![]() |
Dienst "Sicherheitscenter" lässt sich nicht starten - Googleumleitungen - Trojaner on Board ? Hallo Zusammen, ich habe mir einen Trojaner (o.ä.) eingefangen. (Virenprogramm ist Avast) Aufgefallen ist mir das durch Umleitungen bei Google. Daher habe ich mein System überprüfen lassen mit AdAware und Spybot. - Die Programme haben auch einige gefunden was gelöscht werden konnte. Die Googleumleitungen sind nun bis auf ganz seltene Ausnahmen weg! Allerdings lässt sich das Sicherheitscenter nicht mehr Starten. d.H. der Dienst ist deaktiviert. ich kann ihn aktivieren und starten aber nach wenigen sekunden deaktiviert er sich wieder. Mitlterweile habe ich die "Anmeldung" verändert und weiß nicht mehr über welches Konto bzw. Kennwort der Dienst gestartet werden muss. Bzw. würde es ja eh nicht gehen... Habe ich noch einen Trojaner on Board ??? Überprüft mit Malwarebytes habe ich bereits. vielleicht kann mir ja jemand helfen! Vielen Dank im Voraus!!!! Hier das Log von HiJackThis Logfile of Trend Micro HijackThis v2.0.4 Scan saved at 10:15:36, on 06.02.2011 Platform: Windows 7 (WinNT 6.00.3504) MSIE: Internet Explorer v8.00 (8.00.7600.16700) Boot mode: Normal Running processes: C:\Windows\system32\taskhost.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe C:\Program Files\OEM\OSD_1.16\osd.exe C:\Windows\WindowsMobile\wmdc.exe C:\Program Files\Alwil Software\Avast4\ashDisp.exe C:\Program Files\Common Files\Java\Java Update\jusched.exe C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe C:\Program Files\DivX\DivX Update\DivXUpdate.exe C:\Program Files\DivX\DivX Plus Web Player\DDMService.exe C:\Program Files\iTunes\iTunesHelper.exe C:\Program Files\DAEMON Tools Lite\DTLite.exe C:\Program Files\Appigo Sync\Appigo Sync.exe C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe C:\Program Files\Logitech\SetPoint\SetPoint.exe C:\Program Files\Hardcopy\hardcopy.exe C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE C:\Users\Peter Klein\AppData\Local\Apps\2.0\7YTMLKWX.BA0\BLGRCKB8.CGO\woot..tion_5e08585fa4ad14cc_0001.0003_aac5573fca9fb601\Wootch.exe C:\Windows\System32\mobsync.exe C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE C:\Program Files\Rosetta Stone\Rosetta Stone Version 3\RosettaStoneVersion3.exe C:\Program Files\Rosetta Stone\Rosetta Stone Version 3\support\bin\win\RosettaStoneLtdServices.exe C:\Windows\system32\conhost.exe C:\Windows\system32\mmc.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\plugin-container.exe C:\Windows\system32\SearchFilterHost.exe C:\Users\Peter Klein\Downloads\HiJackThis204.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: SearchElf 1.2 Toolbar - {f4e6547e-325b-403c-a3bb-ad29ed37a92f} - C:\Program Files\SearchElf_1.2\tbSear.dll O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll O2 - BHO: Conduit Engine - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files\ConduitEngine\ConduitEngine.dll O2 - BHO: Increase performance and video formats for your HTML5 <video> - {326E768D-4182-46FD-9C16-1449A49795F4} - C:\Program Files\DivX\DivX Plus Web Player\npdivx32.dll O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll O2 - BHO: Use the DivX Plus Web Player to watch web videos with less interruptions and smoother playback on supported sites - {593DDEC6-7468-4cdd-90E1-42DADAA222E9} - C:\Program Files\DivX\DivX Plus Web Player\npdivx32.dll O2 - BHO: Virtual Storage Mount Notification - {5FF49FE8-B332-4CB9-B102-FB6951629E55} - C:\Windows\system32\CbFsMntNtf3.dll O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: SearchElf 1.2 Toolbar - {f4e6547e-325b-403c-a3bb-ad29ed37a92f} - C:\Program Files\SearchElf_1.2\tbSear.dll O3 - Toolbar: SearchElf 1.2 Toolbar - {f4e6547e-325b-403c-a3bb-ad29ed37a92f} - C:\Program Files\SearchElf_1.2\tbSear.dll O3 - Toolbar: Conduit Engine - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files\ConduitEngine\ConduitEngine.dll O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe" O4 - HKLM\..\Run: [OSD] C:\Program Files\OEM\OSD_1.16\osd.exe O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\RealMedia\Update_OB\realsched.exe" -osboot O4 - HKLM\..\Run: [Windows Mobile Device Center] %windir%\WindowsMobile\wmdc.exe O4 - HKLM\..\Run: [avast!] "C:\Program Files\Alwil Software\Avast4\ashDisp.exe" O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" O4 - HKLM\..\Run: [RtHDVCpl] C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe -s O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe O4 - HKLM\..\Run: [DivXUpdate] "C:\Program Files\DivX\DivX Update\DivXUpdate.exe" /CHECKNOW O4 - HKLM\..\Run: [DivX Download Manager] "C:\Program Files\DivX\DivX Plus Web Player\DDmService.exe" start O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe" O4 - HKCU\..\Run: [gStart] C:\Program Files\Garmin\gStart.exe O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files\DAEMON Tools Lite\DTLite.exe" -autorun O4 - HKCU\..\Run: [Appigo Sync] C:\Program Files\Appigo Sync\Appigo Sync.exe O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'LOKALER DIENST') O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'NETZWERKDIENST') O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'NETZWERKDIENST') O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe O4 - Startup: Hardcopy.LNK = C:\Program Files\Hardcopy\hardcopy.exe O4 - Startup: Mediencenter Software.lnk = C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe O4 - Startup: Wootch.appref-ms O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\Windows\system32\GPhotos.scr/200 O8 - Extra context menu item: An vorhandene PDF-Datei anfügen - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html O8 - Extra context menu item: Download all by FlashGet3 - C:\Users\Peter Klein\AppData\Roaming\FlashGetBHO\GetAllUrl.htm O8 - Extra context menu item: Download by FlashGet3 - C:\Users\Peter Klein\AppData\Roaming\FlashGetBHO\GetUrl.htm O8 - Extra context menu item: Linkziel an vorhandene PDF-Datei anhängen - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html O8 - Extra context menu item: Linkziel in Adobe PDF konvertieren - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~1\Office12\EXCEL.EXE/3000 O9 - Extra button: An OneNote senden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~1\Office12\ONBttnIE.dll O9 - Extra 'Tools' menuitem: An OneNote s&enden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~1\Office12\ONBttnIE.dll O9 - Extra button: @C:\Windows\WindowsMobile\INetRepl.dll,-222 - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll O9 - Extra 'Tools' menuitem: @C:\Windows\WindowsMobile\INetRepl.dll,-223 - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll O9 - Extra button: ICQ7.2 - {72EFBFE4-C74F-4187-AEFD-73EA3BE968D6} - C:\Program Files\ICQ7.2\ICQ.exe O9 - Extra 'Tools' menuitem: ICQ7.2 - {72EFBFE4-C74F-4187-AEFD-73EA3BE968D6} - C:\Program Files\ICQ7.2\ICQ.exe O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\Office12\REFIEBAR.DLL O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll O15 - Trusted Zone: hxxp://software.kuaiche.com O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - hxxp://fpdownload2.macromedia.com/pub/shockwave/cabs/flash/swflash.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{715D35D4-431A-4E55-BFE1-0016708772D9}: NameServer = 192.168.0.254 O17 - HKLM\System\CCS\Services\Tcpip\..\{C6EF4E26-4E8C-4458-A58F-9D4550590474}: NameServer = 192.168.0.254 O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll O21 - SSODL: EldosMountNotificator - {5FF49FE8-B332-4CB9-B102-FB6951629E55} - C:\Windows\system32\CbFsMntNtf3.dll O22 - SharedTaskScheduler: Virtual Storage Mount Notification - {5FF49FE8-B332-4CB9-B102-FB6951629E55} - C:\Windows\system32\CbFsMntNtf3.dll O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: Dienst "Bonjour" (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: Brother BRAdminPro Scheduler (BRA_Scheduler) - Unknown owner - C:\Program Files\Brother\BRAdmin Professional 3\bratimer.exe O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe O23 - Service: Google Update Service (gupdate1ca4bca8a47b180) (gupdate1ca4bca8a47b180) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe O23 - Service: Mediencenter Service (MCSWASVR) - Deutsche Telekom AG - C:\Program Files\Telekom\Mediencenter\WebDAV.AdminService.exe O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe O23 - Service: Sony Ericsson OMSI download service (OMSI download service) - Unknown owner - C:\Program Files\Sony Ericsson\Sony Ericsson PC Suite\SupServ.exe O23 - Service: OSD Service (OsdService) - TODO: <????> - C:\Program Files\OEM\OSD_1.16\OsdService.exe O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe O23 - Service: VLC media player - Unknown owner - C:\Programme\VideoLAN\VLC_072\vlc.exe -- End of file - 13050 bytes |
Zitat:
|
Hallo, davon habe ich nicht die Logs geschert. soll ich Adaware und Spybot nochmals laufen lassen und die Logs sichern`? |
Öffne doch mal bitte die Programme und schau in den Menüs nach den Protokollen, die Programme bewahren die Logs auf! |
--- Spybot - Search & Destroy version: 1.6.2 (build: 20090126) --- 2009-01-26 blindman.exe (1.0.0.8) 2009-01-26 SDFiles.exe (1.6.1.7) 2009-01-26 SDMain.exe (1.0.0.6) 2009-01-26 SDShred.exe (1.0.2.5) 2009-01-26 SDUpdate.exe (1.6.0.12) 2009-01-26 SDWinSec.exe (1.0.0.12) 2009-01-26 SpybotSD.exe (1.6.2.46) 2009-03-05 TeaTimer.exe (1.6.6.32) 2011-02-01 unins000.exe (51.49.0.0) 2009-01-26 Update.exe (1.6.0.7) 2009-11-04 advcheck.dll (1.6.5.20) 2007-04-02 aports.dll (2.1.0.0) 2008-06-14 DelZip179.dll (1.79.11.1) 2009-01-26 SDHelper.dll (1.6.2.14) 2008-06-19 sqlite3.dll 2009-01-26 Tools.dll (2.1.6.10) 2009-01-16 UninsSrv.dll (1.0.0.0) 2010-10-05 Includes\Adware.sbi 2010-11-30 Includes\AdwareC.sbi 2010-08-13 Includes\Cookies.sbi 2010-12-14 Includes\Dialer.sbi 2010-12-14 Includes\DialerC.sbi 2010-01-25 Includes\HeavyDuty.sbi 2010-11-30 Includes\Hijackers.sbi 2011-01-25 Includes\HijackersC.sbi 2010-09-15 Includes\iPhone.sbi 2010-12-14 Includes\Keyloggers.sbi 2010-12-14 Includes\KeyloggersC.sbi 2004-11-29 Includes\LSP.sbi 2010-12-14 Includes\Malware.sbi 2011-01-25 Includes\MalwareC.sbi 2010-05-18 Includes\PUPS.sbi 2010-12-14 Includes\PUPSC.sbi 2010-01-25 Includes\Revision.sbi 2009-01-13 Includes\Security.sbi 2010-12-14 Includes\SecurityC.sbi 2008-06-03 Includes\Spybots.sbi 2008-06-03 Includes\SpybotsC.sbi 2011-01-18 Includes\Spyware.sbi 2011-01-18 Includes\SpywareC.sbi 2010-03-08 Includes\Tracks.uti 2010-12-28 Includes\Trojans.sbi 2011-01-25 Includes\TrojansC-02.sbi 2011-01-13 Includes\TrojansC-03.sbi 2011-01-25 Includes\TrojansC-04.sbi 2011-01-25 Includes\TrojansC-05.sbi 2010-12-28 Includes\TrojansC.sbi 2008-03-04 Plugins\Chai.dll 2008-03-05 Plugins\Fennel.dll 2008-02-26 Plugins\Mate.dll 2007-12-24 Plugins\TCPIPAddress.dll --- System information --- Unknown Windows version 6.1 (Build: 7600) (6.1.7600) / MSXML4SP2: Security update for MSXML4 SP2 (KB954430) / MSXML4SP2: Security update for MSXML4 SP2 (KB973688) --- Startup entries list --- Located: HK_LM:Run, Adobe ARM command: "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" file: C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe size: 932288 MD5: BAD6BEA0DE1F69C82BDB74378CE0C20A Located: HK_LM:Run, Adobe Reader Speed Launcher command: "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" file: C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe size: 35760 MD5: 12673BCF7B32087DF63F0CFF550EA40B Located: HK_LM:Run, AppleSyncNotifier command: C:\Program Files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe file: C:\Program Files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe size: 47904 MD5: 310638EBDD87B49DF3D12EDB853D5166 Located: HK_LM:Run, avast! command: "C:\Program Files\Alwil Software\Avast4\ashDisp.exe" file: C:\Program Files\Alwil Software\Avast4\ashDisp.exe size: 81000 MD5: 0A7E9FDF3BF1980CA09FEEAC7F52EFBC Located: HK_LM:Run, DivX Download Manager command: "C:\Program Files\DivX\DivX Plus Web Player\DDmService.exe" start file: C:\Program Files\DivX\DivX Plus Web Player\DDmService.exe size: 63360 MD5: 57D8C4ED26DFD7EF0E2CB196FB8BFB54 Located: HK_LM:Run, DivXUpdate command: "C:\Program Files\DivX\DivX Update\DivXUpdate.exe" /CHECKNOW file: C:\Program Files\DivX\DivX Update\DivXUpdate.exe size: 1226608 MD5: A58E05767687E1E636D160ECEA9BC8ED Located: HK_LM:Run, GrooveMonitor command: "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe" file: C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe size: 31072 MD5: 644795F6985C740F5E36E9336B837D0B Located: HK_LM:Run, iTunesHelper command: "C:\Program Files\iTunes\iTunesHelper.exe" file: C:\Program Files\iTunes\iTunesHelper.exe size: 421160 MD5: F3DEAA1F2FCF70FAF6DE3757CA343FA5 Located: HK_LM:Run, Kernel and Hardware Abstraction Layer command: KHALMNPR.EXE file: C:\Windows\KHALMNPR.EXE size: 55824 MD5: E42A642E162B0468B2C4E9D803079C7F Located: HK_LM:Run, NvCplDaemon command: RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup file: C:\Windows\system32\NvCpl.dll size: 13797992 MD5: 363FDE1796237C3D96DF9F61ED748EF1 Located: HK_LM:Run, OSD command: C:\Program Files\OEM\OSD_1.16\osd.exe file: C:\Program Files\OEM\OSD_1.16\osd.exe size: 376832 MD5: D22A7C0E5BE388E76C8B5DD5C392C18C Located: HK_LM:Run, QuickTime Task command: "C:\Program Files\QuickTime\QTTask.exe" -atboottime file: C:\Program Files\QuickTime\QTTask.exe size: 421888 MD5: 0AEE5668EB59912F32FF245BFA72465F Located: HK_LM:Run, RtHDVCpl command: C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe -s file: C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe size: 9742952 MD5: 9048E39550CD6599F98673B4437D0E4C Located: HK_LM:Run, SunJavaUpdateSched command: "C:\Program Files\Common Files\Java\Java Update\jusched.exe" file: C:\Program Files\Common Files\Java\Java Update\jusched.exe size: 248552 MD5: 93DB1FF92B03D24738A71E6E4992DFD3 Located: HK_LM:Run, TkBellExe command: "C:\Program Files\RealMedia\Update_OB\realsched.exe" -osboot file: C:\Program Files\RealMedia\Update_OB\realsched.exe size: 0 MD5: D41D8CD98F00B204E9800998ECF8427E Warning: if the file is actually larger than 0 bytes, the checksum could not be properly calculated! Located: HK_LM:Run, Windows Mobile Device Center command: %windir%\WindowsMobile\wmdc.exe file: C:\Windows\WindowsMobile\wmdc.exe size: 648072 MD5: 96B3C4E20F02CA16AA1E3E425BFFCC8B Located: HK_CU:Run, Sidebar where: S-1-5-19... command: %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun file: C:\Program Files\Windows Sidebar\Sidebar.exe size: 1173504 MD5: EA6EADF6314E43783BA8EEE79F93F73C Located: HK_CU:RunOnce, mctadmin where: S-1-5-19... command: C:\Windows\System32\mctadmin.exe file: C:\Windows\System32\mctadmin.exe size: 93696 MD5: BBA1A5B86134F496B926DDAF247DB871 Located: HK_CU:Run, Sidebar where: S-1-5-20... command: %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun file: C:\Program Files\Windows Sidebar\Sidebar.exe size: 1173504 MD5: EA6EADF6314E43783BA8EEE79F93F73C Located: HK_CU:RunOnce, mctadmin where: S-1-5-20... command: C:\Windows\System32\mctadmin.exe file: C:\Windows\System32\mctadmin.exe size: 93696 MD5: BBA1A5B86134F496B926DDAF247DB871 Located: HK_CU:Run, Appigo Sync where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: C:\Program Files\Appigo Sync\Appigo Sync.exe file: C:\Program Files\Appigo Sync\Appigo Sync.exe size: 229376 MD5: 86CD8780E31386CA1D46F48440D3A3BF Located: HK_CU:Run, DAEMON Tools Lite where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: "C:\Program Files\DAEMON Tools Lite\DTLite.exe" -autorun file: C:\Program Files\DAEMON Tools Lite\DTLite.exe size: 357696 MD5: F34E7705751BB413283434697BF8E55D Located: HK_CU:Run, gStart where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: C:\Program Files\Garmin\gStart.exe file: C:\Program Files\Garmin\gStart.exe size: 1891416 MD5: 4B4F81C294B9A07479F4F4F8FF20E58C Located: HK_CU:Run, SpybotSD TeaTimer where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe file: C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe size: 2260480 MD5: 390679F7A217A5E73D756276C40AE887 Located: HK_CU:Run, SUPERAntiSpyware where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe file: C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe size: 2424560 MD5: 7B9E9A8C71C77DD03CF97FA7C996C3C9 Located: Startup (allgemein), Logitech SetPoint.lnk where: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup... command: C:\Program Files\Logitech\SetPoint\SetPoint.exe file: C:\Program Files\Logitech\SetPoint\SetPoint.exe size: 813584 MD5: B624202660474516E73AA95238FD9843 Located: Startup (Benutzer), Adobe Gamma.lnk where: C:\Users\Peter Klein\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup... command: C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe file: C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe size: 113664 MD5: C2FF17734176CD15221C10044EF0BA1A Located: Startup (Benutzer), Hardcopy.LNK where: C:\Users\Peter Klein\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup... command: C:\Program Files\Hardcopy\hardcopy.exe file: C:\Program Files\Hardcopy\hardcopy.exe size: 1725440 MD5: 8E3217F553022AA10F77119A88A179AD Located: Startup (Benutzer), Mediencenter Software.lnk where: C:\Users\Peter Klein\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup... command: C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe file: C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe size: 1991824 MD5: 8A0A6722AC6C3FC594500C1B4B494980 Located: WinLogon, LBTWlgn command: c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll file: c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll size: 72208 MD5: A589D4BD91C15A0112E2F5DEF235DD67 --- Browser helper object list --- {18DF081C-E8AD-4283-A596-FA578C2EBDC3} (AcroIEHelperStub) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: AcroIEHelperStub CLSID name: Adobe PDF Link Helper Path: C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\ Long name: AcroIEHelperShim.dll Short name: ACROIE~2.DLL Date (created): 22.09.2010 17:04:14 Date (last access): 10.10.2010 18:28:42 Date (last write): 22.09.2010 17:04:14 Filesize: 75200 Attributes: archive MD5: 203A74767EB81F96A5166B1933DB46D0 CRC32: B0D671C9 Version: 9.4.0.195 {3049C3E9-B461-4BC5-8870-4C09146192CA} (RealPlayer Download and Record Plugin for Internet Explorer) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: RealPlayer Download and Record Plugin for Internet Explorer Path: C:\Program Files\Real\RealPlayer\ Long name: rpbrowserrecordplugin.dll Short name: RPBROW~1.DLL Date (created): 13.10.2009 07:02:20 Date (last access): 13.10.2009 07:02:20 Date (last write): 13.10.2009 07:02:20 Filesize: 329312 Attributes: archive MD5: 98EA10E878D73C261E0C6316A3A48658 CRC32: 6CE96CBB Version: 1.0.1.514 {30F9B915-B755-4826-820B-08FBA6BD249D} (Conduit Engine) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: Conduit Engine Path: C:\Program Files\ConduitEngine\ Long name: ConduitEngine.dll Short name: CONDUI~1.DLL Date (created): 17.12.2010 15:35:46 Date (last access): 17.12.2010 15:35:46 Date (last write): 09.12.2010 12:51:30 Filesize: 3911776 Attributes: archive MD5: D9A0CE26ADA5BD15B1B03A752DDF14A6 CRC32: 720A331A Version: 6.2.7.3 {326E768D-4182-46FD-9C16-1449A49795F4} (Increase performance and video formats for your HTML5 <video>) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: Increase performance and video formats for your HTML5 <video> CLSID name: DivX Plus Web Player HTML5 <video> Path: C:\Program Files\DivX\DivX Plus Web Player\ Long name: npdivx32.dll Short name: Date (created): 08.12.2010 22:15:44 Date (last access): 14.01.2011 07:47:36 Date (last write): 08.12.2010 22:15:44 Filesize: 3123072 Attributes: archive MD5: ABB7A668B5D11BFF77DD00CC2B6C8DB0 CRC32: E10E3B63 Version: 2.1.0.900 {53707962-6F74-2D53-2644-206D7942484F} (Spybot-S&D IE Protection) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: Spybot-S&D IE Protection description: Spybot-S&D IE Browser plugin classification: Legitimate known filename: SDhelper.dll info link: hxxp://spybot.eon.net.au/ info source: Patrick M. Kolla Path: C:\PROGRA~1\SPYBOT~1\ Long name: SDHelper.dll Short name: Date (created): 01.02.2011 12:06:00 Date (last access): 01.02.2011 12:06:00 Date (last write): 26.01.2009 15:31:02 Filesize: 1879896 Attributes: archive MD5: 022C2F6DCCDFA0AD73024D254E62AFAC CRC32: 5BA24007 Version: 1.6.2.14 {593DDEC6-7468-4cdd-90E1-42DADAA222E9} (Use the DivX Plus Web Player to watch web videos with less interruptions and smoother playback on supported sites) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: Use the DivX Plus Web Player to watch web videos with less interruptions and smoother playback on supported sites CLSID name: DivX HiQ Path: C:\Program Files\DivX\DivX Plus Web Player\ Long name: npdivx32.dll Short name: Date (created): 08.12.2010 22:15:44 Date (last access): 14.01.2011 07:47:36 Date (last write): 08.12.2010 22:15:44 Filesize: 3123072 Attributes: archive MD5: ABB7A668B5D11BFF77DD00CC2B6C8DB0 CRC32: E10E3B63 Version: 2.1.0.900 {5FF49FE8-B332-4CB9-B102-FB6951629E55} (Virtual Storage Mount Notification) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: Virtual Storage Mount Notification CLSID name: Virtual Storage Mount Notification Path: C:\Windows\system32\ Long name: CbFsMntNtf3.dll Short name: CBFSMN~1.DLL Date (created): 16.12.2010 13:16:58 Date (last access): 16.12.2010 13:16:58 Date (last write): 15.05.2010 15:55:14 Filesize: 155416 Attributes: archive MD5: D20AC5698D403DAF46DD88ED780E676D CRC32: C672A0E6 Version: 3.0.77.30 {72853161-30C5-4D22-B7F9-0BBC1D38A37E} (Groove GFS Browser Helper) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: Groove GFS Browser Helper Path: C:\Program Files\Microsoft Office\Office12\ Long name: GrooveShellExtensions.dll Short name: GR469A~1.DLL Date (created): 12.02.2009 14:19:32 Date (last access): 22.10.2009 06:54:20 Date (last write): 12.02.2009 14:19:32 Filesize: 2217848 Attributes: archive MD5: A6B5A41C0ED007AB6C43CAD899E533D8 CRC32: BA078F79 Version: 12.0.6421.1000 {DBC80044-A445-435b-BC74-9C25C1C588A9} (Java(tm) Plug-In 2 SSV Helper) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: Java(tm) Plug-In 2 SSV Helper Path: C:\Program Files\Java\jre6\bin\ Long name: jp2ssv.dll Short name: Date (created): 15.09.2010 06:20:48 Date (last access): 04.11.2010 08:55:14 Date (last write): 15.09.2010 06:20:48 Filesize: 41760 Attributes: archive MD5: 3F59EDE1444C14CFBAA15C7EBBFE6196 CRC32: 847C94E6 Version: 6.0.220.4 {f4e6547e-325b-403c-a3bb-ad29ed37a92f} (SearchElf 1.2 Toolbar) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: SearchElf 1.2 Toolbar Path: C:\Program Files\SearchElf_1.2\ Long name: tbSear.dll Short name: Date (created): 17.12.2010 15:35:42 Date (last access): 17.12.2010 15:35:42 Date (last write): 09.12.2010 12:51:30 Filesize: 3911776 Attributes: archive MD5: D9A0CE26ADA5BD15B1B03A752DDF14A6 CRC32: 720A331A Version: 6.2.7.3 --- ActiveX list --- {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) DPF name: Java Runtime Environment 1.6.0 CLSID name: Java Plug-in 1.6.0_22 Installer: Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab description: Sun Java classification: Legitimate known filename: %PROGRAM FILES%\JabaSoft\JRE\*\Bin\npjava131.dll info link: info source: Patrick M. Kolla Path: C:\Program Files\Java\jre6\bin\ Long name: jp2iexp.dll Short name: Date (created): 09.11.2009 19:15:04 Date (last access): 15.09.2074 04:52:30 Date (last write): 15.09.2010 04:50:40 Filesize: 108320 Attributes: archive MD5: 6A25F175BC9D7709ABEA66086489121D CRC32: 3BFA8F9A Version: 6.0.220.4 {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0) DPF name: Java Runtime Environment 1.6.0 CLSID name: Java Plug-in 1.6.0_22 Installer: Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab Path: C:\Program Files\Java\jre6\bin\ Long name: jp2iexp.dll Short name: Date (created): 09.11.2009 19:15:04 Date (last access): 15.09.2074 04:52:30 Date (last write): 15.09.2010 04:50:40 Filesize: 108320 Attributes: archive MD5: 6A25F175BC9D7709ABEA66086489121D CRC32: 3BFA8F9A Version: 6.0.220.4 {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0) DPF name: Java Runtime Environment 1.6.0 CLSID name: Java Plug-in 1.6.0_22 Installer: Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab description: classification: Legitimate known filename: npjpi150_06.dll info link: info source: Safer Networking Ltd. Path: C:\Program Files\Java\jre6\bin\ Long name: npjpi160_22.dll Short name: NPJPI1~1.DLL Date (created): 15.09.2010 02:29:52 Date (last access): 15.09.2074 04:52:42 Date (last write): 15.09.2010 04:50:46 Filesize: 141088 Attributes: archive MD5: AFB7EFCDE5277F6514EF0E9FF8D8D862 CRC32: 2A43B8CC Version: 6.0.220.4 {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) DPF name: CLSID name: Shockwave Flash Object Installer: C:\Windows\Downloaded Program Files\CONFLICT.1\swflash.inf Codebase: hxxp://fpdownload2.macromedia.com/pub/shockwave/cabs/flash/swflash.cab description: Macromedia Shockwave Flash Player classification: Legitimate known filename: info link: info source: Patrick M. Kolla Path: C:\Windows\system32\Macromed\Flash\ Long name: Flash10k.ocx Short name: Date (created): 26.10.2010 09:08:48 Date (last access): 26.10.2010 09:08:48 Date (last write): 26.10.2010 09:08:48 Filesize: 6069712 Attributes: readonly archive MD5: C9848467EAEC8EB4A9FE224CBCAC26C0 CRC32: 4BC4A0C2 Version: 10.1.85.3 --- Process list --- PID: 4040 ( 492) C:\Windows\system32\taskhost.exe size: 49152 MD5: 8F4F5A5C1BAE72CE6EAEEA1CA3F98CA2 PID: 2196 ( 952) C:\Windows\system32\Dwm.exe size: 92672 MD5: 505BF4D1CADEB8D4F8BCD08D944DE25D PID: 2220 (4084) C:\Windows\Explorer.EXE size: 2614272 MD5: 2626FC9755BE22F805D3CFA0CE3EE727 PID: 1168 (2220) C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe size: 31072 MD5: 644795F6985C740F5E36E9336B837D0B PID: 624 (2220) C:\Program Files\OEM\OSD_1.16\osd.exe size: 376832 MD5: D22A7C0E5BE388E76C8B5DD5C392C18C PID: 1536 (2220) C:\Windows\WindowsMobile\wmdc.exe size: 648072 MD5: 96B3C4E20F02CA16AA1E3E425BFFCC8B PID: 1320 (2220) C:\Program Files\Alwil Software\Avast4\ashDisp.exe size: 81000 MD5: 0A7E9FDF3BF1980CA09FEEAC7F52EFBC PID: 1812 (2220) C:\Program Files\Common Files\Java\Java Update\jusched.exe size: 248552 MD5: 93DB1FF92B03D24738A71E6E4992DFD3 PID: 2508 (2220) C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe size: 9742952 MD5: 9048E39550CD6599F98673B4437D0E4C PID: 1212 (2220) C:\Program Files\DivX\DivX Update\DivXUpdate.exe size: 1226608 MD5: A58E05767687E1E636D160ECEA9BC8ED PID: 1900 (2220) C:\Program Files\DivX\DivX Plus Web Player\DDMService.exe size: 63360 MD5: 57D8C4ED26DFD7EF0E2CB196FB8BFB54 PID: 2896 (2220) C:\Program Files\iTunes\iTunesHelper.exe size: 421160 MD5: F3DEAA1F2FCF70FAF6DE3757CA343FA5 PID: 2920 (2220) C:\Program Files\Garmin\gStart.exe size: 1891416 MD5: 4B4F81C294B9A07479F4F4F8FF20E58C PID: 2980 (2220) C:\Program Files\DAEMON Tools Lite\DTLite.exe size: 357696 MD5: F34E7705751BB413283434697BF8E55D PID: 1960 (2220) C:\Program Files\Appigo Sync\Appigo Sync.exe size: 229376 MD5: 86CD8780E31386CA1D46F48440D3A3BF PID: 2824 (2220) C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe size: 2260480 MD5: 390679F7A217A5E73D756276C40AE887 PID: 3256 (2220) C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe size: 2424560 MD5: 7B9E9A8C71C77DD03CF97FA7C996C3C9 PID: 3280 (2220) C:\Program Files\Logitech\SetPoint\SetPoint.exe size: 813584 MD5: B624202660474516E73AA95238FD9843 PID: 1836 (2220) C:\Program Files\Hardcopy\hardcopy.exe size: 1725440 MD5: 8E3217F553022AA10F77119A88A179AD PID: 328 (2220) C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe size: 1991824 MD5: 8A0A6722AC6C3FC594500C1B4B494980 PID: 3300 (3280) C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE size: 55824 MD5: 510581C7BB91650ECECDA3B38CF8E91E PID: 1384 (3296) C:\Users\Peter Klein\AppData\Local\Apps\2.0\7YTMLKWX.BA0\BLGRCKB8.CGO\woot..tion_5e08585fa4ad14cc_0001.0003_aac5573fca9fb601\Wootch.exe size: 1196544 MD5: 806FDA1CC2C609649C810D9DB036734E PID: 4344 ( 680) C:\Windows\System32\mobsync.exe size: 101376 MD5: B4CA51F87E301789E2C7F746EB396AA4 PID: 5416 (2220) C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE size: 12995952 MD5: 2A8AEFDE5BED57D232ECF9482336E139 PID: 3100 (2220) C:\Program Files\Mozilla Firefox\firefox.exe size: 912344 MD5: 0E20A3213ED010FC4997D1EF48082ABC PID: 5924 (2220) C:\Program Files\Rosetta Stone\Rosetta Stone Version 3\RosettaStoneVersion3.exe size: 7573547 MD5: 0BD3570F815AFD4513B1C1749BD72C5A PID: 1232 (3100) C:\Program Files\Mozilla Firefox\plugin-container.exe size: 16856 MD5: BA9A09CF1B9503C363617F3748F6D791 PID: 4324 (5924) C:\Program Files\Rosetta Stone\Rosetta Stone Version 3\support\bin\win\RosettaStoneLtdServices.exe size: 547096 MD5: B2F98F5E3916FFF661C552A9B141423D PID: 6048 ( 452) C:\Windows\system32\conhost.exe size: 271360 MD5: 29D9FCDF65B7C823688A035937BB6697 PID: 3616 (2220) C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe size: 5365592 MD5: 0477C2F9171599CA5BC3307FDFBA8D89 PID: 0 ( 0) [System Process] PID: 4 ( 0) System PID: 244 ( 4) smss.exe size: 69632 PID: 380 ( 372) csrss.exe size: 6144 PID: 440 ( 372) wininit.exe size: 96256 PID: 452 ( 432) csrss.exe size: 6144 PID: 492 ( 440) services.exe size: 259072 PID: 508 ( 440) lsass.exe size: 22528 PID: 516 ( 440) lsm.exe size: 261120 PID: 612 ( 432) winlogon.exe size: 285696 PID: 680 ( 492) svchost.exe size: 20992 PID: 760 ( 492) nvvsvc.exe size: 211560 PID: 800 ( 492) svchost.exe size: 20992 PID: 864 ( 492) svchost.exe size: 20992 PID: 952 ( 492) svchost.exe size: 20992 PID: 980 ( 492) svchost.exe size: 20992 PID: 1132 ( 492) svchost.exe size: 20992 PID: 1204 ( 760) nvvsvc.exe size: 211560 PID: 1368 ( 492) svchost.exe size: 20992 PID: 1440 ( 492) aswUpdSv.exe PID: 1460 ( 492) ashServ.exe PID: 1716 ( 492) spoolsv.exe size: 316928 PID: 1732 ( 980) taskeng.exe size: 192000 PID: 1764 ( 492) svchost.exe size: 20992 PID: 1916 (1732) rundll32.exe size: 44544 PID: 1924 ( 492) AppleMobileDeviceService.exe PID: 1984 ( 492) mDNSResponder.exe PID: 2016 ( 492) bratimer.exe PID: 112 ( 492) cvpnd.exe PID: 356 ( 492) WebDAV.AdminService.exe PID: 696 ( 492) mdm.exe PID: 1060 ( 492) NBService.exe PID: 1356 ( 492) SupServ.exe PID: 1332 ( 492) OsdService.exe PID: 1888 ( 492) vlc.exe PID: 2176 ( 492) ashWebSv.exe PID: 2244 ( 492) ashMaiSv.exe PID: 2528 ( 492) svchost.exe size: 20992 PID: 3168 ( 492) svchost.exe size: 20992 PID: 3352 ( 492) svchost.exe size: 20992 PID: 3564 ( 492) SearchIndexer.exe size: 428032 PID: 3104 ( 492) iPodService.exe PID: 972 ( 492) wmpnetwk.exe PID: 920 ( 492) FNPLicensingService.exe PID: 1092 ( 864) audiodg.exe size: 100864 --- Browser start & search pages list --- Spybot - Search & Destroy browser pages report, 08.02.2011 11:07:38 HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Local Page C:\Windows\system32\blank.htm HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page hxxp://www.google.com HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Bar hxxp://www.google.com/ie HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page hxxp://go.microsoft.com/fwlink/?LinkId=69157 HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Default_Search_URL hxxp://www.google.com/ie HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Search\SearchAssistant hxxp://www.google.com/ie HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\@ hxxp://www.google.com/search?q=%s HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page C:\Windows\System32\blank.htm HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page hxxp://go.microsoft.com/fwlink/?LinkId=54896 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page hxxp://go.microsoft.com/fwlink/?LinkId=69157 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL hxxp://go.microsoft.com/fwlink/?LinkId=69157 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL hxxp://go.microsoft.com/fwlink/?LinkId=54896 --- Winsock Layered Service Provider list --- Protocol 0: MSAFD-Tcpip [TCP/IP] GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IP protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 1: MSAFD-Tcpip [UDP/IP] GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IP protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 2: MSAFD-Tcpip [RAW/IP] GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IP protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 3: MSAFD-Tcpip [TCP/IPv6] GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IPv6 protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 4: MSAFD-Tcpip [UDP/IPv6] GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IPv6 protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 5: MSAFD-Tcpip [RAW/IPv6] GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IPv6 protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 6: RSVP-TCPv6-Dienstanbieter GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP RVSP DB filename: %SystemRoot%\system32\rsvpsp.dll DB protocol: RSVP * Service Provider Protocol 7: RSVP-TCP-Dienstanbieter GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP RVSP DB filename: %SystemRoot%\system32\rsvpsp.dll DB protocol: RSVP * Service Provider Protocol 8: RSVP-UDPv6-Dienstanbieter GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP RVSP DB filename: %SystemRoot%\system32\rsvpsp.dll DB protocol: RSVP * Service Provider Protocol 9: RSVP-UDP-Dienstanbieter GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP RVSP DB filename: %SystemRoot%\system32\rsvpsp.dll DB protocol: RSVP * Service Provider Protocol 10: MSAFD NetBIOS [\Device\NetBT_Tcpip_{52CD94DA-E776-4973-87D5-AA9C92405E25}] SEQPACKET 14 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 11: MSAFD NetBIOS [\Device\NetBT_Tcpip_{52CD94DA-E776-4973-87D5-AA9C92405E25}] DATAGRAM 14 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 12: MSAFD NetBIOS [\Device\NetBT_Tcpip_{5EB4F2E8-A8FA-4F80-9E7A-8B0447E03D81}] SEQPACKET 12 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 13: MSAFD NetBIOS [\Device\NetBT_Tcpip_{5EB4F2E8-A8FA-4F80-9E7A-8B0447E03D81}] DATAGRAM 12 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 14: MSAFD NetBIOS [\Device\NetBT_Tcpip_{748E9E2B-8E48-4446-A95A-857F7D7B1E95}] SEQPACKET 11 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 15: MSAFD NetBIOS [\Device\NetBT_Tcpip_{748E9E2B-8E48-4446-A95A-857F7D7B1E95}] DATAGRAM 11 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 16: MSAFD NetBIOS [\Device\NetBT_Tcpip_{CB07EF28-CFBF-400C-930B-F083FF918B51}] SEQPACKET 8 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 17: MSAFD NetBIOS [\Device\NetBT_Tcpip_{CB07EF28-CFBF-400C-930B-F083FF918B51}] DATAGRAM 8 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 18: MSAFD NetBIOS [\Device\NetBT_Tcpip_{68E248A7-3194-4CF3-AC55-28A002B8C082}] SEQPACKET 9 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 19: MSAFD NetBIOS [\Device\NetBT_Tcpip_{68E248A7-3194-4CF3-AC55-28A002B8C082}] DATAGRAM 9 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 20: MSAFD NetBIOS [\Device\NetBT_Tcpip_{7B27C6A4-D4F3-4B1C-BC64-9C051A522385}] SEQPACKET 7 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 21: MSAFD NetBIOS [\Device\NetBT_Tcpip_{7B27C6A4-D4F3-4B1C-BC64-9C051A522385}] DATAGRAM 7 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 22: MSAFD NetBIOS [\Device\NetBT_Tcpip_{C6EF4E26-4E8C-4458-A58F-9D4550590474}] SEQPACKET 0 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 23: MSAFD NetBIOS [\Device\NetBT_Tcpip_{C6EF4E26-4E8C-4458-A58F-9D4550590474}] DATAGRAM 0 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 24: MSAFD NetBIOS [\Device\NetBT_Tcpip_{715D35D4-431A-4E55-BFE1-0016708772D9}] SEQPACKET 1 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 25: MSAFD NetBIOS [\Device\NetBT_Tcpip_{715D35D4-431A-4E55-BFE1-0016708772D9}] DATAGRAM 1 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 26: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{5FF98B76-6426-4363-8BE8-3016C34EA86D}] SEQPACKET 5 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 27: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{5FF98B76-6426-4363-8BE8-3016C34EA86D}] DATAGRAM 5 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 28: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{CBFCD7B9-F21E-4383-8D61-E6CCF3186141}] SEQPACKET 4 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 29: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{CBFCD7B9-F21E-4383-8D61-E6CCF3186141}] DATAGRAM 4 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 30: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{AECA621E-E16A-4802-AC36-1DEAE57DAB6B}] SEQPACKET 6 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 31: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{AECA621E-E16A-4802-AC36-1DEAE57DAB6B}] DATAGRAM 6 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 32: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{52CD94DA-E776-4973-87D5-AA9C92405E25}] SEQPACKET 15 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 33: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{52CD94DA-E776-4973-87D5-AA9C92405E25}] DATAGRAM 15 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 34: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{5EB4F2E8-A8FA-4F80-9E7A-8B0447E03D81}] SEQPACKET 13 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 35: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{5EB4F2E8-A8FA-4F80-9E7A-8B0447E03D81}] DATAGRAM 13 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 36: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{68E248A7-3194-4CF3-AC55-28A002B8C082}] SEQPACKET 10 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 37: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{68E248A7-3194-4CF3-AC55-28A002B8C082}] DATAGRAM 10 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 38: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{C6EF4E26-4E8C-4458-A58F-9D4550590474}] SEQPACKET 3 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 39: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{C6EF4E26-4E8C-4458-A58F-9D4550590474}] DATAGRAM 3 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 40: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{715D35D4-431A-4E55-BFE1-0016708772D9}] SEQPACKET 2 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 41: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{715D35D4-431A-4E55-BFE1-0016708772D9}] DATAGRAM 2 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Namespace Provider 0: NLA (Network Location Awareness, NLAv1)-Namespace GUID: {6642243A-3BA8-4AA6-BAA5-2E0BD71FDD83} Filename: Description: Microsoft Windows NT/2k/XP name space provider DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: NLA-Namespace Namespace Provider 1: TCP/IP GUID: {22059D40-7E9E-11CF-AE5A-00AA00A7112B} Filename: Description: Microsoft Windows NT/2k/XP TCP/IP name space provider DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: TCP/IP Namespace Provider 2: NTDS GUID: {3B2637EE-E580-11CF-A555-00C04FD8D4AC} Filename: %SystemRoot%\System32\winrnr.dll Description: Microsoft Windows NT/2k/XP name space provider DB filename: %SystemRoot%\system32\winrnr.dll DB protocol: NTDS Namespace Provider 3: E-Mail-Namenshimanbieter GUID: {964ACBA2-B2BC-40EB-8C6A-A6DB40161CAE} Filename: Namespace Provider 4: PNRP-Wolken-Namespaceanbieter GUID: {03FE89CE-766D-4976-B9C1-BB9BC42C7B4D} Filename: Namespace Provider 5: PNRP-Namen-Namespaceanbieter GUID: {03FE89CD-766D-4976-B9C1-BB9BC42C7B4D} Filename: Namespace Provider 6: mdnsNSP GUID: {B600E6E9-553B-4A19-8696-335E5C896153} Filename: C:\Program Files\Bonjour\mdnsNSP.dll Description: Apple Rendezvous protocol DB filename: %ProgramFiles%\Rendezvous\bin\mdnsNSP.dll DB protocol: mdnsNSP |
Logs von AdAware finde ich keine! Vielleicht reicht ja schon das Log von Spybot. Besten Dank im Voraus! |
Bitte routinemäßig einen Vollscan mit malwarebytes machen und Log posten. Denk daran, dass Malwarebytes vor jedem Scan manuell aktualisiert werden muss! Falls Logs aus älteren Scans mit Malwarebytes vorhanden sind, bitte auch davon alle posten! Danach OTL: Systemscan mit OTL Lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop
|
OK, hier ein MalwareBytes-Log von heute: Malwarebytes' Anti-Malware 1.50.1.1100 www.malwarebytes.org Datenbank Version: 5709 Windows 6.1.7600 Internet Explorer 8.0.7600.16385 08.02.2011 16:32:30 mbam-log-2011-02-08 (16-32-30).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|T:\|) Durchsuchte Objekte: 343994 Laufzeit: 2 Stunde(n), 5 Minute(n), 4 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 0 Infizierte Registrierungswerte: 0 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 0 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: (Keine bösartigen Objekte gefunden) hier das Log vom ersten Malwarebytes den ich gemacht habe am 28.01.11 Malwarebytes' Anti-Malware 1.50.1.1100 www.malwarebytes.org Datenbank Version: 5629 Windows 6.1.7600 Internet Explorer 8.0.7600.16385 28.01.2011 13:29:20 mbam-log-2011-01-28 (13-29-20).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|T:\|) Durchsuchte Objekte: 372726 Laufzeit: 2 Stunde(n), 53 Minute(n), 18 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 5 Infizierte Registrierungswerte: 1 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 3 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: HKEY_CURRENT_USER\SOFTWARE\CL2GFOKBC9 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\JP595IR86O (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\NtWqIVLZEWZU (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ (Hijack.Zones) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JP595IR86O (Trojan.FakeAlert) -> Value: JP595IR86O -> Quarantined and deleted successfully. Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: c:\Windows\System32\secushr.dat (Malware.Trace) -> Quarantined and deleted successfully. c:\Windows\Tasks\{22116563-108c-42c0-a7ce-60161b75e508}.job (Trojan.Downloader) -> Quarantined and deleted successfully. c:\Windows\Tasks\{62c40aa6-4406-467a-a5a5-dfdf1b559b7a}.job (Trojan.FakeAlert) -> Quarantined and deleted successfully. |
und nun die Logs von OTL: OTL EXTRAS Logfile: Code: OTL Extras logfile created on: 08.02.2011 18:42:48 - Run 2 |
OTL Logfile: Code: OTL logfile created on: 08.02.2011 18:42:47 - Run 2 |
Beende alle Programme, starte OTL und kopiere folgenden Text in die "Custom Scan/Fixes" Box (unten in OTL): (das ":OTL" muss mitkopiert werden!!!) Code: :OTL Das Logfile müsste geöffnet werden, wenn Du nach dem Fixen auf ok klickst, poste das bitte. Evtl. wird der Rechner neu gestartet. |
Besten Dank - habs gemacht! Rechner wurde neugestartet: hier das Log: All processes killed ========== OTL ========== HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! C:\autoexec.bat moved successfully. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{3e0f55d1-de86-11df-ab84-00215d31c09a}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3e0f55d1-de86-11df-ab84-00215d31c09a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{3e0f55d1-de86-11df-ab84-00215d31c09a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3e0f55d1-de86-11df-ab84-00215d31c09a}\ not found. File C:\Windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL G:\DT5000_Launcher.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fb60568c-c079-11de-983b-00215d31c09a}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{fb60568c-c079-11de-983b-00215d31c09a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fb60568c-c079-11de-983b-00215d31c09a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{fb60568c-c079-11de-983b-00215d31c09a}\ not found. File G:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fb60568f-c079-11de-983b-00030dbe21bb}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{fb60568f-c079-11de-983b-00030dbe21bb}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fb60568f-c079-11de-983b-00030dbe21bb}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{fb60568f-c079-11de-983b-00030dbe21bb}\ not found. File G:\AutoRun.exe not found. C:\Windows\System32\1551694079 folder moved successfully. C:\Windows\cadkasdeinst01.exe moved successfully. C:\Windows\System32\sdiagengt.dll moved successfully. C:\Windows\Tasks\DGIBWI.job moved successfully. ========== COMMANDS ========== C:\Windows\System32\drivers\etc\Hosts moved successfully. HOSTS file reset successfully [EMPTYTEMP] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: Peter Klein ->Temp folder emptied: 12134697 bytes ->Temporary Internet Files folder emptied: 10458801852 bytes ->Java cache emptied: 51295250 bytes ->FireFox cache emptied: 115319417 bytes ->Google Chrome cache emptied: 8062940 bytes ->Flash cache emptied: 56032 bytes User: Public User: sync ->Temp folder emptied: 6516921 bytes ->Temporary Internet Files folder emptied: 3692978 bytes ->Java cache emptied: 2327324 bytes ->Flash cache emptied: 456 bytes %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 0 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 534582 bytes RecycleBin emptied: 330976 bytes Total Files Cleaned = 10.165,00 mb OTL by OldTimer - Version 3.2.20.6 log created on 02082011_202823 Files\Folders moved on Reboot... File move failed. C:\Windows\temp\_avast4_\Webshlock.txt scheduled to be moved on reboot. Registry entries deleted on Reboot... |
Dann bitte jetzt CF ausführen: ComboFix Ein Leitfaden und Tutorium zur Nutzung von ComboFix
http://saved.im/mtm0nzyzmzd5/cofi.jpg
Combofix darf ausschließlich ausgeführt werden, wenn ein Kompetenzler dies ausdrücklich empfohlen hat! |
Hab Combofix laufen lassen: Combofix Logfile: Code: ComboFix 11-02-08.02 - Peter Klein 08.02.2011 20:57:38.1.2 - x86 |
Sicherheitscenter läuft wieder !!! :applaus: Bleibt mir also eine Neuinstallation erspart! - Oder??? Besten Dank!!! wie kann man sich bedanken - Paypalspende? habe noch gemerkt, dass ich eben übersehen habe den Schritt "CCleaner Systembereinigung" übersprungen habe! soll ich das noch nachholen? Anschließend wieder Combofix ausführen? |
Alle Zeitangaben in WEZ +1. Es ist jetzt 01:50 Uhr. |
Copyright ©2000-2025, Trojaner-Board