Trojaner-Board

Trojaner-Board (https://www.trojaner-board.de/)
-   Plagegeister aller Art und deren Bekämpfung (https://www.trojaner-board.de/plagegeister-aller-art-deren-bekaempfung/)
-   -   Java_bytever.bj ???? (https://www.trojaner-board.de/59353-java_bytever-bj.html)

godsilla 06.09.2008 23:05

Java_bytever.bj ????
 
Halli Hallo,

Um es auf den Punkt zu bringen mein Pc ist verseucht bis zum geht nicht mehr.Internet seiten starten sich von alleine und unten rechts oeffnet sich andauert ein gelbes Fenster wo drin steht Das mein Pc mit Spyware und Malware versucht bin, und hir ein Programm runterladen soll um sie zu loeschen. Also ich denke mal das, das der Virus ist?!
Ich habe auch mal mein Antivirus das ich habe ( Trend Micro Pc-chilln) durchlaufen lassen. Es hat 17 Sachen gefunden.

JAVA_BYTEVER.BJ
JAVA_BYTEVER.DL
JAVA_BYTEVER.DK
JAVA_BYTEVER.BK
---
JAVA_BYTEVER.BJ
JAVA_BYTEVER.DL
JAVA_BYTEVER.DK
JAVA_BYTEVER.BK
---
Possible_SCRDL
Possible_SCRDL
Possible_SCRDL
Possible_SCRDL
Possible_SCRDL
Possible_SCRDL
TROJ_AGENT.AGER
TROJ_AGENT.AGER
TROJ_DLOADER.OCD


Das ist was er gefunden hatte. Ich habe es probiert zu loeschen aber funktioniert hat es nicht. Kann mir villeicht jemand weiter helfen? Ich weis echt nicht mehr weiter. :killpc:

mfg :huepp:

Silent sharK 06.09.2008 23:07

Hi,
du könntest die Pfade zu den Funden angeben oder noch besser den ganzen Report von Trend Micro posten.
Nebenbei auch ein regelkonformes HijackThis Logfile.

godsilla 06.09.2008 23:30

hi,

Hir ist der Logfile fuer Trend Mirco. Warum der solange ist weis ich nicht. Meines wissens hat er nur 17 gefunden naja.

"Virus Scan Logs","2008/09/06","***-EAC181B4"
"Time","Security Feature","Source Type","Virus Name","File Name","First Action","Second Action"
"00:01","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\4HQVW1ER\test2[1].exe","Quarantine Success",""
"00:01","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\yaywwVLf.dll","Quarantine Success",""
"00:02","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\tmp[1].exe","Quarantine Success",""
"00:02","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\ltmxn.exe","Quarantine Success",""
"00:02","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\554[1].exe","Quarantine Success",""
"00:02","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\nujjl.exe","Quarantine Success",""
"00:16","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\test2[1].exe","Quarantine Success",""
"00:16","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\fccBsSij.dll","Quarantine Success",""
"00:17","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\4HQVW1ER\tmp[1].exe","Quarantine Success",""
"00:17","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\mldpe.exe","Quarantine Success",""
"00:17","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\554[1].exe","Quarantine Success",""
"00:17","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\zlwco.exe","Quarantine Success",""
"00:31","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\test2[1].exe","Quarantine Success",""
"00:31","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\pmnlkLFy.dll","Quarantine Success",""
"00:32","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\tmp[1].exe","Quarantine Success",""
"00:32","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\pxcuo.exe","Quarantine Success",""
"00:32","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\4HQVW1ER\554[1].exe","Quarantine Success",""
"00:32","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\rbibl.exe","Quarantine Success",""
"10:46","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CJGJ6N0Z\test2[1].exe","Quarantine Success",""
"10:46","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\tmp[1].exe","Quarantine Success",""
"10:46","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\cfwhz.exe","Quarantine Success",""
"10:46","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\tuvVMfdb.dll","Quarantine Success",""
"10:46","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\554[1].exe","Quarantine Success",""
"10:46","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\oaply.exe","Quarantine Success",""
"10:56","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\4HQVW1ER\test2[1].exe","Quarantine Success",""
"10:56","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\vtULCTLC.dll","Quarantine Success",""
"10:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CJGJ6N0Z\tmp[1].exe","Quarantine Success",""
"10:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\leuwl.exe","Quarantine Success",""
"10:57","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\554[1].exe","Quarantine Success",""
"10:57","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\grdlj.exe","Quarantine Success",""
"11:11","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\test2[1].exe","Quarantine Success",""
"11:11","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\pmnoLfde.dll","Quarantine Success",""
"11:11","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\4HQVW1ER\tmp[1].exe","Quarantine Success",""
"11:11","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\ejftw.exe","Quarantine Success",""
"11:12","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CJGJ6N0Z\554[1].exe","Quarantine Success",""
"11:12","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\rxfck.exe","Quarantine Success",""
"11:25","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\test2[1].exe","Quarantine Success",""
"11:26","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\byXonMdb.dll","Quarantine Success",""
"11:26","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\tmp[1].exe","Quarantine Success",""
"11:26","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\corzh.exe","Quarantine Success",""
"11:26","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\4HQVW1ER\554[1].exe","Quarantine Success",""
"11:26","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\yxufk.exe","Quarantine Success",""
"11:40","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CJGJ6N0Z\test2[1].exe","Quarantine Success",""
"11:41","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\jkkHYPHy.dll","Quarantine Success",""
"11:41","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\tmp[1].exe","Quarantine Success",""
"11:41","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\uvcap.exe","Quarantine Success",""
"11:41","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\554[1].exe","Quarantine Success",""
"11:41","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\vpdjz.exe","Quarantine Success",""
"11:55","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\4HQVW1ER\test2[1].exe","Quarantine Success",""
"11:56","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\vtUmMdeC.dll","Quarantine Success",""
"11:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CJGJ6N0Z\tmp[1].exe","Quarantine Success",""
"11:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\ptcfc.exe","Quarantine Success",""
"11:56","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\554[1].exe","Quarantine Success",""
"11:56","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\qjxed.exe","Quarantine Success",""
"12:11","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\SPEB856V\test2[1].exe","Quarantine Success",""
"12:11","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\fccyaAtu.dll","Quarantine Success",""
"12:11","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\89QJKX2J\tmp[1].exe","Quarantine Success",""
"12:11","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\gitze.exe","Quarantine Success",""
"12:12","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CJGJ6N0Z\554[1].exe","Quarantine Success",""
"12:12","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\hqpzb.exe","Quarantine Success",""
"12:26","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\test2[1].exe","Quarantine Success",""
"12:26","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\ddcYqroN.dll","Quarantine Success",""
"12:26","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\SPEB856V\tmp[1].exe","Quarantine Success",""
"12:26","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\oupsj.exe","Quarantine Success",""
"12:27","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\89QJKX2J\554[1].exe","Quarantine Success",""
"12:27","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\hsakv.exe","Quarantine Success",""
"12:41","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\GXMB01QF\test2[1].exe","Quarantine Success",""
"12:41","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\qoMgggHw.dll","Quarantine Success",""
"12:41","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\MX8H2XAZ\tmp[1].exe","Quarantine Success",""
"12:41","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\xeelk.exe","Quarantine Success",""
"12:41","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\SPEB856V\554[1].exe","Quarantine Success",""
"12:41","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\bomdm.exe","Quarantine Success",""
"12:56","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\4HQVW1ER\test2[1].exe","Quarantine Success",""
"12:56","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\vtUkiGWM.dll","Quarantine Success",""
"12:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\GXMB01QF\tmp[1].exe","Quarantine Success",""
"12:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\cywkb.exe","Quarantine Success",""
"12:56","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\MX8H2XAZ\554[1].exe","Quarantine Success",""
"12:56","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\fvxjm.exe","Quarantine Success",""
"13:11","Manual Scan","File","JAVA_BYTEVER.BJ","MagicApplet.class (C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-48717fd3-78af5608.zip)","Quarantine Fail",""
"13:11","Manual Scan","File","JAVA_BYTEVER.DL","OwnClassLoader.class (C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-48717fd3-78af5608.zip)","Quarantine Fail",""
"13:11","Manual Scan","File","JAVA_BYTEVER.DK","ProxyClassLoader.class (C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-48717fd3-78af5608.zip)","Quarantine Fail",""
"13:11","Manual Scan","File","---","C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-48717fd3-78af5608.zip","Quarantine Success",""
"13:11","Manual Scan","File","JAVA_BYTEVER.BK","Installer.class (C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-48717fd3-78af5608.zip)","Quarantine Fail",""
"13:11","Manual Scan","File","JAVA_BYTEVER.BJ","MagicApplet.class (C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-6c2fc83e-2ece0469.zip)","Quarantine Fail",""
"13:11","Manual Scan","File","JAVA_BYTEVER.DL","OwnClassLoader.class (C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-6c2fc83e-2ece0469.zip)","Quarantine Fail",""
"13:11","Manual Scan","File","JAVA_BYTEVER.DK","ProxyClassLoader.class (C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-6c2fc83e-2ece0469.zip)","Quarantine Fail",""
"13:11","Manual Scan","File","JAVA_BYTEVER.BK","Installer.class (C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-6c2fc83e-2ece0469.zip)","Quarantine Fail",""
"13:11","Manual Scan","File","---","C:\Documents and Settings\***\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\dsbr.jar-6c2fc83e-2ece0469.zip","Quarantine Success",""
"13:23","Manual Scan","File","Possible_SCRDL","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\00LSYPBV\10[1].htm","None Taken",""
"13:26","Manual Scan","File","Possible_SCRDL","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\89QJKX2J\10[1].htm","None Taken",""
"13:28","Manual Scan","File","Possible_SCRDL","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CTEZKHI3\10[1].htm","None Taken",""
"13:28","Manual Scan","File","Possible_SCRDL","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\GXMB01QF\10[1].htm","None Taken",""
"13:30","Manual Scan","File","Possible_SCRDL","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\TCHHFTTJ\10[1].htm","None Taken",""
"13:31","Manual Scan","File","Possible_SCRDL","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\10[1].htm","None Taken",""
"13:33","Manual Scan","File","TROJ_AGENT.AGER","C:\Documents and Settings\LocalService\CookiesËvwknv¹òïò","Quarantine Success",""
"13:33","Manual Scan","File","TROJ_AGENT.AGER","C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\8205005F\554[1].exe","Quarantine Success",""
"13:33","Manual Scan","File","TROJ_DLOADER.OCD","C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\HYTH0TIY\tmp[1].exe","Quarantine Success",""
"14:26","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\8HMFODYV\test2[1].exe","Quarantine Success",""
"14:26","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\opnkkkli.dll","Quarantine Success",""
"14:26","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\tmp[1].exe","Quarantine Success",""
"14:26","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\jncks.exe","Quarantine Success",""
"14:26","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\SLAZCD23\554[1].exe","Quarantine Success",""
"14:26","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\ggags.exe","Quarantine Success",""
"14:41","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\test2[1].exe","Quarantine Success",""
"14:41","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\efcYRHyA.dll","Quarantine Success",""
"14:41","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\8HMFODYV\tmp[1].exe","Quarantine Success",""
"14:41","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\qkzyq.exe","Quarantine Success",""
"14:41","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V10GTVVD\554[1].exe","Quarantine Success",""
"14:41","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\irwts.exe","Quarantine Success",""
"14:56","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\MFMZQZ4V\test2[1].exe","Quarantine Success",""
"14:56","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\awtutRJD.dll","Quarantine Success",""
"14:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\A3S3TAR6\tmp[1].exe","Quarantine Success",""
"14:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\pkojg.exe","Quarantine Success",""
"14:57","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\MFMZQZ4V\554[1].exe","Quarantine Success",""
"14:57","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\rsklr.exe","Quarantine Success",""
"15:11","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\test2[1].exe","Quarantine Success",""
"15:11","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\nnnkIaby.dll","Quarantine Success",""
"15:11","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V5VSHJF4\tmp[1].exe","Quarantine Success",""
"15:11","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\pdneo.exe","Quarantine Success",""
"15:11","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CJGJ6N0Z\554[1].exe","Quarantine Success",""
"15:11","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\****\Cookies\vdryu.exe","Quarantine Success",""
"15:26","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\00LSYPBV\test2[1].exe","Quarantine Success",""
"15:26","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\cbXPhhij.dll","Quarantine Success",""
"15:26","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\tmp[1].exe","Quarantine Success",""
"15:26","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\xuytu.exe","Quarantine Success",""
"15:27","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CJGJ6N0Z\554[1].exe","Quarantine Success",""
"15:27","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\clijq.exe","Quarantine Success",""
"15:41","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\CJGJ6N0Z\test2[1].exe","Quarantine Success",""
"15:41","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\urqNEVMe.dll","Quarantine Success",""
"15:41","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\00LSYPBV\tmp[1].exe","Quarantine Success",""
"15:41","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\iyrmi.exe","Quarantine Success",""
"15:41","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\554[1].exe","Quarantine Success",""
"15:41","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\murdc.exe","Quarantine Success",""
"15:56","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\89QJKX2J\test2[1].exe","Quarantine Success",""
"15:56","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\mlJDSLbb.dll","Quarantine Success",""
"15:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\V5VSHJF4\tmp[1].exe","Quarantine Success",""
"15:56","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\xdvzl.exe","Quarantine Success",""
"15:57","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\00LSYPBV\554[1].exe","Quarantine Success",""
"15:57","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\zgjhd.exe","Quarantine Success",""
"16:10","File Monitor","File","PAK_Generic.001","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\MFMZQZ4V\test2[1].exe","Quarantine Success",""
"16:11","File Monitor","File","TROJ_MONDERB.AF","C:\WINDOWS\system32\xxyaAsrO.dll","Quarantine Success",""
"16:11","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\MX8H2XAZ\tmp[1].exe","Quarantine Success",""
"16:11","File Monitor","File","TROJ_DLOADER.OCD","C:\Documents and Settings\***\Cookies\cskyu.exe","Quarantine Success",""
"16:11","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Local Settings\Temporary Internet Files\Content.IE5\0LQB01IN\554[1].exe","Quarantine Success",""
"16:11","File Monitor","File","TROJ_AGENT.AGER","C:\Documents and Settings\***\Cookies\noswz.exe","Quarantine Success",""


HijackThis Logfile folgt...:killpc:

godsilla 06.09.2008 23:36

Hir das HijackThis Logfile....

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 4:30:49 PM, on 9/6/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\DOCUME~1\***\LOCALS~1\Temp\svchost.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe
C:\WINDOWS\system32\svchost.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
C:\WINDOWS\TEMP\mainti2.exe
C:\WINDOWS\system32\uesiuqcr.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\webHancer\Programs\whagent.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Java\jre1.5.0_09\bin\jucheck.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Trend Micro\Internet Security 2007\pccmain.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\PccVScan.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://start.shaw.ca/start/enCA
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\uesiuqcr.exe,
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: getsn32.msiesn - {2D9F1530-0B38-4DCB-A90A-CECD559F3514} - C:\WINDOWS\system32\getsn32.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
O2 - BHO: WhIeHelperObj Class - {c900b400-cdfe-11d3-976a-00e02913a9e0} - C:\Program Files\webHancer\programs\whiehlpr.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe"
O4 - HKLM\..\Run: [Creative WebCam Tray] C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
O4 - HKLM\..\Run: [SiS KHooker] C:\WINDOWS\system32\khooker.exe
O4 - HKLM\..\Run: [nmapp] "C:\Program Files\Pure Networks\Network Magic\nmapp.exe" -autorun -nosplash
O4 - HKLM\..\Run: [pccguide.exe] C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [webHancer Agent] C:\Program Files\webHancer\Programs\whagent.exe
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKCU\..\Run: [Run] "C:\Documents and Settings\***\Application Data\Adobe\Manager.exe"
O4 - HKUS\S-1-5-18\..\Run: [Run] "C:\Documents and Settings\LocalService\Application Data\Adobe\Manager.exe" (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Run] "C:\Documents and Settings\LocalService\Application Data\Adobe\Manager.exe" (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
O4 - Startup: IMVU.lnk = C:\Program Files\IMVU\IMVUClient.exe
O4 - Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe
O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O4 - Global Startup: KODAK Software Updater.lnk = C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - C:\Documents and Settings\***\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O10 - Hijacked Internet access by WebHancer
O10 - Hijacked Internet access by WebHancer
O10 - Hijacked Internet access by WebHancer
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
O16 - DPF: {55027008-315F-4F45-BBC3-8BE119764741} (Slide Image Uploader Control) - http://www.slide.com/uploader/SlideImageUploader.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {DE625294-70E6-45ED-B895-CFFA13AEB044} (AxisMediaControlEmb Class) - http://217.22.201.135/activex/AMC.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab56986.cab
O22 - SharedTaskScheduler: kjlsjf9843nksngfdgffn - {C5AF49A2-94F3-42BD-F234-3604812C897D} - C:\WINDOWS\system32\ksfj83nwe.dll (file missing)
O23 - Service: Print Spooler Service (a6vowoi3iy) - Unknown owner - C:\WINDOWS\system32\odibjh.exe (file missing)
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Network Driver Interface - Unknown owner - C:\DOCUME~1\Eileen\LOCALS~1\Temp\svchost.exe
O23 - Service: Pure Networks Net2Go Service (nmraapache) - Pure Networks, Inc. - C:\Program Files\Pure Networks\Network Magic\WebServer\bin\nmraapache.exe
O23 - Service: Pure Networks Network Magic Service (nmservice) - Pure Networks, Inc. - C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe
O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
O23 - Service: Trend Micro Protection Against Spyware (PcScnSrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe
O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
O24 - Desktop Component 0: (no name) - h**p://207.46.10.252/cgi-bin/getmsg/pic9.jpg?&msg=BCC162AD-09A4-4F5F-A722-7C5F1097FB73&start=0&len=77931&mimepart=3&curmbox=00000000-0000-0000-0000-000000000001&b=45cf5edc0ea994a81e153c11ff285cd7&disk=10.1.106.220_d2219&login=tic%2dtac%2dup%2dur%2dnose&domain=hotmail%2ecom&hm___sig=9cbf261b01c7498 c256d2de97f74fe64f3722478614ec45a

--
End of file - 9608 bytes


:balla:

Silent sharK 06.09.2008 23:55

So, folge den Schritten genau der Reihe nach:

1.)

Dateien Online überprüfen lassen:
  • Suche die Seite Virtustotal auf, klicke auf den Button „Durchsuchen“ und suche folgende Datei/Dateien:
Code:

C:\DOCUME~1\***\LOCALS~1\Temp\svchost.exe
C:\WINDOWS\system32\uesiuqcr.exe

  • Lade nun nacheinander jede/alle Datei/Dateien hoch, und warte bis der Scan vorbei ist. (kann bis zu 2 Minuten dauern.)
  • Poste im Anschluss das Ergebnis der Auswertung, alles abkopieren und in einen Beitrag einfügen.
  • Wichtig: Auch die Größenangabe sowie den HASH mit kopieren!

2.)
LSPFix anwenden:

Im WINSOCK von Windows werden Funktionen gesammelt (Bibliothek) welche zum Zugriff auf Netzwerkkomponenten nötig ist.
Winsock ergänzt Windows um das TCP/IP-Protokoll und ist für die Verbindung des PCs mit dem Internet zuständig.
Sie wird oftmals durch spezielle schädliche Software (Webhancer, NewDotNet) zerstört.
  • Hilfe biete in diesem Fall das Tool -> LSPFix
  • Nach dem Start erscheint diese Auswahl:
http://www.cevrik.sk/FORUM/ndn/lspfix.jpg
  • Bewege nun die schädlichen Dateien von links (KEEP) nach rechts (REMOVE) und dann auf Finish:
Code:

Die bösartigen Einträge sind schon Rechts
  • Danach das System neu starten lassen, und der Zugriff auf das Netzwerk/Internet sollte wieder funktionieren

3.)
SDFix anwenden:
  • Lade das SDFix von AndyManchesta herunter und speichere es auf deinem Desktop.
  • Mach einen Doppelklick auf die Datei SDFix.exe, wähle installieren, um das Programm in seinen eigenen Ordner in C:\ zu entpacken:
    http://img.bleepingcomputer.com/swr-...ix-install.jpg
  • Starte deinen Rechner neu, diesmal in den abgesicherten Modus <= Hinweise beachten!
  • Öffne den neu entstandenen SDFix Ordner, mach einen Doppelklick auf die RunThis.bat, um das Skript zu starten.
  • Gib ein Y ein, um den Reinigungsprozess zu beginnen.
  • Das Programm wird alle Trojaner Dienste und die dazugehörigen Registrierungseinträge löschen, die es findet.
  • Nun wirst du darum gebeten, eine Taste zu drücken, damit dein Rechner neustarten kann.
  • Drücke auf eine Taste. Jetzt wird dein Rechner neu aufgestartet.
  • Wenn der Rechner neu aufgestartet ist, wird das Fixtool nocheinmal laufen, um den Reinigungsprozess zu vervollständigen.
  • Wenn das Programm angibt, dass es beendet ist (Finished), drücke wieder auf irgendeine Taste, um das Skript zu beenden und deine Desktop Icons wieder zu laden.
  • Wenn die Desktop Icons wieder da sind, wird das Skript ein Fenster öffnen und das Ergebnis als einen Report.txt im Ordner SDFix speichern.
  • Kopiere den Inhalt dieses Report.txt und poste ihn, zusammen mit einem neuen HiJackThis Logfile in deinem nächsten Posting.

4.)
MalwareBytes Anti-Malware:
  • Lade dir MalwareBytes Anti-Malware
  • Folge den Anweisungen der Anleitung und poste das Logfile

godsilla 07.09.2008 02:04

So ich habe Schritt eins schon mal gemacht.
Ich habe auch folgende Datein:

C:\DOCUME~1\***\LOCALS~1\Temp\svchost.exe
C:\WINDOWS\system32\uesiuqcr.exe

auf Virustotal geladen das war das ergebniss...

C:\DOCUME~1\***\LOCALS~1\Temp\svchost.exe

MD5: 6564a4020125132069eec77cd033b861
First received: 09.05.2008 01:00:43 (CET)
Date: 09.05.2008 16:54:25 (CET) [+1D]
Results: 4/36
Permalink: analisis/261f29adbb8683cc329c222ce3f4d6fd

File index39.exe received on 09.05.2008 16:53:20 (CET)
Current status: finished

Result: 4/36 (11.11%)
Compact Print results
Antivirus Version Last Update Result
AhnLab-V3 2008.9.5.1 2008.09.05 -
AntiVir 7.8.1.28 2008.09.05 -
Authentium 5.1.0.4 2008.09.05 -
Avast 4.8.1195.0 2008.09.05 -
AVG 8.0.0.161 2008.09.05 -
BitDefender 7.2 2008.09.05 -
CAT-QuickHeal 9.50 2008.09.02 -
ClamAV 0.93.1 2008.09.05 -
DrWeb 4.44.0.09170 2008.09.05 -
eSafe 7.0.17.0 2008.09.03 -
eTrust-Vet 31.6.6071 2008.09.05 -
Ewido 4.0 2008.09.04 -
F-Prot 4.4.4.56 2008.09.04 -
F-Secure 8.0.14332.0 2008.09.05 -
Fortinet 3.14.0.0 2008.09.03 -
GData 19 2008.09.05 -
Ikarus T3.1.1.34.0 2008.09.05 -
K7AntiVirus 7.10.443 2008.09.05 -
Kaspersky 7.0.0.125 2008.09.05 -
McAfee 5377 2008.09.04 -
Microsoft 1.3903 2008.09.05 Worm:Win32/Hamweq.gen!B
NOD32v2 3419 2008.09.05 probably a variant of Win32/AutoRun.KS
Norman 5.80.02 2008.09.05 -
Panda 9.0.0.4 2008.09.04 -
PCTools 4.4.2.0 2008.09.05 -
Prevx1 V2 2008.09.05 Cloaked Malware
Rising 20.60.42.00 2008.09.05 -
Sophos 4.33.0 2008.09.05 -
Sunbelt 3.1.1610.1 2008.09.05 -
Symantec 10 2008.09.05 Downloader
TheHacker 6.3.0.8.072 2008.09.04 -
TrendMicro 8.700.0.1004 2008.09.05 -
VBA32 3.12.8.5 2008.09.05 -
ViRobot 2008.9.5.1365 2008.09.05 -
VirusBuster 4.5.11.0 2008.09.05 -
Webwasher-Gateway 6.6.2 2008.09.05 -
Additional information
File size: 11776 bytes
MD5...: 6564a4020125132069eec77cd033b861
SHA1..: fc22c93ac56ed422b9dd21b74a58450f3dfeae6f
SHA256: 19ffa38a6d093465d4f008c082b71b0f4dda56ee7a591bceaf279d2504ae2536
SHA512: 8468455511e8ba08388627373a700ab7875baef94f24fbccfa685a6f280f643b
e4718bb9c87aad9d0ac20967d81fa5dd023bb77406066e26cea58317b2d93625
PEiD..: -
TrID..: File type identification
Win32 Executable Generic (42.3%)
Win32 Dynamic Link Library (generic) (37.6%)
Generic Win/DOS Executable (9.9%)
DOS Executable Generic (9.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x401caa
timedatestamp.....: 0x48c04ed6 (Thu Sep 04 21:10:46 2008)
machinetype.......: 0x14c (I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
.text 0x1000 0x1d79 0x1e00 5.85 f6047ec0591d79467d0c900a4114d3aa
.rdata 0x3000 0x310 0x400 3.99 f3ae83658e60b70a4bdd792c4e100220
.data 0x4000 0x75c 0x800 5.02 34b7b3a7181b941f82dac0bc9bbd4596

( 2 imports )
> KERNEL32.dll: GetTickCount, GetLastError, GetModuleHandleA, GetModuleFileNameA, lstrcpyA, lstrcatA, Sleep, LoadLibraryA, GetProcAddress, ExitProcess, lstrcpynA, lstrlenA, GetCurrentProcess, CloseHandle
> ADVAPI32.dll: QueryServiceStatus, CreateServiceA, CloseServiceHandle, RegisterServiceCtrlHandlerA, SetServiceStatus, OpenSCManagerA, OpenServiceA, StartServiceCtrlDispatcherA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, StartServiceA

( 0 exports )

Prevx info: http://info.prevx.com/aboutprogramtext.asp?PX5=62A252F200AB774A2E0F00EB51F31500EFB8C214






C:\WINDOWS\system32\uesiuqcr.exe

MD5: 3f883039cb9f132845b2595430915137
First received: 09.06.2008 01:50:03 (CET)
Date: 09.07.2008 01:16:11 (CET) [<1D]
Results: 12/36
Permalink: analisis/d7fb4980d52d0517bcb9f1e998e6c3a9

File mainti2.exe received on 09.07.2008 01:15:02 (CET)
Current status: finished

Result: 12/36 (33.33%)
Compact Print results
Antivirus Version Last Update Result
AhnLab-V3 2008.9.6.0 2008.09.06 -
AntiVir 7.8.1.28 2008.09.05 TR/Crypt.FKM.Gen
Authentium 5.1.0.4 2008.09.06 -
Avast 4.8.1195.0 2008.09.06 -
AVG 8.0.0.161 2008.09.07 -
BitDefender 7.2 2008.09.06 Trojan.Downloader.VB.Gen.1
CAT-QuickHeal 9.50 2008.09.06 -
ClamAV 0.93.1 2008.09.06 -
DrWeb 4.44.0.09170 2008.09.06 -
eSafe 7.0.17.0 2008.09.03 Suspicious File
eTrust-Vet 31.6.6072 2008.09.05 -
Ewido 4.0 2008.09.06 -
F-Prot 4.4.4.56 2008.09.06 -
F-Secure 8.0.14332.0 2008.09.06 AdWare.Win32.BHO.cvf
Fortinet 3.112.0.0 2008.09.06 W32/BbFake.A!tr
GData 19 2008.09.07 -
Ikarus T3.1.1.34.0 2008.09.06 not-a-virus:AdWare.Win32.CashDeluxe.b
K7AntiVirus 7.10.443 2008.09.05 -
Kaspersky 7.0.0.125 2008.09.07 not-a-virus:AdWare.Win32.BHO.cvf
McAfee 5378 2008.09.05 -
Microsoft 1.3903 2008.09.07 TrojanDownloader:Win32/Cadux.B
NOD32v2 3423 2008.09.06 -
Norman 5.80.02 2008.09.05 -
Panda 9.0.0.4 2008.09.06 Suspicious file
PCTools 4.4.2.0 2008.09.06 -
Prevx1 V2 2008.09.07 Malicious Software
Rising 20.60.52.00 2008.09.06 -
Sophos 4.33.0 2008.09.06 Mal/Behav-210
Sunbelt 3.1.1610.1 2008.09.05 -
Symantec 10 2008.09.07 -
TheHacker 6.3.0.8.075 2008.09.06 -
TrendMicro 8.700.0.1004 2008.09.05 -
VBA32 3.12.8.5 2008.09.06 -
ViRobot 2008.9.5.1365 2008.09.06 -
VirusBuster 4.5.11.0 2008.09.06 -
Webwasher-Gateway 6.6.2 2008.09.05 Trojan.Crypt.FKM.Gen
Additional information
File size: 85008 bytes
MD5...: 3f883039cb9f132845b2595430915137
SHA1..: 293046da211fad4de1831c7fd9482e3e4b776489
SHA256: 64d141fbe86cd6aa7c6bb64bca9ab8dc9074e0b0210e0bfe03c3cf1aae9cf03d
SHA512: 8a2fbd38e74f899aa6134c3749e4f0dcf584a89637cac119db828b28b2660e36
288ea7b9ad0f4a8da371bdc837a2b8edfaeb0180d0ba4fa38950336cf2a51c33
PEiD..: UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
TrID..: File type identification
Win32 Executable Microsoft Visual Basic 6 (64.4%)
UPX compressed Win32 Executable (15.6%)
Win32 EXE Yoda's Crypter (13.5%)
Win32 Executable Generic (4.3%)
Generic Win/DOS Executable (1.0%)
PEInfo: PE Structure information

( base data )
entrypointaddress.: 0x537d40
timedatestamp.....: 0x48c13f4f (Fri Sep 05 14:16:47 2008)
machinetype.......: 0x14c (I386)

( 3 sections )
name viradd virsiz rawdsiz ntrpy md5
UPX0 0x1000 0x129000 0x0 0.00 d41d8cd98f00b204e9800998ecf8427e
UPX1 0x12a000 0xe000 0xe000 7.86 6a460f049cce17036fd83811692bedcd
.rsrc 0x138000 0x1000 0xa00 3.27 d53818bdf0800f4ee3e9598ec96f8666

( 2 imports )
> KERNEL32.DLL: LoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
> MSVBVM60.DLL: -

( 0 exports )

Prevx info: http://info.prevx.com/aboutprogramtext.asp?PX5=F3B63ECA108ED02C4CC4016149FB4C00490060C2
packers (Kaspersky): PE_Patch.UPX, UPX, PE_Patch.UPX, UPX, PE_Patch.UPX, UPX
packers (F-Prot): UPX

So nechster post kommt gleich...
Und danke fuer die Hilfe bis jetzt. :bussi:

godsilla 07.09.2008 03:30

Soa hab jetzt (LSPFix) angewendet.
Hier ist dazu der Report...

Teil 1...:sword2:



SDFix: Version 1.221
Run by Administrator on Sat 09/06/2008 at 07:25 PM

Microsoft Windows XP [Version 5.1.2600]
Running From: C:\SDFix

Checking Services :

Name :
a6vowoi3iy

Path :
C:\WINDOWS\system32\odibjh.exe /service

a6vowoi3iy - Deleted



Restoring Default Security Values
Restoring Default Hosts File
Restoring Default Desktop Wallpaper

Rebooting


Checking Files :

Trojan Files Found:

C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr0.dat - Contains Links to Malware Sites! - Deleted
C:\Documents and Settings\All Users\Application Data\Microsoft\Network\Downloader\qmgr1.dat - Contains Links to Malware Sites! - Deleted
C:\WINDOWS\system32\odibjh.exe - Deleted
C:\Documents and Settings\Eileen\Application Data\Adobe\Manager.exe - Deleted
C:\Documents and Settings\LocalService\Application Data\Adobe\Manager.exe - Deleted
C:\RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1015\svchost.exe - Deleted
C:\WINDOWS\default.htm - Deleted



Folder C:\Documents and Settings\Eileen\Application Data\Macromedia\Flash Player\macromedia.com\support\flashplayer\sys\#w*w.redtube.com - Removed


Removing Temp Files

ADS Check :



Final Check :

catchme 0.3.1361.2 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2008-09-06 19:49:04
Windows 5.1.2600 Service Pack 3 NTFS

scanning hidden processes ...

scanning hidden services & system hive ...

scanning hidden registry entries ...

scanning hidden files ...

scan completed successfully
hidden processes: 0
hidden services: 0
hidden files: 0


Remaining Services :




Authorized Application Key Export:

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\standardprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\MSN Messenger\\msncall.exe"="C:\\Program Files\\MSN Messenger\\msncall.exe:*:Enabled:Windows Live Messenger 8.0 (Phone)"
"C:\\Program Files\\Messenger\\msmsgs.exe"="C:\\Program Files\\Messenger\\msmsgs.exe:*:Enabled:Windows Messenger"
"C:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe"="C:\\Program Files\\Kodak\\Kodak EasyShare software\\bin\\EasyShare.exe:*:Enabled:EasyShare"
"C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpCtr.exe"="C:\\WINDOWS\\pchealth\\helpctr\\binaries\\HelpCtr.exe:*:Enabled:Remote Assistance - Windows Messenger and Voice"
"C:\\Program Files\\LimeWire\\LimeWire.exe"="C:\\Program Files\\LimeWire\\LimeWire.exe:*:Enabled:LimeWire"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.1"
"C:\\Program Files\\MSN Messenger\\livecall.exe"="C:\\Program Files\\MSN Messenger\\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)"
"C:\\Program Files\\Bonjour\\mDNSResponder.exe"="C:\\Program Files\\Bonjour\\mDNSResponder.exe:*:Enabled:Bonjour"
"C:\\Program Files\\iTunes\\iTunes.exe"="C:\\Program Files\\iTunes\\iTunes.exe:*:Enabled:iTunes"

[HKEY_LOCAL_MACHINE\system\currentcontrolset\services\sharedaccess\parameters\firewallpolicy\domainprofile\authorizedapplications\list]
"%windir%\\system32\\sessmgr.exe"="%windir%\\system32\\sessmgr.exe:*:enabled:@xpsp2res.dll,-22019"
"C:\\Program Files\\MSN Messenger\\msncall.exe"="C:\\Program Files\\MSN Messenger\\msncall.exe:*:Enabled:Windows Live Messenger 8.0 (Phone)"
"%windir%\\Network Diagnostic\\xpnetdiag.exe"="%windir%\\Network Diagnostic\\xpnetdiag.exe:*:Enabled:@xpsp3res.dll,-20000"
"C:\\Program Files\\MSN Messenger\\msnmsgr.exe"="C:\\Program Files\\MSN Messenger\\msnmsgr.exe:*:Enabled:Windows Live Messenger 8.1"
"C:\\Program Files\\MSN Messenger\\livecall.exe"="C:\\Program Files\\MSN Messenger\\livecall.exe:*:Enabled:Windows Live Messenger 8.1 (Phone)"

Remaining Files :

C:\WINDOWS\default.htm Found

File Backups: - C:\SDFix\backups\backups.zip

Files with Hidden Attributes :

Tue 3 Oct 2006 4,908,984 ...H. --- "C:\Program Files\Picasa2\setup.exe"
Wed 11 Oct 2006 4,348 A.SH. --- "C:\Documents and Settings\All Users\DRM\DRMv1.bak"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2E7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2E8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2E9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2EA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2EB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2ED.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2EE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2EF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2F0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2F2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2F4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2F5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2F6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2F7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2F8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2F9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2FB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2FC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2FD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2FE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\2FF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\300.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\302.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\304.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\305.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\306.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\307.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\308.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\30A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\31A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\31C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\31D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\31E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\320.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\322.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\323.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\324.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\325.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\326.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\327.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\329.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\32A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\32B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\32C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\32D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\32F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\330.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\331.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\332.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\333.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\334.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\336.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\337.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\338.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\339.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\33A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\33B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\33D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\33E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\33F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\340.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\341.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\343.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\344.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\345.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\346.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\347.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\348.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\34A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\34B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\34C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\34D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\34E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\34F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\351.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\352.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\353.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\354.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\355.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\357.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\358.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\359.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\35A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\35B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\35C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\35E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\35F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\360.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\361.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\362.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\365.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\367.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\368.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\36B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\36C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\36D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\36F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\371.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\372.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\373.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\374.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\375.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\376.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\378.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\379.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\37A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\37B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\37C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\37E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\37F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\380.tmp"

godsilla 07.09.2008 03:32

Teil 2 :balla::schrei:

Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\381.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\382.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\383.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\385.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\386.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\387.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\388.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\389.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\38B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\38C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\38D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\38E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\38F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\391.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\392.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\393.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\394.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\395.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\397.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\398.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\399.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\39A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\39B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\39C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\39E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\39F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3A0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3A1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3A2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3A3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3A5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3A6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3A7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3A8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3A9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3AB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3AC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3AD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3AE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3AF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3B1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3B3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3B4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3B5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3B6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3B7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3B9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3BA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3BB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3BC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3BD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3BF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3C0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3C1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3C2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3C3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3C4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3C6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3CE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3D2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3D3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3D6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3D8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3D9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3DC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3DD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3DE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3E0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3E2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3E3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3E4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3E5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3E6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3E8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3E9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3EA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3EB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3EC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3ED.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3EF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3F0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3F1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3F2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3F3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3F4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3F6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3F7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3F8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3F9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3FA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3FB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3FD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3FE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\3FF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\400.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\401.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\403.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\404.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\405.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\406.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\407.tmp"

godsilla 07.09.2008 03:33

Teil 3 :juul:

Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\408.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\40A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\40B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\40C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\40D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\40E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\410.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\411.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\412.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\413.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\414.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\415.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\417.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\418.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\513.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\515.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\517.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\518.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\519.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\51A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\51B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\51C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\51E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\51F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\520.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\521.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\522.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\523.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\525.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\526.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\527.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\528.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\529.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\52A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\52C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\52D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\52E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\52F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\530.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\531.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\533.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\534.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\535.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\536.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\537.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\538.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\53B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\53C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\53D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\53E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\53F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\541.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\542.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\543.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\544.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\545.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\546.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\548.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\549.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\54A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\54B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\54C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\54D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\54F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\550.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\551.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\552.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\553.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\554.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\556.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\557.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\558.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\559.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\55A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\55B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\55D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\55E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\55F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\560.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\561.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\562.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\564.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\565.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\566.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\567.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\568.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\569.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\56B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\56C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\56D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\56E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\56F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\570.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\572.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\573.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\577.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\578.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\57B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\57C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\57E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\581.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\582.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\583.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\585.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\586.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\588.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\589.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\58A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\58B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\58C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\58D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\58F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\590.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\591.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\592.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\593.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\595.tmp"

godsilla 07.09.2008 03:36

Teil 4 :teufel2:

Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\596.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\597.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\598.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\599.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\59A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\59C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\59D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\59E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\59F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5A0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5A1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5A3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5A4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5A5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5A6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5A7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5A8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5AA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5AB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5AC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5AD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5AE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5AF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5B1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5B2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5B3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5B4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5B5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5B6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5B8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5B9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5BA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5BB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5BC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5BD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5BF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5C0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5C1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5C2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5C3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5C4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5C6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5C7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5C8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5C9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5CA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5CB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5CD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5CE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5CF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5D0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5D1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5D2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5D4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5D5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5D6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5D7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5D8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5D9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5DB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5DC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5DD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5DE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5DF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5E0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5E2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5EB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5EE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5EF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5F2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5F3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5F5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5F8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5F9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5FA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5FC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5FD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\5FF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\600.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\601.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\602.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\603.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\604.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\606.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\607.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\608.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\609.tmp"

godsilla 07.09.2008 03:38

Teil 5:aufsmaul:

Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\60A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\60B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\60D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\60E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\60F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\610.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\611.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\612.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\614.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\615.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\616.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\617.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\618.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\619.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\61B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\61C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\61D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\61E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\61F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\620.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\622.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\623.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\624.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\625.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\626.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\627.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\629.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\62A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\62B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\62C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\62D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\62E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\630.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\631.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\632.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\633.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\634.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\635.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\637.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\638.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\639.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\63A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\63B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\63C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\63E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\63F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\640.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\641.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\642.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\643.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\645.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\646.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\647.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\648.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\649.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\64B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\64C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\64D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\64E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\64F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\650.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\652.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\653.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\654.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\655.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\656.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\657.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\659.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\65B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\65E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\65F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\662.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\663.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\665.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\668.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\669.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\66B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\66D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\66E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\670.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\671.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\672.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\673.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\674.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\675.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\677.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\678.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\679.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\67A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\67B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\67C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\67E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\67F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\680.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\681.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\682.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\683.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\685.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\686.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\687.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\688.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\689.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\68A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\68C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\68D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\68E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\68F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\690.tmp"

godsilla 07.09.2008 03:41

Teil 6 :nixda:

Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\691.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\693.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\694.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\695.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\696.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\697.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\698.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\69A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\69B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\69C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\69D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\69E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\69F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6A1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6A2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6A3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6A4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6A5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6A6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6A8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6A9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6AA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6AB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6AC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6AD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6AF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6B0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6B1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6B2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6B3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6B5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6B6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6B7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6B8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6B9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6BA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6BC.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6BD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6BE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6BF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6C0.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6C1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6C3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6C4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6C5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6C6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6C7.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6C8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6CA.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6CE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6CF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6D2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6D3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6D4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6D8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6D9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6DB.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6DD.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6DE.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6DF.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6E1.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6E2.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6E3.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6E4.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6E5.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6E6.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6E8.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6E9.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\6EA.tmp"

godsilla 07.09.2008 03:43

So da kommt noch mehr... aber des wird noch bis zu 20 Seiten werden deswegen hoer ich damit jetz auf und geh gleich zum ende.





Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C06.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C07.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C09.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C0A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C0B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C0C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C0D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C0E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C10.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C12.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C15.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C17.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C19.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C1B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C1E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C1F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C20.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C22.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C23.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C25.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C2B.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C2C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C2D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C2F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C30.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C32.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C34.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C35.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C36.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C3A.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C3C.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C3D.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C3E.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C3F.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C40.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C41.tmp"
Fri 5 Sep 2008 372 A.SHR --- "C:\Program Files\Trend Micro\Internet Security 2007\Quarantine\C43.tmp"
Wed 11 Oct 2006 4,348 ...H. --- "C:\Documents and Settings\Eileen\My Documents\My Music\License Backup\drmv1key.bak"
Wed 11 Oct 2006 20 A..H. --- "C:\Documents and Settings\Eileen\My Documents\My Music\License Backup\drmv1lic.bak"
Fri 29 Sep 2006 312 ...H. --- "C:\Documents and Settings\Eileen\My Documents\My Music\License Backup\drmv2key.bak"
Wed 11 Oct 2006 1,536 A..H. --- "C:\Documents and Settings\Eileen\My Documents\My Music\License Backup\drmv2lic.bak"

Finished!

godsilla 07.09.2008 03:47

So hir ist dan noch mal der neue HijackThis Report...:D

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 8:46:01 PM, on 9/6/2008
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP3 (6.00.2900.5512)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\uesiuqcr.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe
C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
C:\Program Files\Pure Networks\Network Magic\nmapp.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
C:\Program Files\QuickTime\QTTask.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\MSN Messenger\MsnMsgr.Exe
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\LimeWire\LimeWire.exe
C:\DOCUME~1\***\LOCALS~1\Temp\svchost.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe
C:\WINDOWS\system32\svchost.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Java\jre1.5.0_09\bin\jucheck.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\WINDOWS\system32\NOTEPAD.EXE
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\Program Files\HijackThis\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://start.shaw.ca/start/enCA
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
F2 - REG:system.ini: UserInit=C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\uesiuqcr.exe,
O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
O2 - BHO: getsn32.msiesn - {2D9F1530-0B38-4DCB-A90A-CECD559F3514} - C:\WINDOWS\system32\getsn32.dll
O2 - BHO: (no name) - {7E853D72-626A-48EC-A868-BA8D5E23E045} - (no file)
O2 - BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\googletoolbar3.dll
O2 - BHO: WhIeHelperObj Class - {c900b400-cdfe-11d3-976a-00e02913a9e0} - C:\Program Files\webHancer\programs\whiehlpr.dll
O3 - Toolbar: &Google - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\googletoolbar3.dll
O4 - HKLM\..\Run: [Cmaudio] RunDll32 cmicnfg.cpl,CMICtrlWnd
O4 - HKLM\..\Run: [NeroFilterCheck] C:\WINDOWS\system32\NeroCheck.exe
O4 - HKLM\..\Run: [SoundMan] SOUNDMAN.EXE
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe"
O4 - HKLM\..\Run: [Creative WebCam Tray] C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
O4 - HKLM\..\Run: [SiS KHooker] C:\WINDOWS\system32\khooker.exe
O4 - HKLM\..\Run: [nmapp] "C:\Program Files\Pure Networks\Network Magic\nmapp.exe" -autorun -nosplash
O4 - HKLM\..\Run: [pccguide.exe] C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
O4 - HKLM\..\Run: [AppleSyncNotifier] C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [webHancer Agent] C:\Program Files\webHancer\Programs\whagent.exe
O4 - HKLM\..\Run: [UserFaultCheck] %systemroot%\system32\dumprep 0 -u
O4 - HKCU\..\Run: [MsnMsgr] "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
O4 - HKUS\S-1-5-18\..\Run: [Run] "C:\Documents and Settings\LocalService\Application Data\Adobe\Manager.exe" (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\Run: [swg] C:\Program Files\Google\GoogleToolbarNotifier\1.2.1128.5462\GoogleToolbarNotifier.exe (User 'SYSTEM')
O4 - HKUS\S-1-5-18\..\RunOnce: [RunNarrator] Narrator.exe (User 'SYSTEM')
O4 - HKUS\.DEFAULT\..\Run: [Run] "C:\Documents and Settings\LocalService\Application Data\Adobe\Manager.exe" (User 'Default user')
O4 - HKUS\.DEFAULT\..\RunOnce: [RunNarrator] Narrator.exe (User 'Default user')
O4 - Startup: IMVU.lnk = C:\Program Files\IMVU\IMVUClient.exe
O4 - Startup: LimeWire On Startup.lnk = C:\Program Files\LimeWire\LimeWire.exe
O4 - Global Startup: Adobe Gamma Loader.exe.lnk = C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
O4 - Global Startup: Kodak EasyShare software.lnk = C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
O4 - Global Startup: KODAK Software Updater.lnk = C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\Program Files\Java\jre1.5.0_09\bin\ssv.dll
O9 - Extra button: Run IMVU - {d9288080-1baa-4bc4-9cf8-a92d743db949} - C:\Documents and Settings\Eileen\Start Menu\Programs\IMVU\Run IMVU.lnk (file missing)
O9 - Extra button: (no name) - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra 'Tools' menuitem: @xpsp3res.dll,-20001 - {e2e2dd38-d088-4134-82b7-f2ba38496583} - C:\WINDOWS\Network Diagnostic\xpnetdiag.exe
O9 - Extra button: Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O9 - Extra 'Tools' menuitem: Windows Messenger - {FB5F1910-F110-11d2-BB9E-00C04F795683} - C:\Program Files\Messenger\msmsgs.exe
O12 - Plugin for .spop: C:\Program Files\Internet Explorer\Plugins\NPDocBox.dll
O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab
O16 - DPF: {17492023-C23A-453E-A040-C7C580BBF700} (Windows Genuine Advantage Validation Tool) - http://go.microsoft.com/fwlink/?linkid=39204
O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab31267.cab
O16 - DPF: {55027008-315F-4F45-BBC3-8BE119764741} (Slide Image Uploader Control) - http://www.slide.com/uploader/SlideImageUploader.cab
O16 - DPF: {5F8469B4-B055-49DD-83F7-62B522420ECC} (Facebook Photo Uploader Control) - http://upload.facebook.com/controls/FacebookPhotoUploader.cab
O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab31267.cab
O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab
O16 - DPF: {DE625294-70E6-45ED-B895-CFFA13AEB044} (AxisMediaControlEmb Class) - http://217.22.201.135/activex/AMC.cab
O16 - DPF: {F5A7706B-B9C0-4C89-A715-7A0C6B05DD48} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab56986.cab
O22 - SharedTaskScheduler: kjlsjf9843nksngfdgffn - {C5AF49A2-94F3-42BD-F234-3604812C897D} - C:\WINDOWS\system32\ksfj83nwe.dll (file missing)
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe
O23 - Service: Network Driver Interface - Unknown owner - C:\DOCUME~1\Eileen\LOCALS~1\Temp\svchost.exe
O23 - Service: Pure Networks Net2Go Service (nmraapache) - Pure Networks, Inc. - C:\Program Files\Pure Networks\Network Magic\WebServer\bin\nmraapache.exe
O23 - Service: Pure Networks Network Magic Service (nmservice) - Pure Networks, Inc. - C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe
O23 - Service: Trend Micro Central Control Component (PcCtlCom) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
O23 - Service: Trend Micro Protection Against Spyware (PcScnSrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe
O23 - Service: Trend Micro Real-time Service (Tmntsrv) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
O23 - Service: Trend Micro Personal Firewall (TmPfw) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
O23 - Service: Trend Micro Proxy Service (tmproxy) - Trend Micro Inc. - C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
O24 - Desktop Component 0: (no name) - http://207.46.10.252/cgi-bin/getmsg/pic9.jpg?&msg=BCC162AD-09A4-4F5F-A722-7C5F1097FB73&start=0&len=77931&mimepart=3&curmbox=00000000-0000-0000-0000-000000000001&b=45cf5edc0ea994a81e153c11ff285cd7&disk=10.1.106.220_d2219&login=tic%2dtac%2dup%2dur%2dnose&domain=hotmail%2ecom&hm___sig=9cbf261b01c7498 c256d2de97f74fe64f3722478614ec45a

--
End of file - 9275 bytes

godsilla 07.09.2008 06:34

So habe jetz auch Malwarebytes drueber laufen lassen. Hier der Report...

Malwarebytes' Anti-Malware 1.26
Database version: 1120
Windows 5.1.2600 Service Pack 3

9/6/2008 11:28:53 PM
mbam-log-2008-09-06 (23-28-53).txt

Scan type: Full Scan (C:\|)
Objects scanned: 141165
Time elapsed: 2 hour(s), 30 minute(s), 46 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 2
Registry Keys Infected: 17
Registry Values Infected: 3
Registry Data Items Infected: 1
Folders Infected: 3
Files Infected: 86

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
C:\Program Files\webHancer\Programs\whiehlpr.dll (Adware.WebHancer) -> Delete on reboot.
C:\WINDOWS\system32\getsn32.dll (Trojan.Agent) -> Delete on reboot.

Registry Keys Infected:
HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj.1 (Adware.WebHancer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{c8cb3870-cdfe-11d3-976a-00e02913a9e0} (Adware.WebHancer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{c89435b0-cdfe-11d3-976a-00e02913a9e0} (Adware.WebHancer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{c900b400-cdfe-11d3-976a-00e02913a9e0} (Adware.WebHancer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c900b400-cdfe-11d3-976a-00e02913a9e0} (Adware.WebHancer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\TypeLib\{252874d8-5b00-4b93-a282-4ca656598278} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\Interface\{e221c81b-e518-4f93-b0d2-14e52065417a} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\CLSID\{2d9f1530-0b38-4dcb-a90a-cecd559f3514} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2d9f1530-0b38-4dcb-a90a-cecd559f3514} (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\IMAdvertiser (Adware.SearchTwo) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\whiehelperobj.whiehelperobj (Adware.WebHancer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\webHancer Agent (Adware.WebHancer) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\webHancer (Adware.WebHancer) -> Quarantined and deleted successfully.
HKEY_CLASSES_ROOT\getsn32.msiesn (Trojan.FakeAlert) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\network driver interface (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet003\Services\network driver interface (Trojan.Agent) -> Quarantined and deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\network driver interface (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\webhancer agent (Adware.Webhancer) -> Quarantined and deleted successfully.
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Desktop\General\wallpaper (Hijack.Desktop) -> Delete on reboot.
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\run (Trojan.Agent) -> Quarantined and deleted successfully.

Registry Data Items Infected:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr (Hijack.TaskManager) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Folders Infected:
C:\Program Files\webHancer (Adware.Webhancer) -> Delete on reboot.
C:\Program Files\webHancer\Programs (Adware.Webhancer) -> Delete on reboot.
C:\RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1015 (Trojan.Agent) -> Quarantined and deleted successfully.

Files Infected:
C:\Program Files\webHancer\Programs\whiehlpr.dll (Adware.WebHancer) -> Delete on reboot.
C:\Documents and Settings\***\Cookies\zobyl.exe (Trojan.Vundo) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\8205005F\newsys[1].exe (Rogue.Spymonitor) -> Quarantined and deleted successfully.
C:\Documents and Settings\LocalService\Local Settings\Temporary Internet Files\Content.IE5\HYTH0TIY\dkf[1].exe (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Program Files\webHancer\Programs\license.txt (Adware.Webhancer) -> Quarantined and deleted successfully.
C:\Program Files\webHancer\Programs\readme.txt (Adware.Webhancer) -> Quarantined and deleted successfully.
C:\Program Files\webHancer\Programs\sporder.dll (Adware.Webhancer) -> Quarantined and deleted successfully.
C:\Program Files\webHancer\Programs\whagent.exe (Adware.Webhancer) -> Quarantined and deleted successfully.
C:\Program Files\webHancer\Programs\whagent.ini (Adware.Webhancer) -> Quarantined and deleted successfully.
C:\Program Files\webHancer\Programs\whinstaller.exe (Adware.Webhancer) -> Quarantined and deleted successfully.
C:\RECYCLER\S-1-5-21-1482476501-1644491937-682003330-1015\Desktop.ini (Trojan.Agent) -> Quarantined and deleted successfully.
C:\WINDOWS\default.htm (Trojan.Agent) -> Delete on reboot.
C:\WINDOWS\system32\getsn32.dll (Trojan.Agent) -> Delete on reboot.
C:\Documents and Settings\LocalService\Application Data\Adobe\Manager.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\aagqh.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\bagxw.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\bgvqc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\bitxy.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\brznc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\cfkdj.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\dokzd.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\evmow.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ffghc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\gagdt.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ggvgi.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\hslfi.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\icdkd.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\idyuu.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ijahk.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ijgur.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\irxak.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ivtal.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\jbzie.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\joeti.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\jofbs.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\julvi.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\kmowk.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\larag.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\lukfy.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\mjycn.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\mmbfl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\mqubt.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\nmnmm.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\nygzr.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\pqann.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\qguju.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\qidpr.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\qiraf.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\qpccp.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\qtbmk.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\qweiv.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\rbbhi.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\reafh.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ruymo.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\rxbtx.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ssdgo.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\sufym.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\tshak.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\tsorz.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ttvdr.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\tvqvp.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\udcga.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\utfbf.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\utuvz.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\vomvc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\vqjuv.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\vrshb.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\wawrt.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\wphuw.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\wyckf.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\xcbxh.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\xhkkb.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\xiezt.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\xkehh.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\yazup.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ycofz.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\ykdjg.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\yxmcp.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\yytnr.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\zbvjc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\zcpkq.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\zjtcv.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\zvzvs.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\zwuyq.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Cookies\zyabi.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully.
C:\Documents and Settings\***\Local Settings\Temp\svchost.exe (Trojan.Agent) -> Delete on
reboot.


Naja das wars an sich. Hatte aber auch eine Meldung bekommen das manche Datein nicht geloescht werden koennen, und erst beim neustart geloescht werden. Naja ich hoffe mal das alles gut geht. Soll ich noch was machen um zu checken das alles weg ist?

godsilla 07.09.2008 06:58

So ich hatte meinen Pc neu gestartet. Aber der Virus ist immer noch drauf er konnte die dateien nicht loeschen.
Das waren die Dateinen die er nicht loeschen konnte..Siehe link unten ... -.-


http://img148.imageshack.us/my.php?image=fuckrs7.jpg


Langsam weis ich echt nicht mehr weiter. :schrei:
Gibt es kein Programm um dieses Teil zu loeschen?!

Silent sharK 07.09.2008 11:13

So, der Screen zeigt, das er die Dateien nur bei einem Reboot löschen kann. Hast du den Rechner neugestartet?

Zudem noch ist dein System schwerstens infiziert, vermutlich auch mit einem gefährlichen DDoS-fähigem Wurm.
Dir muss klar sein das man es durch diese Tools nie in einen 100% vertrauenswürdigen Zustand versetzen kann und das du umgehend alle Passwörter und Zugangsdaten von einem sauberen Rechner aus ändern sollst, btw. am infiziertem Rechner derweilen nichts heikles unternehmen.
Wenn Onlinebanking, etc. betrieben wurde solltest du deine Bank informieren und die Kontoauszüge auf Kontobewegungen prüfen.
Und ich weiß, wie du dir das Ganze eingefangen hast:
Zitat:

w*w .redtube.com
Auf solchen Seiten gibt es Malware wie Sand am Meer.

Wenn du noch auf Neuaufsetzen verzichten willst, folge den Schritt weiter:

ComboFix
  • Lade dir das Tool hier herunter auf den Desktop -> KLICK
Das Programm jedoch noch nicht starten sondern zuerst folgendes tun:
  • Schliesse alle Anwendungen und Programme, vor allem deine Antiviren-Software und andere Hintergrundwächter, sowie deinen Internetbrowser.
    Vermeide es auch explizit während das Combofix läuft die Maus und Tastatur zu benutzen.
  • Starte nun die combofix.exe von deinem Desktop aus, bestätige die Warnmeldungen und lass dein System durchsuchen.
  • Im Anschluss öffnet sich automatisch eine combofix.txt, diesen Inhalt bitte abkopieren und in deinen Beitrag einfügen. Das log findest du außerdem unter: C:\ComboFix.txt.
Wichtiger Hinweis:
Combofix darf ausschließlich ausgeführt werden wenn ein Kompetenzler dies ausdrücklich empfohlen hat!
Es sollte nie auf eigene Initiative hin ausgeführt werden! Eine falsche Benutzung kann ernsthafte Computerprobleme nach sich ziehen und eine Bereinigung der Infektion noch erschweren.
Hinweis: Combofix verhindert die Autostart Funktion aller CD / DVD und USB - Laufwerken um so eine Verbeitung einzudämmen. Wenn es hierdurch zu Problemen kommt, diese im Thread posten.

(ausführliche Anleitung -> Ein Leitfaden und Tutorium zur Nutzung von ComboFix)

godsilla 07.09.2008 19:10

Also ich habe den Pc neugestartet aber konnten trozdem nicht geloescht werden. Und im gegenteil es wurde immer schlimmer. Der Hintergrund hat sich steandig gewechselt. Und es haben sich immer mehr Seiten von allein geoeffnet. Wie ich den Virus bekommen habe weis ich nicht. Ich bin nicht der einzigste hir der den Pc benutzt.

Ich habe mal ein anderes Programm durchlaufen lassen. (Trojan Remover) Hat an sich eigentlich gut geholfen.. Es oeffnen sich keine fenster mehr, die Meldung das mein Pc versucht ist auch weg. Und der Pc lead auch wieder schneller. Das war der Report...

Teil1...:D

***** TROJAN REMOVER HAS RESTARTED THE SYSTEM *****
9/7/2008 11:56:59 AM: Trojan Remover has been restarted
9/7/2008 11:56:59 AM: Trojan Remover closed
************************************************************


***** NORMAL SCAN FOR ACTIVE MALWARE *****
Trojan Remover Ver 6.7.2.2539. For information, email support@simplysup1.com
[Registered to: mohd alhusain]
Scan started at: 11:53:45 AM 07 Sep 2008
Using Database v7108
Operating System: Windows XP SP3 [Windows XP Home Edition Service Pack 3 (Build 2600)]
File System: NTFS
Data directory: C:\Documents and Settings\Eileen\Application Data\Simply Super Software\Trojan Remover\
Database directory: C:\Program Files\Trojan Remover\
Logfile directory: C:\Documents and Settings\Eileen\My Documents\Simply Super Software\Trojan Remover Logfiles\
Program directory: C:\Program Files\Trojan Remover\
Running with Administrator privileges

************************************************************

************************************************************
11:53:45 AM: Scanning ----------WIN.INI-----------
WIN.INI found in C:\WINDOWS

************************************************************
11:53:45 AM: Scanning --------SYSTEM.INI---------
SYSTEM.INI found in C:\WINDOWS

************************************************************
11:53:45 AM: ----- SCANNING FOR ROOTKIT SERVICES -----
No hidden Services were detected.

************************************************************
11:53:47 AM: Scanning -----WINDOWS REGISTRY-----
--------------------
Checking HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
This key's "Shell" value calls the following program(s):
File: Explorer.exe
C:\WINDOWS\Explorer.exe
1033728 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
----------
This key's "Userinit" value calls the following program(s):
File: C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\system32\userinit.exe
26112 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
----------
This key's "System" value appears to be blank
----------
This key's "UIHost" value calls the following program:
File: logonui.exe
C:\WINDOWS\system32\logonui.exe
514560 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
----------
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
--------------------
Checking HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Value Name: load
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Value Name: Cmaudio
Value Data: RunDll32 cmicnfg.cpl,CMICtrlWnd
cmicnfg.cpl [file not found to scan]
--------------------
Value Name: NeroFilterCheck
Value Data: C:\WINDOWS\system32\NeroCheck.exe
C:\WINDOWS\system32\NeroCheck.exe
155648 bytes
Created: 9/23/2006
Modified: 7/9/2001
Company: Ahead Software Gmbh
--------------------
Value Name: SoundMan
Value Data: SOUNDMAN.EXE
C:\WINDOWS\SOUNDMAN.EXE
577536 bytes
Created: 9/23/2006
Modified: 3/1/2006
Company: Realtek Semiconductor Corp.
--------------------
Value Name: SunJavaUpdateSched
Value Data: "C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe"
C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe
49263 bytes
Created: 2/17/2007
Modified: 10/12/2006
Company: Sun Microsystems, Inc.
--------------------
Value Name: Creative WebCam Tray
Value Data: C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
245760 bytes
Created: 9/29/2006
Modified: 7/30/2004
Company: Creative Technology Ltd
--------------------
Value Name: SiS Tray
Value Data:
Blank entry: []
--------------------
Value Name: SiS KHooker
Value Data: C:\WINDOWS\system32\khooker.exe
C:\WINDOWS\system32\khooker.exe [file not found to scan]
--------------------
Value Name: nmapp
Value Data: "C:\Program Files\Pure Networks\Network Magic\nmapp.exe" -autorun -nosplash
C:\Program Files\Pure Networks\Network Magic\nmapp.exe
321088 bytes
Created: 11/1/2006
Modified: 11/1/2006
Company: Pure Networks, Inc.
--------------------
Value Name: pccguide.exe
Value Data: C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
3429904 bytes
Created: 1/23/2007
Modified: 1/23/2007
Company: Trend Micro Inc.
--------------------
Value Name: AppleSyncNotifier
Value Data: C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
116040 bytes
Created: 7/22/2008
Modified: 7/22/2008
Company: Apple Inc.
--------------------
Value Name: QuickTime Task
Value Data: "C:\Program Files\QuickTime\QTTask.exe" -atboottime
C:\Program Files\QuickTime\QTTask.exe
413696 bytes
Created: 5/27/2008
Modified: 5/27/2008
Company: Apple Inc.

godsilla 07.09.2008 19:11

Teil 2 :aufsmaul:

--------------------
Value Name: iTunesHelper
Value Data: "C:\Program Files\iTunes\iTunesHelper.exe"
C:\Program Files\iTunes\iTunesHelper.exe
289064 bytes
Created: 7/30/2008
Modified: 7/30/2008
Company: Apple Inc.
--------------------
Value Name: UserFaultCheck
Value Data: %systemroot%\system32\dumprep 0 -u
C:\WINDOWS\system32\dumprep 0 -u [file not found to scan]
--------------------
Value Name: TrojanScanner
Value Data: C:\Program Files\Trojan Remover\Trjscan.exe /boot
C:\Program Files\Trojan Remover\Trjscan.exe
914512 bytes
Created: 9/7/2008
Modified: 8/19/2008
Company: Simply Super Software
--------------------
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
This Registry Key appears to be empty
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
This Registry Key appears to be empty
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce
This Registry Key appears to be empty
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
This Registry Key appears to be empty
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Value Name: MsnMsgr
Value Data: "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
C:\Program Files\MSN Messenger\MsnMsgr.Exe
5674352 bytes
Created: 1/19/2007
Modified: 1/19/2007
Company: Microsoft Corporation
--------------------
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
This Registry Key appears to be empty
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
This Registry Key appears to be empty
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
This Registry Key appears to be empty
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
This Registry Key appears to be empty

************************************************************
11:53:50 AM: Scanning -----SHELLEXECUTEHOOKS-----
ValueName: {AEB6717E-7E19-11d0-97EE-00C04FD91972}
File: shell32.dll - this file is expected and has been left in place
----------

************************************************************
11:53:50 AM: Scanning -----HIDDEN REGISTRY ENTRIES-----
Taskdir check completed
----------
No Hidden File-loading Registry Entries found
----------

************************************************************
11:53:51 AM: Scanning -----ACTIVE SCREENSAVER-----
ScreenSaver: C:\WINDOWS\system32\logon.scr
C:\WINDOWS\system32\logon.scr
220672 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
--------------------

************************************************************
11:53:51 AM: Scanning ----- REGISTRY ACTIVE SETUP KEYS -----
Key: {02C7D67F-6411-CD67-0202-030608030602}
Path: C:\WINDOWS\system32\Smiley.exe
C:\WINDOWS\system32\Smiley.exe
1185792 bytes
Created: 8/4/2004
Modified: 8/4/2004
Company:
----------
Key: {4b218e3e-bc98-4770-93d3-2731b9329278}
Path: %SystemRoot%\System32\rundll32.exe setupapi,InstallHinfSection MarketplaceLinkInstall 896 %systemroot%\inf\ie.inf
setupapi,InstallHinfSection MarketplaceLinkInstall 896 %systemroot%\inf\ie.inf [file not found to scan]
----------

************************************************************
11:53:53 AM: Scanning ----- SERVICEDLL REGISTRY KEYS -----
Key: AppMgmt
%SystemRoot%\System32\appmgmts.dll - file is globally excluded (file cannot be found)
--------------------
Key: HidServ
%SystemRoot%\System32\hidserv.dll - file is globally excluded (file cannot be found)
--------------------

************************************************************
11:53:55 AM: Scanning ----- SERVICES REGISTRY KEYS -----
Key: Apple Mobile Device
ImagePath: "C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe"
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
116040 bytes
Created: 7/22/2008
Modified: 7/22/2008
Company: Apple Inc.
----------
Key: Bonjour Service
ImagePath: "C:\Program Files\Bonjour\mDNSResponder.exe"
C:\Program Files\Bonjour\mDNSResponder.exe
229376 bytes
Created: 7/24/2007
Modified: 7/24/2007
Company: Apple Inc.
----------
Key: cmuda
ImagePath: system32\drivers\cmuda.sys
C:\WINDOWS\system32\drivers\cmuda.sys
1373120 bytes
Created: 6/9/2006
Modified: 6/9/2006
Company: C-Media Inc
----------
Key: IDriverT
ImagePath: "C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe"
C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
69632 bytes
Created: 4/4/2005
Modified: 4/4/2005
Company: Macrovision Corporation
----------
Key: ms_mpu401
ImagePath: system32\drivers\msmpu401.sys
C:\WINDOWS\system32\drivers\msmpu401.sys
2944 bytes
Created: 7/12/2006
Modified: 8/17/2001
Company: Microsoft Corporation
----------
Key: nmraapache
ImagePath: "C:\Program Files\Pure Networks\Network Magic\WebServer\bin\nmraapache.exe" -k runservice
C:\Program Files\Pure Networks\Network Magic\WebServer\bin\nmraapache.exe
12800 bytes
Created: 10/14/2006
Modified: 10/14/2006
Company: Pure Networks, Inc.
----------
Key: nmservice
ImagePath: "C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe"
C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe
321088 bytes
Created: 11/1/2006
Modified: 11/1/2006
Company: Pure Networks, Inc.
----------
Key: PcCtlCom
ImagePath: C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
1922576 bytes
Created: 1/23/2007
Modified: 1/23/2007
Company: Trend Micro Inc.
----------
Key: PcScnSrv
ImagePath: "C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe"
C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe
214544 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: PD0620VID
ImagePath: system32\DRIVERS\P0620Vid.sys
C:\WINDOWS\system32\DRIVERS\P0620Vid.sys
-R- 91577 bytes
Created: 9/29/2006
Modified: 7/28/2004
Company: Creative Technology Ltd.
----------
Key: pnarp
ImagePath: system32\DRIVERS\pnarp.sys
C:\WINDOWS\system32\DRIVERS\pnarp.sys
25792 bytes
Created: 3/3/2007
Modified: 2/8/2007
Company: Pure Networks, Inc.
----------
Key: purendis
ImagePath: system32\DRIVERS\purendis.sys
C:\WINDOWS\system32\DRIVERS\purendis.sys
26944 bytes
Created: 3/3/2007
Modified: 2/8/2007
Company: Pure Networks, Inc.
----------
Key: SiS315
ImagePath: system32\DRIVERS\sisgrp.sys
C:\WINDOWS\system32\DRIVERS\sisgrp.sys
432384 bytes
Created: 2/6/2002
Modified: 1/6/2004
Company: Silicon Integrated Systems Corporation
----------
Key: sisagp
ImagePath: system32\DRIVERS\SISAGPX.sys
C:\WINDOWS\system32\DRIVERS\SISAGPX.sys
30720 bytes
Created: 10/26/2006
Modified: 1/13/2003
Company: Silicon Integrated Systems Corporation
----------
Key: SiSkp
ImagePath: system32\drivers\srvkp.sys
C:\WINDOWS\system32\drivers\srvkp.sys
11264 bytes
Created: 10/26/2006
Modified: 10/2/2003
Company: Silicon Integrated Systems Corporation
----------
Key: SwPrv
ImagePath: C:\WINDOWS\system32\dllhost.exe /Processid:{FF3D0FB8-7566-42EE-91DC-CECE1B972A55}
C:\WINDOWS\system32\dllhost.exe
5120 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
----------
Key: tmcfw
ImagePath: system32\DRIVERS\TM_CFW.sys
C:\WINDOWS\system32\DRIVERS\TM_CFW.sys
288848 bytes
Created: 9/7/2007
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: tmcomm
ImagePath: \??\C:\WINDOWS\system32\drivers\tmcomm.sys
C:\WINDOWS\system32\drivers\tmcomm.sys
138384 bytes
Created: 12/29/2006
Modified: 12/24/2007
Company: Trend Micro Inc.
----------
Key: tmmbd
ImagePath: system32\DRIVERS\tm_mbd_c.sys
C:\WINDOWS\system32\DRIVERS\tm_mbd_c.sys
111888 bytes
Created: 9/7/2007
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: Tmntsrv
ImagePath: C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
480784 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: TmPfw
ImagePath: C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
943696 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: tmpreflt
ImagePath: system32\DRIVERS\tmpreflt.sys
C:\WINDOWS\system32\DRIVERS\tmpreflt.sys
36368 bytes
Created: 9/7/2007
Modified: 7/18/2008
Company: Trend Micro Inc.
----------
Key: tmproxy
ImagePath: C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
566872 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.

godsilla 07.09.2008 19:12

Teil 3 :lach:

----------
Key: tmtdi
ImagePath: system32\DRIVERS\tmtdi.sys
C:\WINDOWS\system32\DRIVERS\tmtdi.sys
75088 bytes
Created: 9/7/2007
Modified: 12/29/2006
Company: Trend Micro Incorporated.
----------
Key: tmxpflt
ImagePath: system32\DRIVERS\tmxpflt.sys
C:\WINDOWS\system32\DRIVERS\tmxpflt.sys
205328 bytes
Created: 9/7/2007
Modified: 7/18/2008
Company: Trend Micro Inc.
----------
Key: USBAAPL
ImagePath: System32\Drivers\usbaapl.sys
C:\WINDOWS\System32\Drivers\usbaapl.sys
32000 bytes
Created: 9/3/2008
Modified: 7/22/2008
Company: Apple, Inc.
----------
Key: usnjsvc
ImagePath: "C:\Program Files\MSN Messenger\usnsvc.exe"
C:\Program Files\MSN Messenger\usnsvc.exe
97136 bytes
Created: 1/19/2007
Modified: 1/19/2007
Company: Microsoft Corporation
----------
Key: vsapint
ImagePath: system32\DRIVERS\vsapint.sys
C:\WINDOWS\system32\DRIVERS\vsapint.sys
1195448 bytes
Created: 9/7/2007
Modified: 7/18/2008
Company: Trend Micro Inc.
----------

************************************************************
11:54:03 AM: Scanning -----VXD ENTRIES-----

************************************************************
11:54:03 AM: Scanning ----- WINLOGON\NOTIFY DLLS -----

************************************************************
11:54:04 AM: Scanning ----- CONTEXTMENUHANDLERS -----
Key: {48F45200-91E6-11CE-8A4F-0080C81A28D4}
Path: C:\Program Files\Trend Micro\Internet Security 2007\Tmdshell.dll
C:\Program Files\Trend Micro\Internet Security 2007\Tmdshell.dll
292368 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.
----------

************************************************************
11:54:04 AM: Scanning ----- FOLDER\COLUMNHANDLERS -----

************************************************************
11:54:04 AM: Scanning ----- BROWSER HELPER OBJECTS -----
Key: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}
BHO: C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
37808 bytes
Created: 9/23/2006
Modified: 3/2/2001
Company:
----------
Key: {2D9F1530-0B38-4DCB-A90A-CECD559F3514}
BHO: C:\WINDOWS\system32\getsn32.dll
C:\WINDOWS\system32\getsn32.dll
15360 bytes
Created: 9/6/2008
Modified: 9/7/2008
Company: Microsoft Corporation
----------
Key: {AA58ED58-01DD-4d91-8333-CF10577473F7}
BHO: c:\program files\google\googletoolbar3.dll
c:\program files\google\googletoolbar3.dll
-R- 2403392 bytes
Created: 10/14/2007
Modified: 1/19/2007
Company: Google Inc.
----------

************************************************************
11:54:06 AM: Scanning ----- SHELLSERVICEOBJECTS -----

************************************************************
11:54:06 AM: Scanning ----- SHAREDTASKSCHEDULER ENTRIES -----
Value: {C5AF49A2-94F3-42BD-F234-3604812C897D}
Comment: kjlsjf9843nksngfdgffn
File: C:\WINDOWS\system32\ksfj83nwe.dll
C:\WINDOWS\system32\ksfj83nwe.dll [file not found to scan]
----------

************************************************************
11:54:06 AM: Scanning ----- IMAGEFILE DEBUGGERS -----
No "Debugger" entries found.

************************************************************
11:54:07 AM: Scanning ----- APPINIT_DLLS -----
The AppInit_DLLs value is blank

************************************************************
11:54:07 AM: Scanning ----- SECURITY PROVIDER DLLS -----

************************************************************
11:54:07 AM: Scanning ------ USER STARTUP GROUPS ------
Checking Startup Group for All Users
[C:\WINDOWS\Profiles\All Users\Start Menu\Programs\StartUp]
No Startup files for All Users were located to check

************************************************************
11:54:07 AM: Scanning ------ COMMON STARTUP GROUP ------
[C:\Documents and Settings\All Users\Start Menu\Programs\Startup]
The Common Startup Group attempts to load the following file(s) at boot time:
C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
110592 bytes
Created: 12/9/2006
Modified: 8/24/2000
Company: Adobe Systems, Inc.
Adobe Gamma Loader.exe.lnk - links to C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
--------------------
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\desktop.ini
-HS- 84 bytes
Created: 7/12/2006
Modified: 7/12/2006
Company:
--------------------
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
282624 bytes
Created: 2/20/2007
Modified: 2/20/2007
Company: Eastman Kodak Company
Kodak EasyShare software.lnk - links to C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
--------------------
C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
16423 bytes
Created: 2/13/2004
Modified: 2/13/2004
Company:
KODAK Software Updater.lnk - links to C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
--------------------

************************************************************
11:54:09 AM: Scanning ------ USER STARTUP GROUPS ------
--------------------
Checking Startup Group for: Administrator
[C:\Documents and Settings\Administrator\START MENU\PROGRAMS\STARTUP]
The Startup Group for Administrator attempts to load the following file(s):
C:\Documents and Settings\Administrator\START MENU\PROGRAMS\STARTUP\desktop.ini
-HS- 84 bytes
Created: 9/27/2006
Modified: 7/12/2006
Company:
----------
--------------------
Checking Startup Group for: Eileen
[C:\Documents and Settings\Eileen\START MENU\PROGRAMS\STARTUP]
The Startup Group for Eileen attempts to load the following file(s):
C:\Documents and Settings\Eileen\START MENU\PROGRAMS\STARTUP\desktop.ini
-HS- 84 bytes
Created: 7/12/2006
Modified: 7/12/2006
Company:
----------
C:\Program Files\LimeWire\LimeWire.exe
147456 bytes
Created: 2/8/2008
Modified: 2/8/2008
Company: Lime Wire, LLC
LimeWire On Startup.lnk - links to C:\Program Files\LimeWire\LimeWire.exe
----------

************************************************************
11:54:10 AM: Scanning ----- SCHEDULED TASKS -----
Taskname: AppleSoftwareUpdate.job
File: C:\Program Files\Apple Software Update\SoftwareUpdate.exe
C:\Program Files\Apple Software Update\SoftwareUpdate.exe
566592 bytes
Created: 4/11/2008
Modified: 4/11/2008
Company: Apple Inc.
Parameters: -task
Next Run Time: 9/9/2008 1:43:00 PM
Status: The task has not yet run
Creator: SYSTEM
Comments: [blank]
----------

************************************************************
11:54:10 AM: Scanning ----- SHELLICONOVERLAYIDENTIFIERS -----

************************************************************
11:54:10 AM: ----- ADDITIONAL CHECKS -----
PE386 rootkit checks completed
----------
Winlogon registry rootkit checks completed
----------
Heuristic checks for hidden files/drivers completed
----------
Layered Service Provider entries checks completed
----------
Windows Explorer Policies checks completed
----------
Desktop Wallpaper: C:\Documents and Settings\Eileen\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
C:\Documents and Settings\Eileen\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
1440054 bytes
Created: 9/23/2006
Modified: 5/12/2007
Company:
----------
Web Desktop Wallpaper entry is blank
----------
Additional checks completed

************************************************************
11:54:13 AM: Scanning ----- RUNNING PROCESSES -----

C:\WINDOWS\System32\smss.exe
--------------------
C:\WINDOWS\system32\csrss.exe
--------------------
C:\WINDOWS\system32\winlogon.exe
--------------------
C:\WINDOWS\system32\services.exe
--------------------
C:\WINDOWS\system32\lsass.exe
--------------------
C:\WINDOWS\system32\svchost.exe
--------------------
C:\WINDOWS\system32\svchost.exe
--------------------
C:\WINDOWS\System32\svchost.exe
--------------------
C:\WINDOWS\system32\svchost.exe
--------------------
C:\WINDOWS\system32\svchost.exe
--------------------
C:\WINDOWS\system32\spoolsv.exe
--------------------
C:\WINDOWS\Explorer.EXE
--------------------
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
--------------------
C:\Program Files\Bonjour\mDNSResponder.exe
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe
--------------------
C:\WINDOWS\system32\svchost.exe
--------------------
C:\WINDOWS\SOUNDMAN.EXE
--------------------
C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe
--------------------
C:\Program Files\Creative\Shared Files\CAMTRAY.EXE

Silent sharK 07.09.2008 19:13

Sorry, aber wenn du dich nicht an die Anweisungen haltest, kann dir auch nicht geholfen werden.

Von "Trojan Remover" halte ich nicht viel, ist für mich unnötig wie ein Kropf. :juul:

godsilla 07.09.2008 19:13

Teil 4 :teufel3:

--------------------
C:\Program Files\Pure Networks\Network Magic\nmapp.exe
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
--------------------
C:\Program Files\QuickTime\QTTask.exe
--------------------
C:\Program Files\iTunes\iTunesHelper.exe
--------------------
C:\Program Files\MSN Messenger\MsnMsgr.Exe
--------------------
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
--------------------
C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
--------------------
C:\Program Files\LimeWire\LimeWire.exe
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
--------------------
C:\WINDOWS\system32\wdfmgr.exe
--------------------
C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe
--------------------
C:\Program Files\iPod\bin\iPodService.exe
--------------------
C:\WINDOWS\System32\alg.exe
--------------------
C:\Program Files\Internet Explorer\iexplore.exe
--------------------
C:\Documents and Settings\Eileen\Application Data\Simply Super Software\Trojan Remover\pey44.exe
FileSize: 2548288
[This is a Trojan Remover component]
--------------------
--------------------

************************************************************
11:54:17 AM: Checking AUTOEXEC.BAT file
AUTOEXEC.BAT found in C:\
No malicious entries were found in the AUTOEXEC.BAT file

************************************************************
11:54:17 AM: Checking AUTOEXEC.NT file
AUTOEXEC.NT found in C:\WINDOWS\system32
No malicious entries were found in the AUTOEXEC.NT file

************************************************************
11:54:17 AM: Checking HOSTS file
No malicious entries were found in the HOSTS file

************************************************************
------ INTERNET EXPLORER HOME/START/SEARCH SETTINGS ------
HKLM\Software\Microsoft\Internet Explorer\Main\"Start Page":
http://www.microsoft.com/isapi/redir.dll?prd={SUB_PRD}&clcid={SUB_CLSID}&pver={SUB_PVER}&ar=home
HKLM\Software\Microsoft\Internet Explorer\Main\"Local Page":
%SystemRoot%\system32\blank.htm
HKLM\Software\Microsoft\Internet Explorer\Main\"Search Page":
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKLM\Software\Microsoft\Internet Explorer\Main\"Default_Page_URL":
http://www.microsoft.com/isapi/redir.dll?prd=ie&pver=6&ar=msnhome
HKLM\Software\Microsoft\Internet Explorer\Main\"Default_Search_URL":
http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKLM\Software\Microsoft\Internet Explorer\Search\"CustomizeSearch":
http://ie.search.msn.com/{SUB_RFC1766}/srchasst/srchcust.htm
HKLM\Software\Microsoft\Internet Explorer\Search\"SearchAssistant":
http://www.google.com/ie
HKCU\Software\Microsoft\Internet Explorer\Main\"Start Page":
http://start.shaw.ca/start/enCA
HKCU\Software\Microsoft\Internet Explorer\Main\"Local Page":
C:\WINDOWS\system32\blank.htm
HKCU\Software\Microsoft\Internet Explorer\Main\"Search Page":
http://www.google.com

************************************************************
=== NO CHANGES HAVE BEEN MADE TO YOUR SYSTEM FILES ===
Scan completed at: 11:54:17 AM 07 Sep 2008
-------------------------------------------------------------------------
One or more files could not be moved or renamed as requested.
They may be in use by Windows, so Trojan Remover needs
to restart the system in order to deal with these files.
9/7/2008 11:54:37 AM: restart commenced
************************************************************


***** NORMAL SCAN FOR ACTIVE MALWARE *****
Trojan Remover Ver 6.7.2.2539. For information, email support@simplysup1.com
[Registered to: mohd alhusain]
Scan started at: 11:40:17 AM 07 Sep 2008
Using Database v7108
Operating System: Windows XP SP3 [Windows XP Home Edition Service Pack 3 (Build 2600)]
File System: NTFS
Data directory: C:\Documents and Settings\Eileen\Application Data\Simply Super Software\Trojan Remover\
Database directory: C:\Program Files\Trojan Remover\
Logfile directory: C:\Documents and Settings\Eileen\My Documents\Simply Super Software\Trojan Remover Logfiles\
Program directory: C:\Program Files\Trojan Remover\
Running with Administrator privileges

************************************************************
The regfile\shell\open\command Registry Key appears to have been modified.
The current Registry entry is: regedit.exe "%1" %*.
This entry calls the following file:
C:\WINDOWS\regedit.exe
Trojan Remover has restored the Registry regfile\shell\open key.
--------------------

************************************************************
11:40:46 AM: Scanning ----------WIN.INI-----------
WIN.INI found in C:\WINDOWS

************************************************************
11:40:46 AM: Scanning --------SYSTEM.INI---------
SYSTEM.INI found in C:\WINDOWS

************************************************************
11:40:46 AM: ----- SCANNING FOR ROOTKIT SERVICES -----
No hidden Services were detected.

************************************************************
11:40:48 AM: Scanning -----WINDOWS REGISTRY-----
--------------------
Checking HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
This key's "Shell" value calls the following program(s):
File: Explorer.exe
C:\WINDOWS\Explorer.exe
1033728 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
----------
This key's "Userinit" value calls the following program(s):
File: C:\WINDOWS\system32\userinit.exe
C:\WINDOWS\system32\userinit.exe
26112 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
----------
File: C:\WINDOWS\system32\uesiuqcr.exe
C:\WINDOWS\system32\uesiuqcr.exe
85008 bytes
Created: 9/6/2008
Modified: 9/6/2008
Company: Microsoft Corporation
C:\WINDOWS\system32\uesiuqcr.exe - running process located and terminated
C:\WINDOWS\system32\uesiuqcr.exe - file renamed to: C:\WINDOWS\system32\uesiuqcr.exe.vir
----------
This key's "System" value appears to be blank
----------
This key's "UIHost" value calls the following program:
File: logonui.exe
C:\WINDOWS\system32\logonui.exe
514560 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
----------
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
--------------------
Checking HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows
Value Name: load
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Value Name: Cmaudio
Value Data: RunDll32 cmicnfg.cpl,CMICtrlWnd
cmicnfg.cpl [file not found to scan]
--------------------
Value Name: NeroFilterCheck
Value Data: C:\WINDOWS\system32\NeroCheck.exe
C:\WINDOWS\system32\NeroCheck.exe
155648 bytes
Created: 9/23/2006
Modified: 7/9/2001
Company: Ahead Software Gmbh
--------------------
Value Name: SoundMan
Value Data: SOUNDMAN.EXE
C:\WINDOWS\SOUNDMAN.EXE
577536 bytes
Created: 9/23/2006
Modified: 3/1/2006
Company: Realtek Semiconductor Corp.
--------------------
Value Name: SunJavaUpdateSched
Value Data: "C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe"
C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe
49263 bytes
Created: 2/17/2007
Modified: 10/12/2006
Company: Sun Microsystems, Inc.
--------------------
Value Name: Creative WebCam Tray
Value Data: C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
245760 bytes
Created: 9/29/2006
Modified: 7/30/2004
Company: Creative Technology Ltd
--------------------
Value Name: SiS Tray
Value Data:
Blank entry: []
--------------------
Value Name: SiS KHooker
Value Data: C:\WINDOWS\system32\khooker.exe
C:\WINDOWS\system32\khooker.exe [file not found to scan]
--------------------
Value Name: nmapp
Value Data: "C:\Program Files\Pure Networks\Network Magic\nmapp.exe" -autorun -nosplash
C:\Program Files\Pure Networks\Network Magic\nmapp.exe
321088 bytes
Created: 11/1/2006
Modified: 11/1/2006
Company: Pure Networks, Inc.
--------------------
Value Name: pccguide.exe
Value Data: C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
3429904 bytes
Created: 1/23/2007
Modified: 1/23/2007
Company: Trend Micro Inc.
--------------------
Value Name: AppleSyncNotifier
Value Data: C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleSyncNotifier.exe
116040 bytes
Created: 7/22/2008
Modified: 7/22/2008
Company: Apple Inc.
--------------------
Value Name: QuickTime Task
Value Data: "C:\Program Files\QuickTime\QTTask.exe" -atboottime
C:\Program Files\QuickTime\QTTask.exe
413696 bytes
Created: 5/27/2008
Modified: 5/27/2008
Company: Apple Inc.
--------------------
Value Name: iTunesHelper
Value Data: "C:\Program Files\iTunes\iTunesHelper.exe"
C:\Program Files\iTunes\iTunesHelper.exe
289064 bytes
Created: 7/30/2008
Modified: 7/30/2008
Company: Apple Inc.
--------------------
Value Name: UserFaultCheck
Value Data: %systemroot%\system32\dumprep 0 -u
C:\WINDOWS\system32\dumprep 0 -u [file not found to scan]
--------------------
Value Name: TrojanScanner
Value Data: C:\Program Files\Trojan Remover\Trjscan.exe /boot
C:\Program Files\Trojan Remover\Trjscan.exe
914512 bytes
Created: 9/7/2008
Modified: 8/19/2008
Company: Simply Super Software
--------------------

godsilla 07.09.2008 19:14

Teil 5 ;)

--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
This Registry Key appears to be empty
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
This Registry Key appears to be empty
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServicesOnce
This Registry Key appears to be empty
--------------------
Checking HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
This Registry Key appears to be empty
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Value Name: MsnMsgr
Value Data: "C:\Program Files\MSN Messenger\MsnMsgr.Exe" /background
C:\Program Files\MSN Messenger\MsnMsgr.Exe
5674352 bytes
Created: 1/19/2007
Modified: 1/19/2007
Company: Microsoft Corporation
--------------------
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce
This Registry Key appears to be empty
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
This Registry Key appears to be empty
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
This Registry Key appears to be empty
--------------------
Checking HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
This Registry Key appears to be empty

************************************************************
11:41:34 AM: Scanning -----SHELLEXECUTEHOOKS-----
ValueName: {AEB6717E-7E19-11d0-97EE-00C04FD91972}
File: shell32.dll - this file is expected and has been left in place
----------

************************************************************
11:41:34 AM: Scanning -----HIDDEN REGISTRY ENTRIES-----
Taskdir check completed
----------
No Hidden File-loading Registry Entries found
----------

************************************************************
11:41:34 AM: Scanning -----ACTIVE SCREENSAVER-----
ScreenSaver: C:\WINDOWS\system32\logon.scr
C:\WINDOWS\system32\logon.scr
220672 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
--------------------

************************************************************
11:41:35 AM: Scanning ----- REGISTRY ACTIVE SETUP KEYS -----
Key: {02C7D67F-6411-CD67-0202-030608030602}
Path: C:\WINDOWS\system32\Smiley.exe
C:\WINDOWS\system32\Smiley.exe
1185792 bytes
Created: 8/4/2004
Modified: 8/4/2004
Company:
----------
Key: {4b218e3e-bc98-4770-93d3-2731b9329278}
Path: %SystemRoot%\System32\rundll32.exe setupapi,InstallHinfSection MarketplaceLinkInstall 896 %systemroot%\inf\ie.inf
setupapi,InstallHinfSection MarketplaceLinkInstall 896 %systemroot%\inf\ie.inf [file not found to scan]
----------

************************************************************
11:41:36 AM: Scanning ----- SERVICEDLL REGISTRY KEYS -----
Key: AppMgmt
%SystemRoot%\System32\appmgmts.dll - file is globally excluded (file cannot be found)
--------------------
Key: HidServ
%SystemRoot%\System32\hidserv.dll - file is globally excluded (file cannot be found)
--------------------

************************************************************
11:41:39 AM: Scanning ----- SERVICES REGISTRY KEYS -----
Key: Apple Mobile Device
ImagePath: "C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe"
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
116040 bytes
Created: 7/22/2008
Modified: 7/22/2008
Company: Apple Inc.
----------
Key: Bonjour Service
ImagePath: "C:\Program Files\Bonjour\mDNSResponder.exe"
C:\Program Files\Bonjour\mDNSResponder.exe
229376 bytes
Created: 7/24/2007
Modified: 7/24/2007
Company: Apple Inc.
----------
Key: cmuda
ImagePath: system32\drivers\cmuda.sys
C:\WINDOWS\system32\drivers\cmuda.sys
1373120 bytes
Created: 6/9/2006
Modified: 6/9/2006
Company: C-Media Inc
----------
Key: IDriverT
ImagePath: "C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe"
C:\Program Files\Common Files\InstallShield\Driver\11\Intel 32\IDriverT.exe
69632 bytes
Created: 4/4/2005
Modified: 4/4/2005
Company: Macrovision Corporation
----------
Key: ms_mpu401
ImagePath: system32\drivers\msmpu401.sys
C:\WINDOWS\system32\drivers\msmpu401.sys
2944 bytes
Created: 7/12/2006
Modified: 8/17/2001
Company: Microsoft Corporation
----------
Key: nmraapache
ImagePath: "C:\Program Files\Pure Networks\Network Magic\WebServer\bin\nmraapache.exe" -k runservice
C:\Program Files\Pure Networks\Network Magic\WebServer\bin\nmraapache.exe
12800 bytes
Created: 10/14/2006
Modified: 10/14/2006
Company: Pure Networks, Inc.
----------
Key: nmservice
ImagePath: "C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe"
C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe
321088 bytes
Created: 11/1/2006
Modified: 11/1/2006
Company: Pure Networks, Inc.
----------
Key: PcCtlCom
ImagePath: C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
1922576 bytes
Created: 1/23/2007
Modified: 1/23/2007
Company: Trend Micro Inc.
----------
Key: PcScnSrv
ImagePath: "C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe"
C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe
214544 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: PD0620VID
ImagePath: system32\DRIVERS\P0620Vid.sys
C:\WINDOWS\system32\DRIVERS\P0620Vid.sys
-R- 91577 bytes
Created: 9/29/2006
Modified: 7/28/2004
Company: Creative Technology Ltd.
----------
Key: pnarp
ImagePath: system32\DRIVERS\pnarp.sys
C:\WINDOWS\system32\DRIVERS\pnarp.sys
25792 bytes
Created: 3/3/2007
Modified: 2/8/2007
Company: Pure Networks, Inc.
----------
Key: purendis
ImagePath: system32\DRIVERS\purendis.sys
C:\WINDOWS\system32\DRIVERS\purendis.sys
26944 bytes
Created: 3/3/2007
Modified: 2/8/2007
Company: Pure Networks, Inc.
----------
Key: SiS315
ImagePath: system32\DRIVERS\sisgrp.sys
C:\WINDOWS\system32\DRIVERS\sisgrp.sys
432384 bytes
Created: 2/6/2002
Modified: 1/6/2004
Company: Silicon Integrated Systems Corporation
----------
Key: sisagp
ImagePath: system32\DRIVERS\SISAGPX.sys
C:\WINDOWS\system32\DRIVERS\SISAGPX.sys
30720 bytes
Created: 10/26/2006
Modified: 1/13/2003
Company: Silicon Integrated Systems Corporation
----------
Key: SiSkp
ImagePath: system32\drivers\srvkp.sys
C:\WINDOWS\system32\drivers\srvkp.sys
11264 bytes
Created: 10/26/2006
Modified: 10/2/2003
Company: Silicon Integrated Systems Corporation
----------
Key: SwPrv
ImagePath: C:\WINDOWS\system32\dllhost.exe /Processid:{FF3D0FB8-7566-42EE-91DC-CECE1B972A55}
C:\WINDOWS\system32\dllhost.exe
5120 bytes
Created: 8/4/2004
Modified: 4/13/2008
Company: Microsoft Corporation
----------
Key: tmcfw
ImagePath: system32\DRIVERS\TM_CFW.sys
C:\WINDOWS\system32\DRIVERS\TM_CFW.sys
288848 bytes
Created: 9/7/2007
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: tmcomm
ImagePath: \??\C:\WINDOWS\system32\drivers\tmcomm.sys
C:\WINDOWS\system32\drivers\tmcomm.sys
138384 bytes
Created: 12/29/2006
Modified: 12/24/2007
Company: Trend Micro Inc.
----------
Key: tmmbd
ImagePath: system32\DRIVERS\tm_mbd_c.sys
C:\WINDOWS\system32\DRIVERS\tm_mbd_c.sys
111888 bytes
Created: 9/7/2007
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: Tmntsrv
ImagePath: C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
480784 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: TmPfw
ImagePath: C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
943696 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.
----------

godsilla 07.09.2008 19:16

Teil 6:killpc:

----------
Key: tmpreflt
ImagePath: system32\DRIVERS\tmpreflt.sys
C:\WINDOWS\system32\DRIVERS\tmpreflt.sys
36368 bytes
Created: 9/7/2007
Modified: 7/18/2008
Company: Trend Micro Inc.
----------
Key: tmproxy
ImagePath: C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
566872 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.
----------
Key: tmtdi
ImagePath: system32\DRIVERS\tmtdi.sys
C:\WINDOWS\system32\DRIVERS\tmtdi.sys
75088 bytes
Created: 9/7/2007
Modified: 12/29/2006
Company: Trend Micro Incorporated.
----------
Key: tmxpflt
ImagePath: system32\DRIVERS\tmxpflt.sys
C:\WINDOWS\system32\DRIVERS\tmxpflt.sys
205328 bytes
Created: 9/7/2007
Modified: 7/18/2008
Company: Trend Micro Inc.
----------
Key: USBAAPL
ImagePath: System32\Drivers\usbaapl.sys
C:\WINDOWS\System32\Drivers\usbaapl.sys
32000 bytes
Created: 9/3/2008
Modified: 7/22/2008
Company: Apple, Inc.
----------
Key: usnjsvc
ImagePath: "C:\Program Files\MSN Messenger\usnsvc.exe"
C:\Program Files\MSN Messenger\usnsvc.exe
97136 bytes
Created: 1/19/2007
Modified: 1/19/2007
Company: Microsoft Corporation
----------
Key: vsapint
ImagePath: system32\DRIVERS\vsapint.sys
C:\WINDOWS\system32\DRIVERS\vsapint.sys
1195448 bytes
Created: 9/7/2007
Modified: 7/18/2008
Company: Trend Micro Inc.
----------

************************************************************
11:41:48 AM: Scanning -----VXD ENTRIES-----

************************************************************
11:41:48 AM: Scanning ----- WINLOGON\NOTIFY DLLS -----

************************************************************
11:41:48 AM: Scanning ----- CONTEXTMENUHANDLERS -----
Key: {48F45200-91E6-11CE-8A4F-0080C81A28D4}
Path: C:\Program Files\Trend Micro\Internet Security 2007\Tmdshell.dll
C:\Program Files\Trend Micro\Internet Security 2007\Tmdshell.dll
292368 bytes
Created: 12/29/2006
Modified: 12/29/2006
Company: Trend Micro Inc.
----------

************************************************************
11:41:48 AM: Scanning ----- FOLDER\COLUMNHANDLERS -----

************************************************************
11:41:48 AM: Scanning ----- BROWSER HELPER OBJECTS -----
Key: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3}
BHO: C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
37808 bytes
Created: 9/23/2006
Modified: 3/2/2001
Company:
----------
Key: {2D9F1530-0B38-4DCB-A90A-CECD559F3514}
BHO: C:\WINDOWS\system32\getsn32.dll
C:\WINDOWS\system32\getsn32.dll
15360 bytes
Created: 9/6/2008
Modified: 9/7/2008
Company: Microsoft Corporation
----------
Key: {AA58ED58-01DD-4d91-8333-CF10577473F7}
BHO: c:\program files\google\googletoolbar3.dll
c:\program files\google\googletoolbar3.dll
-R- 2403392 bytes
Created: 10/14/2007
Modified: 1/19/2007
Company: Google Inc.
----------

************************************************************
11:41:49 AM: Scanning ----- SHELLSERVICEOBJECTS -----

************************************************************
11:41:50 AM: Scanning ----- SHAREDTASKSCHEDULER ENTRIES -----
Value: {C5AF49A2-94F3-42BD-F234-3604812C897D}
Comment: kjlsjf9843nksngfdgffn
File: C:\WINDOWS\system32\ksfj83nwe.dll
C:\WINDOWS\system32\ksfj83nwe.dll [file not found to scan]
----------

************************************************************
11:41:50 AM: Scanning ----- IMAGEFILE DEBUGGERS -----
No "Debugger" entries found.

************************************************************
11:41:50 AM: Scanning ----- APPINIT_DLLS -----
The AppInit_DLLs value is blank

************************************************************
11:41:50 AM: Scanning ----- SECURITY PROVIDER DLLS -----

************************************************************
11:41:50 AM: Scanning ------ USER STARTUP GROUPS ------
Checking Startup Group for All Users
[C:\WINDOWS\Profiles\All Users\Start Menu\Programs\StartUp]
No Startup files for All Users were located to check

************************************************************
11:41:50 AM: Scanning ------ COMMON STARTUP GROUP ------
[C:\Documents and Settings\All Users\Start Menu\Programs\Startup]
The Common Startup Group attempts to load the following file(s) at boot time:
C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
110592 bytes
Created: 12/9/2006
Modified: 8/24/2000
Company: Adobe Systems, Inc.
Adobe Gamma Loader.exe.lnk - links to C:\Program Files\Common Files\Adobe\Calibration\Adobe Gamma Loader.exe
--------------------
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\desktop.ini
-HS- 84 bytes
Created: 7/12/2006
Modified: 7/12/2006
Company:
--------------------
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
282624 bytes
Created: 2/20/2007
Modified: 2/20/2007
Company: Eastman Kodak Company
Kodak EasyShare software.lnk - links to C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
--------------------
C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
16423 bytes
Created: 2/13/2004
Modified: 2/13/2004
Company:
KODAK Software Updater.lnk - links to C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
--------------------

************************************************************
11:41:52 AM: Scanning ------ USER STARTUP GROUPS ------
--------------------
Checking Startup Group for: Administrator
[C:\Documents and Settings\Administrator\START MENU\PROGRAMS\STARTUP]
The Startup Group for Administrator attempts to load the following file(s):
C:\Documents and Settings\Administrator\START MENU\PROGRAMS\STARTUP\desktop.ini
-HS- 84 bytes
Created: 9/27/2006
Modified: 7/12/2006
Company:
----------
--------------------
Checking Startup Group for: Eileen
[C:\Documents and Settings\Eileen\START MENU\PROGRAMS\STARTUP]
The Startup Group for Eileen attempts to load the following file(s):
C:\Documents and Settings\Eileen\START MENU\PROGRAMS\STARTUP\desktop.ini
-HS- 84 bytes
Created: 7/12/2006
Modified: 7/12/2006
Company:
----------
C:\Documents and Settings\Eileen\START MENU\PROGRAMS\STARTUP\IMVU.lnk - this links to C:\Program Files\IMVU\IMVUClient.exe - this Shortcut has been removed
----------
C:\Program Files\LimeWire\LimeWire.exe
147456 bytes
Created: 2/8/2008
Modified: 2/8/2008
Company: Lime Wire, LLC
LimeWire On Startup.lnk - links to C:\Program Files\LimeWire\LimeWire.exe
----------

************************************************************
11:42:30 AM: Scanning ----- SCHEDULED TASKS -----
Taskname: AppleSoftwareUpdate.job
File: C:\Program Files\Apple Software Update\SoftwareUpdate.exe
C:\Program Files\Apple Software Update\SoftwareUpdate.exe
566592 bytes
Created: 4/11/2008
Modified: 4/11/2008
Company: Apple Inc.
Parameters: -task
Next Run Time: 9/9/2008 1:43:00 PM
Status: The task has not yet run
Creator: SYSTEM
Comments: [blank]
----------

************************************************************
11:42:31 AM: Scanning ----- SHELLICONOVERLAYIDENTIFIERS -----

************************************************************
11:42:31 AM: ----- ADDITIONAL CHECKS -----
PE386 rootkit checks completed
----------
Winlogon registry rootkit checks completed
----------
Heuristic checks for hidden files/drivers completed
----------
Layered Service Provider entries checks completed
----------
==============================
Restrictive Windows Explorer Policies found in force on this computer:
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System
Value: DisableTaskMgr
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
Value: DisableTaskMgr
All Policy Values listed have been removed
==============================
Windows Explorer Policies checks completed
----------
Desktop Wallpaper: C:\Documents and Settings\Eileen\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
C:\Documents and Settings\Eileen\Local Settings\Application Data\Microsoft\Wallpaper1.bmp
1440054 bytes
Created: 9/23/2006
Modified: 5/12/2007
Company:
----------
Web Desktop Wallpaper: %SystemRoot%\default.htm
C:\WINDOWS\default.htm
1962 bytes
Created: 9/6/2008
Modified: 9/7/2008
Company:
C:\WINDOWS\default.htm appears to contain: TROJAN.FAKEALERT
C:\WINDOWS\default.htm - this registry value has been removed
C:\WINDOWS\default.htm - file renamed to: C:\WINDOWS\default.htm.vir
----------
Additional checks completed

Silent sharK 07.09.2008 19:16

Sorry, die Teile kannst du dir sparen :teufel2:

godsilla 07.09.2008 19:17

Und der letzte teil... :alc:

************************************************************
11:43:19 AM: Scanning ----- RUNNING PROCESSES -----

C:\WINDOWS\System32\smss.exe
[1 loaded module]
--------------------
C:\WINDOWS\system32\csrss.exe
[11 loaded modules in total]
--------------------
C:\WINDOWS\system32\winlogon.exe
[68 loaded modules in total]
--------------------
C:\WINDOWS\system32\services.exe
[25 loaded modules in total]
--------------------
C:\WINDOWS\system32\lsass.exe
[56 loaded modules in total]
--------------------
C:\WINDOWS\system32\svchost.exe
[46 loaded modules in total]
--------------------
C:\WINDOWS\system32\svchost.exe
[37 loaded modules in total]
--------------------
C:\WINDOWS\System32\svchost.exe
[153 loaded modules in total]
--------------------
C:\WINDOWS\system32\svchost.exe
[30 loaded modules in total]
--------------------
C:\WINDOWS\system32\svchost.exe
[40 loaded modules in total]
--------------------
C:\WINDOWS\system32\spoolsv.exe
[53 loaded modules in total]
--------------------
C:\WINDOWS\Explorer.EXE
[94 loaded modules in total]
--------------------
C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
[23 loaded modules in total]
--------------------
C:\Program Files\Bonjour\mDNSResponder.exe
[25 loaded modules in total]
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\PcCtlCom.exe
[51 loaded modules in total]
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\PcScnSrv.exe
[34 loaded modules in total]
--------------------
C:\WINDOWS\system32\svchost.exe
[39 loaded modules in total]
--------------------
C:\WINDOWS\SOUNDMAN.EXE
[20 loaded modules in total]
--------------------
C:\Program Files\Java\jre1.5.0_09\bin\jusched.exe
[16 loaded modules in total]
--------------------
C:\Program Files\Creative\Shared Files\CAMTRAY.EXE
[31 loaded modules in total]
--------------------
C:\Program Files\Pure Networks\Network Magic\nmapp.exe
[80 loaded modules in total]
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\pccguide.exe
[33 loaded modules in total]
--------------------
C:\Program Files\QuickTime\QTTask.exe
[14 loaded modules in total]
--------------------
C:\Program Files\iTunes\iTunesHelper.exe
[47 loaded modules in total]
--------------------
C:\Program Files\MSN Messenger\MsnMsgr.Exe
[89 loaded modules in total]
--------------------
C:\Program Files\Kodak\Kodak EasyShare software\bin\EasyShare.exe
[191 loaded modules in total]
--------------------
C:\Program Files\Kodak\KODAK Software Updater\7288971\Program\Kodak Software Updater.exe
[72 loaded modules in total]
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\Tmntsrv.exe
[19 loaded modules in total]
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\TmPfw.exe
[43 loaded modules in total]
--------------------
C:\Program Files\LimeWire\LimeWire.exe
[68 loaded modules in total]
--------------------
C:\PROGRA~1\TRENDM~1\INTERN~2\tmproxy.exe
[51 loaded modules in total]
--------------------
C:\WINDOWS\system32\wdfmgr.exe
[13 loaded modules in total]
--------------------
C:\Program Files\Pure Networks\Network Magic\nmsrvc.exe
[72 loaded modules in total]
--------------------
C:\Program Files\iPod\bin\iPodService.exe
[28 loaded modules in total]
--------------------
C:\WINDOWS\System32\alg.exe
[29 loaded modules in total]
--------------------
C:\Program Files\Outlook Express\msimn.exe
[77 loaded modules in total]
--------------------
C:\Program Files\Internet Explorer\iexplore.exe
[104 loaded modules in total]
--------------------
C:\WINDOWS\system32\NOTEPAD.EXE
[23 loaded modules in total]
--------------------
C:\Documents and Settings\Eileen\Application Data\Simply Super Software\Trojan Remover\pey44.exe
FileSize: 2548288
[This is a Trojan Remover component]
[22 loaded modules in total]
--------------------

************************************************************
11:46:02 AM: Checking AUTOEXEC.BAT file
AUTOEXEC.BAT found in C:\
No malicious entries were found in the AUTOEXEC.BAT file

************************************************************
11:46:02 AM: Checking AUTOEXEC.NT file
AUTOEXEC.NT found in C:\WINDOWS\system32
No malicious entries were found in the AUTOEXEC.NT file

************************************************************
11:46:02 AM: Checking HOSTS file
No malicious entries were found in the HOSTS file

************************************************************
11:46:02 AM: Scanning ------ %TEMP% DIRECTORY ------
Scan cancelled by User
Scan stopped by user after 1259 files scanned.
--------------------
************************************************************
11:52:50 AM: Scanning ------ C:\WINDOWS\Temp DIRECTORY ------
No files found to scan
************************************************************
11:52:51 AM: Scanning ------ ROOT DIRECTORY ------
Scan stopped by user after 0 files scanned.
--------------------
Internet Explorer settings were not checked.

************************************************************
=== CHANGES WERE MADE TO THE WINDOWS REGISTRY ===
=== CHANGES WERE MADE TO A USER'S STARTUP GROUP ===
=== ONE OR MORE FILES WERE RENAMED OR REMOVED ===
Scan completed at: 11:52:51 AM 07 Sep 2008
-------------------------------------------------------------------------
One or more files could not be moved or renamed as requested.
They may be in use by Windows, so Trojan Remover needs
to restart the system in order to deal with these files.
*** RESTART CANCELLED BY USER ***
Active Malware may already be re-infecting the system.
************************************************************

godsilla 07.09.2008 19:22

Zitat:

Zitat von Dark Viruz (Beitrag 370103)
Sorry, aber wenn du dich nicht an die Anweisungen haltest, kann dir auch nicht geholfen werden.

Von "Trojan Remover" halte ich nicht viel, ist für mich unnötig wie ein Kropf. :juul:

Nur mal so neben bei ich habe mich an die Anweisung gehalten. (Ohne erfolg)
Vondaher habe ich dan "Trojan Remover" benutzt das du als"unoetig wie ein Kropf" findest. Komischer weise hat es mehr gebracht als die Anweisung?!

Silent sharK 07.09.2008 19:29

Meinst du, durch ein dahergelaufenes Programm, das komischerweise nie empfohlen wird, reinigt dein kompromittiertes System?
Schau mal hier => Technische Kompromittierung

Wenn es bei dir jetzt nicht "Klick" macht, kann dir leider hier keiner helfen.

EOD


Alle Zeitangaben in WEZ +1. Es ist jetzt 21:41 Uhr.

Copyright ©2000-2025, Trojaner-Board


Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131