![]() |
Dienst "Sicherheitscenter" lässt sich nicht starten - Googleumleitungen - Trojaner on Board ? Hallo Zusammen, ich habe mir einen Trojaner (o.ä.) eingefangen. (Virenprogramm ist Avast) Aufgefallen ist mir das durch Umleitungen bei Google. Daher habe ich mein System überprüfen lassen mit AdAware und Spybot. - Die Programme haben auch einige gefunden was gelöscht werden konnte. Die Googleumleitungen sind nun bis auf ganz seltene Ausnahmen weg! Allerdings lässt sich das Sicherheitscenter nicht mehr Starten. d.H. der Dienst ist deaktiviert. ich kann ihn aktivieren und starten aber nach wenigen sekunden deaktiviert er sich wieder. Mitlterweile habe ich die "Anmeldung" verändert und weiß nicht mehr über welches Konto bzw. Kennwort der Dienst gestartet werden muss. Bzw. würde es ja eh nicht gehen... Habe ich noch einen Trojaner on Board ??? Überprüft mit Malwarebytes habe ich bereits. vielleicht kann mir ja jemand helfen! Vielen Dank im Voraus!!!! Hier das Log von HiJackThis Logfile of Trend Micro HijackThis v2.0.4 Scan saved at 10:15:36, on 06.02.2011 Platform: Windows 7 (WinNT 6.00.3504) MSIE: Internet Explorer v8.00 (8.00.7600.16700) Boot mode: Normal Running processes: C:\Windows\system32\taskhost.exe C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe C:\Program Files\OEM\OSD_1.16\osd.exe C:\Windows\WindowsMobile\wmdc.exe C:\Program Files\Alwil Software\Avast4\ashDisp.exe C:\Program Files\Common Files\Java\Java Update\jusched.exe C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe C:\Program Files\DivX\DivX Update\DivXUpdate.exe C:\Program Files\DivX\DivX Plus Web Player\DDMService.exe C:\Program Files\iTunes\iTunesHelper.exe C:\Program Files\DAEMON Tools Lite\DTLite.exe C:\Program Files\Appigo Sync\Appigo Sync.exe C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe C:\Program Files\Logitech\SetPoint\SetPoint.exe C:\Program Files\Hardcopy\hardcopy.exe C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE C:\Users\Peter Klein\AppData\Local\Apps\2.0\7YTMLKWX.BA0\BLGRCKB8.CGO\woot..tion_5e08585fa4ad14cc_0001.0003_aac5573fca9fb601\Wootch.exe C:\Windows\System32\mobsync.exe C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE C:\Program Files\Rosetta Stone\Rosetta Stone Version 3\RosettaStoneVersion3.exe C:\Program Files\Rosetta Stone\Rosetta Stone Version 3\support\bin\win\RosettaStoneLtdServices.exe C:\Windows\system32\conhost.exe C:\Windows\system32\mmc.exe C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\plugin-container.exe C:\Windows\system32\SearchFilterHost.exe C:\Users\Peter Klein\Downloads\HiJackThis204.exe R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = R3 - URLSearchHook: SearchElf 1.2 Toolbar - {f4e6547e-325b-403c-a3bb-ad29ed37a92f} - C:\Program Files\SearchElf_1.2\tbSear.dll O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll O2 - BHO: Conduit Engine - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files\ConduitEngine\ConduitEngine.dll O2 - BHO: Increase performance and video formats for your HTML5 <video> - {326E768D-4182-46FD-9C16-1449A49795F4} - C:\Program Files\DivX\DivX Plus Web Player\npdivx32.dll O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll O2 - BHO: Use the DivX Plus Web Player to watch web videos with less interruptions and smoother playback on supported sites - {593DDEC6-7468-4cdd-90E1-42DADAA222E9} - C:\Program Files\DivX\DivX Plus Web Player\npdivx32.dll O2 - BHO: Virtual Storage Mount Notification - {5FF49FE8-B332-4CB9-B102-FB6951629E55} - C:\Windows\system32\CbFsMntNtf3.dll O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll O2 - BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre6\bin\jp2ssv.dll O2 - BHO: SearchElf 1.2 Toolbar - {f4e6547e-325b-403c-a3bb-ad29ed37a92f} - C:\Program Files\SearchElf_1.2\tbSear.dll O3 - Toolbar: SearchElf 1.2 Toolbar - {f4e6547e-325b-403c-a3bb-ad29ed37a92f} - C:\Program Files\SearchElf_1.2\tbSear.dll O3 - Toolbar: Conduit Engine - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files\ConduitEngine\ConduitEngine.dll O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe" O4 - HKLM\..\Run: [OSD] C:\Program Files\OEM\OSD_1.16\osd.exe O4 - HKLM\..\Run: [TkBellExe] "C:\Program Files\RealMedia\Update_OB\realsched.exe" -osboot O4 - HKLM\..\Run: [Windows Mobile Device Center] %windir%\WindowsMobile\wmdc.exe O4 - HKLM\..\Run: [avast!] "C:\Program Files\Alwil Software\Avast4\ashDisp.exe" O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [Kernel and Hardware Abstraction Layer] KHALMNPR.EXE O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" O4 - HKLM\..\Run: [RtHDVCpl] C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe -s O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe O4 - HKLM\..\Run: [DivXUpdate] "C:\Program Files\DivX\DivX Update\DivXUpdate.exe" /CHECKNOW O4 - HKLM\..\Run: [DivX Download Manager] "C:\Program Files\DivX\DivX Plus Web Player\DDmService.exe" start O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe" O4 - HKCU\..\Run: [gStart] C:\Program Files\Garmin\gStart.exe O4 - HKCU\..\Run: [DAEMON Tools Lite] "C:\Program Files\DAEMON Tools Lite\DTLite.exe" -autorun O4 - HKCU\..\Run: [Appigo Sync] C:\Program Files\Appigo Sync\Appigo Sync.exe O4 - HKCU\..\Run: [SpybotSD TeaTimer] C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe O4 - HKUS\S-1-5-19\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'LOKALER DIENST') O4 - HKUS\S-1-5-19\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'LOKALER DIENST') O4 - HKUS\S-1-5-20\..\Run: [Sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'NETZWERKDIENST') O4 - HKUS\S-1-5-20\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'NETZWERKDIENST') O4 - Startup: Adobe Gamma.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe O4 - Startup: Hardcopy.LNK = C:\Program Files\Hardcopy\hardcopy.exe O4 - Startup: Mediencenter Software.lnk = C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe O4 - Startup: Wootch.appref-ms O4 - Global Startup: Logitech SetPoint.lnk = C:\Program Files\Logitech\SetPoint\SetPoint.exe O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\Windows\system32\GPhotos.scr/200 O8 - Extra context menu item: An vorhandene PDF-Datei anfügen - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html O8 - Extra context menu item: Download all by FlashGet3 - C:\Users\Peter Klein\AppData\Roaming\FlashGetBHO\GetAllUrl.htm O8 - Extra context menu item: Download by FlashGet3 - C:\Users\Peter Klein\AppData\Roaming\FlashGetBHO\GetUrl.htm O8 - Extra context menu item: Linkziel an vorhandene PDF-Datei anhängen - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html O8 - Extra context menu item: Linkziel in Adobe PDF konvertieren - res://C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~1\MICROS~1\Office12\EXCEL.EXE/3000 O9 - Extra button: An OneNote senden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~1\Office12\ONBttnIE.dll O9 - Extra 'Tools' menuitem: An OneNote s&enden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~1\Office12\ONBttnIE.dll O9 - Extra button: @C:\Windows\WindowsMobile\INetRepl.dll,-222 - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll O9 - Extra button: (no name) - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll O9 - Extra 'Tools' menuitem: @C:\Windows\WindowsMobile\INetRepl.dll,-223 - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll O9 - Extra button: ICQ7.2 - {72EFBFE4-C74F-4187-AEFD-73EA3BE968D6} - C:\Program Files\ICQ7.2\ICQ.exe O9 - Extra 'Tools' menuitem: ICQ7.2 - {72EFBFE4-C74F-4187-AEFD-73EA3BE968D6} - C:\Program Files\ICQ7.2\ICQ.exe O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~1\Office12\REFIEBAR.DLL O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll O9 - Extra 'Tools' menuitem: Spybot - Search & Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\PROGRA~1\SPYBOT~1\SDHelper.dll O15 - Trusted Zone: hxxp://software.kuaiche.com O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - hxxp://fpdownload2.macromedia.com/pub/shockwave/cabs/flash/swflash.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{715D35D4-431A-4E55-BFE1-0016708772D9}: NameServer = 192.168.0.254 O17 - HKLM\System\CCS\Services\Tcpip\..\{C6EF4E26-4E8C-4458-A58F-9D4550590474}: NameServer = 192.168.0.254 O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll O21 - SSODL: EldosMountNotificator - {5FF49FE8-B332-4CB9-B102-FB6951629E55} - C:\Windows\system32\CbFsMntNtf3.dll O22 - SharedTaskScheduler: Virtual Storage Mount Notification - {5FF49FE8-B332-4CB9-B102-FB6951629E55} - C:\Windows\system32\CbFsMntNtf3.dll O23 - Service: Adobe LM Service - Adobe Systems - C:\Program Files\Common Files\Adobe Systems Shared\Service\Adobelmsvc.exe O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: Dienst "Bonjour" (Bonjour Service) - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe O23 - Service: Brother BRAdminPro Scheduler (BRA_Scheduler) - Unknown owner - C:\Program Files\Brother\BRAdmin Professional 3\bratimer.exe O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe O23 - Service: Google Update Service (gupdate1ca4bca8a47b180) (gupdate1ca4bca8a47b180) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe O23 - Service: Google Updater Service (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe O23 - Service: iPod-Dienst (iPod Service) - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe O23 - Service: Lavasoft Ad-Aware Service - Lavasoft - C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe O23 - Service: Logitech Bluetooth Service (LBTServ) - Logitech, Inc. - C:\Program Files\Common Files\Logishrd\Bluetooth\LBTServ.exe O23 - Service: Mediencenter Service (MCSWASVR) - Deutsche Telekom AG - C:\Program Files\Telekom\Mediencenter\WebDAV.AdminService.exe O23 - Service: Nero BackItUp Scheduler 4.0 - Nero AG - C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe O23 - Service: Sony Ericsson OMSI download service (OMSI download service) - Unknown owner - C:\Program Files\Sony Ericsson\Sony Ericsson PC Suite\SupServ.exe O23 - Service: OSD Service (OsdService) - TODO: <????> - C:\Program Files\OEM\OSD_1.16\OsdService.exe O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe O23 - Service: VLC media player - Unknown owner - C:\Programme\VideoLAN\VLC_072\vlc.exe -- End of file - 13050 bytes |
Zitat:
|
Hallo, davon habe ich nicht die Logs geschert. soll ich Adaware und Spybot nochmals laufen lassen und die Logs sichern`? |
Öffne doch mal bitte die Programme und schau in den Menüs nach den Protokollen, die Programme bewahren die Logs auf! |
--- Spybot - Search & Destroy version: 1.6.2 (build: 20090126) --- 2009-01-26 blindman.exe (1.0.0.8) 2009-01-26 SDFiles.exe (1.6.1.7) 2009-01-26 SDMain.exe (1.0.0.6) 2009-01-26 SDShred.exe (1.0.2.5) 2009-01-26 SDUpdate.exe (1.6.0.12) 2009-01-26 SDWinSec.exe (1.0.0.12) 2009-01-26 SpybotSD.exe (1.6.2.46) 2009-03-05 TeaTimer.exe (1.6.6.32) 2011-02-01 unins000.exe (51.49.0.0) 2009-01-26 Update.exe (1.6.0.7) 2009-11-04 advcheck.dll (1.6.5.20) 2007-04-02 aports.dll (2.1.0.0) 2008-06-14 DelZip179.dll (1.79.11.1) 2009-01-26 SDHelper.dll (1.6.2.14) 2008-06-19 sqlite3.dll 2009-01-26 Tools.dll (2.1.6.10) 2009-01-16 UninsSrv.dll (1.0.0.0) 2010-10-05 Includes\Adware.sbi 2010-11-30 Includes\AdwareC.sbi 2010-08-13 Includes\Cookies.sbi 2010-12-14 Includes\Dialer.sbi 2010-12-14 Includes\DialerC.sbi 2010-01-25 Includes\HeavyDuty.sbi 2010-11-30 Includes\Hijackers.sbi 2011-01-25 Includes\HijackersC.sbi 2010-09-15 Includes\iPhone.sbi 2010-12-14 Includes\Keyloggers.sbi 2010-12-14 Includes\KeyloggersC.sbi 2004-11-29 Includes\LSP.sbi 2010-12-14 Includes\Malware.sbi 2011-01-25 Includes\MalwareC.sbi 2010-05-18 Includes\PUPS.sbi 2010-12-14 Includes\PUPSC.sbi 2010-01-25 Includes\Revision.sbi 2009-01-13 Includes\Security.sbi 2010-12-14 Includes\SecurityC.sbi 2008-06-03 Includes\Spybots.sbi 2008-06-03 Includes\SpybotsC.sbi 2011-01-18 Includes\Spyware.sbi 2011-01-18 Includes\SpywareC.sbi 2010-03-08 Includes\Tracks.uti 2010-12-28 Includes\Trojans.sbi 2011-01-25 Includes\TrojansC-02.sbi 2011-01-13 Includes\TrojansC-03.sbi 2011-01-25 Includes\TrojansC-04.sbi 2011-01-25 Includes\TrojansC-05.sbi 2010-12-28 Includes\TrojansC.sbi 2008-03-04 Plugins\Chai.dll 2008-03-05 Plugins\Fennel.dll 2008-02-26 Plugins\Mate.dll 2007-12-24 Plugins\TCPIPAddress.dll --- System information --- Unknown Windows version 6.1 (Build: 7600) (6.1.7600) / MSXML4SP2: Security update for MSXML4 SP2 (KB954430) / MSXML4SP2: Security update for MSXML4 SP2 (KB973688) --- Startup entries list --- Located: HK_LM:Run, Adobe ARM command: "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" file: C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe size: 932288 MD5: BAD6BEA0DE1F69C82BDB74378CE0C20A Located: HK_LM:Run, Adobe Reader Speed Launcher command: "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe" file: C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe size: 35760 MD5: 12673BCF7B32087DF63F0CFF550EA40B Located: HK_LM:Run, AppleSyncNotifier command: C:\Program Files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe file: C:\Program Files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe size: 47904 MD5: 310638EBDD87B49DF3D12EDB853D5166 Located: HK_LM:Run, avast! command: "C:\Program Files\Alwil Software\Avast4\ashDisp.exe" file: C:\Program Files\Alwil Software\Avast4\ashDisp.exe size: 81000 MD5: 0A7E9FDF3BF1980CA09FEEAC7F52EFBC Located: HK_LM:Run, DivX Download Manager command: "C:\Program Files\DivX\DivX Plus Web Player\DDmService.exe" start file: C:\Program Files\DivX\DivX Plus Web Player\DDmService.exe size: 63360 MD5: 57D8C4ED26DFD7EF0E2CB196FB8BFB54 Located: HK_LM:Run, DivXUpdate command: "C:\Program Files\DivX\DivX Update\DivXUpdate.exe" /CHECKNOW file: C:\Program Files\DivX\DivX Update\DivXUpdate.exe size: 1226608 MD5: A58E05767687E1E636D160ECEA9BC8ED Located: HK_LM:Run, GrooveMonitor command: "C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe" file: C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe size: 31072 MD5: 644795F6985C740F5E36E9336B837D0B Located: HK_LM:Run, iTunesHelper command: "C:\Program Files\iTunes\iTunesHelper.exe" file: C:\Program Files\iTunes\iTunesHelper.exe size: 421160 MD5: F3DEAA1F2FCF70FAF6DE3757CA343FA5 Located: HK_LM:Run, Kernel and Hardware Abstraction Layer command: KHALMNPR.EXE file: C:\Windows\KHALMNPR.EXE size: 55824 MD5: E42A642E162B0468B2C4E9D803079C7F Located: HK_LM:Run, NvCplDaemon command: RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup file: C:\Windows\system32\NvCpl.dll size: 13797992 MD5: 363FDE1796237C3D96DF9F61ED748EF1 Located: HK_LM:Run, OSD command: C:\Program Files\OEM\OSD_1.16\osd.exe file: C:\Program Files\OEM\OSD_1.16\osd.exe size: 376832 MD5: D22A7C0E5BE388E76C8B5DD5C392C18C Located: HK_LM:Run, QuickTime Task command: "C:\Program Files\QuickTime\QTTask.exe" -atboottime file: C:\Program Files\QuickTime\QTTask.exe size: 421888 MD5: 0AEE5668EB59912F32FF245BFA72465F Located: HK_LM:Run, RtHDVCpl command: C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe -s file: C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe size: 9742952 MD5: 9048E39550CD6599F98673B4437D0E4C Located: HK_LM:Run, SunJavaUpdateSched command: "C:\Program Files\Common Files\Java\Java Update\jusched.exe" file: C:\Program Files\Common Files\Java\Java Update\jusched.exe size: 248552 MD5: 93DB1FF92B03D24738A71E6E4992DFD3 Located: HK_LM:Run, TkBellExe command: "C:\Program Files\RealMedia\Update_OB\realsched.exe" -osboot file: C:\Program Files\RealMedia\Update_OB\realsched.exe size: 0 MD5: D41D8CD98F00B204E9800998ECF8427E Warning: if the file is actually larger than 0 bytes, the checksum could not be properly calculated! Located: HK_LM:Run, Windows Mobile Device Center command: %windir%\WindowsMobile\wmdc.exe file: C:\Windows\WindowsMobile\wmdc.exe size: 648072 MD5: 96B3C4E20F02CA16AA1E3E425BFFCC8B Located: HK_CU:Run, Sidebar where: S-1-5-19... command: %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun file: C:\Program Files\Windows Sidebar\Sidebar.exe size: 1173504 MD5: EA6EADF6314E43783BA8EEE79F93F73C Located: HK_CU:RunOnce, mctadmin where: S-1-5-19... command: C:\Windows\System32\mctadmin.exe file: C:\Windows\System32\mctadmin.exe size: 93696 MD5: BBA1A5B86134F496B926DDAF247DB871 Located: HK_CU:Run, Sidebar where: S-1-5-20... command: %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun file: C:\Program Files\Windows Sidebar\Sidebar.exe size: 1173504 MD5: EA6EADF6314E43783BA8EEE79F93F73C Located: HK_CU:RunOnce, mctadmin where: S-1-5-20... command: C:\Windows\System32\mctadmin.exe file: C:\Windows\System32\mctadmin.exe size: 93696 MD5: BBA1A5B86134F496B926DDAF247DB871 Located: HK_CU:Run, Appigo Sync where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: C:\Program Files\Appigo Sync\Appigo Sync.exe file: C:\Program Files\Appigo Sync\Appigo Sync.exe size: 229376 MD5: 86CD8780E31386CA1D46F48440D3A3BF Located: HK_CU:Run, DAEMON Tools Lite where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: "C:\Program Files\DAEMON Tools Lite\DTLite.exe" -autorun file: C:\Program Files\DAEMON Tools Lite\DTLite.exe size: 357696 MD5: F34E7705751BB413283434697BF8E55D Located: HK_CU:Run, gStart where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: C:\Program Files\Garmin\gStart.exe file: C:\Program Files\Garmin\gStart.exe size: 1891416 MD5: 4B4F81C294B9A07479F4F4F8FF20E58C Located: HK_CU:Run, SpybotSD TeaTimer where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe file: C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe size: 2260480 MD5: 390679F7A217A5E73D756276C40AE887 Located: HK_CU:Run, SUPERAntiSpyware where: S-1-5-21-1493101012-1834472469-1317637537-1000... command: C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe file: C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe size: 2424560 MD5: 7B9E9A8C71C77DD03CF97FA7C996C3C9 Located: Startup (allgemein), Logitech SetPoint.lnk where: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup... command: C:\Program Files\Logitech\SetPoint\SetPoint.exe file: C:\Program Files\Logitech\SetPoint\SetPoint.exe size: 813584 MD5: B624202660474516E73AA95238FD9843 Located: Startup (Benutzer), Adobe Gamma.lnk where: C:\Users\Peter Klein\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup... command: C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe file: C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe size: 113664 MD5: C2FF17734176CD15221C10044EF0BA1A Located: Startup (Benutzer), Hardcopy.LNK where: C:\Users\Peter Klein\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup... command: C:\Program Files\Hardcopy\hardcopy.exe file: C:\Program Files\Hardcopy\hardcopy.exe size: 1725440 MD5: 8E3217F553022AA10F77119A88A179AD Located: Startup (Benutzer), Mediencenter Software.lnk where: C:\Users\Peter Klein\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup... command: C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe file: C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe size: 1991824 MD5: 8A0A6722AC6C3FC594500C1B4B494980 Located: WinLogon, LBTWlgn command: c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll file: c:\program files\common files\logishrd\bluetooth\LBTWlgn.dll size: 72208 MD5: A589D4BD91C15A0112E2F5DEF235DD67 --- Browser helper object list --- {18DF081C-E8AD-4283-A596-FA578C2EBDC3} (AcroIEHelperStub) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: AcroIEHelperStub CLSID name: Adobe PDF Link Helper Path: C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\ Long name: AcroIEHelperShim.dll Short name: ACROIE~2.DLL Date (created): 22.09.2010 17:04:14 Date (last access): 10.10.2010 18:28:42 Date (last write): 22.09.2010 17:04:14 Filesize: 75200 Attributes: archive MD5: 203A74767EB81F96A5166B1933DB46D0 CRC32: B0D671C9 Version: 9.4.0.195 {3049C3E9-B461-4BC5-8870-4C09146192CA} (RealPlayer Download and Record Plugin for Internet Explorer) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: RealPlayer Download and Record Plugin for Internet Explorer Path: C:\Program Files\Real\RealPlayer\ Long name: rpbrowserrecordplugin.dll Short name: RPBROW~1.DLL Date (created): 13.10.2009 07:02:20 Date (last access): 13.10.2009 07:02:20 Date (last write): 13.10.2009 07:02:20 Filesize: 329312 Attributes: archive MD5: 98EA10E878D73C261E0C6316A3A48658 CRC32: 6CE96CBB Version: 1.0.1.514 {30F9B915-B755-4826-820B-08FBA6BD249D} (Conduit Engine) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: Conduit Engine Path: C:\Program Files\ConduitEngine\ Long name: ConduitEngine.dll Short name: CONDUI~1.DLL Date (created): 17.12.2010 15:35:46 Date (last access): 17.12.2010 15:35:46 Date (last write): 09.12.2010 12:51:30 Filesize: 3911776 Attributes: archive MD5: D9A0CE26ADA5BD15B1B03A752DDF14A6 CRC32: 720A331A Version: 6.2.7.3 {326E768D-4182-46FD-9C16-1449A49795F4} (Increase performance and video formats for your HTML5 <video>) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: Increase performance and video formats for your HTML5 <video> CLSID name: DivX Plus Web Player HTML5 <video> Path: C:\Program Files\DivX\DivX Plus Web Player\ Long name: npdivx32.dll Short name: Date (created): 08.12.2010 22:15:44 Date (last access): 14.01.2011 07:47:36 Date (last write): 08.12.2010 22:15:44 Filesize: 3123072 Attributes: archive MD5: ABB7A668B5D11BFF77DD00CC2B6C8DB0 CRC32: E10E3B63 Version: 2.1.0.900 {53707962-6F74-2D53-2644-206D7942484F} (Spybot-S&D IE Protection) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: Spybot-S&D IE Protection description: Spybot-S&D IE Browser plugin classification: Legitimate known filename: SDhelper.dll info link: hxxp://spybot.eon.net.au/ info source: Patrick M. Kolla Path: C:\PROGRA~1\SPYBOT~1\ Long name: SDHelper.dll Short name: Date (created): 01.02.2011 12:06:00 Date (last access): 01.02.2011 12:06:00 Date (last write): 26.01.2009 15:31:02 Filesize: 1879896 Attributes: archive MD5: 022C2F6DCCDFA0AD73024D254E62AFAC CRC32: 5BA24007 Version: 1.6.2.14 {593DDEC6-7468-4cdd-90E1-42DADAA222E9} (Use the DivX Plus Web Player to watch web videos with less interruptions and smoother playback on supported sites) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: Use the DivX Plus Web Player to watch web videos with less interruptions and smoother playback on supported sites CLSID name: DivX HiQ Path: C:\Program Files\DivX\DivX Plus Web Player\ Long name: npdivx32.dll Short name: Date (created): 08.12.2010 22:15:44 Date (last access): 14.01.2011 07:47:36 Date (last write): 08.12.2010 22:15:44 Filesize: 3123072 Attributes: archive MD5: ABB7A668B5D11BFF77DD00CC2B6C8DB0 CRC32: E10E3B63 Version: 2.1.0.900 {5FF49FE8-B332-4CB9-B102-FB6951629E55} (Virtual Storage Mount Notification) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: Virtual Storage Mount Notification CLSID name: Virtual Storage Mount Notification Path: C:\Windows\system32\ Long name: CbFsMntNtf3.dll Short name: CBFSMN~1.DLL Date (created): 16.12.2010 13:16:58 Date (last access): 16.12.2010 13:16:58 Date (last write): 15.05.2010 15:55:14 Filesize: 155416 Attributes: archive MD5: D20AC5698D403DAF46DD88ED780E676D CRC32: C672A0E6 Version: 3.0.77.30 {72853161-30C5-4D22-B7F9-0BBC1D38A37E} (Groove GFS Browser Helper) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: Groove GFS Browser Helper Path: C:\Program Files\Microsoft Office\Office12\ Long name: GrooveShellExtensions.dll Short name: GR469A~1.DLL Date (created): 12.02.2009 14:19:32 Date (last access): 22.10.2009 06:54:20 Date (last write): 12.02.2009 14:19:32 Filesize: 2217848 Attributes: archive MD5: A6B5A41C0ED007AB6C43CAD899E533D8 CRC32: BA078F79 Version: 12.0.6421.1000 {DBC80044-A445-435b-BC74-9C25C1C588A9} (Java(tm) Plug-In 2 SSV Helper) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: Java(tm) Plug-In 2 SSV Helper Path: C:\Program Files\Java\jre6\bin\ Long name: jp2ssv.dll Short name: Date (created): 15.09.2010 06:20:48 Date (last access): 04.11.2010 08:55:14 Date (last write): 15.09.2010 06:20:48 Filesize: 41760 Attributes: archive MD5: 3F59EDE1444C14CFBAA15C7EBBFE6196 CRC32: 847C94E6 Version: 6.0.220.4 {f4e6547e-325b-403c-a3bb-ad29ed37a92f} (SearchElf 1.2 Toolbar) location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ BHO name: CLSID name: SearchElf 1.2 Toolbar Path: C:\Program Files\SearchElf_1.2\ Long name: tbSear.dll Short name: Date (created): 17.12.2010 15:35:42 Date (last access): 17.12.2010 15:35:42 Date (last write): 09.12.2010 12:51:30 Filesize: 3911776 Attributes: archive MD5: D9A0CE26ADA5BD15B1B03A752DDF14A6 CRC32: 720A331A Version: 6.2.7.3 --- ActiveX list --- {8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0) DPF name: Java Runtime Environment 1.6.0 CLSID name: Java Plug-in 1.6.0_22 Installer: Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab description: Sun Java classification: Legitimate known filename: %PROGRAM FILES%\JabaSoft\JRE\*\Bin\npjava131.dll info link: info source: Patrick M. Kolla Path: C:\Program Files\Java\jre6\bin\ Long name: jp2iexp.dll Short name: Date (created): 09.11.2009 19:15:04 Date (last access): 15.09.2074 04:52:30 Date (last write): 15.09.2010 04:50:40 Filesize: 108320 Attributes: archive MD5: 6A25F175BC9D7709ABEA66086489121D CRC32: 3BFA8F9A Version: 6.0.220.4 {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0) DPF name: Java Runtime Environment 1.6.0 CLSID name: Java Plug-in 1.6.0_22 Installer: Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab Path: C:\Program Files\Java\jre6\bin\ Long name: jp2iexp.dll Short name: Date (created): 09.11.2009 19:15:04 Date (last access): 15.09.2074 04:52:30 Date (last write): 15.09.2010 04:50:40 Filesize: 108320 Attributes: archive MD5: 6A25F175BC9D7709ABEA66086489121D CRC32: 3BFA8F9A Version: 6.0.220.4 {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0) DPF name: Java Runtime Environment 1.6.0 CLSID name: Java Plug-in 1.6.0_22 Installer: Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_22-windows-i586.cab description: classification: Legitimate known filename: npjpi150_06.dll info link: info source: Safer Networking Ltd. Path: C:\Program Files\Java\jre6\bin\ Long name: npjpi160_22.dll Short name: NPJPI1~1.DLL Date (created): 15.09.2010 02:29:52 Date (last access): 15.09.2074 04:52:42 Date (last write): 15.09.2010 04:50:46 Filesize: 141088 Attributes: archive MD5: AFB7EFCDE5277F6514EF0E9FF8D8D862 CRC32: 2A43B8CC Version: 6.0.220.4 {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) DPF name: CLSID name: Shockwave Flash Object Installer: C:\Windows\Downloaded Program Files\CONFLICT.1\swflash.inf Codebase: hxxp://fpdownload2.macromedia.com/pub/shockwave/cabs/flash/swflash.cab description: Macromedia Shockwave Flash Player classification: Legitimate known filename: info link: info source: Patrick M. Kolla Path: C:\Windows\system32\Macromed\Flash\ Long name: Flash10k.ocx Short name: Date (created): 26.10.2010 09:08:48 Date (last access): 26.10.2010 09:08:48 Date (last write): 26.10.2010 09:08:48 Filesize: 6069712 Attributes: readonly archive MD5: C9848467EAEC8EB4A9FE224CBCAC26C0 CRC32: 4BC4A0C2 Version: 10.1.85.3 --- Process list --- PID: 4040 ( 492) C:\Windows\system32\taskhost.exe size: 49152 MD5: 8F4F5A5C1BAE72CE6EAEEA1CA3F98CA2 PID: 2196 ( 952) C:\Windows\system32\Dwm.exe size: 92672 MD5: 505BF4D1CADEB8D4F8BCD08D944DE25D PID: 2220 (4084) C:\Windows\Explorer.EXE size: 2614272 MD5: 2626FC9755BE22F805D3CFA0CE3EE727 PID: 1168 (2220) C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe size: 31072 MD5: 644795F6985C740F5E36E9336B837D0B PID: 624 (2220) C:\Program Files\OEM\OSD_1.16\osd.exe size: 376832 MD5: D22A7C0E5BE388E76C8B5DD5C392C18C PID: 1536 (2220) C:\Windows\WindowsMobile\wmdc.exe size: 648072 MD5: 96B3C4E20F02CA16AA1E3E425BFFCC8B PID: 1320 (2220) C:\Program Files\Alwil Software\Avast4\ashDisp.exe size: 81000 MD5: 0A7E9FDF3BF1980CA09FEEAC7F52EFBC PID: 1812 (2220) C:\Program Files\Common Files\Java\Java Update\jusched.exe size: 248552 MD5: 93DB1FF92B03D24738A71E6E4992DFD3 PID: 2508 (2220) C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe size: 9742952 MD5: 9048E39550CD6599F98673B4437D0E4C PID: 1212 (2220) C:\Program Files\DivX\DivX Update\DivXUpdate.exe size: 1226608 MD5: A58E05767687E1E636D160ECEA9BC8ED PID: 1900 (2220) C:\Program Files\DivX\DivX Plus Web Player\DDMService.exe size: 63360 MD5: 57D8C4ED26DFD7EF0E2CB196FB8BFB54 PID: 2896 (2220) C:\Program Files\iTunes\iTunesHelper.exe size: 421160 MD5: F3DEAA1F2FCF70FAF6DE3757CA343FA5 PID: 2920 (2220) C:\Program Files\Garmin\gStart.exe size: 1891416 MD5: 4B4F81C294B9A07479F4F4F8FF20E58C PID: 2980 (2220) C:\Program Files\DAEMON Tools Lite\DTLite.exe size: 357696 MD5: F34E7705751BB413283434697BF8E55D PID: 1960 (2220) C:\Program Files\Appigo Sync\Appigo Sync.exe size: 229376 MD5: 86CD8780E31386CA1D46F48440D3A3BF PID: 2824 (2220) C:\Program Files\Spybot - Search & Destroy\TeaTimer.exe size: 2260480 MD5: 390679F7A217A5E73D756276C40AE887 PID: 3256 (2220) C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe size: 2424560 MD5: 7B9E9A8C71C77DD03CF97FA7C996C3C9 PID: 3280 (2220) C:\Program Files\Logitech\SetPoint\SetPoint.exe size: 813584 MD5: B624202660474516E73AA95238FD9843 PID: 1836 (2220) C:\Program Files\Hardcopy\hardcopy.exe size: 1725440 MD5: 8E3217F553022AA10F77119A88A179AD PID: 328 (2220) C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe size: 1991824 MD5: 8A0A6722AC6C3FC594500C1B4B494980 PID: 3300 (3280) C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.EXE size: 55824 MD5: 510581C7BB91650ECECDA3B38CF8E91E PID: 1384 (3296) C:\Users\Peter Klein\AppData\Local\Apps\2.0\7YTMLKWX.BA0\BLGRCKB8.CGO\woot..tion_5e08585fa4ad14cc_0001.0003_aac5573fca9fb601\Wootch.exe size: 1196544 MD5: 806FDA1CC2C609649C810D9DB036734E PID: 4344 ( 680) C:\Windows\System32\mobsync.exe size: 101376 MD5: B4CA51F87E301789E2C7F746EB396AA4 PID: 5416 (2220) C:\Program Files\Microsoft Office\Office12\OUTLOOK.EXE size: 12995952 MD5: 2A8AEFDE5BED57D232ECF9482336E139 PID: 3100 (2220) C:\Program Files\Mozilla Firefox\firefox.exe size: 912344 MD5: 0E20A3213ED010FC4997D1EF48082ABC PID: 5924 (2220) C:\Program Files\Rosetta Stone\Rosetta Stone Version 3\RosettaStoneVersion3.exe size: 7573547 MD5: 0BD3570F815AFD4513B1C1749BD72C5A PID: 1232 (3100) C:\Program Files\Mozilla Firefox\plugin-container.exe size: 16856 MD5: BA9A09CF1B9503C363617F3748F6D791 PID: 4324 (5924) C:\Program Files\Rosetta Stone\Rosetta Stone Version 3\support\bin\win\RosettaStoneLtdServices.exe size: 547096 MD5: B2F98F5E3916FFF661C552A9B141423D PID: 6048 ( 452) C:\Windows\system32\conhost.exe size: 271360 MD5: 29D9FCDF65B7C823688A035937BB6697 PID: 3616 (2220) C:\Program Files\Spybot - Search & Destroy\SpybotSD.exe size: 5365592 MD5: 0477C2F9171599CA5BC3307FDFBA8D89 PID: 0 ( 0) [System Process] PID: 4 ( 0) System PID: 244 ( 4) smss.exe size: 69632 PID: 380 ( 372) csrss.exe size: 6144 PID: 440 ( 372) wininit.exe size: 96256 PID: 452 ( 432) csrss.exe size: 6144 PID: 492 ( 440) services.exe size: 259072 PID: 508 ( 440) lsass.exe size: 22528 PID: 516 ( 440) lsm.exe size: 261120 PID: 612 ( 432) winlogon.exe size: 285696 PID: 680 ( 492) svchost.exe size: 20992 PID: 760 ( 492) nvvsvc.exe size: 211560 PID: 800 ( 492) svchost.exe size: 20992 PID: 864 ( 492) svchost.exe size: 20992 PID: 952 ( 492) svchost.exe size: 20992 PID: 980 ( 492) svchost.exe size: 20992 PID: 1132 ( 492) svchost.exe size: 20992 PID: 1204 ( 760) nvvsvc.exe size: 211560 PID: 1368 ( 492) svchost.exe size: 20992 PID: 1440 ( 492) aswUpdSv.exe PID: 1460 ( 492) ashServ.exe PID: 1716 ( 492) spoolsv.exe size: 316928 PID: 1732 ( 980) taskeng.exe size: 192000 PID: 1764 ( 492) svchost.exe size: 20992 PID: 1916 (1732) rundll32.exe size: 44544 PID: 1924 ( 492) AppleMobileDeviceService.exe PID: 1984 ( 492) mDNSResponder.exe PID: 2016 ( 492) bratimer.exe PID: 112 ( 492) cvpnd.exe PID: 356 ( 492) WebDAV.AdminService.exe PID: 696 ( 492) mdm.exe PID: 1060 ( 492) NBService.exe PID: 1356 ( 492) SupServ.exe PID: 1332 ( 492) OsdService.exe PID: 1888 ( 492) vlc.exe PID: 2176 ( 492) ashWebSv.exe PID: 2244 ( 492) ashMaiSv.exe PID: 2528 ( 492) svchost.exe size: 20992 PID: 3168 ( 492) svchost.exe size: 20992 PID: 3352 ( 492) svchost.exe size: 20992 PID: 3564 ( 492) SearchIndexer.exe size: 428032 PID: 3104 ( 492) iPodService.exe PID: 972 ( 492) wmpnetwk.exe PID: 920 ( 492) FNPLicensingService.exe PID: 1092 ( 864) audiodg.exe size: 100864 --- Browser start & search pages list --- Spybot - Search & Destroy browser pages report, 08.02.2011 11:07:38 HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Local Page C:\Windows\system32\blank.htm HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page hxxp://www.google.com HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Bar hxxp://www.google.com/ie HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page hxxp://go.microsoft.com/fwlink/?LinkId=69157 HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Default_Search_URL hxxp://www.google.com/ie HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Search\SearchAssistant hxxp://www.google.com/ie HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchUrl\@ hxxp://www.google.com/search?q=%s HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page C:\Windows\System32\blank.htm HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page hxxp://go.microsoft.com/fwlink/?LinkId=54896 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page hxxp://go.microsoft.com/fwlink/?LinkId=69157 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL hxxp://go.microsoft.com/fwlink/?LinkId=69157 HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL hxxp://go.microsoft.com/fwlink/?LinkId=54896 --- Winsock Layered Service Provider list --- Protocol 0: MSAFD-Tcpip [TCP/IP] GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IP protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 1: MSAFD-Tcpip [UDP/IP] GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IP protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 2: MSAFD-Tcpip [RAW/IP] GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IP protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 3: MSAFD-Tcpip [TCP/IPv6] GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IPv6 protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 4: MSAFD-Tcpip [UDP/IPv6] GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IPv6 protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 5: MSAFD-Tcpip [RAW/IPv6] GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP IPv6 protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD Tcpip[*] Protocol 6: RSVP-TCPv6-Dienstanbieter GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP RVSP DB filename: %SystemRoot%\system32\rsvpsp.dll DB protocol: RSVP * Service Provider Protocol 7: RSVP-TCP-Dienstanbieter GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP RVSP DB filename: %SystemRoot%\system32\rsvpsp.dll DB protocol: RSVP * Service Provider Protocol 8: RSVP-UDPv6-Dienstanbieter GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP RVSP DB filename: %SystemRoot%\system32\rsvpsp.dll DB protocol: RSVP * Service Provider Protocol 9: RSVP-UDP-Dienstanbieter GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP RVSP DB filename: %SystemRoot%\system32\rsvpsp.dll DB protocol: RSVP * Service Provider Protocol 10: MSAFD NetBIOS [\Device\NetBT_Tcpip_{52CD94DA-E776-4973-87D5-AA9C92405E25}] SEQPACKET 14 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 11: MSAFD NetBIOS [\Device\NetBT_Tcpip_{52CD94DA-E776-4973-87D5-AA9C92405E25}] DATAGRAM 14 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 12: MSAFD NetBIOS [\Device\NetBT_Tcpip_{5EB4F2E8-A8FA-4F80-9E7A-8B0447E03D81}] SEQPACKET 12 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 13: MSAFD NetBIOS [\Device\NetBT_Tcpip_{5EB4F2E8-A8FA-4F80-9E7A-8B0447E03D81}] DATAGRAM 12 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 14: MSAFD NetBIOS [\Device\NetBT_Tcpip_{748E9E2B-8E48-4446-A95A-857F7D7B1E95}] SEQPACKET 11 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 15: MSAFD NetBIOS [\Device\NetBT_Tcpip_{748E9E2B-8E48-4446-A95A-857F7D7B1E95}] DATAGRAM 11 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 16: MSAFD NetBIOS [\Device\NetBT_Tcpip_{CB07EF28-CFBF-400C-930B-F083FF918B51}] SEQPACKET 8 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 17: MSAFD NetBIOS [\Device\NetBT_Tcpip_{CB07EF28-CFBF-400C-930B-F083FF918B51}] DATAGRAM 8 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 18: MSAFD NetBIOS [\Device\NetBT_Tcpip_{68E248A7-3194-4CF3-AC55-28A002B8C082}] SEQPACKET 9 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 19: MSAFD NetBIOS [\Device\NetBT_Tcpip_{68E248A7-3194-4CF3-AC55-28A002B8C082}] DATAGRAM 9 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 20: MSAFD NetBIOS [\Device\NetBT_Tcpip_{7B27C6A4-D4F3-4B1C-BC64-9C051A522385}] SEQPACKET 7 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 21: MSAFD NetBIOS [\Device\NetBT_Tcpip_{7B27C6A4-D4F3-4B1C-BC64-9C051A522385}] DATAGRAM 7 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 22: MSAFD NetBIOS [\Device\NetBT_Tcpip_{C6EF4E26-4E8C-4458-A58F-9D4550590474}] SEQPACKET 0 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 23: MSAFD NetBIOS [\Device\NetBT_Tcpip_{C6EF4E26-4E8C-4458-A58F-9D4550590474}] DATAGRAM 0 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 24: MSAFD NetBIOS [\Device\NetBT_Tcpip_{715D35D4-431A-4E55-BFE1-0016708772D9}] SEQPACKET 1 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 25: MSAFD NetBIOS [\Device\NetBT_Tcpip_{715D35D4-431A-4E55-BFE1-0016708772D9}] DATAGRAM 1 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 26: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{5FF98B76-6426-4363-8BE8-3016C34EA86D}] SEQPACKET 5 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 27: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{5FF98B76-6426-4363-8BE8-3016C34EA86D}] DATAGRAM 5 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 28: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{CBFCD7B9-F21E-4383-8D61-E6CCF3186141}] SEQPACKET 4 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 29: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{CBFCD7B9-F21E-4383-8D61-E6CCF3186141}] DATAGRAM 4 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 30: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{AECA621E-E16A-4802-AC36-1DEAE57DAB6B}] SEQPACKET 6 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 31: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{AECA621E-E16A-4802-AC36-1DEAE57DAB6B}] DATAGRAM 6 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 32: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{52CD94DA-E776-4973-87D5-AA9C92405E25}] SEQPACKET 15 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 33: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{52CD94DA-E776-4973-87D5-AA9C92405E25}] DATAGRAM 15 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 34: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{5EB4F2E8-A8FA-4F80-9E7A-8B0447E03D81}] SEQPACKET 13 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 35: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{5EB4F2E8-A8FA-4F80-9E7A-8B0447E03D81}] DATAGRAM 13 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 36: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{68E248A7-3194-4CF3-AC55-28A002B8C082}] SEQPACKET 10 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 37: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{68E248A7-3194-4CF3-AC55-28A002B8C082}] DATAGRAM 10 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 38: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{C6EF4E26-4E8C-4458-A58F-9D4550590474}] SEQPACKET 3 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 39: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{C6EF4E26-4E8C-4458-A58F-9D4550590474}] DATAGRAM 3 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 40: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{715D35D4-431A-4E55-BFE1-0016708772D9}] SEQPACKET 2 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Protocol 41: MSAFD NetBIOS [\Device\NetBT_Tcpip6_{715D35D4-431A-4E55-BFE1-0016708772D9}] DATAGRAM 2 GUID: {8D5F1830-C273-11CF-95C8-00805F48A192} Filename: %SystemRoot%\system32\mswsock.dll Description: Microsoft Windows NT/2k/XP NetBios protocol DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: MSAFD NetBIOS * Namespace Provider 0: NLA (Network Location Awareness, NLAv1)-Namespace GUID: {6642243A-3BA8-4AA6-BAA5-2E0BD71FDD83} Filename: Description: Microsoft Windows NT/2k/XP name space provider DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: NLA-Namespace Namespace Provider 1: TCP/IP GUID: {22059D40-7E9E-11CF-AE5A-00AA00A7112B} Filename: Description: Microsoft Windows NT/2k/XP TCP/IP name space provider DB filename: %SystemRoot%\system32\mswsock.dll DB protocol: TCP/IP Namespace Provider 2: NTDS GUID: {3B2637EE-E580-11CF-A555-00C04FD8D4AC} Filename: %SystemRoot%\System32\winrnr.dll Description: Microsoft Windows NT/2k/XP name space provider DB filename: %SystemRoot%\system32\winrnr.dll DB protocol: NTDS Namespace Provider 3: E-Mail-Namenshimanbieter GUID: {964ACBA2-B2BC-40EB-8C6A-A6DB40161CAE} Filename: Namespace Provider 4: PNRP-Wolken-Namespaceanbieter GUID: {03FE89CE-766D-4976-B9C1-BB9BC42C7B4D} Filename: Namespace Provider 5: PNRP-Namen-Namespaceanbieter GUID: {03FE89CD-766D-4976-B9C1-BB9BC42C7B4D} Filename: Namespace Provider 6: mdnsNSP GUID: {B600E6E9-553B-4A19-8696-335E5C896153} Filename: C:\Program Files\Bonjour\mdnsNSP.dll Description: Apple Rendezvous protocol DB filename: %ProgramFiles%\Rendezvous\bin\mdnsNSP.dll DB protocol: mdnsNSP |
Logs von AdAware finde ich keine! Vielleicht reicht ja schon das Log von Spybot. Besten Dank im Voraus! |
Bitte routinemäßig einen Vollscan mit malwarebytes machen und Log posten. Denk daran, dass Malwarebytes vor jedem Scan manuell aktualisiert werden muss! Falls Logs aus älteren Scans mit Malwarebytes vorhanden sind, bitte auch davon alle posten! Danach OTL: Systemscan mit OTL Lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop
|
OK, hier ein MalwareBytes-Log von heute: Malwarebytes' Anti-Malware 1.50.1.1100 www.malwarebytes.org Datenbank Version: 5709 Windows 6.1.7600 Internet Explorer 8.0.7600.16385 08.02.2011 16:32:30 mbam-log-2011-02-08 (16-32-30).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|T:\|) Durchsuchte Objekte: 343994 Laufzeit: 2 Stunde(n), 5 Minute(n), 4 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 0 Infizierte Registrierungswerte: 0 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 0 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: (Keine bösartigen Objekte gefunden) hier das Log vom ersten Malwarebytes den ich gemacht habe am 28.01.11 Malwarebytes' Anti-Malware 1.50.1.1100 www.malwarebytes.org Datenbank Version: 5629 Windows 6.1.7600 Internet Explorer 8.0.7600.16385 28.01.2011 13:29:20 mbam-log-2011-01-28 (13-29-20).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|T:\|) Durchsuchte Objekte: 372726 Laufzeit: 2 Stunde(n), 53 Minute(n), 18 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 5 Infizierte Registrierungswerte: 1 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 3 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: HKEY_CURRENT_USER\SOFTWARE\CL2GFOKBC9 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\JP595IR86O (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\NtWqIVLZEWZU (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\XML (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\ (Hijack.Zones) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JP595IR86O (Trojan.FakeAlert) -> Value: JP595IR86O -> Quarantined and deleted successfully. Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: c:\Windows\System32\secushr.dat (Malware.Trace) -> Quarantined and deleted successfully. c:\Windows\Tasks\{22116563-108c-42c0-a7ce-60161b75e508}.job (Trojan.Downloader) -> Quarantined and deleted successfully. c:\Windows\Tasks\{62c40aa6-4406-467a-a5a5-dfdf1b559b7a}.job (Trojan.FakeAlert) -> Quarantined and deleted successfully. |
und nun die Logs von OTL: OTL EXTRAS Logfile: Code: OTL Extras logfile created on: 08.02.2011 18:42:48 - Run 2 |
OTL Logfile: Code: OTL logfile created on: 08.02.2011 18:42:47 - Run 2 |
Beende alle Programme, starte OTL und kopiere folgenden Text in die "Custom Scan/Fixes" Box (unten in OTL): (das ":OTL" muss mitkopiert werden!!!) Code: :OTL Das Logfile müsste geöffnet werden, wenn Du nach dem Fixen auf ok klickst, poste das bitte. Evtl. wird der Rechner neu gestartet. |
Besten Dank - habs gemacht! Rechner wurde neugestartet: hier das Log: All processes killed ========== OTL ========== HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! C:\autoexec.bat moved successfully. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{3e0f55d1-de86-11df-ab84-00215d31c09a}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3e0f55d1-de86-11df-ab84-00215d31c09a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{3e0f55d1-de86-11df-ab84-00215d31c09a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3e0f55d1-de86-11df-ab84-00215d31c09a}\ not found. File C:\Windows\system32\RunDLL32.EXE Shell32.DLL,ShellExec_RunDLL G:\DT5000_Launcher.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fb60568c-c079-11de-983b-00215d31c09a}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{fb60568c-c079-11de-983b-00215d31c09a}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fb60568c-c079-11de-983b-00215d31c09a}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{fb60568c-c079-11de-983b-00215d31c09a}\ not found. File G:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fb60568f-c079-11de-983b-00030dbe21bb}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{fb60568f-c079-11de-983b-00030dbe21bb}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{fb60568f-c079-11de-983b-00030dbe21bb}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{fb60568f-c079-11de-983b-00030dbe21bb}\ not found. File G:\AutoRun.exe not found. C:\Windows\System32\1551694079 folder moved successfully. C:\Windows\cadkasdeinst01.exe moved successfully. C:\Windows\System32\sdiagengt.dll moved successfully. C:\Windows\Tasks\DGIBWI.job moved successfully. ========== COMMANDS ========== C:\Windows\System32\drivers\etc\Hosts moved successfully. HOSTS file reset successfully [EMPTYTEMP] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: Peter Klein ->Temp folder emptied: 12134697 bytes ->Temporary Internet Files folder emptied: 10458801852 bytes ->Java cache emptied: 51295250 bytes ->FireFox cache emptied: 115319417 bytes ->Google Chrome cache emptied: 8062940 bytes ->Flash cache emptied: 56032 bytes User: Public User: sync ->Temp folder emptied: 6516921 bytes ->Temporary Internet Files folder emptied: 3692978 bytes ->Java cache emptied: 2327324 bytes ->Flash cache emptied: 456 bytes %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 0 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 534582 bytes RecycleBin emptied: 330976 bytes Total Files Cleaned = 10.165,00 mb OTL by OldTimer - Version 3.2.20.6 log created on 02082011_202823 Files\Folders moved on Reboot... File move failed. C:\Windows\temp\_avast4_\Webshlock.txt scheduled to be moved on reboot. Registry entries deleted on Reboot... |
Dann bitte jetzt CF ausführen: ComboFix Ein Leitfaden und Tutorium zur Nutzung von ComboFix
http://saved.im/mtm0nzyzmzd5/cofi.jpg
Combofix darf ausschließlich ausgeführt werden, wenn ein Kompetenzler dies ausdrücklich empfohlen hat! |
Hab Combofix laufen lassen: Combofix Logfile: Code: ComboFix 11-02-08.02 - Peter Klein 08.02.2011 20:57:38.1.2 - x86 |
Sicherheitscenter läuft wieder !!! :applaus: Bleibt mir also eine Neuinstallation erspart! - Oder??? Besten Dank!!! wie kann man sich bedanken - Paypalspende? habe noch gemerkt, dass ich eben übersehen habe den Schritt "CCleaner Systembereinigung" übersprungen habe! soll ich das noch nachholen? Anschließend wieder Combofix ausführen? |
Ok. Bitte nun Logs mit GMER und OSAM erstellen und posten. GMER stürzt häufiger ab, wenn das Tool auch beim 2. Mal nicht will, lass es einfach weg und führ nur OSAM aus - die Online-Abfrage durch OSAM bitte überspringen. Bei OSAM bitte darauf auch achten, dass Du das Log auch als *.log und nicht *.html oder so abspeicherst. Downloade Dir danach bitte MBRCheck (by a_d_13) und speichere die Datei auf dem Desktop.
|
GMER: GMER Logfile: Code: GMER 1.0.15.15530 - hxxp://www.gmer.net |
OSAM: OSAM Logfile: Code: Report of OSAM: Autorun Manager v5.0.11926.0 If You have questions or want to get some help, You can visit Online Solutions :: Index |
MBRCheck: MBRCheck, version 1.2.3 (c) 2010, AD Command-line: Windows Version: Windows 7 Professional Windows Information: (build 7600), 32-bit Base Board Manufacturer: FUJITSU SIEMENS BIOS Manufacturer: Phoenix System Manufacturer: FUJITSU SIEMENS System Product Name: AMILO Pi 3540 Logical Drives Mask: 0x0008003c Kernel Drivers (total 167): 0x83019000 \SystemRoot\system32\ntkrnlpa.exe 0x83429000 \SystemRoot\system32\halmacpi.dll 0x80BB1000 \SystemRoot\system32\kdcom.dll 0x83629000 \SystemRoot\system32\mcupdate_GenuineIntel.dll 0x836A1000 \SystemRoot\system32\PSHED.dll 0x836B2000 \SystemRoot\system32\BOOTVID.dll 0x836BA000 \SystemRoot\system32\CLFS.SYS 0x836FC000 \SystemRoot\system32\CI.dll 0x8B407000 \SystemRoot\system32\drivers\Wdf01000.sys 0x8B478000 \SystemRoot\system32\drivers\WDFLDR.SYS 0x8B486000 \SystemRoot\System32\Drivers\spzr.sys 0x8B579000 \SystemRoot\System32\Drivers\WMILIB.SYS 0x8B582000 \SystemRoot\System32\Drivers\SCSIPORT.SYS 0x8B5A8000 \SystemRoot\system32\DRIVERS\ACPI.sys 0x8B5F0000 \SystemRoot\system32\DRIVERS\msisadrv.sys 0x837A7000 \SystemRoot\system32\DRIVERS\vdrvroot.sys 0x837B2000 \SystemRoot\system32\DRIVERS\pci.sys 0x837DC000 \SystemRoot\System32\drivers\partmgr.sys 0x8B5F8000 \SystemRoot\system32\DRIVERS\compbatt.sys 0x837ED000 \SystemRoot\system32\DRIVERS\BATTC.SYS 0x83600000 \SystemRoot\system32\DRIVERS\volmgr.sys 0x8B632000 \SystemRoot\System32\drivers\volmgrx.sys 0x8B67D000 \SystemRoot\System32\drivers\mountmgr.sys 0x8B693000 \SystemRoot\system32\DRIVERS\atapi.sys 0x8B69C000 \SystemRoot\system32\DRIVERS\ataport.SYS 0x8B6BF000 \SystemRoot\system32\DRIVERS\msahci.sys 0x8B6C9000 \SystemRoot\system32\DRIVERS\PCIIDEX.SYS 0x8B6D7000 \SystemRoot\system32\DRIVERS\amdxata.sys 0x8B6E0000 \SystemRoot\system32\drivers\fltmgr.sys 0x8B714000 \SystemRoot\system32\drivers\fileinfo.sys 0x8B725000 \SystemRoot\system32\DRIVERS\Lbd.sys 0x8B827000 \SystemRoot\System32\Drivers\Ntfs.sys 0x8B956000 \SystemRoot\System32\Drivers\msrpc.sys 0x8B981000 \SystemRoot\System32\Drivers\ksecdd.sys 0x8B994000 \SystemRoot\System32\Drivers\cng.sys 0x8B9F1000 \SystemRoot\System32\drivers\pcw.sys 0x8B800000 \SystemRoot\System32\Drivers\Fs_Rec.sys 0x8B734000 \SystemRoot\system32\drivers\ndis.sys 0x8BA05000 \SystemRoot\system32\drivers\NETIO.SYS 0x8BA43000 \SystemRoot\System32\Drivers\ksecpkg.sys 0x8BA68000 \SystemRoot\System32\drivers\tcpip.sys 0x8BBB1000 \SystemRoot\System32\drivers\fwpkclnt.sys 0x8BBE2000 \SystemRoot\system32\DRIVERS\vmstorfl.sys 0x8BC14000 \SystemRoot\system32\DRIVERS\volsnap.sys 0x8BC53000 \SystemRoot\System32\Drivers\spldr.sys 0x8BC5B000 \SystemRoot\System32\drivers\rdyboost.sys 0x8BC88000 \SystemRoot\System32\Drivers\mup.sys 0x8BC98000 \SystemRoot\System32\drivers\hwpolicy.sys 0x8BCA0000 \SystemRoot\System32\DRIVERS\fvevol.sys 0x8BCD2000 \SystemRoot\system32\DRIVERS\disk.sys 0x8BCE3000 \SystemRoot\system32\DRIVERS\CLASSPNP.SYS 0x8BD3B000 \SystemRoot\system32\DRIVERS\cdrom.sys 0x8BD5A000 \SystemRoot\System32\Drivers\Null.SYS 0x8BD61000 \SystemRoot\System32\Drivers\Beep.SYS 0x8BD68000 \SystemRoot\System32\drivers\vga.sys 0x8BD74000 \SystemRoot\System32\drivers\VIDEOPRT.SYS 0x8BD95000 \SystemRoot\System32\drivers\watchdog.sys 0x8BDA2000 \SystemRoot\System32\DRIVERS\RDPCDD.sys 0x8BDAA000 \SystemRoot\system32\drivers\rdpencdd.sys 0x8BDB2000 \SystemRoot\system32\drivers\rdprefmp.sys 0x8BDBA000 \SystemRoot\System32\Drivers\Msfs.SYS 0x8BDC5000 \SystemRoot\System32\Drivers\Npfs.SYS 0x8BDD3000 \SystemRoot\system32\DRIVERS\tdx.sys 0x8BDEA000 \SystemRoot\system32\DRIVERS\TDI.SYS 0x8BDF5000 \SystemRoot\System32\Drivers\aswTdi.SYS 0x90016000 \SystemRoot\system32\drivers\afd.sys 0x90070000 \SystemRoot\System32\Drivers\aswRdr.SYS 0x90074000 \SystemRoot\System32\DRIVERS\netbt.sys 0x900A6000 \SystemRoot\system32\DRIVERS\wfplwf.sys 0x900AD000 \SystemRoot\system32\DRIVERS\pacer.sys 0x900CC000 \SystemRoot\system32\DRIVERS\netbios.sys 0x900DA000 \SystemRoot\system32\DRIVERS\wanarp.sys 0x900ED000 \SystemRoot\system32\DRIVERS\termdd.sys 0x900FD000 \??\C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS 0x9011F000 \??\C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS 0x90125000 \SystemRoot\system32\DRIVERS\rdbss.sys 0x90166000 \SystemRoot\system32\drivers\nsiproxy.sys 0x90170000 \SystemRoot\system32\DRIVERS\mssmbios.sys 0x9017A000 \SystemRoot\System32\drivers\discache.sys 0x90186000 \SystemRoot\system32\drivers\csc.sys 0x8B809000 \SystemRoot\System32\Drivers\dfsc.sys 0x91219000 \??\C:\Windows\system32\drivers\cbfs3.sys 0x91258000 \SystemRoot\system32\DRIVERS\blbdrive.sys 0x91266000 \SystemRoot\System32\Drivers\aswSP.SYS 0x91287000 \SystemRoot\system32\DRIVERS\tunnel.sys 0x91C06000 \SystemRoot\system32\DRIVERS\nvlddmkm.sys 0x92565000 \SystemRoot\system32\DRIVERS\nvBridge.kmd 0x912A8000 \SystemRoot\System32\drivers\dxgkrnl.sys 0x92567000 \SystemRoot\System32\drivers\dxgmms1.sys 0x925A0000 \SystemRoot\system32\DRIVERS\usbuhci.sys 0x925AB000 \SystemRoot\system32\DRIVERS\USBPORT.SYS 0x9135F000 \SystemRoot\system32\DRIVERS\usbehci.sys 0x9136E000 \SystemRoot\system32\DRIVERS\HDAudBus.sys 0x92A2D000 \SystemRoot\system32\DRIVERS\NETw5x32.sys 0x92E30000 \SystemRoot\system32\DRIVERS\Rt86win7.sys 0x92E75000 \SystemRoot\system32\DRIVERS\i8042prt.sys 0x92E8D000 \SystemRoot\system32\DRIVERS\kbdclass.sys 0x92E9A000 \SystemRoot\system32\DRIVERS\mouclass.sys 0x92EA7000 \SystemRoot\system32\DRIVERS\GEARAspiWDM.sys 0x92EAD000 \SystemRoot\System32\Drivers\a6jzddee.SYS 0x92EE6000 \SystemRoot\system32\DRIVERS\CmBatt.sys 0x92EEA000 \SystemRoot\system32\DRIVERS\intelppm.sys 0x92EFC000 \SystemRoot\system32\DRIVERS\CompositeBus.sys 0x92F09000 \SystemRoot\system32\DRIVERS\dne2000.sys 0x92F27000 \SystemRoot\system32\DRIVERS\AgileVpn.sys 0x92F39000 \SystemRoot\system32\DRIVERS\rasl2tp.sys 0x92F51000 \SystemRoot\system32\DRIVERS\ndistapi.sys 0x92F5C000 \SystemRoot\system32\DRIVERS\ndiswan.sys 0x92F7E000 \SystemRoot\system32\DRIVERS\raspppoe.sys 0x92F96000 \SystemRoot\system32\DRIVERS\raspptp.sys 0x92FAD000 \SystemRoot\system32\DRIVERS\rassstp.sys 0x92FC4000 \SystemRoot\system32\DRIVERS\rdpbus.sys 0x92FCE000 \SystemRoot\system32\DRIVERS\swenum.sys 0x9138D000 \SystemRoot\system32\DRIVERS\ks.sys 0x92FD0000 \SystemRoot\system32\DRIVERS\umbus.sys 0x9302E000 \SystemRoot\system32\DRIVERS\usbhub.sys 0x93072000 \SystemRoot\System32\Drivers\NDProxy.SYS 0x93203000 \SystemRoot\system32\drivers\RTKVHDA.sys 0x93512000 \SystemRoot\system32\drivers\portcls.sys 0x93541000 \SystemRoot\system32\drivers\drmk.sys 0x9355A000 \SystemRoot\system32\DRIVERS\usbccgp.sys 0x93571000 \SystemRoot\system32\DRIVERS\USBD.SYS 0x93573000 \SystemRoot\system32\DRIVERS\hidusb.sys 0x9357E000 \SystemRoot\system32\DRIVERS\HIDCLASS.SYS 0x93591000 \SystemRoot\system32\DRIVERS\HIDPARSE.SYS 0x93598000 \SystemRoot\system32\DRIVERS\LHidFilt.Sys 0x935A0000 \SystemRoot\system32\DRIVERS\mouhid.sys 0x935AB000 \SystemRoot\system32\DRIVERS\LMouFilt.Sys 0x935B3000 \SystemRoot\System32\Drivers\crashdmp.sys 0x935C0000 \SystemRoot\System32\Drivers\dump_dumpata.sys 0x935CB000 \SystemRoot\System32\Drivers\dump_msahci.sys 0x935D5000 \SystemRoot\System32\Drivers\dump_dumpfve.sys 0x99320000 \SystemRoot\System32\win32k.sys 0x935E6000 \SystemRoot\System32\drivers\Dxapi.sys 0x99580000 \SystemRoot\System32\TSDDD.dll 0x995B0000 \SystemRoot\System32\cdd.dll 0x93083000 \SystemRoot\system32\drivers\luafv.sys 0x9309E000 \SystemRoot\system32\DRIVERS\aswMonFlt.sys 0x930B5000 \SystemRoot\system32\DRIVERS\aswFsBlk.sys 0x930BD000 \SystemRoot\system32\drivers\WudfPf.sys 0x930D7000 \SystemRoot\system32\DRIVERS\lltdio.sys 0x930E7000 \SystemRoot\system32\DRIVERS\nwifi.sys 0x9312D000 \SystemRoot\system32\DRIVERS\ndisuio.sys 0x9313D000 \SystemRoot\system32\DRIVERS\rspndr.sys 0x93150000 \SystemRoot\system32\drivers\HTTP.sys 0x931D5000 \SystemRoot\system32\DRIVERS\bowser.sys 0x931EE000 \SystemRoot\System32\drivers\mpsdrv.sys 0x93000000 \SystemRoot\system32\DRIVERS\mrxsmb.sys 0x913C1000 \SystemRoot\system32\DRIVERS\mrxsmb10.sys 0x92FDE000 \SystemRoot\system32\DRIVERS\mrxsmb20.sys 0xA2E0F000 \??\C:\Windows\system32\Drivers\CVPNDRVA.sys 0xA2E9F000 \SystemRoot\system32\drivers\peauth.sys 0xA2F36000 \SystemRoot\System32\Drivers\secdrv.SYS 0xA2F40000 \SystemRoot\System32\DRIVERS\srvnet.sys 0xA2F61000 \SystemRoot\System32\drivers\tcpipreg.sys 0xA2F6E000 \SystemRoot\System32\DRIVERS\srv2.sys 0xA0610000 \SystemRoot\System32\DRIVERS\srv.sys 0xA0661000 \??\C:\Windows\system32\directport.sys 0xA0669000 \??\C:\Windows\system32\kbfiltr.sys 0xA06E1000 \SystemRoot\system32\DRIVERS\asyncmac.sys 0xA06EA000 \??\C:\Windows\system32\Drivers\PROCEXP113.SYS 0xA071D000 \??\C:\Users\PATRIC~1\AppData\Local\Temp\afriqfoc.sys 0xA0735000 \SystemRoot\system32\DRIVERS\monitor.sys 0x773C0000 \Windows\System32\ntdll.dll 0x484C0000 \Windows\System32\smss.exe 0x77600000 \Windows\System32\apisetschema.dll 0x10000000 \Program Files\DAEMON Tools Lite\Engine.dll Processes (total 77): 0 System Idle Process 4 System 244 C:\Windows\System32\smss.exe 380 csrss.exe 440 C:\Windows\System32\wininit.exe 452 csrss.exe 492 C:\Windows\System32\services.exe 508 C:\Windows\System32\lsass.exe 516 C:\Windows\System32\lsm.exe 644 C:\Windows\System32\svchost.exe 720 C:\Windows\System32\nvvsvc.exe 760 C:\Windows\System32\svchost.exe 824 C:\Windows\System32\svchost.exe 856 C:\Windows\System32\svchost.exe 880 C:\Windows\System32\svchost.exe 1004 C:\Windows\System32\svchost.exe 1108 C:\Windows\System32\svchost.exe 1192 C:\Windows\System32\winlogon.exe 1292 C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe 1312 C:\Program Files\Alwil Software\Avast4\ashServ.exe 1444 C:\Windows\System32\nvvsvc.exe 1520 C:\Program Files\Lavasoft\Ad-Aware\AAWService.exe 1720 C:\Windows\System32\taskeng.exe 1728 C:\Windows\System32\spoolsv.exe 1768 C:\Windows\System32\svchost.exe 1812 C:\Windows\System32\rundll32.exe 1872 C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe 1896 C:\Program Files\Bonjour\mDNSResponder.exe 1924 C:\Program Files\Brother\BRAdmin Professional 3\bratimer.exe 1956 C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe 2004 C:\Program Files\Telekom\Mediencenter\WebDAV.AdminService.exe 328 C:\Program Files\Common Files\microsoft shared\VS7DEBUG\mdm.exe 388 C:\Program Files\Common Files\Nero\Nero BackItUp 4\NBService.exe 876 C:\Program Files\Sony Ericsson\Sony Ericsson PC Suite\SupServ.exe 1140 C:\Program Files\OEM\OSD_1.16\OsdService.exe 1952 C:\Windows\System32\svchost.exe 1380 C:\Program Files\VideoLAN\VLC_072\vlc.exe 2072 C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe 2324 unsecapp.exe 2404 WmiPrvSE.exe 2896 C:\Windows\System32\svchost.exe 2940 C:\Windows\System32\taskhost.exe 3004 C:\Windows\System32\dwm.exe 3212 C:\Windows\System32\svchost.exe 4012 C:\Program Files\Microsoft Office\Office12\GrooveMonitor.exe 3136 C:\Windows\WindowsMobile\wmdc.exe 2596 C:\Program Files\Alwil Software\Avast4\ashDisp.exe 3084 C:\Windows\System32\svchost.exe 3556 C:\Program Files\Common Files\Java\Java Update\jusched.exe 2772 C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe 3144 C:\Windows\System32\SearchIndexer.exe 3540 C:\Program Files\DivX\DivX Update\DivXUpdate.exe 3484 C:\Program Files\DivX\DivX Plus Web Player\DDMService.exe 3764 C:\Program Files\iTunes\iTunesHelper.exe 3780 C:\Program Files\Garmin\gStart.exe 3808 C:\Program Files\DAEMON Tools Lite\DTLite.exe 3800 C:\Program Files\Appigo Sync\Appigo Sync.exe 3364 C:\Program Files\Logitech\SetPoint\SetPoint.exe 3316 C:\Program Files\Hardcopy\hardcopy.exe 1472 C:\Program Files\Telekom\Mediencenter\MediencenterSoftware.exe 672 C:\Program Files\Windows Media Player\wmpnetwk.exe 3868 C:\Program Files\Common Files\Logishrd\KHAL2\KHALMNPR.exe 3332 C:\Program Files\iPod\bin\iPodService.exe 584 C:\Windows\explorer.exe 2336 C:\Windows\System32\mobsync.exe 1248 C:\Windows\System32\audiodg.exe 5200 C:\PROGRA~1\MICROS~1\Office12\OUTLOOK.EXE 3292 C:\Program Files\Mozilla Firefox\firefox.exe 5220 C:\Program Files\Mozilla Firefox\plugin-container.exe 3512 C:\Program Files\UltraEdit\uedit32.exe 5636 C:\Users\Peter Klein\Downloads\osam_autorun_manager_5_0_portable\osam.exe 616 C:\Windows\System32\SearchProtocolHost.exe 4144 C:\Windows\System32\SearchFilterHost.exe 6024 C:\Windows\explorer.exe 5028 C:\Users\Peter Klein\Desktop\MBRCheck.exe 5284 C:\Windows\System32\conhost.exe 4904 C:\Windows\System32\dllhost.exe \\.\C: --> \\.\PhysicalDrive0 at offset 0x00000002`32900000 (NTFS) \\.\D: --> \\.\PhysicalDrive0 at offset 0x00000019`bcc00000 (NTFS) PhysicalDrive0 Model Number: HitachiHTS543232L9A300, Rev: FB4OC40C Size Device Name MBR Status -------------------------------------------- 298 GB \\.\PhysicalDrive0 Windows 7 MBR code detected SHA1: 4379A3D43019B46FA357F7DD6A53B45A3CA8FB79 Done! |
Sieht ok aus. Mach bitte zur Kontrolle Vollscans mit Malwarebytes und SASW und poste die Logs. Denk dran beide Tools zu updaten vor dem Scan!! |
Malwarebytes' Anti-Malware 1.50.1.1100 Malwarebytes Datenbank Version: 5718 Windows 6.1.7600 Internet Explorer 8.0.7600.16385 09.02.2011 15:01:19 mbam-log-2011-02-09 (15-01-19).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|T:\|) Durchsuchte Objekte: 341491 Laufzeit: 1 Stunde(n), 55 Minute(n), 56 Sekunde(n) Infizierte Speicherprozesse: 0 Infizierte Speichermodule: 0 Infizierte Registrierungsschlüssel: 0 Infizierte Registrierungswerte: 0 Infizierte Dateiobjekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 0 Infizierte Speicherprozesse: (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: (Keine bösartigen Objekte gefunden) Infizierte Dateien: (Keine bösartigen Objekte gefunden) |
SUPERAntiSpyware Scan Log hxxp://www.superantispyware.com Generated 02/09/2011 at 05:38 PM Application Version : 4.48.1000 Core Rules Database Version : 6365 Trace Rules Database Version: 4177 Scan type : Complete Scan Total Scan Time : 02:19:13 Memory items scanned : 863 Memory threats detected : 0 Registry items scanned : 10602 Registry threats detected : 0 File items scanned : 183193 File threats detected : 3 Adware.Tracking Cookie C:\Users\peter klein\AppData\Roaming\Microsoft\Windows\Cookies\peter_klein@stat.aldi[2].txt C:\Users\peter klein\AppData\Roaming\Microsoft\Windows\Cookies\peter_klein@stat.aldi[1].txt C:\Users\peter klein\AppData\Roaming\Microsoft\Windows\Cookies\peter_klein@xiti[1].txt |
Hier die 2 Logs muss ich mir nun weitere Sorgen machen? |
Sieht ok aus, da wurden nur Cookies gefunden. Noch Probleme oder weitere Funde in der Zwischenzeit? |
ich hab bisher keine Probleme gehabt. Es scheint alles wieder "sauber" zu laufen! BESTEN DANK ! |
Dann wären wir durch! :abklatsch: Bitte abschließend die Updates prüfen, unten mein Leitfaden dazu. Für noch mehr Sicherheit solltest Du nach der beseitigten Infektion auch möglichst alle Passwörter ändern. Microsoftupdate Windows XP: Besuch mit dem IE die MS-Updateseite und lass Dir alle wichtigen Updates installieren. Windows Vista/7: Anleitung Windows-Update PDF-Reader aktualisieren Dein Adobe Reader ist nicht aktuell, was ein großes Sicherheitsrisiko darstellt. Du solltest daher besser die alte Version über Systemsteuerung => Software deinstallieren, indem Du dort auf "Adobe Reader x.0" klickst und das Programm entfernst. Ich empfehle einen alternativen PDF-Reader wie SumatraPDF oder Foxit PDF Reader, beide sind sehr viel schlanker und flotter als der AdobeReader. Bitte überprüf bei der Gelegenheit auch die Aktualität des Flashplayers, hier der direkte Downloadlink => http://filepony.de/?q=Flash+Player Java-Update Veraltete Java-Installationen sind ein Sicherheitsrisiko, daher solltest Du die alten Versionen löschen (falls vorhanden, am besten mit JavaRa) und auf die neuste aktualisieren. Beende dazu alle Programme (v.a. die Browser), klick danach auf Start, Systemsteuerung, Software und deinstalliere darüber alle aufgelisteten Java-Versionen. Lad Dir danach von hier das aktuelle Java SE Runtime Environment (JRE) herunter und installiere es. |
Alle Zeitangaben in WEZ +1. Es ist jetzt 20:16 Uhr. |
Copyright ©2000-2025, Trojaner-Board