Trojaner-Board

Trojaner-Board (https://www.trojaner-board.de/)
-   Log-Analyse und Auswertung (https://www.trojaner-board.de/log-analyse-auswertung/)
-   -   Trojaner Generic17.CNOG gefunden (https://www.trojaner-board.de/86981-trojaner-generic17-cnog-gefunden.html)

chicken87 10.06.2010 20:17

Trojaner Generic17.CNOG gefunden
 
Hallo liebe Board User,
ich habe mir leider einen Trojaner eingefangen (für euch ja nix neues :D )
Ich vermute mal das es von dem nervigen ICQ Bilder geschicke gekommen ist weil ich ansonsten eigentlich immer genau darauf achte was mir auf die Festplatte kommt.
Als Antivirus Programm benutze ich AVG und halte es auch immer aktuell.
Nun findet besagtes AVG ständig den Trojaner Generic17.CNOG zu dem ich bei google nicht viel finden konnte (andere generic17 arten ja aber es gibt da anscheindend viele verschiedene und meiner war leider nicht dabei :dummguck: )
hab mich also für "andere" generic17 trojaner bisl schlau gemacht und hab jetzt ma HijackThis durchlaufen lassen und bevor ich mir nun alles verstelle (wovor ja gewarnt wird wenn man so wie ich keine Ahnung davon hat) wollte ich den log nun hier posten und hoffe auf eure Hilfe.
Hoffentlich hab ich soweit alles beachtet wegen Post zensieren und so :dummguck:

HiJackthis Logfile:
Code:

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 20:40:23, on 10.06.2010
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\SYSTEM32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\SYSTEM32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
C:\Programme\avmwlanstick\WlanNetService.exe
C:\Programme\Java\jre6\bin\jqs.exe
C:\PROGRA~1\AVG\AVG8\avgrsx.exe
C:\WINDOWS\RTHDCPL.EXE
C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe
C:\Programme\Java\jre6\bin\jusched.exe
C:\Programme\avmwlanstick\wlangui.exe
C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe
C:\PROGRA~1\AVG\AVG8\avgtray.exe
C:\Programme\DivX\DivX Update\DivXUpdate.exe
C:\WINDOWS\system32\ctfmon.exe
D:\Programme\DAEMON Tools\daemon.exe
C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe
C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
C:\Programme\CDBurnerXP\NMSAccess.exe
C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe
C:\WINDOWS\system32\PnkBstrA.exe
C:\WINDOWS\system32\PnkBstrB.exe
C:\Programme\CyberLink\Shared Files\RichVideo.exe
C:\PROGRA~1\AVG\AVG8\avgemc.exe
C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Programme\AVG\AVG8\avgcsrvx.exe
C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe
D:\Programme\ICQ6.5\ICQ.exe
C:\PROGRA~1\AVG\AVG8\avgnsx.exe
C:\WINDOWS\TEMP\bxhj.tmp\svchost.exe
D:\Programme\Winamp\winamp.exe
C:\Programme\Mozilla Firefox\firefox.exe
C:\Dokumente und Einstellungen\***\Desktop\HiJackThis204.exe

R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = hxxp://google.icq.com/search/search_frame.php
R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://google.icq.com
R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://google.huddi.com
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://go.microsoft.com/fwlink/?LinkId=69157
R3 - URLSearchHook: ICQ  Toolbar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - D:\Programme\ICQToolbar\toolbaru.dll
O2 - BHO: Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\AcroIEHelper.dll
O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Programme\AVG\AVG8\avgssie.dll
O2 - BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre6\bin\ssv.dll
O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Programme\Java\jre6\bin\jp2ssv.dll
O2 - BHO: JQSIEStartDetectorImpl - {E7E6F031-17CE-4C07-BC86-EABFE594F69C} - C:\Programme\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
O3 - Toolbar: ICQ  Toolbar - {855F3B16-6D32-4fe6-8A56-BBB695989046} - D:\Programme\ICQToolbar\toolbaru.dll
O4 - HKLM\..\Run: [RTHDCPL] RTHDCPL.EXE
O4 - HKLM\..\Run: [SkyTel] SkyTel.EXE
O4 - HKLM\..\Run: [Alcmtr] ALCMTR.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Programme\Java\jre6\bin\jusched.exe"
O4 - HKLM\..\Run: [AVMWlanClient] C:\Programme\avmwlanstick\wlangui.exe
O4 - HKLM\..\Run: [Launch LGDCore] "C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe" /SHOWHIDE
O4 - HKLM\..\Run: [AVG8_TRAY] C:\PROGRA~1\AVG\AVG8\avgtray.exe
O4 - HKLM\..\Run: [StartCCC] "C:\Programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun
O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe"
O4 - HKLM\..\Run: [DivXUpdate] "C:\Programme\DivX\DivX Update\DivXUpdate.exe" /CHECKNOW
O4 - HKLM\..\Run: [net] "C:\WINDOWS\system32\net.net"
O4 - HKCU\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\ctfmon.exe
O4 - HKCU\..\Run: [DAEMON Tools] "D:\Programme\DAEMON Tools\daemon.exe" -lang 1033
O4 - HKUS\S-1-5-19\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'LOKALER DIENST')
O4 - HKUS\S-1-5-19\..\Run: [InfoCockpit] D:\Programme\T-Online\T-Online_Software_6\Info-Cockpit\IC_START.EXE /nosplash (User 'LOKALER DIENST')
O4 - HKUS\S-1-5-20\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'NETZWERKDIENST')
O4 - HKUS\S-1-5-18\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [CTFMON.EXE] C:\WINDOWS\system32\CTFMON.EXE (User 'Default user')
O8 - Extra context menu item: &ICQ Toolbar Search - res://D:\Programme\ICQToolbar\toolbaru.dll/SEARCH.HTML
O8 - Extra context menu item: Free YouTube to Mp3 Converter - C:\Dokumente und Einstellungen\***\Anwendungsdaten\DVDVideoSoftIEHelpers\youtubetomp3.htm
O9 - Extra button: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - D:\Programme\ICQLite\ICQLite.exe (file missing)
O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - D:\Programme\ICQLite\ICQLite.exe (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - D:\Programme\ICQ6.5\ICQ.exe
O9 - Extra 'Tools' menuitem: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - D:\Programme\ICQ6.5\ICQ.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Programme\Messenger\msmsgs.exe
O17 - HKLM\System\CCS\Services\Tcpip\..\{E00C9C0C-85CF-43EC-9DFE-EF9E9EBEBDE7}: NameServer = 192.168.0.1
O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Programme\AVG\AVG8\avgpp.dll
O20 - Winlogon Notify: avgrsstarter - avgrsstx.dll (file missing)
O20 - Winlogon Notify: fgpipe - fgpipe.dll (file missing)
O20 - Winlogon Notify: fnpipe - fnpipe.dll (file missing)
O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - C:\WINDOWS\system32\browseui.dll
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\WINDOWS\system32\browseui.dll
O23 - Service: Ati HotKey Poller - ATI Technologies Inc. - C:\WINDOWS\system32\Ati2evxx.exe
O23 - Service: ATI Smart - Unknown owner - C:\WINDOWS\system32\ati2sgag.exe
O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgemc.exe
O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~1\AVG\AVG8\avgwdsvc.exe
O23 - Service: AVM WLAN Connection Service - AVM Berlin - C:\Programme\avmwlanstick\WlanNetService.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: Java Quick Starter (JavaQuickStarterService) - Sun Microsystems, Inc. - C:\Programme\Java\jre6\bin\jqs.exe
O23 - Service: Kerio Personal Firewall 4 (KPF4) - Kerio Technologies - C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe
O23 - Service: T-Online WLAN Adapter Steuerungsdienst (MZCCntrl) - T-Online International AG, Marmiko IT-Solutions GmbH - C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe
O23 - Service: NMSAccess - Unknown owner - C:\Programme\CDBurnerXP\NMSAccess.exe
O23 - Service: PnkBstrA - Unknown owner - C:\WINDOWS\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\WINDOWS\system32\PnkBstrB.exe
O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Programme\CyberLink\Shared Files\RichVideo.exe
O23 - Service: ServiceLayer - Nokia. - C:\Programme\Gemeinsame Dateien\PCSuite\Services\ServiceLayer.exe

--
End of file - 8343 bytes

--- --- ---


Gruß euer Chicken :D

markusg 10.06.2010 20:38

ootl:
Systemscan mit OTL
download otl:
http://filepony.de/download-otl/

Doppelklick auf die OTL.exe
(user von Windows 7 und Vista: Rechtsklick als Administrator ausführen)
1. Oben findest Du ein Kästchen mit Output. Wähle bitte Minimal Output
2. Hake an "scan all users"
3. Unter "Extra Registry wähle:
"Use Safelist" "LOP Check" "Purity Check"
4. Kopiere in die Textbox:
netsvcs
msconfig
safebootminimal
safebootnetwork
activex
drivers32
%ALLUSERSPROFILE%\Application Data\*.
%ALLUSERSPROFILE%\Application Data\*.exe /s
%APPDATA%\*.
%APPDATA%\*.exe /s
%SYSTEMDRIVE%\*.exe
/md5start
userinit.exe
eventlog.dll
scecli.dll
netlogon.dll
cngaudit.dll
ws2ifsl.sys
sceclt.dll
ntelogon.dll
logevent.dll
iaStor.sys
nvstor.sys
atapi.sys
IdeChnDr.sys
viasraid.sys
AGP440.sys
vaxscsi.sys
nvatabus.sys
viamraid.sys
nvata.sys
nvgts.sys
iastorv.sys
ViPrt.sys
eNetHook.dll
ahcix86.sys
KR10N.sys
nvstor32.sys
ahcix86s.sys
/md5stop
%systemroot%\system32\drivers\*.sys /lockedfiles
%systemroot%\System32\config\*.sav
%systemroot%\*. /mp /s
%systemroot%\system32\*.dll /lockedfiles
CREATERESTOREPOINT
5. Klicke "run Scan"
6. 2 reporte werden erstellt:
OTL.Txt
Extras.Txt
poste bitte beide, eventuell musst du die aufteilen.

chicken87 10.06.2010 22:36

otl.txt:

OTL Logfile:
Code:

OTL logfile created on: 10.06.2010 23:02:23 - Run 1
OTL by OldTimer - Version 3.2.6.0    Folder = C:\Dokumente und Einstellungen\***\Desktop
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000407 | Country: Deutschland | Language: DEU | Date Format: dd.MM.yyyy
 
2,00 Gb Total Physical Memory | 1,00 Gb Available Physical Memory | 54,00% Memory free
4,00 Gb Paging File | 3,00 Gb Available in Paging File | 76,00% Paging File free
Paging file location(s): C:\pagefile.sys 2046 4092 [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Programme
Drive C: | 30,00 Gb Total Space | 7,10 Gb Free Space | 23,68% Space Free | Partition Type: NTFS
Drive D: | 100,00 Gb Total Space | 24,82 Gb Free Space | 24,82% Space Free | Partition Type: NTFS
Drive E: | 103,76 Gb Total Space | 14,53 Gb Free Space | 14,00% Space Free | Partition Type: NTFS
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
Drive I: | 931,28 Gb Total Space | 597,19 Gb Free Space | 64,13% Space Free | Partition Type: FAT32
 
Computer Name: ***
Current User Name: ***
Logged in as Administrator.
 
Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Minimal
 
========== Processes (SafeList) ==========
 
PRC - C:\Dokumente und Einstellungen\***\Desktop\OTL.exe (OldTimer Tools)
PRC - C:\WINDOWS\Temp\bxhj.tmp\svchost.exe ()
PRC - C:\Programme\DivX\DivX Plus Player\DivX Plus Player.exe ()
PRC - C:\Programme\DivX\DivX Update\DivXUpdate.exe ()
PRC - C:\Programme\Mozilla Firefox\firefox.exe (Mozilla Corporation)
PRC - C:\Programme\AVG\AVG8\avgtray.exe (AVG Technologies CZ, s.r.o.)
PRC - D:\Programme\ICQ6.5\ICQ.exe (ICQ, LLC.)
PRC - C:\Programme\AVG\AVG8\avgcsrvx.exe (AVG Technologies CZ, s.r.o.)
PRC - C:\Programme\AVG\AVG8\avgrsx.exe (AVG Technologies CZ, s.r.o.)
PRC - C:\Programme\AVG\AVG8\avgnsx.exe (AVG Technologies CZ, s.r.o.)
PRC - C:\Programme\AVG\AVG8\avgemc.exe (AVG Technologies CZ, s.r.o.)
PRC - C:\Programme\AVG\AVG8\avgwdsvc.exe (AVG Technologies CZ, s.r.o.)
PRC - C:\Programme\Windows NT\Zubehör\wordpad.exe (Microsoft Corporation)
PRC - C:\WINDOWS\explorer.exe (Microsoft Corporation)
PRC - D:\Programme\DAEMON Tools\daemon.exe (DT Soft Ltd.)
PRC - C:\Programme\avmwlanstick\WLanGUI.exe (AVM Berlin)
PRC - C:\Programme\avmwlanstick\WLanNetService.exe (AVM Berlin)
PRC - C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe (Logitech Inc.)
PRC - C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe (T-Online International AG, Marmiko IT-Solutions GmbH)
PRC - C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe (Kerio Technologies)
PRC - C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe (Kerio Technologies)
PRC - C:\Programme\CDBurnerXP\NMSAccess.exe ()
 
 
========== Modules (SafeList) ==========
 
MOD - C:\Dokumente und Einstellungen\***\Desktop\OTL.exe (OldTimer Tools)
MOD - C:\WINDOWS\system32\msscript.ocx (Microsoft Corporation)
MOD - C:\WINDOWS\system32\framedyn.dll (Microsoft Corporation)
 
 
========== Win32 Services (SafeList) ==========
 
SRV - (avg8emc) -- C:\Programme\AVG\AVG8\avgemc.exe (AVG Technologies CZ, s.r.o.)
SRV - (avg8wd) -- C:\Programme\AVG\AVG8\avgwdsvc.exe (AVG Technologies CZ, s.r.o.)
SRV - (AVM WLAN Connection Service) -- C:\Programme\avmwlanstick\WLanNetService.exe (AVM Berlin)
SRV - (ServiceLayer) -- C:\Programme\Gemeinsame Dateien\PCSuite\Services\ServiceLayer.exe (Nokia.)
SRV - (MZCCntrl) -- C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe (T-Online International AG, Marmiko IT-Solutions GmbH)
SRV - (KPF4) -- C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe (Kerio Technologies)
SRV - (IDriverT) -- C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe (Macrovision Corporation)
SRV - (NMSAccess) -- C:\Programme\CDBurnerXP\NMSAccess.exe ()
 
 
========== Driver Services (SafeList) ==========
 
DRV - (atksgt) -- C:\WINDOWS\system32\drivers\atksgt.sys ()
DRV - (lirsgt) -- C:\WINDOWS\system32\drivers\lirsgt.sys ()
DRV - (AvgLdx86) -- C:\WINDOWS\System32\Drivers\avgldx86.sys (AVG Technologies CZ, s.r.o.)
DRV - (AvgMfx86) -- C:\WINDOWS\System32\Drivers\avgmfx86.sys (AVG Technologies CZ, s.r.o.)
DRV - (AvgTdiX) -- C:\WINDOWS\System32\Drivers\avgtdix.sys (AVG Technologies CZ, s.r.o.)
DRV - (ati2mtag) -- C:\WINDOWS\system32\drivers\ati2mtag.sys (ATI Technologies Inc.)
DRV - (ATIAVAIW) -- C:\WINDOWS\system32\drivers\atinavt2.sys (ATI Technologies Inc.)
DRV - (StarOpen) -- C:\WINDOWS\system32\drivers\StarOpen.sys ()
DRV - (nm) -- C:\WINDOWS\system32\drivers\nmnt.sys (Microsoft Corporation)
DRV - (MPE) -- C:\WINDOWS\system32\drivers\mpe.sys (Microsoft Corporation)
DRV - (usbaudio) USB-Audiotreiber (WDM) -- C:\WINDOWS\system32\drivers\usbaudio.sys (Microsoft Corporation)
DRV - (HDAudBus) -- C:\WINDOWS\system32\drivers\hdaudbus.sys (Windows (R) Server 2003 DDK provider)
DRV - (sptd) -- C:\WINDOWS\System32\Drivers\sptd.sys ()
DRV - (CVirtA) -- C:\WINDOWS\system32\drivers\CVirtA.sys (Cisco Systems, Inc.)
DRV - (FWLANUSB) -- C:\WINDOWS\system32\drivers\fwlanusb.sys (AVM GmbH)
DRV - (Nokia USB Phone Parent) -- C:\WINDOWS\system32\drivers\nmwcd.sys (Nokia)
DRV - (Nokia USB Port) -- C:\WINDOWS\system32\drivers\nmwcdcj.sys (Nokia)
DRV - (Nokia USB Modem) -- C:\WINDOWS\system32\drivers\nmwcdcm.sys (Nokia)
DRV - (Nokia USB Generic) -- C:\WINDOWS\system32\drivers\nmwcdc.sys (Nokia)
DRV - (IntcAzAudAddService) Service for Realtek HD Audio (WDM) -- C:\WINDOWS\system32\drivers\RtkHDAud.Sys (Realtek Semiconductor Corp.)
DRV - (MIINPazX) -- C:\Programme\Gemeinsame Dateien\Marmiko Shared\MInfraIS\MIINPazx.sys (T-Online International AG, Marmiko IT-Solutions GmbH)
DRV - (yukonwxp) -- C:\WINDOWS\system32\drivers\yk51x86.sys (Marvell)
DRV - (MACNDIS5) -- C:\Programme\Gemeinsame Dateien\Marmiko Shared\MAcNdis5.sys (Marmiko IT-Solutions GmbH)
DRV - (MTOnlPktAlyX) -- D:\Programme\T-Online\T-Online_Software_6\Basis-Software\Basis1\MTOnlPktAlyx.sys (T-Online International AG, Marmiko IT-Solutions GmbH)
DRV - (fwdrv) -- C:\WINDOWS\system32\drivers\fwdrv.sys (Kerio Technologies)
DRV - (khips) -- C:\WINDOWS\system32\drivers\khips.sys ()
DRV - (ss_mdm) -- C:\WINDOWS\system32\drivers\ss_mdm.sys (MCCI)
DRV - (ss_mdfl) -- C:\WINDOWS\system32\drivers\ss_mdfl.sys (MCCI)
DRV - (ss_bus) SAMSUNG Mobile USB Device 1.0 driver (WDM) -- C:\WINDOWS\system32\drivers\ss_bus.sys (MCCI)
 
 
========== Standard Registry (SafeList) ==========
 
 
========== Internet Explorer ==========
 
 
 
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
 
 
IE - HKU\S-1-5-21-436374069-1547161642-839522115-1004\SOFTWARE\Microsoft\Internet Explorer\Main,Prev Search Page = ICQ.com Suche
IE - HKU\S-1-5-21-436374069-1547161642-839522115-1004\SOFTWARE\Microsoft\Internet Explorer\Main,Search Page = ICQ.com Suche
IE - HKU\S-1-5-21-436374069-1547161642-839522115-1004\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = Suchen
IE - HKU\S-1-5-21-436374069-1547161642-839522115-1004\..\URLSearchHook: {855F3B16-6D32-4fe6-8A56-BBB695989046} - D:\Programme\ICQToolbar\toolbaru.dll (ICQ Inc.)
IE - HKU\S-1-5-21-436374069-1547161642-839522115-1004\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
 
========== FireFox ==========
 
FF - prefs.js..browser.search.selectedEngine: "Yahoo"
FF - prefs.js..browser.startup.homepage: "www.google.de"
FF - prefs.js..extensions.enabledItems: {3f963a5b-e555-4543-90e2-c3908898db71}:8.5.0.429
FF - prefs.js..extensions.enabledItems: jqs@sun.com:1.0
FF - prefs.js..extensions.enabledItems: {ACAA314B-EEBA-48e4-AD47-84E31C44796C}:1.0.1
FF - prefs.js..network.proxy.type: 4
 
FF - HKLM\software\mozilla\Firefox\Extensions\\{3f963a5b-e555-4543-90e2-c3908898db71}: C:\Programme\AVG\AVG8\Firefox [2009.12.23 21:03:42 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.0.19\extensions\\Components: C:\Programme\Mozilla Firefox\components [2010.03.31 20:24:34 | 000,000,000 | ---D | M]
FF - HKLM\software\mozilla\Mozilla Firefox 3.0.19\extensions\\Plugins: C:\Programme\Mozilla Firefox\plugins [2010.03.31 20:24:33 | 000,000,000 | ---D | M]
 
[2008.08.30 14:18:49 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Mozilla\Extensions
[2010.06.10 20:45:13 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Mozilla\Firefox\Profiles\fdi86ufp.default\extensions
[2009.09.03 16:41:19 | 000,000,000 | ---D | M] (Microsoft .NET Framework Assistant) -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Mozilla\Firefox\Profiles\fdi86ufp.default\extensions\{20a82645-c095-46ed-80e3-08825760534b}
[2010.05.27 15:37:20 | 000,000,000 | ---D | M] (No name found) -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Mozilla\Firefox\Profiles\fdi86ufp.default\extensions\{ACAA314B-EEBA-48e4-AD47-84E31C44796C}
[2010.06.10 20:45:13 | 000,000,000 | ---D | M] -- C:\Programme\Mozilla Firefox\extensions
[2007.01.31 15:28:10 | 000,000,000 | ---D | M] (Java Console) -- C:\Programme\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA}
[2008.08.30 14:18:40 | 000,001,392 | ---- | M] () -- C:\Programme\Mozilla Firefox\searchplugins\amazondotcom-de.xml
[2008.11.14 12:18:35 | 000,002,344 | ---- | M] () -- C:\Programme\Mozilla Firefox\searchplugins\eBay-de.xml
[2008.08.30 14:18:40 | 000,006,805 | ---- | M] () -- C:\Programme\Mozilla Firefox\searchplugins\leo_ende_de.xml
[2008.08.30 14:18:40 | 000,000,986 | ---- | M] () -- C:\Programme\Mozilla Firefox\searchplugins\wikipedia-de.xml
[2008.08.30 14:18:40 | 000,000,801 | ---- | M] () -- C:\Programme\Mozilla Firefox\searchplugins\yahoo-de.xml
 
O1 HOSTS File: ([2004.08.04 13:00:00 | 000,000,820 | ---- | M]) - C:\WINDOWS\system32\drivers\etc\hosts
O1 - Hosts: 127.0.0.1      localhost
O2 - BHO: (Adobe PDF Reader) - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\AcroIEHelper.dll (Adobe Systems Incorporated)
O2 - BHO: (AVG Safe Search) - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - C:\Programme\AVG\AVG8\avgssie.dll (AVG Technologies CZ, s.r.o.)
O2 - BHO: (Java(tm) Plug-In SSV Helper) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre6\bin\ssv.dll (Sun Microsystems, Inc.)
O3 - HKLM\..\Toolbar: (ICQ  Toolbar) - {855F3B16-6D32-4fe6-8A56-BBB695989046} - D:\Programme\ICQToolbar\toolbaru.dll (ICQ Inc.)
O3 - HKU\S-1-5-21-436374069-1547161642-839522115-1004\..\Toolbar\WebBrowser: (ICQ  Toolbar) - {855F3B16-6D32-4FE6-8A56-BBB695989046} - D:\Programme\ICQToolbar\toolbaru.dll (ICQ Inc.)
O4 - HKLM..\Run: [Adobe Reader Speed Launcher] C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe (Adobe Systems Incorporated)
O4 - HKLM..\Run: [Alcmtr] C:\WINDOWS\Alcmtr.exe (Realtek Semiconductor Corp.)
O4 - HKLM..\Run: [AVG8_TRAY] C:\Programme\AVG\AVG8\avgtray.exe (AVG Technologies CZ, s.r.o.)
O4 - HKLM..\Run: [AVMWlanClient] C:\Programme\avmwlanstick\WLanGUI.exe (AVM Berlin)
O4 - HKLM..\Run: [DivXUpdate] C:\Programme\DivX\DivX Update\DivXUpdate.exe ()
O4 - HKLM..\Run: [Launch LGDCore] C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe (Logitech Inc.)
O4 - HKLM..\Run: [net] C:\WINDOWS\System32\net.net (Privat)
O4 - HKLM..\Run: [SkyTel] C:\WINDOWS\SkyTel.exe (Realtek Semiconductor Corp.)
O4 - HKLM..\Run: [StartCCC] C:\Programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe (Advanced Micro Devices, Inc.)
O4 - HKU\.DEFAULT..\Run: [InfoCockpit] D:\Programme\T-Online\T-Online_Software_6\Info-Cockpit\IC_START.EXE (T-Online)
O4 - HKU\S-1-5-18..\Run: [InfoCockpit] D:\Programme\T-Online\T-Online_Software_6\Info-Cockpit\IC_START.EXE (T-Online)
O4 - HKU\S-1-5-19..\Run: [InfoCockpit] D:\Programme\T-Online\T-Online_Software_6\Info-Cockpit\IC_START.EXE (T-Online)
O4 - HKU\S-1-5-20..\Run: [InfoCockpit] D:\Programme\T-Online\T-Online_Software_6\Info-Cockpit\IC_START.EXE (T-Online)
O4 - HKU\S-1-5-21-436374069-1547161642-839522115-1004..\Run: [DAEMON Tools] D:\Programme\DAEMON Tools\daemon.exe (DT Soft Ltd.)
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1
O7 - HKU\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-436374069-1547161642-839522115-1004\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O8 - Extra context menu item: &ICQ Toolbar Search - D:\Programme\ICQToolbar\toolbaru.dll (ICQ Inc.)
O8 - Extra context menu item: Free YouTube to Mp3 Converter - C:\Dokumente und Einstellungen\***\Anwendungsdaten\DVDVideoSoftIEHelpers\youtubetomp3.htm ()
O9 - Extra Button: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - D:\Programme\ICQLite\ICQLite.exe File not found
O9 - Extra 'Tools' menuitem : ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - D:\Programme\ICQLite\ICQLite.exe File not found
O9 - Extra Button: ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - D:\Programme\ICQ6.5\ICQ.exe (ICQ, LLC.)
O9 - Extra 'Tools' menuitem : ICQ6 - {E59EB121-F339-4851-A3BA-FE49C35617C2} - D:\Programme\ICQ6.5\ICQ.exe (ICQ, LLC.)
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} hxxp://download.microsoft.com/download/8/b/d/8bd77752-5704-4d68-a152-f7252adaa4f2/LegitCheckControl.cab (Windows Genuine Advantage Validation Tool)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab (Java Plug-in 1.6.0_11)
O16 - DPF: {CAFEEFAC-0015-0000-0009-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.5.0/jinstall-1_5_0_09-windows-i586.cab (Java Plug-in 1.5.0_09)
O16 - DPF: {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab (Java Plug-in 1.6.0)
O16 - DPF: {CAFEEFAC-0016-0000-0001-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_01-windows-i586.cab (Java Plug-in 1.6.0_01)
O16 - DPF: {CAFEEFAC-0016-0000-0002-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_02-windows-i586.cab (Java Plug-in 1.6.0_02)
O16 - DPF: {CAFEEFAC-0016-0000-0011-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab (Java Plug-in 1.6.0_11)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_11-windows-i586.cab (Java Plug-in 1.6.0_11)
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.2.1
O18 - Protocol\Handler\http\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Programme\Gemeinsame Dateien\System\Ole DB\msdaipp.dll (Microsoft Corporation)
O18 - Protocol\Handler\http\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Programme\Gemeinsame Dateien\System\Ole DB\msdaipp.dll (Microsoft Corporation)
O18 - Protocol\Handler\https\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Programme\Gemeinsame Dateien\System\Ole DB\msdaipp.dll (Microsoft Corporation)
O18 - Protocol\Handler\https\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Programme\Gemeinsame Dateien\System\Ole DB\msdaipp.dll (Microsoft Corporation)
O18 - Protocol\Handler\ipp\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Programme\Gemeinsame Dateien\System\Ole DB\msdaipp.dll (Microsoft Corporation)
O18 - Protocol\Handler\linkscanner {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - C:\Programme\AVG\AVG8\avgpp.dll (AVG Technologies CZ, s.r.o.)
O18 - Protocol\Handler\msdaipp\0x00000001 {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Programme\Gemeinsame Dateien\System\Ole DB\msdaipp.dll (Microsoft Corporation)
O18 - Protocol\Handler\msdaipp\oledb {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Programme\Gemeinsame Dateien\System\Ole DB\msdaipp.dll (Microsoft Corporation)
O20 - HKLM Winlogon: Shell - (Explorer.exe) - C:\WINDOWS\explorer.exe (Microsoft Corporation)
O20 - Winlogon\Notify\AtiExtEvent: DllName - Ati2evxx.dll - C:\WINDOWS\System32\ati2evxx.dll (ATI Technologies Inc.)
O20 - Winlogon\Notify\avgrsstarter: DllName - avgrsstx.dll - C:\WINDOWS\System32\avgrsstx.dll (AVG Technologies CZ, s.r.o.)
O20 - Winlogon\Notify\fgpipe: DllName - fgpipe.dll - C:\WINDOWS\System32\fgpipe.dll ()
O20 - Winlogon\Notify\fnpipe: DllName - fnpipe.dll -  File not found
O24 - Desktop Components:0 (Die derzeitige Homepage) - About:Home
O24 - Desktop WallPaper: C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Anwendungsdaten\Microsoft\Wallpaper1.bmp
O24 - Desktop BackupWallPaper: C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Anwendungsdaten\Microsoft\Wallpaper1.bmp
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2007.01.31 21:59:43 | 000,000,000 | ---- | M] () - C:\AUTOEXEC.BAT -- [ NTFS ]
O32 - AutoRun File - [2008.10.24 13:30:10 | 000,000,088 | R--- | M] () - I:\autorun.inf -- [ FAT32 ]
O33 - MountPoints2\{9de264a2-0742-11df-b288-00040efa9132}\Shell\AutoRun\command - "" = H:\Menu.exe -- File not found
O33 - MountPoints2\{a3cfe398-2407-11de-b095-00040efa9132}\Shell\AutoRun\command - "" = I:\TOSHIBA\more4you.exe -- [2008.12.10 20:19:22 | 010,929,464 | ---- | M] (TOSHIBA)
O33 - MountPoints2\{a4037a23-b152-11db-bcf0-0016e6843adf}\Shell - "" = AutoRun
O33 - MountPoints2\{a4037a23-b152-11db-bcf0-0016e6843adf}\Shell\AutoRun - "" = Auto&Play
O33 - MountPoints2\{a4037a23-b152-11db-bcf0-0016e6843adf}\Shell\AutoRun\command - "" = J:\pushinst.exe -- File not found
O33 - MountPoints2\J\Shell - "" = AutoRun
O33 - MountPoints2\J\Shell\AutoRun - "" = Auto&Play
O33 - MountPoints2\J\Shell\AutoRun\command - "" = J:\pushinst.exe -- File not found
O34 - HKLM BootExecute: (autocheck autochk *) -  File not found
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
 
NetSvcs: 6to4 -  File not found
NetSvcs: Ias - C:\WINDOWS\system32\ias [2007.01.31 22:41:48 | 000,000,000 | ---D | M]
NetSvcs: Iprip -  File not found
NetSvcs: Irmon -  File not found
NetSvcs: NWCWorkstation -  File not found
NetSvcs: Nwsapagent -  File not found
NetSvcs: Wmi - C:\WINDOWS\system32\wmi.dll (Microsoft Corporation)
NetSvcs: WmdmPmSp -  File not found
 
MsConfig - StartUpFolder: C:^Dokumente und Einstellungen^All Users^Startmenü^Programme^Autostart^Adobe Reader - Schnellstart.lnk - C:\Programme\Adobe\Reader 8.0\Reader\reader_sl.exe - (Adobe Systems Incorporated)
MsConfig - StartUpFolder: C:^Dokumente und Einstellungen^All Users^Startmenü^Programme^Autostart^Adobe Reader Synchronizer.lnk - C:\Programme\Adobe\Reader 8.0\Reader\AdobeCollabSync.exe - (Adobe Systems Incorporated)
MsConfig - StartUpReg: AdobeUpdater - hkey= - key= - C:\Programme\Gemeinsame Dateien\Adobe\Updater5\AdobeUpdater.exe (Adobe Systems Incorporated)
MsConfig - StartUpReg: FreePDF Assistant - hkey= - key= - C:\Programme\FreePDF_XP\fpassist.exe (shbox.de)
MsConfig - StartUpReg: PCSuiteTrayApplication - hkey= - key= - D:\Programme\Nokia\Nokia PC Suite 6\LaunchApplication.exe (Nokia)
MsConfig - StartUpReg: PcSync - hkey= - key= - D:\Programme\Nokia\Nokia PC Suite 6\PcSync2.exe (Time Information Services Ltd.)
MsConfig - StartUpReg: RemoteControl - hkey= - key= - C:\Programme\CyberLink\PowerDVD\PDVDServ.exe (Cyberlink Corp.)
MsConfig - State: "system.ini" - 0
MsConfig - State: "win.ini" - 0
MsConfig - State: "bootini" - 0
MsConfig - State: "services" - 0
MsConfig - State: "startup" - 2
 
SafeBootMin: Base - Driver Group
SafeBootMin: Boot Bus Extender - Driver Group
SafeBootMin: Boot file system - Driver Group
SafeBootMin: File system - Driver Group
SafeBootMin: Filter - Driver Group
SafeBootMin: PCI Configuration - Driver Group
SafeBootMin: PNP Filter - Driver Group
SafeBootMin: Primary disk - Driver Group
SafeBootMin: SCSI Class - Driver Group
SafeBootMin: sermouse.sys - Driver
SafeBootMin: System Bus Extender - Driver Group
SafeBootMin: vds - Service
SafeBootMin: vga.sys - Driver
SafeBootMin: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers
SafeBootMin: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive
SafeBootMin: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive
SafeBootMin: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller
SafeBootMin: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc
SafeBootMin: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard
SafeBootMin: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse
SafeBootMin: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters
SafeBootMin: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter
SafeBootMin: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System
SafeBootMin: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive
SafeBootMin: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy
SafeBootMin: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume
SafeBootMin: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices
 
SafeBootNet: Base - Driver Group
SafeBootNet: Boot Bus Extender - Driver Group
SafeBootNet: Boot file system - Driver Group
SafeBootNet: File system - Driver Group
SafeBootNet: Filter - Driver Group
SafeBootNet: NDIS Wrapper - Driver Group
SafeBootNet: NetBIOSGroup - Driver Group
SafeBootNet: NetDDEGroup - Driver Group
SafeBootNet: Network - Driver Group
SafeBootNet: NetworkProvider - Driver Group
SafeBootNet: nm - C:\WINDOWS\system32\drivers\nmnt.sys (Microsoft Corporation)
SafeBootNet: nm.sys - C:\WINDOWS\system32\drivers\nmnt.sys (Microsoft Corporation)
SafeBootNet: PCI Configuration - Driver Group
SafeBootNet: PNP Filter - Driver Group
SafeBootNet: PNP_TDI - Driver Group
SafeBootNet: Primary disk - Driver Group
SafeBootNet: SCSI Class - Driver Group
SafeBootNet: sermouse.sys - Driver
SafeBootNet: Streams Drivers - Driver Group
SafeBootNet: System Bus Extender - Driver Group
SafeBootNet: TDI - Driver Group
SafeBootNet: vga.sys - Driver
SafeBootNet: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers
SafeBootNet: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive
SafeBootNet: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive
SafeBootNet: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller
SafeBootNet: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc
SafeBootNet: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard
SafeBootNet: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse
SafeBootNet: {4D36E972-E325-11CE-BFC1-08002BE10318} - Net
SafeBootNet: {4D36E973-E325-11CE-BFC1-08002BE10318} - NetClient
SafeBootNet: {4D36E974-E325-11CE-BFC1-08002BE10318} - NetService
SafeBootNet: {4D36E975-E325-11CE-BFC1-08002BE10318} - NetTrans
SafeBootNet: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters
SafeBootNet: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter
SafeBootNet: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System
SafeBootNet: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive
SafeBootNet: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume
SafeBootNet: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices
 
ActiveX: {08B0E5C0-4FCB-11CF-AAA5-00401C608500} - Java (Sun)
ActiveX: {10072CEC-8CC1-11D1-986E-00A0C955B42F} - Vektorgrafik-Rendering (VML)
ActiveX: {2179C5D3-EBFF-11CF-B6FD-00AA00B4E220} - NetShow
ActiveX: {22d6f312-b0f6-11d0-94ab-0080c74c7e95} - Microsoft Windows Media Player 6.4
ActiveX: {283807B5-2C60-11D0-A31D-00AA00B92C03} - DirectAnimation
ActiveX: {2C7339CF-2B09-4501-B3F3-F3508C9228ED} - %SystemRoot%\system32\regsvr32.exe /s /n /i:/UserInstall %SystemRoot%\system32\themeui.dll
ActiveX: {36f8ec70-c29a-11d1-b5c7-0000f8051515} - Dynamic HTML-Datenbindung für Java
ActiveX: {3af36230-a269-11d1-b5bf-0000f8051515} - Offline Browsing Pack
ActiveX: {3bf42070-b3b1-11d1-b5c5-0000f8051515} - Uniscribe
ActiveX: {411EDCF7-755D-414E-A74B-3DCD6583F589} - Microsoft .NET Framework 1.1 Service Pack 1 (KB867460)
ActiveX: {4278c270-a269-11d1-b5bf-0000f8051515} - Erweitertes Authoring
ActiveX: {44BBA840-CC51-11CF-AAFA-00AA00B6015C} - "%ProgramFiles%\Outlook Express\setup50.exe" /APP:OE /CALLER:WINNT /user /install
ActiveX: {44BBA842-CC51-11CF-AAFA-00AA00B6015B} - rundll32.exe advpack.dll,LaunchINFSection C:\WINDOWS\INF\msnetmtg.inf,NetMtg.Install.PerUser.NT
ActiveX: {44BBA848-CC51-11CF-AAFA-00AA00B6015C} - DirectShow
ActiveX: {44BBA855-CC51-11CF-AAFA-00AA00B6015F} - DirectDrawEx
ActiveX: {45ea75a0-a269-11d1-b5bf-0000f8051515} - Internet Explorer Help
ActiveX: {4f216970-c90c-11d1-b5c7-0000f8051515} - DirectAnimation Java Classes
ActiveX: {4f645220-306d-11d2-995d-00c04f98bbc9} - Microsoft Windows Script 5.6
ActiveX: {5056b317-8d4c-43ee-8543-b9d1e234b8f4} - Sicherheitsupdate für Windows XP (KB923789)
ActiveX: {5945c046-1e7d-11d1-bc44-00c04fd912be} - rundll32.exe advpack.dll,LaunchINFSection C:\WINDOWS\INF\msmsgs.inf,BLC.QuietInstall.PerUser
ActiveX: {5A8D6EE0-3E18-11D0-821E-444553540000} - ICW
ActiveX: {5F95E1AF-2620-4f15-BDF9-7FDCE4607E17} - BearFlix
ActiveX: {5fd399c0-a70a-11d1-9948-00c04f98bbc9} - Internet Explorer Setup Tools
ActiveX: {630b1da0-b465-11d1-9948-00c04f98bbc9} - Browsing Enhancements
ActiveX: {6BF52A52-394A-11d3-B153-00C04F79FAA6} - Microsoft Windows Media Player
ActiveX: {6fab99d0-bab8-11d1-994a-00c04f98bbc9} - MSN Site Access
ActiveX: {7131646D-CD3C-40F4-97B9-CD9E4E6262EF} - .NET Framework
ActiveX: {7790769C-0471-11d2-AF11-00C04FA35D02} - "%ProgramFiles%\Outlook Express\setup50.exe" /APP:WAB /CALLER:WINNT /user /install
ActiveX: {89820200-ECBD-11cf-8B85-00AA005B4340} - regsvr32.exe /s /n /i:U shell32.dll
ActiveX: {89820200-ECBD-11cf-8B85-00AA005B4383} - C:\WINDOWS\system32\ie4uinit.exe -BaseSettings
ActiveX: {89B4C1CD-B018-4511-B0A1-5476DBF70820} - C:\WINDOWS\system32\Rundll32.exe C:\WINDOWS\system32\mscories.dll,Install
ActiveX: {9381D8F2-0288-11D0-9501-00AA00B911A5} - Dynamic HTML Data Binding
ActiveX: {B508B3F1-A24A-32C0-B310-85786919EF28} - .NET Framework
ActiveX: {C09FB3CD-3D0C-3F2D-899A-6A1D67F2073F} - .NET Framework
ActiveX: {C9E9A340-D1F1-11D0-821E-444553540600} - Internet Explorer Core Fonts
ActiveX: {CB2F7EDD-9D1F-43C1-90FC-4F52EAE172A1} - .NET Framework
ActiveX: {CC2A9BA0-3BDD-11D0-821E-444553540000} - Taskplaner
ActiveX: {CDD7975E-60F8-41d5-8149-19E51D6F71D0} - Windows Movie Maker v2.1
ActiveX: {D27CDB6E-AE6D-11cf-96B8-444553540000} - Adobe Flash Player
ActiveX: {DAA94A2A-2A8D-4D3B-9DB8-56FBECED082D} - Microsoft .NET Framework 1.1 Security Update (KB953297)
ActiveX: {de5aed00-a4bf-11d1-9948-00c04f98bbc9} - HTML Help
ActiveX: {E78BFA60-5393-4C38-82AB-E8019E464EB4} - .NET Framework
ActiveX: {E92B03AB-B707-11d2-9CBD-0000F87A369E} - Active Directory Service Interface
ActiveX: <{12d0ed0d-0ee0-4f90-8827-78cefb8f4988} - C:\WINDOWS\system32\ieudinit.exe
ActiveX: >{22d6f312-b0f6-11d0-94ab-0080c74c7e95} - C:\WINDOWS\inf\unregmp2.exe /ShowWMP
ActiveX: >{26923b43-4d38-484f-9b9e-de460746276c} - C:\WINDOWS\system32\ie4uinit.exe -UserIconConfig
ActiveX: >{60B49E34-C7CC-11D0-8953-00A0C90347FF} - "C:\WINDOWS\system32\rundll32.exe" "C:\WINDOWS\system32\iedkcs32.dll",BrandIEActiveSetup SIGNUP
ActiveX: >{60B49E34-C7CC-11D0-8953-00A0C90347FF}MICROS - RunDLL32 IEDKCS32.DLL,BrandIE4 SIGNUP
ActiveX: >{881dd1c5-3dcf-431b-b061-f3f88e8be88a} - %systemroot%\system32\shmgrate.exe OCInstallUserConfigOE
 
Drivers32: msacm.iac2 - C:\WINDOWS\system32\iac25_32.ax (Intel Corporation)
Drivers32: msacm.l3acm - C:\WINDOWS\system32\l3codeca.acm (Fraunhofer Institut Integrierte Schaltungen IIS)
Drivers32: msacm.lhacm - C:\WINDOWS\System32\lhacm.acm (Microsoft Corporation)
Drivers32: msacm.sl_anet - C:\WINDOWS\System32\sl_anet.acm (Sipro Lab Telecom Inc.)
Drivers32: msacm.trspch - C:\WINDOWS\System32\tssoft32.acm (DSP GROUP, INC.)
Drivers32: MSVideo8 - C:\WINDOWS\System32\vfwwdm32.dll (Microsoft Corporation)
Drivers32: vidc.cvid - C:\WINDOWS\System32\iccvid.dll (Radius Inc.)
Drivers32: vidc.DIVX - C:\WINDOWS\System32\DivX.dll (DivX, Inc.)
Drivers32: vidc.iv31 - C:\WINDOWS\System32\ir32_32.dll ()
Drivers32: vidc.iv32 - C:\WINDOWS\System32\ir32_32.dll ()
Drivers32: vidc.iv41 - C:\WINDOWS\System32\ir41_32.ax (Intel Corporation)
Drivers32: vidc.iv50 - C:\WINDOWS\System32\ir50_32.dll (Intel Corporation)
Drivers32: VIDC.MP42 - C:\WINDOWS\System32\mpg4c32.dll (Microsoft Corporation)
Drivers32: VIDC.MPG4 - C:\WINDOWS\System32\mpg4c32.dll (Microsoft Corporation)
Drivers32: vidc.yv12 - C:\WINDOWS\System32\DivX.dll (DivX, Inc.)
 
CREATERESTOREPOINT
Restore point Set: OTL Restore Point (69256455022182400)
 
========== Files/Folders - Created Within 30 Days ==========
 
[2010.06.10 22:59:58 | 000,572,416 | ---- | C] (OldTimer Tools) -- C:\Dokumente und Einstellungen\***\Desktop\OTL.exe
[2010.06.10 20:38:30 | 000,388,608 | ---- | C] (Trend Micro Inc.) -- C:\Dokumente und Einstellungen\***\Desktop\HiJackThis204.exe
[2010.06.10 17:15:48 | 000,000,000 | RH-D | C] -- C:\Dokumente und Einstellungen\***\Recent
[2010.06.06 23:21:01 | 001,146,536 | ---- | C] (Piriform Ltd) -- C:\Dokumente und Einstellungen\***\Desktop\ccsetup232_slim.exe
[2010.06.06 19:42:44 | 013,001,416 | ---- | C] (TeamSpeak Systems GmbH) -- C:\Dokumente und Einstellungen\***\Desktop\TeamSpeak3-Client-win32-3.0.0-beta21.exe
[2010.05.27 15:37:19 | 000,000,000 | ---D | C] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\DVDVideoSoftIEHelpers
[2010.05.27 15:37:05 | 000,000,000 | ---D | C] -- C:\Dokumente und Einstellungen\***\Eigene Dateien\DVDVideoSoft
[2010.05.27 15:36:57 | 000,000,000 | ---D | C] -- C:\Programme\DVDVideoSoft
[2010.05.27 15:36:45 | 000,000,000 | ---D | C] -- C:\Programme\Gemeinsame Dateien\DVDVideoSoft
[2010.05.27 15:29:18 | 017,911,323 | ---- | C] (DVDVideoSoft Limited.                                      ) -- C:\Dokumente und Einstellungen\***\Desktop\FreeYouTubeToMp3Converter35.exe
[2010.05.25 09:43:32 | 000,000,000 | ---D | C] -- C:\Dokumente und Einstellungen\NetworkService\Anwendungsdaten\Macromedia
[2010.05.25 09:43:31 | 000,000,000 | ---D | C] -- C:\Dokumente und Einstellungen\NetworkService\Anwendungsdaten\Adobe
[2010.05.24 11:58:13 | 000,000,000 | ---D | C] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\47AA6DE573C5B3A3C10002B31817F9CF
[2010.05.24 11:57:50 | 000,036,767 | ---- | C] (Privat) -- C:\WINDOWS\System32\net.net
[59 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[4 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[1 C:\Dokumente und Einstellungen\***\*.tmp files -> C:\Dokumente und Einstellungen\***\*.tmp -> ]
 
========== Files - Modified Within 30 Days ==========
 
[2010.06.10 23:00:04 | 000,572,416 | ---- | M] (OldTimer Tools) -- C:\Dokumente und Einstellungen\***\Desktop\OTL.exe
[2010.06.10 22:55:02 | 000,233,984 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Anwendungsdaten\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
[2010.06.10 21:20:13 | 000,070,330 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Desktop\Neu WordPad-Dokument (4).doc
[2010.06.10 20:38:31 | 000,388,608 | ---- | M] (Trend Micro Inc.) -- C:\Dokumente und Einstellungen\***\Desktop\HiJackThis204.exe
[2010.06.10 17:16:40 | 000,003,690 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Eigene Dateien\cc_20100610_171633.reg
[2010.06.10 17:03:52 | 000,024,064 | ---- | M] () -- C:\WINDOWS\System32\fgpipe.dll
[2010.06.10 15:56:43 | 060,896,297 | ---- | M] () -- C:\WINDOWS\System32\drivers\Avg\incavi.avm
[2010.06.10 14:50:06 | 000,012,598 | ---- | M] () -- C:\WINDOWS\System32\wpa.dbl
[2010.06.10 14:49:25 | 000,000,006 | -H-- | M] () -- C:\WINDOWS\tasks\SA.DAT
[2010.06.10 14:49:20 | 000,002,048 | --S- | M] () -- C:\WINDOWS\bootstat.dat
[2010.06.10 14:47:27 | 008,912,896 | ---- | M] () -- C:\Dokumente und Einstellungen\***\ntuser.dat
[2010.06.10 14:47:27 | 000,000,190 | -HS- | M] () -- C:\Dokumente und Einstellungen\***\ntuser.ini
[2010.06.09 16:57:03 | 004,286,646 | -H-- | M] () -- C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Anwendungsdaten\IconCache.db
[2010.06.07 16:28:27 | 000,000,061 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Desktop\internetdj.m3u
[2010.06.06 23:28:48 | 000,237,924 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Eigene Dateien\cc_20100606_232809.reg
[2010.06.06 23:23:05 | 000,000,632 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Desktop\CCleaner.lnk
[2010.06.06 23:21:23 | 001,146,536 | ---- | M] (Piriform Ltd) -- C:\Dokumente und Einstellungen\***\Desktop\ccsetup232_slim.exe
[2010.06.06 19:48:39 | 000,000,683 | ---- | M] () -- C:\Dokumente und Einstellungen\All Users\Desktop\TeamSpeak 3 Client.lnk
[2010.06.06 19:47:35 | 013,001,416 | ---- | M] (TeamSpeak Systems GmbH) -- C:\Dokumente und Einstellungen\***\Desktop\TeamSpeak3-Client-win32-3.0.0-beta21.exe
[2010.05.27 15:37:16 | 000,000,906 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Desktop\DVDVideoSoft Free Studio.lnk
[2010.05.27 15:36:02 | 017,911,323 | ---- | M] (DVDVideoSoft Limited.                                      ) -- C:\Dokumente und Einstellungen\***\Desktop\FreeYouTubeToMp3Converter35.exe
[2010.05.24 11:57:50 | 000,036,767 | ---- | M] (Privat) -- C:\WINDOWS\System32\net.net
[2010.05.18 09:38:54 | 000,073,551 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Desktop\52171302b_x.jpg
[2010.05.17 11:18:58 | 000,001,490 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Desktop\DivX Movies.lnk
[2010.05.17 11:18:48 | 000,000,757 | ---- | M] () -- C:\Dokumente und Einstellungen\All Users\Desktop\DivX Plus Player.lnk
[59 C:\WINDOWS\*.tmp files -> C:\WINDOWS\*.tmp -> ]
[4 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ]
[1 C:\Dokumente und Einstellungen\***\*.tmp files -> C:\Dokumente und Einstellungen\***\*.tmp -> ]
 
========== Files Created - No Company Name ==========
 
[2010.06.10 17:16:35 | 000,003,690 | ---- | C] () -- C:\Dokumente und Einstellungen\***\Eigene Dateien\cc_20100610_171633.reg
[2010.06.10 17:03:52 | 000,024,064 | ---- | C] () -- C:\WINDOWS\System32\fgpipe.dll
[2010.06.07 16:28:27 | 000,000,061 | ---- | C] () -- C:\Dokumente und Einstellungen\***\Desktop\internetdj.m3u
[2010.06.06 23:28:14 | 000,237,924 | ---- | C] () -- C:\Dokumente und Einstellungen\***\Eigene Dateien\cc_20100606_232809.reg
[2010.06.06 23:23:05 | 000,000,632 | ---- | C] () -- C:\Dokumente und Einstellungen\***\Desktop\CCleaner.lnk
[2010.06.06 19:48:39 | 000,000,683 | ---- | C] () -- C:\Dokumente und Einstellungen\All Users\Desktop\TeamSpeak 3 Client.lnk
[2010.05.27 15:37:06 | 000,000,906 | ---- | C] () -- C:\Dokumente und Einstellungen\***\Desktop\DVDVideoSoft Free Studio.lnk
[2010.05.18 09:38:54 | 000,073,551 | ---- | C] () -- C:\Dokumente und Einstellungen\***\Desktop\52171302b_x.jpg
[2010.05.17 11:18:58 | 000,001,490 | ---- | C] () -- C:\Dokumente und Einstellungen\***\Desktop\DivX Movies.lnk
[2010.05.17 11:18:48 | 000,000,757 | ---- | C] () -- C:\Dokumente und Einstellungen\All Users\Desktop\DivX Plus Player.lnk
[2010.03.02 18:09:25 | 000,022,328 | ---- | C] () -- C:\WINDOWS\System32\drivers\PnkBstrK.sys
[2009.07.22 11:10:01 | 000,013,312 | ---- | C] () -- C:\WINDOWS\System32\BASSMOD.dll
[2009.05.15 12:33:56 | 000,000,010 | ---- | C] () -- C:\WINDOWS\WININIT.INI
[2009.04.28 10:12:33 | 000,020,480 | ---- | C] () -- C:\WINDOWS\System32\H@tKeysH@@k.DLL
[2009.03.18 12:34:26 | 000,120,200 | ---- | C] () -- C:\WINDOWS\System32\DLLDEV32i.dll
[2009.03.18 12:34:01 | 000,007,119 | ---- | C] () -- C:\WINDOWS\mgxoschk.ini
[2009.01.22 11:00:20 | 000,005,632 | ---- | C] () -- C:\WINDOWS\System32\drivers\StarOpen.sys
[2008.11.26 17:09:35 | 000,000,112 | ---- | C] () -- C:\WINDOWS\ActiveSkin.INI
[2008.06.11 13:32:09 | 000,000,359 | ---- | C] () -- C:\WINDOWS\SIERRA.INI
[2008.06.10 14:39:16 | 000,217,088 | ---- | C] () -- C:\WINDOWS\System32\libmySQL.dll
[2008.06.10 14:39:16 | 000,102,400 | ---- | C] () -- C:\WINDOWS\System32\TrackerNET.dll
[2007.09.15 19:46:23 | 000,000,311 | ---- | C] () -- C:\WINDOWS\game.ini
[2007.07.12 20:49:45 | 000,043,520 | ---- | C] () -- C:\WINDOWS\System32\CmdLineExt03.dll
[2007.06.26 12:24:38 | 000,000,754 | ---- | C] () -- C:\WINDOWS\WORDPAD.INI
[2007.02.08 19:17:52 | 000,682,232 | ---- | C] () -- C:\WINDOWS\System32\drivers\sptd.sys
[2007.02.01 00:07:39 | 000,000,023 | ---- | C] () -- C:\WINDOWS\BlendSettings.ini
[2007.01.31 22:14:09 | 000,135,168 | R--- | C] () -- C:\WINDOWS\System32\RtlCPAPI.dll
[2007.01.31 19:44:01 | 000,281,760 | ---- | C] () -- C:\WINDOWS\System32\drivers\atksgt.sys
[2007.01.31 19:44:01 | 000,025,888 | ---- | C] () -- C:\WINDOWS\System32\drivers\lirsgt.sys
[2007.01.31 15:47:49 | 000,363,520 | ---- | C] () -- C:\WINDOWS\System32\psisdecd.dll
[2007.01.31 15:24:04 | 000,019,968 | ---- | C] () -- C:\WINDOWS\System32\cpuinf32.dll
[2007.01.31 15:22:49 | 000,116,224 | ---- | C] () -- C:\WINDOWS\System32\redmonnt.dll
[2005.12.07 13:31:00 | 000,202,752 | R--- | C] () -- C:\WINDOWS\System32\CddbCdda.dll
[2005.09.26 12:05:06 | 000,081,920 | ---- | C] () -- C:\WINDOWS\System32\drivers\khips.sys
[2002.06.06 02:01:58 | 000,029,696 | ---- | C] () -- C:\WINDOWS\System32\asutl8.dll
 
========== LOP Check ==========
 
[2009.03.18 12:35:03 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Aldi Sued Fotoservice
[2007.03.10 18:32:24 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Downloaded Installations
[2010.03.31 20:28:32 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Electronic Arts
[2009.03.18 13:27:07 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\MAGIX
[2007.03.10 18:33:34 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\PC Suite
[2007.02.02 13:30:54 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\T-Online
[2009.10.04 15:50:52 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Tages
[2008.12.25 11:28:26 | 000,000,000 | -HSD | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\.#
[2010.05.24 11:58:13 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\47AA6DE573C5B3A3C10002B31817F9CF
[2009.01.06 14:13:59 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Acreon
[2008.04.25 18:59:31 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Anvil Studio
[2009.02.18 13:17:11 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Azureus
[2009.07.29 10:24:29 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Clonk Rage
[2007.08.10 09:05:35 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Command & Conquer 3 Tiberium Wars
[2010.03.31 23:31:58 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Command and Conquer 4
[2007.03.15 16:02:21 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\DataLayer
[2010.05.27 15:37:19 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\DVDVideoSoftIEHelpers
[2007.05.15 12:14:31 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\FrostWire
[2010.03.16 14:55:45 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\HLSW
[2010.04.24 23:19:58 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\ICQ
[2007.03.29 14:59:02 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\ICQLite
[2007.06.17 13:39:27 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\LimeWire
[2009.03.18 13:41:05 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\MAGIX
[2008.11.19 01:58:46 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\MobMapUpdater
[2007.08.09 17:06:32 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\My Games
[2007.10.09 07:53:54 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Nokia
[2007.12.12 19:19:50 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Nokia Multimedia Player
[2007.03.10 18:32:56 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\PC Suite
[2009.03.25 20:57:12 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Red Alert 3
[2009.01.22 14:46:09 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Samsung
[2007.02.02 13:31:06 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\T-Online
[2010.03.09 17:23:29 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\TS3Client
[2009.10.04 15:51:19 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Ubisoft
[2010.01.13 18:08:11 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\uTorrent
[2009.05.30 19:53:31 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Wildfire
 
========== Purity Check ==========
 
 
 
========== Custom Scans ==========
 
 
< %ALLUSERSPROFILE%\Application Data\*. >
 
< %ALLUSERSPROFILE%\Application Data\*.exe /s >
 
< %APPDATA%\*. >
[2008.12.25 11:28:26 | 000,000,000 | -HSD | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\.#
[2010.05.24 11:58:13 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\47AA6DE573C5B3A3C10002B31817F9CF
[2009.01.06 14:13:59 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Acreon
[2010.03.31 20:29:06 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Adobe
[2008.04.25 18:59:31 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Anvil Studio
[2007.08.10 22:48:36 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\ATI
[2009.02.18 13:17:11 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Azureus
[2009.07.29 10:24:29 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Clonk Rage
[2007.08.10 09:05:35 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Command & Conquer 3 Tiberium Wars
[2010.03.31 23:31:58 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Command and Conquer 4
[2007.06.28 12:54:01 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\CyberLink
[2007.03.15 16:02:21 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\DataLayer
[2007.03.17 12:54:44 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\DivX
[2010.01.05 22:58:19 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\dvdcss
[2010.05.27 15:37:19 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\DVDVideoSoftIEHelpers
[2007.05.15 12:14:31 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\FrostWire
[2007.07.17 08:18:03 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Help
[2010.03.16 14:55:45 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\HLSW
[2010.04.24 23:19:58 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\ICQ
[2007.03.29 14:59:02 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\ICQLite
[2007.01.31 22:07:30 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Identities
[2007.06.17 13:39:27 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\LimeWire
[2007.01.31 15:42:48 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Macromedia
[2009.03.18 13:41:05 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\MAGIX
[2009.03.21 19:48:24 | 000,000,000 | --SD | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Microsoft
[2008.11.19 01:58:46 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\MobMapUpdater
[2007.01.31 15:38:35 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Mozilla
[2007.08.09 17:06:32 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\My Games
[2007.10.09 07:53:54 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Nokia
[2007.12.12 19:19:50 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Nokia Multimedia Player
[2010.05.27 14:45:06 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\OpenOffice.org2
[2007.03.10 18:32:56 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\PC Suite
[2007.01.31 15:22:32 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\PSpad
[2009.03.25 20:57:12 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Red Alert 3
[2009.01.22 14:46:09 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Samsung
[2007.08.10 09:01:05 | 000,000,000 | RH-D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\SecuROM
[2007.01.31 15:20:36 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Sun
[2007.02.02 13:31:06 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\T-Online
[2010.04.29 16:11:33 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\teamspeak2
[2010.03.09 17:23:29 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\TS3Client
[2009.03.21 19:50:41 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\U3
[2009.10.04 15:51:19 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Ubisoft
[2010.01.13 18:08:11 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\uTorrent
[2007.05.23 12:22:53 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\vlc
[2009.05.30 19:53:31 | 000,000,000 | ---D | M] -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Wildfire
 
< %APPDATA%\*.exe /s >
[2010.05.24 11:58:20 | 000,147,420 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\47AA6DE573C5B3A3C10002B31817F9CF\gotnewupdate000.exe
[2009.01.06 14:14:30 | 000,272,384 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Acreon\WowMatrix\Modules\curl.exe
[2007.12.21 02:25:40 | 001,523,040 | ---- | M] (Adobe Systems Incorporated) -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Macromedia\Flash Player\www.macromedia.com\bin\fpupdateax\fpupdateax.exe
[2007.01.31 15:20:48 | 000,018,718 | R--- | M] () -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Microsoft\Installer\{333BECA0-DED8-4139-A516-8D9E44E22669}\ARPPRODUCTICON.exe
[2007.01.31 15:20:48 | 000,018,718 | R--- | M] () -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Microsoft\Installer\{333BECA0-DED8-4139-A516-8D9E44E22669}\NewShortcut2_8315396A5EA1419DBEC4978284BDF556.exe
[2007.01.31 15:20:48 | 000,018,718 | R--- | M] () -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\Microsoft\Installer\{333BECA0-DED8-4139-A516-8D9E44E22669}\NewShortcut3_8315396A5EA1419DBEC4978284BDF556.exe
[2006.04.05 20:38:10 | 000,110,592 | ---- | M] () -- C:\Dokumente und Einstellungen\***\Anwendungsdaten\U3\temp\cleanup.exe
 
< %SYSTEMDRIVE%\*.exe >
[2001.05.24 13:59:30 | 000,162,304 | ---- | M] () -- C:\UNWISE.EXE
 
 
< MD5 for: AGP440.SYS  >
[2004.08.04 01:10:00 | 018,782,319 | ---- | M] () .cab file -- C:\WINDOWS\Driver Cache\i386\sp2.cab:AGP440.sys
[2008.09.10 15:24:54 | 023,898,261 | ---- | M] () .cab file -- C:\WINDOWS\Driver Cache\i386\sp3.cab:AGP440.sys
[2008.09.10 15:24:54 | 023,898,261 | ---- | M] () .cab file -- C:\WINDOWS\ServicePackFiles\i386\sp3.cab:AGP440.sys
[2008.04.13 20:36:38 | 000,042,368 | ---- | M] (Microsoft Corporation) MD5=08FD04AA961BDC77FB983F328334E3D7 -- C:\WINDOWS\ServicePackFiles\i386\agp440.sys
[2008.04.13 20:36:38 | 000,042,368 | ---- | M] (Microsoft Corporation) MD5=08FD04AA961BDC77FB983F328334E3D7 -- C:\WINDOWS\system32\drivers\agp440.sys
 
< MD5 for: ATAPI.SYS  >
[2004.08.04 01:10:00 | 018,782,319 | ---- | M] () .cab file -- C:\WINDOWS\Driver Cache\i386\sp2.cab:atapi.sys
[2008.09.10 15:24:54 | 023,898,261 | ---- | M] () .cab file -- C:\WINDOWS\Driver Cache\i386\sp3.cab:atapi.sys
[2008.09.10 15:24:54 | 023,898,261 | ---- | M] () .cab file -- C:\WINDOWS\ServicePackFiles\i386\sp3.cab:atapi.sys
[2008.04.13 20:40:30 | 000,096,512 | ---- | M] (Microsoft Corporation) MD5=9F3A2F5AA6875C72BF062C712CFA2674 -- C:\WINDOWS\ServicePackFiles\i386\atapi.sys
[2008.04.13 20:40:30 | 000,096,512 | ---- | M] (Microsoft Corporation) MD5=9F3A2F5AA6875C72BF062C712CFA2674 -- C:\WINDOWS\system32\drivers\atapi.sys
[2004.08.03 23:59:44 | 000,095,360 | ---- | M] (Microsoft Corporation) MD5=CDFE4411A69C224BD1D11B2DA92DAC51 -- C:\WINDOWS\$NtServicePackUninstall$\atapi.sys
[2004.08.03 22:59:44 | 000,095,360 | ---- | M] (Microsoft Corporation) MD5=CDFE4411A69C224BD1D11B2DA92DAC51 -- C:\WINDOWS\system32\ReinstallBackups\0007\DriverFiles\i386\atapi.sys
[2004.08.03 23:59:44 | 000,095,360 | ---- | M] (Microsoft Corporation) MD5=CDFE4411A69C224BD1D11B2DA92DAC51 -- C:\WINDOWS\system32\ReinstallBackups\0008\DriverFiles\i386\atapi.sys
 
< MD5 for: EVENTLOG.DLL  >
[2008.04.14 04:22:10 | 000,056,320 | ---- | M] (Microsoft Corporation) MD5=04955AA695448C181B367D964AF158AA -- C:\WINDOWS\ServicePackFiles\i386\eventlog.dll
[2008.04.14 04:22:10 | 000,056,320 | ---- | M] (Microsoft Corporation) MD5=04955AA695448C181B367D964AF158AA -- C:\WINDOWS\system32\eventlog.dll
[2004.08.04 00:57:20 | 000,055,808 | ---- | M] (Microsoft Corporation) MD5=B932C077D5A65B71B4512544AC404CB4 -- C:\WINDOWS\$NtServicePackUninstall$\eventlog.dll
 
< MD5 for: NETLOGON.DLL  >
[2008.04.14 04:22:19 | 000,407,040 | ---- | M] (Microsoft Corporation) MD5=0098D35F91DEAB9C127360A877F2CF84 -- C:\WINDOWS\ServicePackFiles\i386\netlogon.dll
[2008.04.14 04:22:19 | 000,407,040 | ---- | M] (Microsoft Corporation) MD5=0098D35F91DEAB9C127360A877F2CF84 -- C:\WINDOWS\system32\netlogon.dll
[2004.08.04 00:57:32 | 000,407,040 | ---- | M] (Microsoft Corporation) MD5=D27395EDCD3416AFD125A9370DCB585C -- C:\WINDOWS\$NtServicePackUninstall$\netlogon.dll
 
< MD5 for: SCECLI.DLL  >
[2008.04.14 04:22:23 | 000,187,904 | ---- | M] (Microsoft Corporation) MD5=5132443DF6FC3771A17AB4AE55DCBC28 -- C:\WINDOWS\ServicePackFiles\i386\scecli.dll
[2008.04.14 04:22:23 | 000,187,904 | ---- | M] (Microsoft Corporation) MD5=5132443DF6FC3771A17AB4AE55DCBC28 -- C:\WINDOWS\system32\scecli.dll
[2004.08.04 00:57:34 | 000,186,880 | ---- | M] (Microsoft Corporation) MD5=64DC26B3CF7BCCAD431CE360A4C625D5 -- C:\WINDOWS\$NtServicePackUninstall$\scecli.dll
 
< MD5 for: USERINIT.EXE  >
[2008.04.14 04:23:03 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=788F95312E26389D596C0FA55834E106 -- C:\WINDOWS\ServicePackFiles\i386\userinit.exe
[2008.04.14 04:23:03 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=788F95312E26389D596C0FA55834E106 -- C:\WINDOWS\system32\userinit.exe
[2004.08.04 00:58:18 | 000,025,088 | ---- | M] (Microsoft Corporation) MD5=D1E53DC57143F2584B1DD53B036C0633 -- C:\WINDOWS\$NtServicePackUninstall$\userinit.exe
 
< MD5 for: WS2IFSL.SYS  >
[2004.08.04 13:00:00 | 000,012,032 | ---- | M] (Microsoft Corporation) MD5=6ABE6E225ADB5A751622A9CC3BC19CE8 -- C:\WINDOWS\system32\dllcache\ws2ifsl.sys
[2004.08.04 13:00:00 | 000,012,032 | ---- | M] (Microsoft Corporation) MD5=6ABE6E225ADB5A751622A9CC3BC19CE8 -- C:\WINDOWS\system32\drivers\ws2ifsl.sys
 
< %systemroot%\system32\drivers\*.sys /lockedfiles >
[2007.08.10 08:19:21 | 000,682,232 | ---- | M] () Unable to obtain MD5 -- C:\WINDOWS\system32\drivers\sptd.sys
 
< %systemroot%\System32\config\*.sav >
[2007.01.31 22:45:45 | 000,094,208 | ---- | M] () -- C:\WINDOWS\system32\config\default.sav
[2007.01.31 22:45:45 | 000,638,976 | ---- | M] () -- C:\WINDOWS\system32\config\software.sav
[2007.01.31 22:45:45 | 000,446,464 | ---- | M] () -- C:\WINDOWS\system32\config\system.sav
 
< %systemroot%\*. /mp /s >
 
< %systemroot%\system32\*.dll /lockedfiles >
[2009.02.25 23:42:32 | 000,442,368 | ---- | M] (Advanced Micro Devices, Inc.) Unable to obtain MD5 -- C:\WINDOWS\system32\ATIDEMGX.dll
[2009.03.08 04:31:44 | 000,348,160 | ---- | M] (Microsoft Corporation) Unable to obtain MD5 -- C:\WINDOWS\system32\dxtmsft.dll
[2009.03.08 04:31:38 | 000,216,064 | ---- | M] (Microsoft Corporation) Unable to obtain MD5 -- C:\WINDOWS\system32\dxtrans.dll
[2010.03.10 08:15:55 | 000,420,352 | ---- | M] (Microsoft Corporation) Unable to obtain MD5 -- C:\WINDOWS\system32\vbscript.dll
[4 C:\WINDOWS\system32\*.tmp files -> C:\WINDOWS\system32\*.tmp -> ]
< End of report >

--- --- ---

chicken87 10.06.2010 22:39

Trojaner Generic17.CNOG gefunden
 
muss die extras txt leider aufteilen anscheinend


OTL Extras logfile created on: 10.06.2010 23:02:23 - Run 1
OTL by OldTimer - Version 3.2.6.0 Folder = C:\Dokumente und Einstellungen\dominik\Desktop
Windows XP Home Edition Service Pack 3 (Version = 5.1.2600) - Type = NTWorkstation
Internet Explorer (Version = 8.0.6001.18702)
Locale: 00000407 | Country: Deutschland | Language: DEU | Date Format: dd.MM.yyyy

2,00 Gb Total Physical Memory | 1,00 Gb Available Physical Memory | 54,00% Memory free
4,00 Gb Paging File | 3,00 Gb Available in Paging File | 76,00% Paging File free
Paging file location(s): C:\pagefile.sys 2046 4092 [binary data]

%SystemDrive% = C: | %SystemRoot% = C:\WINDOWS | %ProgramFiles% = C:\Programme
Drive C: | 30,00 Gb Total Space | 7,10 Gb Free Space | 23,68% Space Free | Partition Type: NTFS
Drive D: | 100,00 Gb Total Space | 24,82 Gb Free Space | 24,82% Space Free | Partition Type: NTFS
Drive E: | 103,76 Gb Total Space | 14,53 Gb Free Space | 14,00% Space Free | Partition Type: NTFS
F: Drive not present or media not loaded
G: Drive not present or media not loaded
H: Drive not present or media not loaded
Drive I: | 931,28 Gb Total Space | 597,19 Gb Free Space | 64,13% Space Free | Partition Type: FAT32

Computer Name: ***
Current User Name: ***
Logged in as Administrator.

Current Boot Mode: Normal
Scan Mode: All users
Company Name Whitelist: Off
Skip Microsoft Files: Off
File Age = 30 Days
Output = Minimal

========== Extra Registry (SafeList) ==========


========== File Associations ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<extension>]

[HKEY_USERS\S-1-5-21-436374069-1547161642-839522115-1004\SOFTWARE\Classes\<extension>]
.html [@ = FirefoxHTML] -- C:\Programme\Mozilla Firefox\firefox.exe (Mozilla Corporation)

========== Shell Spawning ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\<key>\shell\[command]\command]
batfile [open] -- "%1" %*
cmdfile [open] -- "%1" %*
comfile [open] -- "%1" %*
exefile [open] -- "%1" %*
htmlfile [edit] -- Reg Error: Key error.
piffile [open] -- "%1" %*
regfile [merge] -- Reg Error: Key error.
scrfile [config] -- "%1"
scrfile [install] -- rundll32.exe desk.cpl,InstallScreenSaver %l (Microsoft Corporation)
scrfile [open] -- "%1" /S
txtfile [edit] -- Reg Error: Key error.
Unknown [openas] -- %SystemRoot%\system32\rundll32.exe %SystemRoot%\system32\shell32.dll,OpenAs_RunDLL %1
Directory [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)
Directory [Winamp.Bookmark] -- "D:\Programme\Winamp\winamp.exe" /BOOKMARK "%1" (Nullsoft)
Directory [Winamp.Enqueue] -- "D:\Programme\Winamp\winamp.exe" /ADD "%1" (Nullsoft)
Directory [Winamp.Play] -- "D:\Programme\Winamp\winamp.exe" "%1" (Nullsoft)
Folder [open] -- %SystemRoot%\Explorer.exe /idlist,%I,%L (Microsoft Corporation)
Folder [explore] -- %SystemRoot%\Explorer.exe /e,/idlist,%I,%L (Microsoft Corporation)
Drive [find] -- %SystemRoot%\Explorer.exe (Microsoft Corporation)

========== Security Center Settings ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center]
"FirstRunDisabled" = 1
"AntiVirusDisableNotify" = 0
"FirewallDisableNotify" = 0
"UpdatesDisableNotify" = 0
"AntiVirusOverride" = 0
"FirewallOverride" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\AhnlabAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ComputerAssociatesAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\KasperskyAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\McAfeeFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaAntiVirus]
"DisableMonitoring" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\PandaFirewall]
"DisableMonitoring" = 0

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SophosAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\SymantecFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TinyFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendAntiVirus]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\TrendFirewall]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Monitoring\ZoneLabsFirewall]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\GloballyOpenPorts\List]
"139:TCP" = 139:TCP:*:Enabled:@xpsp2res.dll,-22004
"445:TCP" = 445:TCP:*:Enabled:@xpsp2res.dll,-22005
"137:UDP" = 137:UDP:*:Enabled:@xpsp2res.dll,-22001
"138:UDP" = 138:UDP:*:Enabled:@xpsp2res.dll,-22002

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile]
"EnableFirewall" = 0
"DisableNotifications" = 0

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List]
"139:TCP" = 139:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22004
"445:TCP" = 445:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22005
"137:UDP" = 137:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22001
"138:UDP" = 138:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22002
"1900:UDP" = 1900:UDP:LocalSubNet:Enabled:@xpsp2res.dll,-22007
"2869:TCP" = 2869:TCP:LocalSubNet:Enabled:@xpsp2res.dll,-22008
"3724:TCP" = 3724:TCP:*:Enabled:Blizzard Downloader: 3724

========== Authorized Applications List ==========

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List]

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List]
"C:\WINDOWS\system32\ftp.exe" = C:\WINDOWS\system32\ftp.exe:*:Enabled:Programm zur Dateiübertragung -- (Microsoft Corporation)
"C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe" = C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe:*:Enabled:Kerio Personal Firewall 4 - GUI -- (Kerio Technologies)
"D:\Programme\QIP\qip.exe" = D:\Programme\QIP\qip.exe:*:Enabled:Quiet Internet Pager -- (The Author of QIP)
"D:\Programme\World of Warcraft\BackgroundDownloader.exe" = D:\Programme\World of Warcraft\BackgroundDownloader.exe:*:Enabled:Blizzard Downloader -- (Blizzard Entertainment)
"D:\Programme\ICQLite\ICQLite.exe" = D:\Programme\ICQLite\ICQLite.exe:*:Enabled:ICQ Lite -- File not found
"D:\Programme\ICQ6\ICQ.exe" = D:\Programme\ICQ6\ICQ.exe:*:Enabled:ICQ6 -- File not found
"C:\Programme\AVG\AVG8\avgemc.exe" = C:\Programme\AVG\AVG8\avgemc.exe:*:Enabled:avgemc.exe -- (AVG Technologies CZ, s.r.o.)
"C:\Programme\AVG\AVG8\avgupd.exe" = C:\Programme\AVG\AVG8\avgupd.exe:*:Enabled:avgupd.exe -- (AVG Technologies CZ, s.r.o.)
"C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Temp\Blizzard Launcher Temporary - 2381f618\Launcher.exe" = C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Temp\Blizzard Launcher Temporary - 2381f618\Launcher.exe:*:Enabled:Blizzard Launcher -- File not found
"D:\Programme\uTorrent\uTorrent.exe" = D:\Programme\uTorrent\uTorrent.exe:*:Enabled:µTorrent -- (BitTorrent, Inc.)
"D:\Programme\ICQ6.5\ICQ.exe" = D:\Programme\ICQ6.5\ICQ.exe:*:Enabled:ICQ6 -- (ICQ, LLC.)
"E:\Programme\LAN CoD 4\Setup\Data\iw3mp.exe" = E:\Programme\LAN CoD 4\Setup\Data\iw3mp.exe:*:Enabled:Call of Duty(R) 4 - Modern Warfare(TM) -- ()
"C:\WINDOWS\TEMP\iuyy.tmp\svchost.exe" = C:\WINDOWS\TEMP\iuyy.tmp\svchost.exe:*:Enabled:svchost -- File not found
"C:\WINDOWS\TEMP\bxhj.tmp\svchost.exe" = C:\WINDOWS\TEMP\bxhj.tmp\svchost.exe:*:Enabled:svchost -- ()

========== HKEY_LOCAL_MACHINE Uninstall List ==========

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall]
"{02EBDBB9-4600-41D3-B566-40CB861511D2}" = World of Warcraft FREE Trial
"{055EE59D-217B-43A7-ABFF-507B966405D8}" = ATI Catalyst Control Center
"{09CF6AF5-9206-4FD7-9B08-BA6819FB47E3}" = Anno 1404
"{0D80391C-0A72-43BB-9BC2-143F63CC111D}" = Nokia PC Connectivity Solution
"{13F3917B56CD4C25848BDC69916971BB}" = DivX Converter
"{18D10072035C4515918F7E37EAFAACFC}" = AutoUpdate
"{1A655D51-1423-48A3-B748-8F5A0BE294C8}" = Microsoft Visual J# .NET Redistributable Package 1.1
"{20071984-5EB1-4881-8EDB-082532ACEC6D}" = Heroes of Might and Magic V
"{26A24AE4-039D-4CA4-87B4-2F83216011FF}" = Java(TM) 6 Update 11
"{295C31E5-3F91-498E-9623-DA24D2FA2B6A}" = T-Online WLAN-Access Finder
"{296D8550-CB06-48E4-9A8B-E5034FB64715}" = Command & Conquer™ Alarmstufe Rot 3
"{2987EE84-C4EE-4FF5-8160-32DE00D6ABC6}" = GTA2
"{29B3C64A-0F93-47CD-9C54-72C0C5578487}" = Samsung PC Studio
"{3248F0A8-6813-11D6-A77B-00B0D0150090}" = J2SE Runtime Environment 5.0 Update 9
"{3248F0A8-6813-11D6-A77B-00B0D0160000}" = Java(TM) SE Runtime Environment 6
"{3248F0A8-6813-11D6-A77B-00B0D0160010}" = Java(TM) SE Runtime Environment 6 Update 1
"{3248F0A8-6813-11D6-A77B-00B0D0160020}" = Java(TM) 6 Update 2
"{333BECA0-DED8-4139-A516-8D9E44E22669}" = Kerio Personal Firewall
"{350C97B3-3D7C-4EE8-BAA9-00BCB3D54227}" = WebFldrs XP
"{35CB6715-41F8-4F99-8881-6FC75BF054B0}" = Oblivion
"{394DC0BC-5476-4260-B52C-BDE1BDEFA958}" = Unreal Tournament 2004
"{3BD633E0-4BF8-4499-9149-88F0767D449C}" = Call of Duty(R) 4 - Modern Warfare(TM) 1.4 Patch
"{3D9CF3CA-3AB0-4A82-9853-D7C43FD1D775}" = ANNO 1404
"{3FC7CBBC4C1E11DCA1A752EA55D89593}" = DivX Version Checker
"{4324BC93-C82F-ED16-BA86-5E34B9E05303}" = ccc-core-static
"{4ED118EE-785C-CC18-5D2E-D5CA4BAA03F0}" = Catalyst Control Center Graphics Full New
"{539475B7-44B7-8B0A-134C-F01B9C8B7569}" = ccc-core-preinstall
"{5AC7AE54-55DF-1126-076C-623F008D40B6}" = Catalyst Control Center Graphics Full Existing
"{5EE7D259-D137-4438-9A5F-42F432EC0421}" = VC80CRTRedist - 8.0.50727.4053
"{60DE4033-9503-48D1-A483-7846BD217CA9}" = ICQ6.5
"{629F65FB-7F3C-4D66-A1C0-20722744B7B6}" = Star Wars(tm) Knights of the Old Republic(tm) II: The Sith Lords(tm)
"{6351D217-3EE3-1967-29BE-6A77635FE485}" = Skins
"{66FF4C48-0083-4E60-8556-B883AB200091}" = Heroes of Might & Magic V: Hammers of Fate
"{6811CAA0-BF12-11D4-9EA1-0050BAE317E1}" = PowerDVD
"{6972FD5E-01D0-4742-8EB0-A0D351CF28FF}" = Governor of Poker
"{6AB9CD3A-F91F-233B-923B-6C59BA63524D}" = Catalyst Control Center HydraVision Full
"{7299052b-02a4-4627-81f2-1818da5d550d}" = Microsoft Visual C++ 2005 Redistributable
"{77A1C7DD-E4F6-4057-92FC-710219215987}" = Logitech G11 Keyboard Software 1.03
"{7B9CC60A-9B81-46A3-A953-76B6BF9EEC97}" = Age of Empires III
"{82696435-8572-4D8B-A230-D1AA567D0F0F}" = Command & Conquer™ 4 Tiberian Twilight
"{8503C901-85D7-4262-88D2-8D8B2A7B08B8}" = Call of Duty(R) 4 - Modern Warfare(TM) 1.5 Patch
"{85A91C22-C369-FCFB-5F1F-D59EB21AD0E1}" = CCC Help English
"{8A15B7D9-908A-4EF9-BA84-5AEDE61743EE}" = Call of Duty(R) 4 - Modern Warfare(TM) 1.6 Patch
"{8D9D8304-5241-41EB-BC97-D78E094323B7}_is1" = CDBurnerXP
"{8FB1A5EA-7DA8-4D57-80FB-BD923CCCC852}" = OpenOffice.org 2.1
"{931C37FC-594D-43A9-B10F-A2F2B1F03498}" = Call of Duty(R) 4 - Modern Warfare(TM) 1.7 Patch
"{9A25302D-30C0-39D9-BD6F-21E6EC160475}" = Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17
"{9BD3BC83-C14A-4C54-A5FB-F43D93D5E4EF}" = Nokia Connectivity Cable Driver
"{A3051CD0-2F64-3813-A88D-B8DCCDE8F8C7}" = Microsoft .NET Framework 3.0 Service Pack 2
"{A6D0140F-E62F-9D1E-2408-9CFF91FF6FC8}" = ccc-utility
"{AC76BA86-7AD7-1031-7B44-A81000000003}" = Adobe Reader 8.1.0 - Deutsch
"{B0C30E93-D3D9-4F04-A2AC-54749B573275}" = Command & Conquer 3
"{B1275E23-717A-4D52-997A-1AD1E24BC7F3}" = T-Online 6.0
"{B13A7C41581B411290FBC0395694E2A9}" = DivX Converter
"{B7050CBDB2504B34BC2A9CA0A692CC29}" = DivX Web Player
"{B7A0CE06-068E-11D6-97FD-0050BACBF861}" = PowerProducer Express
"{C09FB3CD-3D0C-3F2D-899A-6A1D67F2073F}" = Microsoft .NET Framework 2.0 Service Pack 2
"{C44A7422-E380-44BE-79FE-1C032D8A03A7}" = Catalyst Control Center Core Implementation
"{C4A4722E-79F9-417C-BD72-8D359A090C97}" = Samsung PC Studio
"{CB099890-1D5F-11D5-9EA9-0050BAE317E1}" = PowerDirector
"{CB2F7EDD-9D1F-43C1-90FC-4F52EAE172A1}" = Microsoft .NET Framework 1.1
"{CE2CDD62-0124-36CA-84D3-9F4DCF5C5BD9}" = Microsoft .NET Framework 3.5 SP1
"{D36DD326-7280-11D8-97C8-000129760CBE}" = PhotoNow! 1.0
"{D3B1C799-CB73-42DE-BA0F-2344793A095C}" = Catalyst Control Center - Branding
"{E1B34BF3-6333-47DC-AD85-D89A95829478}" = Nokia PC Suite
"{E5D24929-91A4-B0A1-DE00-AFC453921EF7}" = Catalyst Control Center Graphics Light
"{E6C09BFB-BA75-15C7-5B18-A2CE31C4F42B}" = Catalyst Control Center Graphics Previews Common
"{E78BFA60-5393-4C38-82AB-E8019E464EB4}" = Microsoft .NET Framework 1.1 German Language Pack
"{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}" = Realtek High Definition Audio Driver
"Adobe Flash Player ActiveX" = Adobe Flash Player ActiveX
"Adobe Flash Player Plugin" = Adobe Flash Player 10 Plugin
"All ATI Software" = ATI - Software Uninstall Utility
"ApexDC++" = ApexDC++ 1.1.0
"ATI Display Driver" = ATI Display Driver
"AVG8Uninstall" = AVG Free 8.5
"AVMWLANCLI" = AVM FRITZ!WLAN
"BearFlix" = BearFlix
"C988931A08278BCA99C447BBDEEA229CC8656E50" = Windows Driver Package - Nokia Modem (07/24/2006 6.81.0.23)
"CCleaner" = CCleaner
"Clonk Planet" = Clonk Planet
"Clonk Rage" = Clonk Rage
"Defraggler" = Defraggler (remove only)
"DivX Content Uploader" = DivX Content Uploader
"DivX Plus DirectShow Filters" = DivX Plus DirectShow Filters
"DivX Setup.divx.com" = DivX-Setup
"Dynomite Deluxe 2.71" = Dynomite Deluxe 2.71
"Free Audio CD Burner_is1" = Free Audio CD Burner version 1.3
"Free YouTube to MP3 Converter_is1" = Free YouTube to MP3 Converter version 3.5
"FreePDF_XP" = FreePDF XP (Remove only)
"GPL Ghostscript 8.54" = GPL Ghostscript 8.54
"GPL Ghostscript Fonts" = GPL Ghostscript Fonts
"Grand Theft Auto" = Grand Theft Auto
"Half-Life" = Half-Life
"Heroes of Might and Magic® III" = Heroes of Might and Magic® III Complete
"Hitman: Contracts" = Hitman: Contracts
"HLSW_is1" = HLSW v1.3.2.1
"IDNMitigationAPIs" = Microsoft Internationalized Domain Names Mitigation APIs
"ie7" = Windows Internet Explorer 7
"ie8" = Windows Internet Explorer 8
"InstallShield_{3BD633E0-4BF8-4499-9149-88F0767D449C}" = Call of Duty(R) 4 - Modern Warfare(TM) 1.4 Patch
"InstallShield_{7B9CC60A-9B81-46A3-A953-76B6BF9EEC97}" = Age of Empires III
"InstallShield_{8503C901-85D7-4262-88D2-8D8B2A7B08B8}" = Call of Duty(R) 4 - Modern Warfare(TM) 1.5 Multiplayer Patch
"InstallShield_{8A15B7D9-908A-4EF9-BA84-5AEDE61743EE}" = Call of Duty(R) 4 - Modern Warfare(TM) 1.6 Patch
"InstallShield_{931C37FC-594D-43A9-B10F-A2F2B1F03498}" = Call of Duty(R) 4 - Modern Warfare(TM) 1.7 Patch
"IrfanView" = IrfanView (remove only)
"KLiteCodecPack_is1" = K-Lite Codec Pack 2.77 Full
"LimeWire" = LimeWire 4.12.11
"Microsoft .NET Framework 1.1 (1033)" = Microsoft .NET Framework 1.1
"Microsoft .NET Framework 3.5 SP1" = Microsoft .NET Framework 3.5 SP1
"MobMap_is1" = MobMap 3.02
"Mozilla Firefox (3.0.19)" = Mozilla Firefox (3.0.19)
"MSCompPackV1" = Microsoft Compression Client Pack 1.0 for Windows XP
"net" = Advertisement Service
"NLSDownlevelMapping" = Microsoft National Language Support Downlevel APIs
"POD-Bot 2.5" = POD-Bot 2.5
"PSPad editor_is1" = PSPad editor
"QIP2005" = QIP 2005 Uninstall
"Redirection Port Monitor" = RedMon - Redirection Port Monitor
"SAMSUNG CDMA Modem" = SAMSUNG CDMA Modem Driver Set
"SAMSUNG Mobile Composite Device" = SAMSUNG Mobile Composite Device Software
"Samsung Mobile phone USB driver" = Samsung Mobile phone USB driver Software
"SAMSUNG Mobile USB Modem" = SAMSUNG Mobile USB Modem Software
"SAMSUNG Mobile USB Modem 1.0" = SAMSUNG Mobile USB Modem 1.0 Software
"Sierra Utilities" = Sierra Utilities
"Strike Force 180" = Strike Force 180
"Teamspeak 2 RC2_is1" = TeamSpeak 2 RC2
"TeamSpeak 3 Client" = TeamSpeak 3 Client
"ToolbarICQToolbar.ICQToolbarObjectIEToolbar" = ICQ Toolbar
"Tumble Bugs_is1" = Tumble Bugs
"Uninstall_is1" = Uninstall 1.0.0.1
"VLC media player" = VideoLAN VLC media player 0.8.6b
"Winamp" = Winamp
"Windows Media Format Runtime" = Windows Media Format 11 runtime
"Windows Media Player" = Windows Media Player 11
"Windows XP Service Pack" = Windows XP Service Pack 3
"WinRAR archiver" = WinRAR Archivierer
"WMFDist11" = Windows Media Format 11 runtime
"wmp11" = Windows Media Player 11
"World of Warcraft" = World of Warcraft
"Wudf01000" = Microsoft User-Mode Driver Framework Feature Pack 1.0
"Zuma Deluxe 1.0" = Zuma Deluxe 1.0

den letzten rest kann ich aus undefinierbaren gründen net posten da schmiert mir jedes mal die serververbindung ab

markusg 11.06.2010 10:18

Fixen mit OTL

• Starte bitte die OTL.exe.
Vista-User mit Rechtsklick "als Administrator starten"
• Kopiere nun das Folgende in die Textbox.

:OTL
PRC - C:\WINDOWS\Temp\bxhj.tmp\svchost.exe ()
O20 - Winlogon\Notify\fgpipe: DllName - fgpipe.dll - C:\WINDOWS\System32\fgpipe.dll ()
O20 - Winlogon\Notify\fnpipe: DllName - fnpipe.dll - File not found
:Files
C:\WINDOWS\Temp\bxhj.tmp\svchost.exe
C:\WINDOWS\System32\fgpipe.dll

:Commands
[purity]
[EMPTYFLASH]
[emptytemp]
[start explorer]
[Reboot]

• Schliesse bitte nun alle Programme.
• Klicke nun bitte auf den Run Fix Button.
• OTL kann gegebenfalls einen Neustart verlangen. Bitte dies zulassen.
• Nach dem Neustart findest Du ein Textdokument dieses posten

chicken87 11.06.2010 11:48

Soderle hab ich nun gemacht hier das TXT Dokument

All processes killed
========== OTL ==========
Process svchost.exe killed successfully!
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\fgpipe\ deleted successfully.
C:\WINDOWS\system32\fgpipe.dll moved successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\fnpipe\ deleted successfully.
========== FILES ==========
C:\WINDOWS\Temp\bxhj.tmp\svchost.exe moved successfully.
File\Folder C:\WINDOWS\System32\fgpipe.dll not found.
========== COMMANDS ==========

[EMPTYFLASH]

User: All Users

User: Default User

User: ***
->Flash cache emptied: 1536061 bytes

User: LocalService

User: NetworkService
->Flash cache emptied: 3032 bytes

Total Flash Files Cleaned = 1,00 mb


[EMPTYTEMP]

User: All Users

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: ***
->Temp folder emptied: 446932 bytes
->Temporary Internet Files folder emptied: 1245213 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 38290519 bytes
->Flash cache emptied: 0 bytes

User: LocalService
->Temp folder emptied: 66016 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: NetworkService
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 539778 bytes
->Flash cache emptied: 0 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 2802592 bytes
%systemroot%\System32 .tmp files removed: 1262983 bytes
%systemroot%\System32\dllcache .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 664 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 43,00 mb


OTL by OldTimer - Version 3.2.6.0 log created on 06112010_124216

Files\Folders moved on Reboot...
File\Folder C:\Dokumente und Einstellungen\***\Lokale Einstellungen\Temp\[Torrentsworld.net] - ***.torrent not found!

Registry entries deleted on Reboot...

markusg 11.06.2010 11:50

bitte erstelle und poste ein combofix log.
Ein Leitfaden und Tutorium zur Nutzung von ComboFix

chicken87 11.06.2010 13:03

So nun die Combofix.txt

Combofix Logfile:
Code:

ComboFix 10-06-10.04 - *** 11.06.2010  13:36:26.1.2 - x86
Microsoft Windows XP Home Edition  5.1.2600.3.1252.49.1031.18.2047.1459 [GMT 2:00]
ausgeführt von:: c:\dokumente und einstellungen\***\Desktop\ComboFix.exe
AV: AVG Anti-Virus Free *On-access scanning disabled* (Updated) {17DDD097-36FF-435F-9E1B-52D74245D6BF}
FW: Kerio Personal Firewall *disabled* {333BECA0-DED8-4139-A516-8D9E44E22669}

Achtung - Auf diesem PC ist keine Wiederherstellungskonsole installiert !!
.

((((((((((((((((((((((((((((((((((((  Weitere Löschungen  ))))))))))))))))))))))))))))))))))))))))))))))))
.

c:\dokumente und einstellungen\***\Anwendungsdaten\.#
c:\windows\system32\net.net
I:\Autorun.inf

Infizierte Kopie von c:\windows\system32\drivers\isapnp.sys wurde gefunden und desinfiziert
Kopie von - Kitty had a snack :p wurde wiederhergestellt
.
(((((((((((((((((((((((  Dateien erstellt von 2010-05-11 bis 2010-06-11  ))))))))))))))))))))))))))))))
.

2010-06-11 10:42 . 2010-06-11 10:42        --------        d-----w-        C:\_OTL
2010-05-27 13:37 . 2010-05-27 13:37        --------        d-----w-        c:\dokumente und einstellungen\***\Anwendungsdaten\DVDVideoSoftIEHelpers
2010-05-27 13:36 . 2010-05-27 13:36        --------        d-----w-        c:\programme\DVDVideoSoft
2010-05-27 13:36 . 2010-05-27 13:37        --------        d-----w-        c:\programme\Gemeinsame Dateien\DVDVideoSoft
2010-05-24 09:58 . 2010-06-10 21:07        --------        d-----w-        c:\dokumente und einstellungen\***\Anwendungsdaten\47AA6DE573C5B3A3C10002B31817F9CF
2010-05-17 09:18 . 2010-05-17 09:18        56766        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\DivXPlusShortcuts\Uninstaller.exe
2010-05-17 09:18 . 2010-05-17 09:18        53600        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\Update\Uninstaller.exe
2010-05-17 09:18 . 2010-05-17 09:18        57679        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\Player\Uninstaller.exe
2010-05-17 09:18 . 2010-05-17 09:18        84040        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\TransferWizard\Uninstaller.exe
2010-05-17 09:18 . 2010-05-17 09:18        54629        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\TranscodeEngine\Uninstaller.exe
2010-05-17 09:18 . 2010-05-17 09:18        54166        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\DSAVCDecoder\Uninstaller.exe
2010-05-17 09:18 . 2010-05-17 09:18        54101        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\MPEG2Plugin\Uninstaller.exe
2010-05-17 09:18 . 2010-05-17 09:18        57532        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\DSASPDecoder\Uninstaller.exe
2010-05-17 09:18 . 2010-05-17 09:18        54153        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\DFXPlugin\Uninstaller.exe
2010-05-17 09:18 . 2010-05-17 09:18        57409        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\ControlPanel\Uninstaller.exe
2010-05-17 08:54 . 2010-05-17 08:54        144696        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\RunAsUser\RUNASUSERPROCESS.exe

.
((((((((((((((((((((((((((((((((((((  Find3M Bericht  ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2010-06-02 11:45 . 2008-12-28 15:16        --------        d-----w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\avg8
2010-05-27 12:45 . 2007-03-07 09:17        --------        d-----w-        c:\dokumente und einstellungen\***\Anwendungsdaten\OpenOffice.org2
2010-05-17 09:21 . 2010-04-12 19:53        57344        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\RunAsUser\RUNASUSERPROCESS.dll
2010-05-17 09:21 . 2010-04-12 19:46        --------        d-----w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX
2010-05-17 09:18 . 2007-03-04 11:35        --------        d-----w-        c:\programme\DivX
2010-05-17 08:54 . 2010-04-12 19:53        754984        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\Setup\Resource.dll
2010-05-17 08:54 . 2010-04-12 19:53        1180952        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\Setup\DivXSetup.exe
2010-04-29 14:11 . 2008-02-20 15:23        --------        d-----w-        c:\dokumente und einstellungen\***\Anwendungsdaten\teamspeak2
2010-04-24 21:19 . 2008-09-23 19:20        --------        d-----w-        c:\dokumente und einstellungen\***\Anwendungsdaten\ICQ
2010-04-20 21:27 . 2010-03-31 16:51        650496        ----a-w-        c:\dokumente und einstellungen\LocalService\Lokale Einstellungen\Anwendungsdaten\FontCache3.0.0.0.dat
2010-04-20 14:43 . 2010-04-20 14:42        --------        d-----w-        c:\programme\Windows Media Connect 2
2010-04-12 19:53 . 2010-04-12 19:53        57054        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\DSDesktopComponents\Uninstaller.exe
2010-04-12 19:53 . 2010-04-12 19:53        56458        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\DivXDecoderShortcut\Uninstaller.exe
2010-04-12 19:53 . 2010-04-12 19:53        54174        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\DSAACDecoder\Uninstaller.exe
2010-04-12 19:53 . 2010-04-12 19:53        52963        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\MSVC80CRTRedist\Uninstaller.exe
2010-04-12 19:52 . 2010-04-12 19:52        54073        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\Qt4.5\Uninstaller.exe
2010-04-12 19:52 . 2009-08-14 17:22        --------        d-----w-        c:\programme\Gemeinsame Dateien\DivX Shared
2010-04-12 19:52 . 2010-04-12 19:52        56969        ----a-w-        c:\dokumente und einstellungen\All Users\Anwendungsdaten\DivX\ASPEncoder\Uninstaller.exe
2010-03-31 01:58 . 2007-03-04 11:35        123888        ------w-        c:\windows\system32\pxcpyi64.exe
2010-03-31 01:58 . 2007-02-02 12:41        44944        ----a-w-        c:\windows\system32\drivers\PxHelp20.sys
2010-03-31 01:58 . 2007-02-02 12:41        133616        ------w-        c:\windows\system32\pxafs.dll
2010-03-31 01:58 . 2007-02-02 12:41        125424        ------w-        c:\windows\system32\pxinsi64.exe
2010-03-30 10:36 . 2009-11-27 10:36        79488        ----a-w-        c:\dokumente und einstellungen\***\Anwendungsdaten\Sun\Java\jre1.6.0_17\gtapi.dll
2010-03-29 11:14 . 2004-08-04 11:00        84318        ----a-w-        c:\windows\system32\perfc007.dat
2010-03-29 11:14 . 2004-08-04 11:00        458476        ----a-w-        c:\windows\system32\perfh007.dat
2010-03-28 17:27 . 2009-01-06 12:14        196608        ----a-w-        c:\dokumente und einstellungen\***\Anwendungsdaten\Acreon\WowMatrix\Libraries\wmweb.dll
2010-03-28 17:27 . 2009-01-06 12:14        258048        ----a-w-        c:\dokumente und einstellungen\***\Anwendungsdaten\Acreon\WowMatrix\Libraries\wmzip.dll
2009-05-01 21:02 . 2009-05-01 21:02        1044480        ----a-w-        c:\programme\mozilla firefox\plugins\libdivx.dll
2009-05-01 21:02 . 2009-05-01 21:02        200704        ----a-w-        c:\programme\mozilla firefox\plugins\ssldivx.dll
.

((((((((((((((((((((((((((((  Autostartpunkte der Registrierung  ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt.
REGEDIT4

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"DAEMON Tools"="d:\programme\DAEMON Tools\daemon.exe" [2007-04-03 165784]

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDCPL"="RTHDCPL.EXE" [2006-05-27 16208384]
"SkyTel"="SkyTel.EXE" [2006-05-16 2879488]
"SunJavaUpdateSched"="c:\programme\Java\jre6\bin\jusched.exe" [2009-01-20 136600]
"AVMWlanClient"="c:\programme\avmwlanstick\wlangui.exe" [2006-07-31 1544192]
"Launch LGDCore"="c:\programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe" [2006-07-23 1126400]
"AVG8_TRAY"="c:\progra~1\AVG\AVG8\avgtray.exe" [2010-03-19 2046816]
"StartCCC"="c:\programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2009-02-25 61440]
"Adobe Reader Speed Launcher"="c:\programme\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2007-05-11 40048]
"DivXUpdate"="c:\programme\DivX\DivX Update\DivXUpdate.exe" [2010-04-12 1135912]

[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]
"InfoCockpit"="d:\programme\T-Online\T-Online_Software_6\Info-Cockpit\IC_START.EXE" [2006-08-02 176128]

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\winlogon\notify\avgrsstarter]
2009-08-18 08:28        11952        ----a-w-        c:\windows\system32\avgrsstx.dll

[HKLM\~\startupfolder\C:^Dokumente und Einstellungen^All Users^Startmenü^Programme^Autostart^Adobe Reader - Schnellstart.lnk]
path=c:\dokumente und einstellungen\All Users\Startmenü\Programme\Autostart\Adobe Reader - Schnellstart.lnk
backup=c:\windows\pss\Adobe Reader - Schnellstart.lnkCommon Startup

[HKLM\~\startupfolder\C:^Dokumente und Einstellungen^All Users^Startmenü^Programme^Autostart^Adobe Reader Synchronizer.lnk]
path=c:\dokumente und einstellungen\All Users\Startmenü\Programme\Autostart\Adobe Reader Synchronizer.lnk
backup=c:\windows\pss\Adobe Reader Synchronizer.lnkCommon Startup

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AdobeUpdater]
2007-03-01 08:37        2321600        ----a-r-        c:\programme\Gemeinsame Dateien\Adobe\Updater5\AdobeUpdater.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\FreePDF Assistant]
2005-05-27 10:24        310272        ----a-w-        c:\programme\FreePDF_XP\fpassist.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PCSuiteTrayApplication]
2006-06-15 11:36        229376        ----a-w-        d:\programme\Nokia\Nokia PC Suite 6\LaunchApplication.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\PcSync]
2006-06-27 15:21        1449984        ----a-w-        d:\programme\Nokia\Nokia PC Suite 6\PcSync2.exe

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\RemoteControl]
2004-11-02 19:24        32768        ------w-        c:\programme\CyberLink\PowerDVD\PDVDServ.exe

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"c:\\WINDOWS\\system32\\ftp.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
"c:\\Programme\\Kerio\\Personal Firewall 4\\kpf4gui.exe"=
"d:\\Programme\\QIP\\qip.exe"=
"d:\\Programme\\World of Warcraft\\BackgroundDownloader.exe"=
"c:\\Programme\\AVG\\AVG8\\avgemc.exe"=
"c:\\Programme\\AVG\\AVG8\\avgupd.exe"=
"d:\\Programme\\uTorrent\\uTorrent.exe"=
"d:\\Programme\\ICQ6.5\\ICQ.exe"=
"e:\\Programme\\LAN CoD 4\\Setup\\Data\\iw3mp.exe"=
"c:\\WINDOWS\\system32\\PnkBstrA.exe"=
"c:\\WINDOWS\\system32\\PnkBstrB.exe"=

[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\GloballyOpenPorts\List]
"3724:TCP"= 3724:TCP:Blizzard Downloader: 3724

R1 AvgLdx86;AVG Free AVI Loader Driver x86;c:\windows\system32\drivers\avgldx86.sys [28.12.2008 17:16 335240]
R1 AvgTdiX;AVG Free8 Network Redirector;c:\windows\system32\drivers\avgtdix.sys [28.12.2008 17:16 108552]
R1 fwdrv;Firewall Driver;c:\windows\system32\drivers\fwdrv.sys [26.09.2005 12:05 286720]
R1 khips;Kerio HIPS Driver;c:\windows\system32\drivers\khips.sys [26.09.2005 12:05 81920]
R2 avg8emc;AVG Free8 E-mail Scanner;c:\progra~1\AVG\AVG8\avgemc.exe [28.12.2008 17:16 908056]
R2 avg8wd;AVG Free8 WatchDog;c:\progra~1\AVG\AVG8\avgwdsvc.exe [28.12.2008 17:16 297752]
R2 MZCCntrl;T-Online WLAN Adapter Steuerungsdienst;c:\programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe [02.02.2007 13:30 61440]
R3 FWLANUSB;AVM FRITZ!WLAN;c:\windows\system32\drivers\fwlanusb.sys [31.01.2007 23:12 264704]
S3 MACNDIS5;MACNDIS5 NDIS Protocol Driver;c:\progra~1\GEMEIN~1\MARMIK~1\MACNDIS5.SYS [02.02.2007 13:30 17280]
S3 MIINPazX;MIINPazX NDIS Protocol Driver;c:\progra~1\GEMEIN~1\MARMIK~1\MInfraIS\MIINPazX.SYS [02.02.2007 13:30 17152]
S3 MTOnlPktAlyX;MTOnlPktAlyX NDIS Protocol Driver;d:\progra~1\T-Online\T-ONLI~1\BASIS-~1\Basis1\MTOnlPktAlyX.SYS [02.02.2007 13:30 17664]
S4 sptd;sptd;c:\windows\system32\drivers\sptd.sys [08.02.2007 19:17 682232]
.
.
------- Zusätzlicher Suchlauf -------
.
uStart Page = hxxp://google.huddi.com
IE: &ICQ Toolbar Search - d:\programme\ICQToolbar\toolbaru.dll/SEARCH.HTML
IE: Free YouTube to Mp3 Converter - c:\dokumente und einstellungen\***\Anwendungsdaten\DVDVideoSoftIEHelpers\youtubetomp3.htm
TCP: {E00C9C0C-85CF-43EC-9DFE-EF9E9EBEBDE7} = 192.168.0.1
FF - ProfilePath - c:\dokumente und einstellungen\***\Anwendungsdaten\Mozilla\Firefox\Profiles\fdi86ufp.default\
FF - prefs.js: browser.search.selectedEngine - Yahoo
FF - prefs.js: browser.startup.homepage - www.***.de
FF - prefs.js: network.proxy.type - 4
FF - component: c:\programme\AVG\AVG8\Firefox\components\avgssff.dll
FF - HiddenExtension: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
.

**************************************************************************

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, hxxp://www.***.net
Rootkit scan 2010-06-11 13:42
Windows 5.1.2600 Service Pack 3 NTFS

Scanne versteckte Prozesse...

Scanne versteckte Autostarteinträge...

Scanne versteckte Dateien...

Scan erfolgreich abgeschlossen
versteckte Dateien: 0

**************************************************************************
.
--------------------- Gesperrte Registrierungsschluessel ---------------------

[HKEY_USERS\S-1-5-21-436374069-1547161642-839522115-1004\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)

[HKEY_USERS\S-1-5-21-436374069-1547161642-839522115-1004\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu2\Programs\Electronic Arts\C*o*m*m*a*n*d* *&* *C*o*n*q*u*e*r* *3* *T*i*b*e*r*i*u*m* *W*a*r*s*"!\Kundendienst]
"Order"=hex:08,00,00,00,02,00,00,00,b8,02,00,00,01,00,00,00,04,00,00,00,de,00,
  00,00,00,00,00,00,d0,00,00,00,41,75,67,4d,02,00,00,00,01,00,00,00,be,00,32,\

[HKEY_USERS\S-1-5-21-436374069-1547161642-839522115-1004\Software\SecuROM\License information*]
"datasecu"=hex:31,f4,1c,d6,56,52,d8,43,f1,a2,75,ab,12,d1,c7,1b,72,09,5a,72,51,
  d8,bd,de,3f,03,c0,96,d3,e1,c1,3f,cd,94,69,85,93,79,bd,89,80,7d,44,e8,bb,24,\
"rkeysecu"=hex:f5,89,b9,94,31,7d,1f,db,2c,5a,58,f8,bf,26,aa,26
.
--------------------- Durch laufende Prozesse gestartete DLLs ---------------------

- - - - - - - > 'winlogon.exe'(752)
c:\windows\system32\Ati2evxx.dll
.
Zeit der Fertigstellung: 2010-06-11  13:45:19
ComboFix-quarantined-files.txt  2010-06-11 11:45

Vor Suchlauf: 7.565.946.880 Bytes frei
Nach Suchlauf: 7.554.719.744 Bytes frei

- - End Of File - - FE67079E98DF53C28981E65986E3CA13

--- --- ---

markusg 11.06.2010 13:12

öffne den arbeitsplatz, c:
dort siehst du nen ordner _otl
den packe mit winzip oder rar, rechtsklick und zu _otl.rar hinzufügen.
das selbe mache mit qoobox.
dann hier hochladen, wie unter punkt2
http://www.trojaner-board.de/54791-a...ner-board.html
dann gib mal bescheid, wie der pc läuft.

chicken87 11.06.2010 13:28

Also ich hab die Dateien gepackt und hochgeladen.
Vielleicht täuscht mich das ganze auch aber ich hab das Gefühl als würde mein Rechner schneller laufen, agiler wenn man so will.
Bis jetzt auch noch kein neues Pop Up von AVG wegen dem Trojaner.

markusg 11.06.2010 13:32

kannst du mal die avg homepage besuchen und erst mal auf avg 9 upgraden, scanne dan und poste mir eventuelle funde, wir müssen noch weiter prüfen.

chicken87 11.06.2010 13:40

Bin grad dabei aber bei meiner bescheidenen Leitung wirds wohl en bischen dauern :D

markusg 11.06.2010 13:50

jo, aber man muss schon aktuell bleiben :-) so hätte die infektion vllt verhindert werden können.

chicken87 11.06.2010 15:48

So auf AVG 9 aktualisiert und siehe da , weitere Treffer *grml*
und ich dachte solange ich die software aktualisiere wäre ich geschützt

Naja hier ma der Log vom Scan

"Scan ""Geplanter Scan"" wurde beendet."
"Infektionen";"5";"5";"0"
"Informationen";"2"
"Für den Scanvorgang ausgewählte Ordner:";"Gesamten Computer scannen"
"Start des Scans:";"Freitag, 11. Juni 2010, 15:27:35"
"Scan beendet:";"Freitag, 11. Juni 2010, 16:39:36 (1 Stunde(n) 12 Minute(n) )"
"Gesamtanzahl gescannter Objekte:";"376650"
"Benutzer, der den Scan gestartet hat:";"SYSTEM"

"Infektionen"
"Datei";"Infektion";"Ergebnis"
"C:\System Volume Information\_restore{6456E1C6-C26D-47B9-ABDB-A7D3D4B2014D}\RP583\A0138624.sys";"Virus identifiziert: Win32/Patched.DY";"In Virenquarantäne verschoben"
"C:\System Volume Information\_restore{6456E1C6-C26D-47B9-ABDB-A7D3D4B2014D}\RP583\A0138514.exe";"Trojaner: SHeur3.ZOV";"In Virenquarantäne verschoben"
"C:\Qoobox\Quarantine\C\WINDOWS\system32\net.net.vir";"Trojaner: Clicker.AFJE";"In Virenquarantäne verschoben"
"C:\Qoobox\Quarantine\C\WINDOWS\system32\Drivers\isapnp.sys.vir";"Virus identifiziert: Win32/Patched.DY";"In Virenquarantäne verschoben"
"C:\_OTL\MovedFiles\06112010_124216\C_WINDOWS\Temp\bxhj.tmp\svchost.exe";"Trojaner: SHeur3.ADNA";"In Virenquarantäne verschoben"

"Informationen"
"Datei";"Informationen";"Ergebnis"
"C:\service\sp\Office2003SP2-KB887616-FullFile-DEU.exe";"Die Datei wurde von einer beschädigten digitalen Signatur signiert, die von Microsoft Corporation ausgestellt wurde.";""
"C:\service\sp\Office2003SP1-kb842532-fullfile-deu.exe";"Die Datei wurde von einer beschädigten digitalen Signatur signiert, die von Microsoft Corporation ausgestellt wurde.";""

markusg 11.06.2010 16:15

ok, das sind funde in der systemwiederherstellung + im qoobox bzw otl folder, das ist ok erst mal.
erstelle und poste ein gmer report:
http://www.trojaner-board.de/74908-a...t-scanner.html

chicken87 11.06.2010 17:01

Also ich hab GMER durchlaufen lassen allerdings mit allen Partitionen und nach ner Weile kam dann ne Fehlermeldung und es brach den Scan ab.
Hab jetzt nur den Quickscan- Log hoffe der reicht.

GMER 1.0.15.15281 - hxxp://www.g**r.net
Rootkit quick scan 2010-06-11 17:45:33
Windows 5.1.2600 Service Pack 3
Running: 7219g12m.exe; Driver: C:\DOKUME~1\***\LOKALE~1\Temp\uwlyypoc.sys


---- Devices - GMER 1.0.15 ----

AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip fwdrv.sys (Kerio Technologies)
AttachedDevice \Driver\Tcpip \Device\Ip ntkrnlpa.exe (NT-Kernel und -System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Tcp fwdrv.sys (Kerio Technologies)
AttachedDevice \Driver\Tcpip \Device\Tcp ntkrnlpa.exe (NT-Kernel und -System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Udp fwdrv.sys (Kerio Technologies)
AttachedDevice \Driver\Tcpip \Device\Udp ntkrnlpa.exe (NT-Kernel und -System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\RawIp fwdrv.sys (Kerio Technologies)
AttachedDevice \Driver\Tcpip \Device\RawIp ntkrnlpa.exe (NT-Kernel und -System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)

---- EOF - GMER 1.0.15 ----

markusg 11.06.2010 17:28

bitte lass gmer noch mal durchlaufen, diesmal nur partition c: auswählen.

chicken87 14.06.2010 01:00

Trojaner Generic17.CNOG gefunden
 
So nun hatte ich übers Wochenende kaum Zeit aber bin nun endlich ma zum GMER gekommen hier die Log Datei (musste sie Splitten da zuviele Zeichen)
GMER Logfile:
Code:

GMER 1.0.15.15281 - hxxp://www.gmer.net
Rootkit scan 2010-06-14 01:37:45
Windows 5.1.2600 Service Pack 3
Running: 7219g12m.exe; Driver: C:\DOKUME~1\***\LOKALE~1\Temp\uwlyypoc.sys
 
 
---- System - GMER 1.0.15 ----
 
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwClose [0xACC70435]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwCreateFile [0xACC6FC5C]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwCreateKey [0xACC6C0B0]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwCreateProcess [0xACC6F031]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwCreateProcessEx [0xACC6EEAE]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwCreateThread [0xACC6F693]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwDeleteFile [0xACC704B5]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwDeleteKey [0xACC6C4E1]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwDeleteValueKey [0xACC6C574]
SSDT \SystemRoot\system32\drivers\khips.sys ZwLoadDriver [0xACA5E8B0]
SSDT \SystemRoot\system32\drivers\khips.sys ZwMapViewOfSection [0xACA5EA20]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwOpenFile [0xACC6FF27]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwOpenKey [0xACC6C307]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwResumeThread [0xACC6F71F]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwSetInformationFile [0xACC70229]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwSetValueKey [0xACC6C67D]
SSDT \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies) ZwWriteFile [0xACC70186]
 
---- Kernel code sections - GMER 1.0.15 ----
 
.text ntkrnlpa.exe!ZwCallbackReturn + 2D54 805045F0 4 Bytes CALL DA3CF29A
.text ntkrnlpa.exe!ZwCallbackReturn + 2D80 8050461C 4 Bytes JMP 861CACA5
PAGENDSM NDIS.sys!NdisMIndicateStatus B9E479EF 6 Bytes JMP ACC641EC \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies)
.text C:\WINDOWS\system32\DRIVERS\ati2mtag.sys section is writeable [0xB933A000, 0x1C5D58, 0xE8000020]
.text C:\WINDOWS\system32\DRIVERS\atksgt.sys section is writeable [0xAA121300, 0x3B6D8, 0xE8000020]
.text C:\WINDOWS\system32\DRIVERS\lirsgt.sys section is writeable [0xBA408300, 0x1BEE, 0xE8000020]
 
---- User code sections - GMER 1.0.15 ----
 
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\Explorer.EXE[116] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\Explorer.EXE[116] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\Explorer.EXE[116] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\Explorer.EXE[116] WININET.dll!InternetConnectA 408CDEAE 5 Bytes JMP 00080F54
.text C:\WINDOWS\Explorer.EXE[116] WININET.dll!InternetConnectW 408CF862 5 Bytes JMP 00080FE0
.text C:\WINDOWS\Explorer.EXE[116] WININET.dll!InternetOpenA 408DD690 5 Bytes JMP 00080D24
.text C:\WINDOWS\Explorer.EXE[116] WININET.dll!InternetOpenW 408DDB09 5 Bytes JMP 00080DB0
.text C:\WINDOWS\Explorer.EXE[116] WININET.dll!InternetOpenUrlA 408DF3A4 5 Bytes JMP 00080E3C
.text C:\WINDOWS\Explorer.EXE[116] WININET.dll!InternetOpenUrlW 40926DDF 5 Bytes JMP 00080EC8
.text C:\WINDOWS\Explorer.EXE[116] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\Explorer.EXE[116] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\Explorer.EXE[116] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\Java\jre6\bin\jqs.exe[220] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\Java\jre6\bin\jqs.exe[220] WS2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\Programme\Java\jre6\bin\jqs.exe[220] WS2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\Programme\Java\jre6\bin\jqs.exe[220] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\Programme\Java\jre6\bin\jqs.exe[220] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\Java\jre6\bin\jqs.exe[220] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000301A8
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00030090
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00030694
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000302C0
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00030234
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00030004
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0003011C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000304F0
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0003057C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000303D8
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0003034C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00030464
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00030608
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] WS2_32.dll!socket 71A14211 5 Bytes JMP 000308C4
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] WS2_32.dll!bind 71A14480 5 Bytes JMP 00030838
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00030950
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000307AC
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00030720
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] WININET.dll!InternetConnectA 408CDEAE 5 Bytes JMP 00030F54
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] WININET.dll!InternetConnectW 408CF862 5 Bytes JMP 00030FE0
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] WININET.dll!InternetOpenA 408DD690 5 Bytes JMP 00030D24
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] WININET.dll!InternetOpenW 408DDB09 5 Bytes JMP 00030DB0
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] WININET.dll!InternetOpenUrlA 408DF3A4 5 Bytes JMP 00030E3C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4ss.exe[272] WININET.dll!InternetOpenUrlW 40926DDF 5 Bytes JMP 00030EC8
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\Gemeinsame Dateien\Marmiko Shared\MZCCntrl.exe[408] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\CDBurnerXP\NMSAccess.exe[480] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\WINDOWS\system32\PnkBstrA.exe[484] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\WINDOWS\system32\PnkBstrA.exe[484] WS2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\WINDOWS\system32\PnkBstrA.exe[484] WS2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\WINDOWS\system32\PnkBstrA.exe[484] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\WINDOWS\system32\PnkBstrA.exe[484] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\WINDOWS\system32\PnkBstrA.exe[484] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\WINDOWS\system32\PnkBstrB.exe[508] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\WINDOWS\system32\PnkBstrB.exe[508] WS2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\WINDOWS\system32\PnkBstrB.exe[508] WS2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\WINDOWS\system32\PnkBstrB.exe[508] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\WINDOWS\system32\PnkBstrB.exe[508] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\WINDOWS\system32\PnkBstrB.exe[508] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] WS2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] WS2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[516] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\CyberLink\Shared Files\RichVideo.exe[576] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001601A8
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00160090
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00160694
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!CreateProcessW 7C802336 5 Bytes JMP 001602C0
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00160234
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00160004
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0016011C
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001604F0
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!CreateThread 7C8106D7 5 Bytes JMP 0016057C
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001603D8
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0016034C
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!WinExec 7C86250D 5 Bytes JMP 00160464
.text C:\WINDOWS\system32\csrss.exe[724] KERNEL32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00160608
.text C:\WINDOWS\system32\csrss.exe[724] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001607AC
.text C:\WINDOWS\system32\csrss.exe[724] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00160720
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000701A8
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00070090
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00070694
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000702C0
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00070234
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00070004
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0007011C
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000704F0
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0007057C
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000703D8
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0007034C
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00070464
.text C:\WINDOWS\system32\winlogon.exe[756] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00070608
.text C:\WINDOWS\system32\winlogon.exe[756] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000707AC
.text C:\WINDOWS\system32\winlogon.exe[756] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00070720
.text C:\WINDOWS\system32\winlogon.exe[756] WS2_32.dll!socket 71A14211 5 Bytes JMP 000708C4
.text C:\WINDOWS\system32\winlogon.exe[756] WS2_32.dll!bind 71A14480 5 Bytes JMP 00070838
.text C:\WINDOWS\system32\winlogon.exe[756] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00070950
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\services.exe[800] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\services.exe[800] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\services.exe[800] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\lsass.exe[812] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\lsass.exe[812] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\lsass.exe[812] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\lsass.exe[812] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\lsass.exe[812] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\lsass.exe[812] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\WINDOWS\system32\Ati2evxx.exe[980] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\WINDOWS\system32\Ati2evxx.exe[980] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\WINDOWS\system32\Ati2evxx.exe[980] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\svchost.exe[1000] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\svchost.exe[1000] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\svchost.exe[1000] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\svchost.exe[1000] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\svchost.exe[1000] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\svchost.exe[1000] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\svchost.exe[1048] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\svchost.exe[1048] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\svchost.exe[1048] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\svchost.exe[1048] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\svchost.exe[1048] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\svchost.exe[1048] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\System32\svchost.exe[1128] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\System32\svchost.exe[1128] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\System32\svchost.exe[1128] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\System32\svchost.exe[1128] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\System32\svchost.exe[1128] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\System32\svchost.exe[1128] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\WINDOWS\System32\svchost.exe[1128] WININET.dll!InternetConnectA 408CDEAE 5 Bytes JMP 00080F54
.text C:\WINDOWS\System32\svchost.exe[1128] WININET.dll!InternetConnectW 408CF862 5 Bytes JMP 00080FE0
.text C:\WINDOWS\System32\svchost.exe[1128] WININET.dll!InternetOpenA 408DD690 5 Bytes JMP 00080D24
.text C:\WINDOWS\System32\svchost.exe[1128] WININET.dll!InternetOpenW 408DDB09 5 Bytes JMP 00080DB0
.text C:\WINDOWS\System32\svchost.exe[1128] WININET.dll!InternetOpenUrlA 408DF3A4 5 Bytes JMP 00080E3C
.text C:\WINDOWS\System32\svchost.exe[1128] WININET.dll!InternetOpenUrlW 40926DDF 5 Bytes JMP 00080EC8
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Dokumente und Einstellungen\***\Desktop\7219g12m.exe[1188] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\WINDOWS\system32\Ati2evxx.exe[1204] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\svchost.exe[1212] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\svchost.exe[1212] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\svchost.exe[1212] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\svchost.exe[1212] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\svchost.exe[1212] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\svchost.exe[1212] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\AVG\AVG9\avgchsvx.exe[1220] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\AVG\AVG9\avgrsx.exe[1228] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\wuauclt.exe[1296] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\wuauclt.exe[1296] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\wuauclt.exe[1296] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\wuauclt.exe[1296] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\wuauclt.exe[1296] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\wuauclt.exe[1296] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[1356] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
 
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\svchost.exe[1368] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\svchost.exe[1368] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\svchost.exe[1368] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\svchost.exe[1368] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\svchost.exe[1368] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\svchost.exe[1368] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\spoolsv.exe[1540] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\spoolsv.exe[1540] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\spoolsv.exe[1540] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\spoolsv.exe[1540] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\spoolsv.exe[1540] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\spoolsv.exe[1540] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\svchost.exe[1824] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\svchost.exe[1824] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\svchost.exe[1824] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\svchost.exe[1824] WININET.dll!InternetConnectA 408CDEAE 5 Bytes JMP 00080F54
.text C:\WINDOWS\system32\svchost.exe[1824] WININET.dll!InternetConnectW 408CF862 5 Bytes JMP 00080FE0
.text C:\WINDOWS\system32\svchost.exe[1824] WININET.dll!InternetOpenA 408DD690 5 Bytes JMP 00080D24
.text C:\WINDOWS\system32\svchost.exe[1824] WININET.dll!InternetOpenW 408DDB09 5 Bytes JMP 00080DB0
.text C:\WINDOWS\system32\svchost.exe[1824] WININET.dll!InternetOpenUrlA 408DF3A4 5 Bytes JMP 00080E3C
.text C:\WINDOWS\system32\svchost.exe[1824] WININET.dll!InternetOpenUrlW 40926DDF 5 Bytes JMP 00080EC8
.text C:\WINDOWS\system32\svchost.exe[1824] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\svchost.exe[1824] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\svchost.exe[1824] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\WINDOWS\RTHDCPL.EXE[1900] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\WINDOWS\RTHDCPL.EXE[1900] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\WINDOWS\RTHDCPL.EXE[1900] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] WS2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] WS2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\Programme\AVG\AVG9\avgwdsvc.exe[1904] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] WS2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] WS2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] WININET.dll!InternetConnectA 408CDEAE 5 Bytes JMP 00130F54
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] WININET.dll!InternetConnectW 408CF862 5 Bytes JMP 00130FE0
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] WININET.dll!InternetOpenA 408DD690 5 Bytes JMP 00130D24
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] WININET.dll!InternetOpenW 408DDB09 5 Bytes JMP 00130DB0
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] WININET.dll!InternetOpenUrlA 408DF3A4 5 Bytes JMP 00130E3C
.text C:\Programme\avmwlanstick\WlanNetService.exe[1980] WININET.dll!InternetOpenUrlW 40926DDF 5 Bytes JMP 00130EC8
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] WININET.dll!InternetConnectA 408CDEAE 5 Bytes JMP 00130F54
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] WININET.dll!InternetConnectW 408CF862 5 Bytes JMP 00130FE0
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] WININET.dll!InternetOpenA 408DD690 5 Bytes JMP 00130D24
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] WININET.dll!InternetOpenW 408DDB09 5 Bytes JMP 00130DB0
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] WININET.dll!InternetOpenUrlA 408DF3A4 5 Bytes JMP 00130E3C
.text C:\Programme\Java\jre6\bin\jusched.exe[2064] WININET.dll!InternetOpenUrlW 40926DDF 5 Bytes JMP 00130EC8
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\avmwlanstick\wlangui.exe[2072] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\avmwlanstick\wlangui.exe[2072] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\avmwlanstick\wlangui.exe[2072] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\avmwlanstick\wlangui.exe[2072] WININET.dll!InternetConnectA 408CDEAE 5 Bytes JMP 00130F54
.text C:\Programme\avmwlanstick\wlangui.exe[2072] WININET.dll!InternetConnectW 408CF862 5 Bytes JMP 00130FE0
.text C:\Programme\avmwlanstick\wlangui.exe[2072] WININET.dll!InternetOpenA 408DD690 5 Bytes JMP 00130D24
.text C:\Programme\avmwlanstick\wlangui.exe[2072] WININET.dll!InternetOpenW 408DDB09 5 Bytes JMP 00130DB0
.text C:\Programme\avmwlanstick\wlangui.exe[2072] WININET.dll!InternetOpenUrlA 408DF3A4 5 Bytes JMP 00130E3C
.text C:\Programme\avmwlanstick\wlangui.exe[2072] WININET.dll!InternetOpenUrlW 40926DDF 5 Bytes JMP 00130EC8
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\Gemeinsame Dateien\Logitech\G-series Software\LGDCore.exe[2084] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\Adobe\Reader 8.0\Reader\Reader_sl.exe[2136] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] WININET.dll!InternetConnectA 408CDEAE 5 Bytes JMP 00130F54
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] WININET.dll!InternetConnectW 408CF862 5 Bytes JMP 00130FE0
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] WININET.dll!InternetOpenA 408DD690 5 Bytes JMP 00130D24
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] WININET.dll!InternetOpenW 408DDB09 5 Bytes JMP 00130DB0
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] WININET.dll!InternetOpenUrlA 408DF3A4 5 Bytes JMP 00130E3C
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] WININET.dll!InternetOpenUrlW 40926DDF 5 Bytes JMP 00130EC8
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] ws2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] ws2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\Programme\DivX\DivX Update\DivXUpdate.exe[2156] ws2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] KERNEL32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[2164] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] WS2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] WS2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\PROGRA~1\AVG\AVG9\avgtray.exe[2168] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[2212] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\ctfmon.exe[2232] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\ctfmon.exe[2232] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\ctfmon.exe[2232] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] WS2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] WS2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\Programme\AVG\AVG9\avgemc.exe[2264] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\AVG\AVG9\avgnsx.exe[2348] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\AVG\AVG9\avgcsrvx.exe[2508] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\System32\alg.exe[3132] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\System32\alg.exe[3132] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\System32\alg.exe[3132] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\System32\alg.exe[3132] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\System32\alg.exe[3132] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\System32\alg.exe[3132] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] KERNEL32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\ATI Technologies\ATI.ACE\Core-Static\ccc.exe[3240] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000801A8
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00080090
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00080694
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000802C0
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00080234
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00080004
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0008011C
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000804F0
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0008057C
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000803D8
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0008034C
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00080464
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00080608
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000807AC
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00080720
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] WS2_32.dll!socket 71A14211 5 Bytes JMP 000808C4
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] WS2_32.dll!bind 71A14480 5 Bytes JMP 00080838
.text C:\WINDOWS\system32\wbem\wmiprvse.exe[3356] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00080950
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 001301A8
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00130090
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00130694
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 001302C0
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00130234
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00130004
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0013011C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 001304F0
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0013057C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 001303D8
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0013034C
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00130464
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00130608
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 001307AC
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00130720
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] WS2_32.dll!socket 71A14211 5 Bytes JMP 001308C4
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] WS2_32.dll!bind 71A14480 5 Bytes JMP 00130838
.text C:\Programme\Kerio\Personal Firewall 4\kpf4gui.exe[3416] WS2_32.dll!connect 71A14A07 5 Bytes JMP 00130950
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!VirtualProtectEx 7C801A61 5 Bytes JMP 000701A8
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!VirtualProtect 7C801AD4 5 Bytes JMP 00070090
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!WriteProcessMemory 7C802213 5 Bytes JMP 00070694
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!CreateProcessW 7C802336 5 Bytes JMP 000702C0
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!CreateProcessA 7C80236B 5 Bytes JMP 00070234
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!VirtualAlloc 7C809AF1 5 Bytes JMP 00070004
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!VirtualAllocEx 7C809B12 5 Bytes JMP 0007011C
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!CreateRemoteThread 7C8104CC 5 Bytes JMP 000704F0
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!CreateThread 7C8106D7 5 Bytes JMP 0007057C
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!CreateProcessInternalW 7C8197B0 5 Bytes JMP 000703D8
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!CreateProcessInternalA 7C81D54E 5 Bytes JMP 0007034C
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!WinExec 7C86250D 5 Bytes JMP 00070464
.text C:\WINDOWS\system32\wscntfy.exe[3668] kernel32.dll!SetThreadContext 7C863C09 5 Bytes JMP 00070608
.text C:\WINDOWS\system32\wscntfy.exe[3668] USER32.dll!SetWindowsHookExW 7E37820F 5 Bytes JMP 000707AC
.text C:\WINDOWS\system32\wscntfy.exe[3668] USER32.dll!SetWindowsHookExA 7E381211 5 Bytes JMP 00070720
 
---- Kernel IAT/EAT - GMER 1.0.15 ----
 
IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisCloseAdapter] [ACC64040] \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies)
IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisOpenAdapter] [ACC6405B] \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies)
IAT \SystemRoot\system32\DRIVERS\tcpip.sys[NDIS.SYS!NdisRegisterProtocol] [ACC640DF] \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies)
IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisDeregisterProtocol] [ACC64102] \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies)
IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisRegisterProtocol] [ACC640DF] \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies)
IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisOpenAdapter] [ACC6405B] \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies)
IAT \SystemRoot\system32\DRIVERS\wanarp.sys[NDIS.SYS!NdisCloseAdapter] [ACC64040] \SystemRoot\system32\drivers\fwdrv.sys (Kerio Technologies)
 
---- Devices - GMER 1.0.15 ----
 
AttachedDevice \Driver\Tcpip \Device\Ip fwdrv.sys (Kerio Technologies)
AttachedDevice \Driver\Tcpip \Device\Ip ntkrnlpa.exe (NT-Kernel und -System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Ip avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Tcp fwdrv.sys (Kerio Technologies)
AttachedDevice \Driver\Tcpip \Device\Tcp ntkrnlpa.exe (NT-Kernel und -System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Tcp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\Udp fwdrv.sys (Kerio Technologies)
AttachedDevice \Driver\Tcpip \Device\Udp ntkrnlpa.exe (NT-Kernel und -System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\Udp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \Driver\Tcpip \Device\RawIp fwdrv.sys (Kerio Technologies)
AttachedDevice \Driver\Tcpip \Device\RawIp ntkrnlpa.exe (NT-Kernel und -System/Microsoft Corporation)
AttachedDevice \Driver\Tcpip \Device\RawIp avgtdix.sys (AVG Network connection watcher/AVG Technologies CZ, s.r.o.)
AttachedDevice \FileSystem\Fastfat \Fat fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
 
---- Registry - GMER 1.0.15 ----
 
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xBE 0x36 0x0B 0x19 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 D:\Programme\DAEMON Tools\
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x79 0xD6 0x0F 0xA3 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40
Reg HKLM\SYSTEM\CurrentControlSet\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0x72 0x65 0xAF 0x50 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xBE 0x36 0x0B 0x19 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 D:\Programme\DAEMON Tools\
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x79 0xD6 0x0F 0xA3 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet002\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0x72 0x65 0xAF 0x50 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@h0 0
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@khjeh 0xBE 0x36 0x0B 0x19 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4@p0 D:\Programme\DAEMON Tools\
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@khjeh 0x79 0xD6 0x0F 0xA3 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001@a0 0x20 0x01 0x00 0x00 ...
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40 (not active ControlSet)
Reg HKLM\SYSTEM\ControlSet003\Services\sptd\Cfg\19659239224E364682FA4BAF72C53EA4\00000001\0Jf40@khjeh 0x72 0x65 0xAF 0x50 ...
 
---- EOF - GMER 1.0.15 ----

--- --- ---

markusg 14.06.2010 11:03

download malwarebytes:
Malwarebytes
instalieren, öffnen, registerkarte aktualisierung, updaten.
registerkarte scanner, komplett scan, funde löschen, log posten.

chicken87 14.06.2010 13:01

So hier nun die Log datei von Malewarebytes

Malwarebytes' Anti-Malware 1.46
Malwarebytes

Datenbank Version: 4196

Windows 5.1.2600 Service Pack 3
Internet Explorer 8.0.6001.18702

14.06.2010 13:58:14
mbam-log-2010-06-14 (13-58-14).txt

Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|E:\|I:\|)
Durchsuchte Objekte: 275924
Laufzeit: 1 Stunde(n), 3 Minute(n), 36 Sekunde(n)

Infizierte Speicherprozesse: 0
Infizierte Speichermodule: 0
Infizierte Registrierungsschlüssel: 0
Infizierte Registrierungswerte: 0
Infizierte Dateiobjekte der Registrierung: 0
Infizierte Verzeichnisse: 0
Infizierte Dateien: 3

Infizierte Speicherprozesse:
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule:
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel:
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte:
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung:
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse:
(Keine bösartigen Objekte gefunden)

Infizierte Dateien:
C:\_OTL\MovedFiles\06112010_124216\C_WINDOWS\system32\fgpipe.dll (Trojan.Agent) -> No action taken.
E:\Programme\LAN CoD 4\***\rzr-cd4f\rzr-cod4.exe (Trojan.Agent.CK) -> No action taken.
C:\WINDOWS\system32\h@tkeysh@@k.dll (Trojan.Agent) -> No action taken.


soweit so gut aber kann ich die dll ausm Windows Ordner bedenkenlos löschen??

markusg 14.06.2010 13:56

ja, kannst sie löschen.

chicken87 14.06.2010 16:10

wars das nun? :applaus:
oder soll ich sonst noch was durchlaufen lassen?
AVG meldet sich auch nicht mehr.
dann möchte ich mich nochmals bedanken für die schnelle und kompetente Hilfe hier. Wirklich ein großes Lob ohne die Hilfe hier wäre ich wirklich aufgeschmissen gewesen:dankeschoen::dankeschoen::dankeschoen:

markusg 14.06.2010 16:15

reinige mit otcleanit:
http://oldtimer.geekstogo.com/OTM.exe
Klicke cleanup!
dein pc wird evtl. neu starten
programm löscht sich selbst, + die verwendeten tools
die Systemwiederherstellung de- und reaktivieren:
Windows XP - Die Systemwiederherstellung komplett abschalten
um deine software aktuell zu halten, solltest du secunia nutzen:
http://www.trojaner-board.de/83959-s...ector-psi.html
abschließend noch den eset online scanner ausführen:
Free ESET Online Antivirus Scanner
funde löschen, log posten.
außer deine internetverbindung ist wirklich zu langsam dafür weis ja nicht genau, welche anbindung du hast.


Alle Zeitangaben in WEZ +1. Es ist jetzt 21:57 Uhr.

Copyright ©2000-2024, Trojaner-Board


Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130