
[2012.07.07 17:04:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{E860AE1D-2ADB-4D70-9DE0-E477E9913EA5}
[2012.07.07 17:04:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5C4BCDA6-836E-4856-95D5-297BB354B1DC}
[2012.07.06 16:27:27 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{25F5F9AE-5AE6-4C95-A426-C845CF4258DB}
[2012.07.06 16:27:14 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EE6382BA-E2C9-440C-B2B1-9A46B4FBC4DD}
[2012.07.05 13:23:38 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{39B5C022-2890-4D59-91CC-F814C5C59B58}
[2012.07.05 13:23:27 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{7DEB5185-DB6C-4E6F-A6AA-5A491CC3E7E1}
[2012.07.04 21:03:02 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{B6831CD6-B9DD-46A3-9C2F-F154450C1397}
[2012.07.04 21:02:48 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{61953AC0-6FBB-45B3-848E-B77323B12738}
[2012.07.03 21:01:26 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{C5EC49DA-169B-475D-B6AC-E29B06E5B88B}
[2012.07.01 10:18:29 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5AF337A7-B2B0-4C4F-B89B-5AC455F5939C}
[2012.07.01 10:18:07 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{116ABFCC-80AF-4795-AD91-950BB06D5AB0}
[2012.06.30 11:13:42 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{B8814BF1-D1A2-4455-BA62-C8AB2D903769}
[2012.06.30 11:13:30 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{43399625-2933-4FF9-850F-96FED302AB64}
[2012.06.29 21:29:54 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{0BCF0318-A4BA-4237-BE95-8C10B368B8DC}
[2012.06.29 21:29:42 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{3C5B38BE-BF0A-4607-A298-2810C16D6477}
[2012.06.27 17:18:25 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{680986D0-A909-4740-8558-0D26A1D3F93F}
[2012.06.27 17:18:13 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{FEE13981-CCBC-46B8-90B0-46CCB34C4A8E}
[2012.06.27 13:46:34 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{3CF85D47-1852-4A3A-89E5-A0F4C344D480}
[2012.06.27 13:46:22 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{E0A1C294-F42F-404A-B8CD-18090B6B94FB}
[2012.06.25 21:25:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{BB1E30EB-C152-4A12-8B23-518E3328A79E}
[2012.06.25 21:25:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{A952AE45-6334-4D89-9149-7F99A555C600}
[2012.06.24 22:24:23 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{3F88239F-7287-4B57-BBDF-3B3100CC3961}
[2012.06.24 22:24:11 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{8CCB21B0-7B9E-4E2F-B8ED-799F553B068C}
[2012.06.24 12:25:57 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{24C18AC0-5556-4198-9643-51FDA154F248}
[2012.06.24 12:25:46 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{9B01D8BE-17B2-4167-9A6D-0C692A81E0C8}
[2012.06.23 10:49:07 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{DC631595-7BBF-4981-BED4-1100B4925CF7}
[2012.06.23 10:48:54 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{67C1E72B-CD9C-4B7E-A3B1-7AFCB97DBD85}
[2012.06.22 20:35:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{44B69A68-9B91-4C45-A7A4-82132925084B}
[2012.06.22 20:35:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{973EE23F-9F31-4163-877E-C015D08AFEB9}
[2012.06.20 14:47:16 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{E3F574D4-E30B-4E07-AED0-A0F4CF509575}
[2012.06.20 14:47:01 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{989C171A-141B-4F0E-9686-0ABFCAB42BC9}
[2012.06.19 20:39:13 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{F4C82822-0A91-4D4F-9C8B-23A124041324}
[2012.06.17 14:05:59 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{B5C2276F-BCA3-41D4-9898-46D47A8193EA}
[1 C:\Users\Cris\AppData\Roaming\*.tmp files -> C:\Users\Cris\AppData\Roaming\*.tmp -> ]
 
========== Files - Modified Within 30 Days ==========
 
[2012.07.17 12:49:59 | 000,595,968 | ---- | M] (OldTimer Tools) -- C:\Users\Cris\Desktop\OTL.exe
[2012.07.17 12:47:27 | 000,629,122 | ---- | M] () -- C:\Windows\SysNative\perfh007.dat
[2012.07.17 12:47:27 | 000,594,766 | ---- | M] () -- C:\Windows\SysNative\perfh009.dat
[2012.07.17 12:47:27 | 000,119,994 | ---- | M] () -- C:\Windows\SysNative\perfc007.dat
[2012.07.17 12:47:27 | 000,099,136 | ---- | M] () -- C:\Windows\SysNative\perfc009.dat
[2012.07.17 12:47:26 | 001,434,104 | ---- | M] () -- C:\Windows\SysNative\PerfStringBackup.INI
[2012.07.17 12:46:26 | 000,014,752 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
[2012.07.17 12:46:25 | 000,014,752 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
[2012.07.17 12:41:00 | 000,001,116 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001UA.job
[2012.07.17 12:40:44 | 000,292,816 | ---- | M] () -- C:\Windows\SysNative\FNTCACHE.DAT
[2012.07.17 12:40:32 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat
[2012.07.17 12:39:46 | 1408,688,128 | -HS- | M] () -- C:\hiberfil.sys
[2012.07.17 12:13:00 | 000,000,924 | ---- | M] () -- C:\Windows\tasks\FacebookUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001UA.job
[2012.07.17 11:41:00 | 000,001,064 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001Core.job
[2012.07.16 15:13:03 | 000,000,902 | ---- | M] () -- C:\Windows\tasks\FacebookUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001Core.job
[2012.07.15 15:35:37 | 000,008,192 | RHS- | M] () -- C:\BOOTSECT.BAK
[2012.07.15 14:11:03 | 000,002,544 | ---- | M] () -- C:\Windows\diagwrn.xml
[2012.07.15 14:10:59 | 000,001,890 | ---- | M] () -- C:\Windows\diagerr.xml
[1 C:\Users\Cris\AppData\Roaming\*.tmp files -> C:\Users\Cris\AppData\Roaming\*.tmp -> ]
 
========== Files Created - No Company Name ==========
 
[2012.07.16 22:17:34 | 000,347,904 | ---- | C] () -- C:\Windows\SysNative\systemsf.ebd
[2012.07.16 22:15:21 | 000,010,429 | ---- | C] () -- C:\Windows\SysNative\ScavengeSpace.xml
[2012.07.16 22:15:04 | 000,105,559 | ---- | C] () -- C:\Windows\SysWow64\RacRules.xml
[2012.07.16 22:15:04 | 000,105,559 | ---- | C] () -- C:\Windows\SysNative\RacRules.xml
[2012.07.16 22:14:32 | 000,146,389 | ---- | C] () -- C:\Windows\SysWow64\printmanagement.msc
[2012.07.16 22:14:32 | 000,001,041 | ---- | C] () -- C:\Windows\SysWow64\tcpbidi.xml
[2012.07.15 14:10:56 | 000,002,544 | ---- | C] () -- C:\Windows\diagwrn.xml
[2012.07.15 14:10:56 | 000,001,890 | ---- | C] () -- C:\Windows\diagerr.xml
[2012.06.24 12:29:21 | 000,186,752 | ---- | C] () -- C:\Windows\SysNative\wuwebv.dll
[2012.06.08 15:31:58 | 000,001,206 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\CamStudio.Producer.ini
[2012.06.08 15:31:58 | 000,000,000 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\CamStudio.Producer.Data.ini
[2012.06.08 15:29:07 | 000,000,408 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\CamShapes.ini
[2012.06.08 15:29:07 | 000,000,408 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\CamLayout.ini
[2012.06.08 15:29:07 | 000,000,102 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\Camdata.ini
[2011.11.09 15:48:07 | 000,000,008 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\nt16bmj6slpr3ghp.dat
[2011.11.09 11:06:10 | 000,000,008 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\pi04uu2dmwq0ultr.dat
[1601.02.13 10:28:18 | 000,004,416 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\JtvTVjsvofOsGopOqGup
[1601.02.13 10:28:18 | 000,000,065 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\tNstTTjjJvfVsso
[1601.02.13 10:28:18 | 000,000,016 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\VTfAeJoVOexopgyGQXdy
 
========== LOP Check ==========
 
[2012.06.11 18:19:12 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Dropbox
[2012.03.13 23:51:01 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\DVDVideoSoft
[2012.06.11 18:19:12 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\DVDVideoSoftIEHelpers
[2012.06.11 19:26:08 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Ghrrynb
[2012.06.11 18:19:56 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\ICQ
[2012.03.16 00:38:05 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\kock
[2011.05.24 23:27:31 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\OpenOffice.org
[2011.05.25 00:05:29 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Windows Live Writer
[2012.03.16 00:38:23 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\xmldm
[2012.07.16 15:13:03 | 000,000,902 | ---- | M] () -- C:\Windows\Tasks\FacebookUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001Core.job
[2012.07.17 12:13:00 | 000,000,924 | ---- | M] () -- C:\Windows\Tasks\FacebookUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001UA.job
[2012.06.22 20:34:45 | 000,032,632 | ---- | M] () -- C:\Windows\Tasks\SCHEDLGU.TXT
 
========== Purity Check ==========
 
 
 
========== Custom Scans ==========
 
< %ALLUSERSPROFILE%\Application Data\*. >
 
< %ALLUSERSPROFILE%\Application Data\*.exe /s >
 
< %APPDATA%\*. >
[2011.05.28 14:19:13 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Adobe
[2012.06.11 18:19:12 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Dropbox
[2012.03.03 19:21:43 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\dvdcss
[2012.03.13 23:51:01 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\DVDVideoSoft
[2012.06.11 18:19:12 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\DVDVideoSoftIEHelpers
[2012.06.11 19:26:08 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Ghrrynb
[2012.06.11 18:19:56 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\ICQ
[2011.05.24 00:48:22 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Identities
[2012.03.16 00:38:05 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\kock
[2012.06.11 18:19:56 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\kodak
[2011.05.24 00:54:20 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Macromedia
[2011.11.09 16:05:53 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Malwarebytes
[2009.07.14 20:18:34 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Media Center Programs
[2011.11.09 15:55:47 | 000,000,000 | --SD | M] -- C:\Users\Cris\AppData\Roaming\Microsoft
[2011.05.24 23:27:31 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\OpenOffice.org
[2012.06.11 18:20:10 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Skype
[2012.06.11 18:20:11 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\vlc
[2011.05.25 00:05:29 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Windows Live Writer
[2011.05.25 01:21:28 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\WinRAR
[2012.03.16 00:38:23 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\xmldm
 
< %APPDATA%\*.exe /s >
[2011.04.22 20:15:04 | 012,993,904 | ---- | M] (Microsoft Corporation) -- C:\Users\Cris\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\OUTLOOK.EXE
[2010.08.13 13:00:16 | 000,521,080 | ---- | M] (Microsoft Corporation) -- C:\Users\Cris\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\POWERPNT.EXE
 
< %SYSTEMDRIVE%\*.exe >
 
< MD5 for: AGP440.SYS  >
[2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\SysNative\drivers\AGP440.sys
[2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\SysNative\DriverStore\FileRepository\machine.inf_amd64_neutral_a2f120466549d68b\AGP440.sys
[2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\winsxs\amd64_machine.inf_31bf3856ad364e35_6.1.7600.16385_none_1607dee2d861e021\AGP440.sys
[2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\winsxs\amd64_machine.inf_31bf3856ad364e35_6.1.7601.17514_none_1838f2aad55063bb\AGP440.sys
 
< MD5 for: ATAPI.SYS  >
[2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\SysNative\drivers\atapi.sys
[2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\SysNative\DriverStore\FileRepository\mshdc.inf_amd64_neutral_aad30bdeec04ea5e\atapi.sys
[2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\winsxs\amd64_mshdc.inf_31bf3856ad364e35_6.1.7600.16385_none_392d19c13b3ad543\atapi.sys
[2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\winsxs\amd64_mshdc.inf_31bf3856ad364e35_6.1.7601.17514_none_3b5e2d89382958dd\atapi.sys
 
< MD5 for: CNGAUDIT.DLL  >
[2009.07.14 03:15:06 | 000,012,288 | ---- | M] (Microsoft Corporation) MD5=50BA656134F78AF64E4DD3C8B6FEFD7E -- C:\Windows\SysWOW64\cngaudit.dll
[2009.07.14 03:15:06 | 000,012,288 | ---- | M] (Microsoft Corporation) MD5=50BA656134F78AF64E4DD3C8B6FEFD7E -- C:\Windows\winsxs\x86_microsoft-windows-cngaudit-dll_31bf3856ad364e35_6.1.7600.16385_none_e83a414890e8132b\cngaudit.dll
[2009.07.14 03:40:20 | 000,018,944 | ---- | M] (Microsoft Corporation) MD5=86FE1B1F8FD42CD0DB641AB1CDB13093 -- C:\Windows\SysNative\cngaudit.dll
[2009.07.14 03:40:20 | 000,018,944 | ---- | M] (Microsoft Corporation) MD5=86FE1B1F8FD42CD0DB641AB1CDB13093 -- C:\Windows\winsxs\amd64_microsoft-windows-cngaudit-dll_31bf3856ad364e35_6.1.7600.16385_none_4458dccc49458461\cngaudit.dll
 
< MD5 for: IASTORV.SYS  >
[2010.11.20 15:33:38 | 000,410,496 | ---- | M] (Intel Corporation) MD5=3DF4395A7CF8B7A72A5F4606366B8C2D -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.17514_none_0d3757e79e6784d0\iaStorV.sys
[2010.11.20 15:33:38 | 000,410,496 | ---- | M] (Intel Corporation) MD5=3DF4395A7CF8B7A72A5F4606366B8C2D -- C:\Windows\SysNative\DriverStore\FileRepository\iastorv.inf_amd64_neutral_668286aa35d55928\iaStorV.sys
[2010.11.20 15:33:38 | 000,410,496 | ---- | M] (Intel Corporation) MD5=3DF4395A7CF8B7A72A5F4606366B8C2D -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.17514_none_0d3757e79e6784d0\iaStorV.sys
[2011.03.11 08:19:16 | 000,410,496 | ---- | M] (Intel Corporation) MD5=5B3DE7208E5000D5B451B9D290D2579C -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.21680_none_0d714416b7c182d5\iaStorV.sys
[2011.03.11 08:41:26 | 000,410,496 | ---- | M] (Intel Corporation) MD5=AAAF44DB3BD0B9D1FB6969B23ECC8366 -- C:\Windows\SysNative\drivers\iaStorV.sys
[2011.03.11 08:41:26 | 000,410,496 | ---- | M] (Intel Corporation) MD5=AAAF44DB3BD0B9D1FB6969B23ECC8366 -- C:\Windows\SysNative\DriverStore\FileRepository\iastorv.inf_amd64_neutral_0bcee2057afcc090\iaStorV.sys
[2011.03.11 08:41:26 | 000,410,496 | ---- | M] (Intel Corporation) MD5=AAAF44DB3BD0B9D1FB6969B23ECC8366 -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.17577_none_0cf9793d9e95787b\iaStorV.sys
[2011.03.11 08:23:00 | 000,410,496 | ---- | M] (Intel Corporation) MD5=B75E45C564E944A2657167D197AB29DA -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7600.16778_none_0b141c81a16e25e6\iaStorV.sys
[2011.03.11 08:25:49 | 000,410,496 | ---- | M] (Intel Corporation) MD5=BFDC9D75698800CFE4D1698BF2750EA2 -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7600.20921_none_0bccc8c8ba6985c1\iaStorV.sys
[2009.07.14 03:48:04 | 000,410,688 | ---- | M] (Intel Corporation) MD5=D83EFB6FD45DF9D55E9A1AFC63640D50 -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7600.16385_none_0b06441fa1790136\iaStorV.sys
 
< MD5 for: NETLOGON.DLL  >
[2009.07.14 03:41:52 | 000,692,736 | ---- | M] (Microsoft Corporation) MD5=956D030D375F207B22FB111E06EF9C35 -- C:\Windows\winsxs\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7600.16385_none_59aca8ea51aaeefe\netlogon.dll
[2010.11.20 15:27:22 | 000,695,808 | ---- | M] (Microsoft Corporation) MD5=AA339DD8BB128EF66660DFBBB59043D3 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_5bddbcb24e997298\netlogon.dll
[2010.11.20 15:27:22 | 000,695,808 | ---- | M] (Microsoft Corporation) MD5=AA339DD8BB128EF66660DFBBB59043D3 -- C:\Windows\SysNative\netlogon.dll
[2010.11.20 15:27:22 | 000,695,808 | ---- | M] (Microsoft Corporation) MD5=AA339DD8BB128EF66660DFBBB59043D3 -- C:\Windows\winsxs\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_5bddbcb24e997298\netlogon.dll
[2010.11.20 14:20:28 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=C1809B9907ADEDAF16F50C894100883B -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\wow64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_6632670482fa3493\netlogon.dll
[2010.11.20 14:20:28 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=C1809B9907ADEDAF16F50C894100883B -- C:\Windows\SysWOW64\netlogon.dll
[2010.11.20 14:20:28 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=C1809B9907ADEDAF16F50C894100883B -- C:\Windows\winsxs\wow64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_6632670482fa3493\netlogon.dll
[2009.07.14 03:16:02 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=EAA75D9000B71F10EEC04D2AE6C60E81 -- C:\Windows\winsxs\wow64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7600.16385_none_6401533c860bb0f9\netlogon.dll
 
< MD5 for: NVSTOR.SYS  >
[2009.07.14 03:45:45 | 000,167,488 | ---- | M] (NVIDIA Corporation) MD5=477DC4D6DEB99BE37084C9AC6D013DA1 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7600.16385_none_95cfb4ced8afab0e\nvstor.sys
[2011.03.11 08:23:06 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=6C1D5F70E7A6A3FD1C90D840EDC048B9 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7600.16778_none_95dd8d30d8a4cfbe\nvstor.sys
[2011.03.11 08:25:53 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=AE274836BA56518E279087363A781214 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7600.20921_none_96963977f1a02f99\nvstor.sys
[2011.03.11 08:19:21 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=D23C7E8566DA2B8A7C0DBBB761D54888 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.21680_none_983ab4c5eef82cad\nvstor.sys
[2011.03.11 08:41:34 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=DAB0E87525C10052BF65F06152F37E4A -- C:\Windows\SysNative\drivers\nvstor.sys
[2011.03.11 08:41:34 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=DAB0E87525C10052BF65F06152F37E4A -- C:\Windows\SysNative\DriverStore\FileRepository\nvraid.inf_amd64_neutral_0276fc3b3ea60d41\nvstor.sys
[2011.03.11 08:41:34 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=DAB0E87525C10052BF65F06152F37E4A -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.17577_none_97c2e9ecd5cc2253\nvstor.sys
[2010.11.20 15:33:48 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=F7CD50FE7139F07E77DA8AC8033D1832 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.17514_none_9800c896d59e2ea8\nvstor.sys
[2010.11.20 15:33:48 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=F7CD50FE7139F07E77DA8AC8033D1832 -- C:\Windows\SysNative\DriverStore\FileRepository\nvraid.inf_amd64_neutral_dd659ed032d28a14\nvstor.sys
[2010.11.20 15:33:48 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=F7CD50FE7139F07E77DA8AC8033D1832 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.17514_none_9800c896d59e2ea8\nvstor.sys
 
< MD5 for: SCECLI.DLL  >
[2009.07.14 03:16:13 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=26073302DAEA83CC5B944C546D6B47D2 -- C:\Windows\winsxs\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7600.16385_none_9e577e55272d37b4\scecli.dll
[2009.07.14 03:41:53 | 000,232,448 | ---- | M] (Microsoft Corporation) MD5=398712DDDAEFB85EDF61DF6A07B65C79 -- C:\Windows\winsxs\amd64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7600.16385_none_9402d402f2cc75b9\scecli.dll
[2010.11.20 14:21:04 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=8124944EC89D6A1815E4E53F5B96AAF4 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_a088921d241bbb4e\scecli.dll
[2010.11.20 14:21:04 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=8124944EC89D6A1815E4E53F5B96AAF4 -- C:\Windows\SysWOW64\scecli.dll
[2010.11.20 14:21:04 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=8124944EC89D6A1815E4E53F5B96AAF4 -- C:\Windows\winsxs\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_a088921d241bbb4e\scecli.dll
[2010.11.20 15:27:25 | 000,232,960 | ---- | M] (Microsoft Corporation) MD5=ED78427259134C63ED69804D2132B86C -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_9633e7caefbaf953\scecli.dll
[2010.11.20 15:27:25 | 000,232,960 | ---- | M] (Microsoft Corporation) MD5=ED78427259134C63ED69804D2132B86C -- C:\Windows\SysNative\scecli.dll
[2010.11.20 15:27:25 | 000,232,960 | ---- | M] (Microsoft Corporation) MD5=ED78427259134C63ED69804D2132B86C -- C:\Windows\winsxs\amd64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_9633e7caefbaf953\scecli.dll
 
< MD5 for: USER32.DLL  >
[2010.11.20 14:08:57 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=5E0DB2D8B2750543CD2EBB9EA8E6CDD3 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll
[2010.11.20 14:08:57 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=5E0DB2D8B2750543CD2EBB9EA8E6CDD3 -- C:\Windows\SysWOW64\user32.dll
[2010.11.20 14:08:57 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=5E0DB2D8B2750543CD2EBB9EA8E6CDD3 -- C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll
[2009.07.14 03:41:56 | 001,008,640 | ---- | M] (Microsoft Corporation) MD5=72D7B3EA16946E8F0CF7458150031CC6 -- C:\Windows\winsxs\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_292d5de8870d85d9\user32.dll
[2009.07.14 03:11:24 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=E8B0FFC209E504CB7E79FC24E6C085F0 -- C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_3382083abb6e47d4\user32.dll
[2010.11.20 15:27:27 | 001,008,128 | ---- | M] (Microsoft Corporation) MD5=FE70103391A64039A921DBFFF9C7AB1B -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_2b5e71b083fc0973\user32.dll
[2010.11.20 15:27:27 | 001,008,128 | ---- | M] (Microsoft Corporation) MD5=FE70103391A64039A921DBFFF9C7AB1B -- C:\Windows\SysNative\user32.dll
[2010.11.20 15:27:27 | 001,008,128 | ---- | M] (Microsoft Corporation) MD5=FE70103391A64039A921DBFFF9C7AB1B -- C:\Windows\winsxs\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_2b5e71b083fc0973\user32.dll
 
< MD5 for: USERINIT.EXE  >
[2010.11.20 14:17:48 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=61AC3EFDFACFDD3F0F11DD4FD4044223 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_de3024012ff21116\userinit.exe
[2010.11.20 14:17:48 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=61AC3EFDFACFDD3F0F11DD4FD4044223 -- C:\Windows\SysWOW64\userinit.exe
[2010.11.20 14:17:48 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=61AC3EFDFACFDD3F0F11DD4FD4044223 -- C:\Windows\winsxs\x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_de3024012ff21116\userinit.exe
[2009.07.14 03:14:43 | 000,026,112 | ---- | M] (Microsoft Corporation) MD5=6DE80F60D7DE9CE6B8C2DDFDF79EF175 -- C:\Windows\winsxs\x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7600.16385_none_dbff103933038d7c\userinit.exe
[2009.07.14 03:39:48 | 000,030,208 | ---- | M] (Microsoft Corporation) MD5=6F8F1376A13114CC10C0E69274F5A4DE -- C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7600.16385_none_381dabbceb60feb2\userinit.exe
[2010.11.20 15:25:24 | 000,030,720 | ---- | M] (Microsoft Corporation) MD5=BAFE84E637BF7388C96EF48D4D3FDD53 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_3a4ebf84e84f824c\userinit.exe
[2010.11.20 15:25:24 | 000,030,720 | ---- | M] (Microsoft Corporation) MD5=BAFE84E637BF7388C96EF48D4D3FDD53 -- C:\Windows\SysNative\userinit.exe
[2010.11.20 15:25:24 | 000,030,720 | ---- | M] (Microsoft Corporation) MD5=BAFE84E637BF7388C96EF48D4D3FDD53 -- C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_3a4ebf84e84f824c\userinit.exe
 
< MD5 for: WININIT.EXE  >
[2009.07.14 03:39:52 | 000,129,024 | ---- | M] (Microsoft Corporation) MD5=94355C28C1970635A31B3FE52EB7CEBA -- C:\Windows\SysNative\wininit.exe
[2009.07.14 03:39:52 | 000,129,024 | ---- | M] (Microsoft Corporation) MD5=94355C28C1970635A31B3FE52EB7CEBA -- C:\Windows\winsxs\amd64_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_8ce7aa761e01ad49\wininit.exe
[2009.07.14 03:14:45 | 000,096,256 | ---- | M] (Microsoft Corporation) MD5=B5C5DCAD3899512020D135600129D665 -- C:\Windows\SysWOW64\wininit.exe
[2009.07.14 03:14:45 | 000,096,256 | ---- | M] (Microsoft Corporation) MD5=B5C5DCAD3899512020D135600129D665 -- C:\Windows\winsxs\x86_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_30c90ef265a43c13\wininit.exe
 
< MD5 for: WINLOGON.EXE  >
[2010.11.20 15:25:30 | 000,390,656 | ---- | M] (Microsoft Corporation) MD5=1151B1BAA6F350B1DB6598E0FEA7C457 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7601.17514_none_cde90685eb910636\winlogon.exe
[2010.11.20 15:25:30 | 000,390,656 | ---- | M] (Microsoft Corporation) MD5=1151B1BAA6F350B1DB6598E0FEA7C457 -- C:\Windows\SysNative\winlogon.exe
[2010.11.20 15:25:30 | 000,390,656 | ---- | M] (Microsoft Corporation) MD5=1151B1BAA6F350B1DB6598E0FEA7C457 -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7601.17514_none_cde90685eb910636\winlogon.exe
[2009.07.14 03:39:52 | 000,389,120 | ---- | M] (Microsoft Corporation) MD5=132328DF455B0028F13BF0ABEE51A63A -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.16385_none_cbb7f2bdeea2829c\winlogon.exe
[2009.10.28 09:01:57 | 000,389,632 | ---- | M] (Microsoft Corporation) MD5=A93D41A4D4B0D91C072D11DD8AF266DE -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.20560_none_cc522fd507b468f8\winlogon.exe
[2009.10.28 08:24:40 | 000,389,632 | ---- | M] (Microsoft Corporation) MD5=DA3E2A6FA9660CC75B471530CE88453A -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.16447_none_cbe534e7ee8042ad\winlogon.exe
 
< MD5 for: WS2IFSL.SYS  >
[2009.07.14 02:10:33 | 000,021,504 | ---- | M] (Microsoft Corporation) MD5=6BCC1D7D2FD2453957C5479A32364E52 -- C:\Windows\SysNative\drivers\ws2ifsl.sys
[2009.07.14 02:10:33 | 000,021,504 | ---- | M] (Microsoft Corporation) MD5=6BCC1D7D2FD2453957C5479A32364E52 -- C:\Windows\winsxs\amd64_microsoft-windows-w..rastructure-ws2ifsl_31bf3856ad364e35_6.1.7600.16385_none_ab7b927be17eace8\ws2ifsl.sys
 
< %systemroot%\system32\drivers\*.sys /lockedfiles >
 
< %systemroot%\System32\config\*.sav >
 
< %systemroot%\*. /mp /s >
 
< %systemroot%\system32\*.dll /lockedfiles >
 
<           >

< End of report >
         

Geändert von CrisJano (17.07.2012 um 12:34 Uhr)

Alt 17.07.2012, 12:32   #12
CrisJano
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Sorry, Dopplung...

Problem:
Der Trojaner hat sich am 11.06. bei mir draufgespielt.
Ergo: Vor über 30 Tagen.
OTL scannt die Dateien, die bis vor max. 30 Tagen verändert wurden.

Vorschlag:
Soll ich dann einen "normalen" Scan durchführen mit der Einstellung 60 Tage?

Oder reicht das so?

Alt 18.07.2012, 11:13   #13
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Achso, danke für den Hinweis, mach mal Einstellung 90 Tage, ansonsten alles wie oben
__________________
"Die Wahrheit ist normalerweise nur eine Entschuldigung für einen Mangel an Fantasie." (Elim Garak)

Das Trojaner-Board unterstützen
Warum Linux besser als Windows ist!

Alt 18.07.2012, 13:22   #14
CrisJano
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



kann es sein, dass es garnicht möglich ist, mit dem Quick-Scan die 90 Tage einzustellen?

Alt 18.07.2012, 19:44   #15
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Standard

Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log



Ja das ist möglich. Mach dann eben keinen QuickScan
__________________
"Die Wahrheit ist normalerweise nur eine Entschuldigung für einen Mangel an Fantasie." (Elim Garak)

Das Trojaner-Board unterstützen
Warum Linux besser als Windows ist!

Antwort

Themen zu Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log
administrator, anti-malware, autostart, dateisystem, downloader, escan, explorer, forum, gelöscht, helper, heuristiks/extra, heuristiks/shuriken, java, java/agent.dm, java/agent.dp, java/agent.dt, java/trojandownloader.agent.me, log, mail, malware, malwarebytes, microsoft, online, problem, scan, software, system, trojan.agent, trojaner, trojaner gefunden, variant, verschlüsselung, windows, windows verschlüsselungstrojaner, windows verschlüsserungs trojaner entschlüsseln?



Ähnliche Themen: Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log


  1. Windows 7; ESET Online-Scanner Fund "Variante von Win32/DownloadSponsor.C evtl. unerwünschte Anwendung"
    Log-Analyse und Auswertung - 27.04.2015 (13)
  2. Trojaner durch ESET Online Scanner gefunden
    Log-Analyse und Auswertung - 26.03.2015 (10)
  3. Eset online scanner gibt immer wieder Meldungen! - Windows 7
    Log-Analyse und Auswertung - 05.02.2015 (17)
  4. Fundmeldung von Eset Online Scanner
    Plagegeister aller Art und deren Bekämpfung - 25.01.2015 (9)
  5. Windows XP: maleware laut eset online scanner
    Log-Analyse und Auswertung - 04.11.2014 (11)
  6. Eset Online Scanner: 25 Funde - Was tun?
    Plagegeister aller Art und deren Bekämpfung - 22.07.2014 (1)
  7. ESET Online Scanner findet 18 Infizierte Dateien
    Plagegeister aller Art und deren Bekämpfung - 20.06.2014 (3)
  8. Fund von Eset online Scanner
    Log-Analyse und Auswertung - 01.06.2014 (5)
  9. Helfer für ESET Online Scanner Logfile
    Log-Analyse und Auswertung - 18.05.2014 (5)
  10. Win7 64Bit - Email Account wurde kompromittiert, vermutlich durch Virus, Trojaner, Malware oder Hijacker. Nach Scan mit ESET Online Scanner
    Log-Analyse und Auswertung - 17.04.2014 (9)
  11. ESET Online Scanner hat Bedrohungen erkannt
    Log-Analyse und Auswertung - 31.01.2014 (5)
  12. Probleme nach ESET Online Scanner
    Log-Analyse und Auswertung - 06.07.2013 (19)
  13. ESET online scanner fand trojans, was tun?
    Log-Analyse und Auswertung - 18.06.2013 (21)
  14. ESET Online Scanner hat 5 infected Files gefunden
    Log-Analyse und Auswertung - 18.04.2012 (1)
  15. ESET Online Scanner (NOD32)
    Anleitungen, FAQs & Links - 21.12.2009 (1)

Zum Thema Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log - Hallo Zusammen, auch ich habe leider eine Mail bekommen und die erst für echt gehalten und im Affekt den Anhang geöffnet. Ich sitze seit 4 1/2 Stunden am PC und - Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log...
Archiv
Du betrachtest: Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.