|
Plagegeister aller Art und deren Bekämpfung: youtube seitenladefehlerWindows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
28.10.2011, 22:13 | #16 |
| youtube seitenladefehler otl hat sich aufgehängt und ich mußt mit dem task-manager aussteigen bzw. hab ich mich abgemeldet. als ich mich wieder angemeldet hab ist gleich folgendes von otl aufgegangen: All processes killed ========== OTL ========== Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\jswtrayutil deleted successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\NDSTray.exe deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! C:\autoexec.bat moved successfully. C:\ProgramData\ZA_PreservedFiles folder moved successfully. C:\ProgramData\bltofzsb.qlf moved successfully. C:\Users\Zentrale\AppData\Roaming\CheckPoint\ZoneAlarm Toolbar\TrustChecker folder moved successfully. C:\Users\Zentrale\AppData\Roaming\CheckPoint\ZoneAlarm Toolbar\PTPCACHE folder moved successfully. C:\Users\Zentrale\AppData\Roaming\CheckPoint\ZoneAlarm Toolbar folder moved successfully. C:\Users\Zentrale\AppData\Roaming\CheckPoint folder moved successfully. ========== COMMANDS ========== [EMPTYTEMP] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 17730126 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: Ninjai ->Temp folder emptied: 754762989 bytes ->Temporary Internet Files folder emptied: 546354466 bytes ->Java cache emptied: 237774496 bytes ->FireFox cache emptied: 95481741 bytes ->Flash cache emptied: 94532 bytes User: postgres ->Temp folder emptied: 904424 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: Public User: Zentrale ->Temp folder emptied: 46566647 bytes ->Temporary Internet Files folder emptied: 7382743 bytes ->Java cache emptied: 7140 bytes ->FireFox cache emptied: 3255016 bytes ->Flash cache emptied: 405 bytes %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 0 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 2014093736 bytes RecycleBin emptied: 4455 bytes Total Files Cleaned = 3.552,00 mb C:\Windows\System32\drivers\etc\Hosts moved successfully. HOSTS file reset successfully OTL by OldTimer - Version 3.2.31.0 log created on 10282011_230349 Files\Folders moved on Reboot... Registry entries deleted on Reboot... |
28.10.2011, 22:21 | #17 |
/// Winkelfunktion /// TB-Süch-Tiger™ | youtube seitenladefehler Starte Windows bitte neu.
__________________Danach dieses Tool von Kaspersky ausführen und das Log posten => http://www.trojaner-board.de/82358-t...entfernen.html Das Tool so einstellen wie unten im Bild angegeben - klick auf change parameters und setze die Haken wie im folgenden Screenshot abgebildet, Dann auf Start Scan klicken und wenn es durch ist auf den Button Report klicken um das Log anzuzeigen. Dieses bitte komplett posten. Hinweis: Bitte nichts voreilig mit dem TDSS-Killer löschen! Falls Objekte vom TDSS-Killer bemängelt werden, alle mit der Aktion "skip" behandeln und hier nur das Log posten! Falls du durch die Infektion auf deine Dokumente/Eigenen Dateien nicht zugreifen kannst, Verknüpfungen auf dem Desktop oder im Startmenü unter "alle Programme" fehlen, bitte unhide ausführen: Downloade dir bitte unhide.exe und speichere diese Datei auf deinem Desktop. Starte das Tool und es sollten alle Dateien und Ordner wieder sichtbar sein. ( Könnte eine Weile dauern ) Windows-Vista und Windows-7-User müssen das Tool per Rechtsklick als Administrator ausführen!
__________________ |
28.10.2011, 23:03 | #18 |
| youtube seitenladefehler keine funde
__________________und ich hab die paramet so eingestellt wie sie gehört haben. |
29.10.2011, 15:38 | #19 | |
/// Winkelfunktion /// TB-Süch-Tiger™ | youtube seitenladefehler Dann bitte jetzt CF ausführen: ComboFix Ein Leitfaden und Tutorium zur Nutzung von ComboFix
Combofix darf ausschließlich ausgeführt werden, wenn ein Kompetenzler dies ausdrücklich empfohlen hat! Solltest du nach der Ausführung von Combofix Probleme beim Starten von Anwendungen haben und Meldungen erhalten wie Zitat:
__________________ Logfiles bitte immer in CODE-Tags posten |
29.10.2011, 17:48 | #20 |
| youtube seitenladefehler Combofix Logfile: Code:
ATTFilter ComboFix 11-10-29.03 - Zentrale 29.10.2011 18:29:51.1.2 - x86 Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.43.1031.18.2939.1961 [GMT 2:00] ausgeführt von:: c:\users\Ninjai\Desktop\ComboFix.exe AV: Avira Desktop *Disabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C} SP: Avira Desktop *Disabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691} SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} . . (((((((((((((((((((((((((((((((((((( Weitere Löschungen )))))))))))))))))))))))))))))))))))))))))))))))) . . c:\windows\IsUn0407.exe c:\windows\system32\CddbCdda.dll . . ((((((((((((((((((((((( Dateien erstellt von 2011-09-28 bis 2011-10-29 )))))))))))))))))))))))))))))) . . 2011-10-29 15:27 . 2011-10-29 15:27 56200 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{0BF1AFF3-DAA4-43D9-979D-1D803BC32CF9}\offreg.dll 2011-10-28 21:45 . 2011-10-28 21:45 -------- d-----w- c:\users\Ninjai\AppData\Roaming\Malwarebytes 2011-10-28 21:03 . 2011-10-28 21:03 -------- d-----w- C:\_OTL 2011-10-28 06:50 . 2011-10-07 03:48 6668624 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{0BF1AFF3-DAA4-43D9-979D-1D803BC32CF9}\mpengine.dll 2011-10-27 15:47 . 2011-10-27 15:47 -------- d-----w- c:\program files\ESET 2011-10-27 14:37 . 2011-10-27 14:37 -------- d-----w- c:\users\Zentrale\AppData\Roaming\Malwarebytes 2011-10-27 14:36 . 2011-10-27 14:36 -------- d-----w- c:\programdata\Malwarebytes 2011-10-27 14:36 . 2011-10-27 14:36 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware 2011-10-27 14:36 . 2011-08-31 15:00 22216 ----a-w- c:\windows\system32\drivers\mbam.sys 2011-10-18 08:06 . 2011-10-18 08:06 -------- d-----w- c:\users\Ninjai\AppData\Roaming\Avira 2011-10-18 08:05 . 2011-10-11 13:00 74640 ----a-w- c:\windows\system32\drivers\avgntflt.sys 2011-10-18 08:05 . 2011-10-11 13:00 36000 ----a-w- c:\windows\system32\drivers\avkmgr.sys 2011-10-18 08:05 . 2011-10-11 13:00 134344 ----a-w- c:\windows\system32\drivers\avipbb.sys 2011-10-18 08:05 . 2011-10-18 08:05 -------- d-----w- c:\programdata\Avira 2011-10-18 08:05 . 2011-10-18 08:05 -------- d-----w- c:\program files\Avira 2011-10-12 23:23 . 2011-07-29 16:01 293376 ----a-w- c:\windows\system32\psisdecd.dll 2011-10-12 23:23 . 2011-07-29 16:01 217088 ----a-w- c:\windows\system32\psisrndr.ax 2011-10-12 23:23 . 2011-07-29 16:00 57856 ----a-w- c:\windows\system32\MSDvbNP.ax 2011-10-12 23:23 . 2011-07-29 16:00 69632 ----a-w- c:\windows\system32\Mpeg2Data.ax 2011-10-12 23:23 . 2011-09-06 13:30 2043392 ----a-w- c:\windows\system32\win32k.sys 2011-10-12 23:23 . 2011-09-14 10:51 2409784 ----a-w- c:\program files\Windows Mail\OESpamFilter.dat 2011-10-12 23:23 . 2011-08-25 16:15 555520 ----a-w- c:\windows\system32\UIAutomationCore.dll 2011-10-12 23:23 . 2011-08-25 16:14 563712 ----a-w- c:\windows\system32\oleaut32.dll 2011-10-12 23:23 . 2011-08-25 16:14 238080 ----a-w- c:\windows\system32\oleacc.dll 2011-10-12 23:23 . 2011-08-25 13:31 4096 ----a-w- c:\windows\system32\oleaccrc.dll . . . (((((((((((((((((((((((((((((((((((( Find3M Bericht )))))))))))))))))))))))))))))))))))))))))))))))))))))) . 2011-10-15 06:40 . 2011-05-20 07:39 414368 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl 2010-08-05 19:38 . 2010-08-05 19:38 119808 ----a-w- c:\program files\mozilla firefox\components\GoogleDesktopMozilla.dll . . (((((((((((((((((((((((((((( Autostartpunkte der Registrierung )))))))))))))))))))))))))))))))))))))))) . . *Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt. REGEDIT4 . [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920] "TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" [2008-04-24 430080] . [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-08-14 1348904] "Google Desktop Search"="c:\program files\Google\Google Desktop Search\GoogleDesktop.exe" [2010-08-05 30192] "Google EULA Launcher"="c:\program files\Google\Google EULA\GoogleEULALauncher.exe" [2008-05-28 20480] "Toshiba TEMPO"="c:\program files\Toshiba TEMPRO\Toshiba.Tempo.UI.TrayApplication.exe" [2008-04-24 103824] "topi"="c:\program files\TOSHIBA\Toshiba Online Product Information\topi.exe" [2007-07-10 581632] "IgfxTray"="c:\windows\system32\igfxtray.exe" [2008-06-25 150040] "HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2008-06-25 170520] "Persistence"="c:\windows\system32\igfxpers.exe" [2008-06-25 145944] "RtHDVCpl"="RtHDVCpl.exe" [2008-04-08 6037504] "TPwrMain"="c:\program files\TOSHIBA\Power Saver\TPwrMain.EXE" [2008-01-17 431456] "SmoothView"="c:\program files\Toshiba\SmoothView\SmoothView.exe" [2008-06-24 509816] "00TCrdMain"="c:\program files\TOSHIBA\FlashCards\TCrdMain.exe" [2008-05-09 716800] "Toshiba Registration"="c:\program files\Toshiba\Registration\ToshibaRegistration.exe" [2008-01-11 574864] "Camera Assistant Software"="c:\program files\Camera Assistant Software for Toshiba\traybar.exe" [2008-09-26 417792] "SunJavaUpdateSched"="c:\program files\Java\jre6\bin\jusched.exe" [2009-10-11 149280] "PCSuiteTrayApplication"="c:\program files\Nokia\Nokia PC Suite 6\LaunchApplication.exe" [2007-06-18 271360] "Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 8.0\Reader\Reader_sl.exe" [2011-05-27 40368] "Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2011-03-29 937920] "avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2011-10-11 258512] . [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce] "Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2011-08-31 449608] . [HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run] "Nokia.PCSync"="c:\program files\Nokia\Nokia PC Suite 6\PcSync2.exe" [2007-06-19 1241088] . c:\users\Zentrale\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ TRDCReminder.lnk - c:\program files\TOSHIBA\TRDCReminder\TRDCReminder.exe [2008-3-5 393216] . c:\users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ TRDCReminder.lnk - c:\program files\TOSHIBA\TRDCReminder\TRDCReminder.exe [2008-3-5 393216] . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system] "EnableUIADesktopToggle"= 0 (0x0) . [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\windows] "AppInit_DLLs"=c:\progra~1\Google\GOOGLE~2\GOEC62~1.DLL . [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32] "aux"=wdmaud.drv . [HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware] "DisableMonitoring"=dword:00000001 . R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384] R3 GoogleDesktopManager-051210-111108;Google Desktop Manager 5.9.1005.12335;c:\program files\Google\Google Desktop Search\GoogleDesktop.exe [2010-08-05 30192] R3 jswpsapi;Jumpstart Wifi Protected Setup;c:\program files\Jumpstart\jswpsapi.exe [2008-04-16 954368] R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504] S1 avkmgr;avkmgr;c:\windows\system32\DRIVERS\avkmgr.sys [2011-10-11 36000] S1 jswpslwf;JumpStart Wireless Filter Driver;c:\windows\system32\DRIVERS\jswpslwf.sys [2008-04-28 20384] S2 AntiVirSchedulerService;Avira Planer;c:\program files\Avira\AntiVir Desktop\sched.exe [2011-10-11 86224] S2 ConfigFree Service;ConfigFree Service;c:\program files\TOSHIBA\ConfigFree\CFSvcs.exe [2008-04-16 40960] S2 pgsql-8.3;PostgreSQL Database Server 8.3;c:\program files\PostgreSQL\8.3\bin\pg_ctl.exe [2009-12-10 65536] S2 TempoMonitoringService;Notebook Performance Tuning Service ;c:\program files\Toshiba TEMPRO\TempoSVC.exe [2008-04-24 99720] S2 TOSHIBA SMART Log Service;TOSHIBA SMART Log Service;c:\program files\TOSHIBA\SMARTLogService\TosIPCSrv.exe [2008-02-06 126976] S3 FwLnk;FwLnk Driver;c:\windows\system32\DRIVERS\FwLnk.sys [2006-11-20 7168] S3 SmartFaceVWatchSrv;SmartFaceVWatchSrv;c:\program files\TOSHIBA\SmartFaceV\SmartFaceVWatchSrv.exe [2008-08-25 77824] . . [HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost] LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache getPlusHelper REG_MULTI_SZ getPlusHelper . . ------- Zusätzlicher Suchlauf ------- . uStart Page = hxxp://search.conduit.com?SearchSource=10&ctid=CT2613550 mStart Page = hxxp://www.google.com/ig/redirectdomain?brand=TSEA&bmod=TSEA TCP: DhcpNameServer = 192.168.178.1 FF - ProfilePath - c:\users\Zentrale\AppData\Roaming\Mozilla\Firefox\Profiles\r75rnyo1.default\ FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd} FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension . - - - - Entfernte verwaiste Registrierungseinträge - - - - . HKLM-Run-cfFncEnabler.exe - cfFncEnabler.exe . . . ************************************************************************** . catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, hxxp://www.gmer.net Rootkit scan 2011-10-29 18:34 Windows 6.0.6002 Service Pack 2 NTFS . Scanne versteckte Prozesse... . Scanne versteckte Autostarteinträge... . HKCU\Software\Microsoft\Windows\CurrentVersion\Run TOSCDSPD = c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe?/i??????F?E?i??P?u?x?u???u???u?? . Scanne versteckte Dateien... . Scan erfolgreich abgeschlossen versteckte Dateien: 0 . ************************************************************************** . --------------------- Gesperrte Registrierungsschluessel --------------------- . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 "MSCurrentCountry"=dword:000000b5 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings] @Denied: (A) (Users) @Denied: (A) (Everyone) @Allowed: (B 1 2 3 4 5) (S-1-5-20) "BlindDial"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{2e8491d5-0e58-453c-9cad-b7fde6ba9de8}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:16020054 "Dhcpv6State"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{2f423c37-5272-4536-8314-2fd9e60a4b89}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:0a001e33 "Dhcpv6State"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{4cc7823b-9183-4a13-8a0f-94c26c0784c4}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:100024d2 "Dhcpv6State"=dword:00000001 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{89e18d65-4f3b-4efc-8f55-bc76fe49ed00}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:17000000 "Dhcpv6State"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{8b9e3e73-9572-4c25-bc79-fae10cfcdfc9}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:16000000 "Dhcpv6State"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{9c642153-bfe0-4511-a0b6-e778ddd5ea9e}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:07001422 "Dhcpv6State"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{ba32a50a-3d27-4fae-8591-5916311409be}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:0c001422 "Dhcpv6State"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{bbc6e855-e04f-4895-9bd5-39475731bdf5}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:17000000 "Dhcpv6State"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{f50c0996-5b4a-4c6a-a322-6e991d4caa0e}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:06001422 "Dhcpv6State"=dword:00000000 . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{f70a361f-6437-4fcc-91a4-cd88d468d91b}] @DACL=(02 0000) "Dhcpv6Iaid"=dword:0e001422 "Dhcpv6State"=dword:00000000 . Zeit der Fertigstellung: 2011-10-29 18:36:45 ComboFix-quarantined-files.txt 2011-10-29 16:36 . Vor Suchlauf: 12 Verzeichnis(se), 72.020.656.128 Bytes frei Nach Suchlauf: 14 Verzeichnis(se), 72.151.830.528 Bytes frei . - - End Of File - - 86FDB48BA2560C33657A3857C0FB51DF |
29.10.2011, 22:20 | #21 |
/// Winkelfunktion /// TB-Süch-Tiger™ | youtube seitenladefehler Ok. Bitte nun Logs mit GMER und OSAM erstellen und posten. GMER stürzt häufiger ab, wenn das Tool auch beim 2. Mal nicht will, lass es einfach weg und führ nur OSAM aus - die Online-Abfrage durch OSAM bitte überspringen. Bei OSAM bitte darauf auch achten, dass Du das Log auch als *.log und nicht *.html oder so abspeicherst. Hinweis: Zum Entpacken von OSAM bitte WinRAR oder 7zip verwenden! Stell auch unbedingt den Virenscanner ab, besonders der Scanner von McAfee meldet oft einen Fehalarm in OSAM! Downloade dir bitte aswMBR.exe und speichere die Datei auf deinem Desktop.
Wichtig: Drücke keinesfalls einen der Fix Buttons ohne Anweisung Hinweis: Sollte der Scan Button ausgeblendet sein, schließe das Tool und starte es erneut. Sollte der Scan abbrechen und das Programm abstürzen, dann teile mir das mit und wähle unter AV Scan die Einstellung (none).
__________________ --> youtube seitenladefehler |
30.10.2011, 02:50 | #22 |
| youtube seitenladefehler GMER GMER Logfile: Code:
ATTFilter GMER 1.0.15.15641 - hxxp://www.gmer.net Rootkit scan 2011-10-30 02:38:11 Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 WDC_WD25 rev.11.0 Running: usnxnvf8.exe; Driver: C:\Users\Zentrale\AppData\Local\Temp\kgliqpow.sys ---- System - GMER 1.0.15 ---- SSDT 8C894FC6 ZwCreateSection SSDT 8C894FD0 ZwRequestWaitReplyPort SSDT 8C894FCB ZwSetContextThread SSDT 8C894FD5 ZwSetSecurityObject SSDT 8C894FDA ZwSystemDebugControl SSDT 8C894F67 ZwTerminateProcess ---- Kernel code sections - GMER 1.0.15 ---- .text ntkrnlpa.exe!KeSetEvent + 215 822CA998 4 Bytes [C6, 4F, 89, 8C] .text ntkrnlpa.exe!KeSetEvent + 539 822CACBC 4 Bytes [D0, 4F, 89, 8C] .text ntkrnlpa.exe!KeSetEvent + 56D 822CACF0 4 Bytes [CB, 4F, 89, 8C] .text ntkrnlpa.exe!KeSetEvent + 5D1 822CAD54 4 Bytes [D5, 4F, 89, 8C] .text ntkrnlpa.exe!KeSetEvent + 619 822CAD9C 4 Bytes [DA, 4F, 89, 8C] .text ... .text C:\Windows\system32\DRIVERS\tos_sps32.sys section is writeable [0x8A54E480, 0x3C939, 0xE8000020] .dsrt C:\Windows\system32\DRIVERS\tos_sps32.sys unknown last section [0x8A58F900, 0x3CA, 0x48000040] ---- Devices - GMER 1.0.15 ---- AttachedDevice \Driver\kbdclass \Device\KeyboardClass0 Wdf01000.sys (WDF Dynamic/Microsoft Corporation) ---- Registry - GMER 1.0.15 ---- Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{2e8491d5-0e58-453c-9cad-b7fde6ba9de8}@Dhcpv6Iaid 369229908 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{2e8491d5-0e58-453c-9cad-b7fde6ba9de8}@Dhcpv6State 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{2f423c37-5272-4536-8314-2fd9e60a4b89}@Dhcpv6Iaid 167779891 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{2f423c37-5272-4536-8314-2fd9e60a4b89}@Dhcpv6State 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{4cc7823b-9183-4a13-8a0f-94c26c0784c4}@Dhcpv6Iaid 268444882 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{4cc7823b-9183-4a13-8a0f-94c26c0784c4}@Dhcpv6State 1 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{89e18d65-4f3b-4efc-8f55-bc76fe49ed00}@Dhcpv6Iaid 385875968 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{89e18d65-4f3b-4efc-8f55-bc76fe49ed00}@Dhcpv6State 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{8b9e3e73-9572-4c25-bc79-fae10cfcdfc9}@Dhcpv6Iaid 369098752 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{8b9e3e73-9572-4c25-bc79-fae10cfcdfc9}@Dhcpv6State 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{9c642153-bfe0-4511-a0b6-e778ddd5ea9e}@Dhcpv6Iaid 117445666 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{9c642153-bfe0-4511-a0b6-e778ddd5ea9e}@Dhcpv6State 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{ba32a50a-3d27-4fae-8591-5916311409be}@Dhcpv6Iaid 201331746 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{ba32a50a-3d27-4fae-8591-5916311409be}@Dhcpv6State 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{bbc6e855-e04f-4895-9bd5-39475731bdf5}@Dhcpv6Iaid 385875968 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{bbc6e855-e04f-4895-9bd5-39475731bdf5}@Dhcpv6State 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{f50c0996-5b4a-4c6a-a322-6e991d4caa0e}@Dhcpv6Iaid 100668450 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{f50c0996-5b4a-4c6a-a322-6e991d4caa0e}@Dhcpv6State 0 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{f70a361f-6437-4fcc-91a4-cd88d468d91b}@Dhcpv6Iaid 234886178 Reg HKLM\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters\Interfaces\{f70a361f-6437-4fcc-91a4-cd88d468d91b}@Dhcpv6State 0 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{2e8491d5-0e58-453c-9cad-b7fde6ba9de8}@Dhcpv6Iaid 369229908 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{2e8491d5-0e58-453c-9cad-b7fde6ba9de8}@Dhcpv6State 0 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{2f423c37-5272-4536-8314-2fd9e60a4b89}@Dhcpv6Iaid 167779891 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{2f423c37-5272-4536-8314-2fd9e60a4b89}@Dhcpv6State 0 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{4cc7823b-9183-4a13-8a0f-94c26c0784c4}@Dhcpv6Iaid 268444882 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{4cc7823b-9183-4a13-8a0f-94c26c0784c4}@Dhcpv6State 1 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{89e18d65-4f3b-4efc-8f55-bc76fe49ed00}@Dhcpv6Iaid 385875968 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{89e18d65-4f3b-4efc-8f55-bc76fe49ed00}@Dhcpv6State 0 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{8b9e3e73-9572-4c25-bc79-fae10cfcdfc9}@Dhcpv6Iaid 369098752 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{8b9e3e73-9572-4c25-bc79-fae10cfcdfc9}@Dhcpv6State 0 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{9c642153-bfe0-4511-a0b6-e778ddd5ea9e}@Dhcpv6Iaid 117445666 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{9c642153-bfe0-4511-a0b6-e778ddd5ea9e}@Dhcpv6State 0 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{ba32a50a-3d27-4fae-8591-5916311409be}@Dhcpv6Iaid 201331746 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{ba32a50a-3d27-4fae-8591-5916311409be}@Dhcpv6State 0 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{bbc6e855-e04f-4895-9bd5-39475731bdf5}@Dhcpv6Iaid 385875968 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{bbc6e855-e04f-4895-9bd5-39475731bdf5}@Dhcpv6State 0 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{f50c0996-5b4a-4c6a-a322-6e991d4caa0e}@Dhcpv6Iaid 100668450 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{f50c0996-5b4a-4c6a-a322-6e991d4caa0e}@Dhcpv6State 0 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{f70a361f-6437-4fcc-91a4-cd88d468d91b}@Dhcpv6Iaid 234886178 Reg HKLM\SYSTEM\ControlSet003\Services\Tcpip6\Parameters\Interfaces\{f70a361f-6437-4fcc-91a4-cd88d468d91b}@Dhcpv6State 0 ---- EOF - GMER 1.0.15 ---- OSAM OSAM Logfile: Code:
ATTFilter Report of OSAM: Autorun Manager v5.0.11926.0 hxxp://www.online-solutions.ru/en/ Saved at 02:01:27 on 30.10.2011 OS: Windows Vista Home Premium Edition Service Pack 2 (Build 6002), 32-bit Default Browser: Mozilla Corporation Firefox 3.5.5 Scanner Settings [x] Rootkits detection (hidden registry) [x] Rootkits detection (hidden files) [x] Retrieve files information [x] Check Microsoft signatures Filters [ ] Trusted entries [ ] Empty entries [x] Hidden registry entries (rootkit activity) [x] Exclusively opened files [x] Not found files [x] Files without detailed information [x] Existing files [ ] Non-startable services [ ] Non-startable drivers [x] Active entries [x] Disabled entries [AppInit DLLs] -----( HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows )----- "AppInit_DLLs" - "Google" - C:\PROGRA~1\Google\GOOGLE~2\GOEC62~1.DLL [Control Panel Objects] -----( %SystemRoot%\system32 )----- "FlashPlayerCPLApp.cpl" - "Adobe Systems Incorporated" - C:\Windows\system32\FlashPlayerCPLApp.cpl "TOSCDSPD.cpl" - "TOSHIBA" - C:\Windows\system32\TOSCDSPD.cpl -----( HKLM\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls )----- "NokiaConnectionManager" - "Nokia" - C:\PROGRA~1\Nokia\NOKIAP~1\CONNEC~1.CPL [Drivers] -----( HKLM\SYSTEM\CurrentControlSet\Services )----- "avgntflt" (avgntflt) - "Avira GmbH" - C:\Windows\System32\DRIVERS\avgntflt.sys "avipbb" (avipbb) - "Avira GmbH" - C:\Windows\System32\DRIVERS\avipbb.sys "avkmgr" (avkmgr) - "Avira GmbH" - C:\Windows\System32\DRIVERS\avkmgr.sys "catchme" (catchme) - ? - C:\Users\Zentrale\AppData\Local\Temp\catchme.sys (File not found) "IP in IP Tunnel Driver" (IpInIp) - ? - C:\Windows\System32\DRIVERS\ipinip.sys (File not found) "IPX Traffic Filter Driver" (NwlnkFlt) - ? - C:\Windows\System32\DRIVERS\nwlnkflt.sys (File not found) "IPX Traffic Forwarder Driver" (NwlnkFwd) - ? - C:\Windows\System32\DRIVERS\nwlnkfwd.sys (File not found) "kgliqpow" (kgliqpow) - ? - C:\Users\Zentrale\AppData\Local\Temp\kgliqpow.sys (Hidden registry entry, rootkit activity | File not found) "PxHelp20" (PxHelp20) - "Sonic Solutions" - C:\Windows\System32\Drivers\PxHelp20.sys "ssmdrv" (ssmdrv) - "Avira GmbH" - C:\Windows\System32\DRIVERS\ssmdrv.sys "upperdev" (upperdev) - ? - C:\Windows\System32\DRIVERS\usbser_lowerflt.sys (File not found) [Explorer] -----( HKLM\Software\Classes\Folder\shellex\ColumnHandlers )----- {F9DB5320-233E-11D1-9F84-707F02C10627} "PDF Shell Extension" - "Adobe Systems, Inc." - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll -----( HKLM\Software\Classes\Protocols\Filter )----- {807563E5-5146-11D5-A672-00B0D022E945} "Microsoft Office InfoPath XML Mime Filter" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\MSOXMLMF.DLL -----( HKLM\Software\Classes\Protocols\Handler )----- {314111c7-a502-11d2-bbca-00c04f8ec294} "HxProtocol Class" - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Help\hxds.dll {0A9007C0-4076-11D3-8789-0000F8105754} "Microsoft Infotech Storage Protocol for IE 4.0" - "Microsoft Corporation" - c:\Program Files\Common Files\Microsoft Shared\Information Retrieval\msitss.dll {91774881-D725-4E58-B298-07617B9B86A8} "Skype IE add-on Pluggable Protocol" - "Skype Technologies S.A." - C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll -----( HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved )----- {911051fa-c21c-4246-b470-070cd8df6dc4} ".cab or .zip files" - ? - (File not found | COM-object registry key not found) {1b24a030-9b20-49bc-97ac-1be4426f9e59} "ActiveDirectory Folder" - ? - (File not found | COM-object registry key not found) {34449847-FD14-4fc8-A75A-7432F5181EFB} "ActiveDirectory Folder" - ? - (File not found | COM-object registry key not found) {0F8604A5-4ECE-4DE1-BA7D-CF10F8AA4F48} "Contacts folder" - ? - (File not found | COM-object registry key not found) {2C2577C2-63A7-40e3-9B7F-586602617ECB} "Explorer Query Band" - ? - (File not found | COM-object registry key not found) {FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75} "IE User Assist" - ? - (File not found | COM-object registry key not found) {00020d75-0000-0000-c000-000000000046} "lnkfile" - ? - (File not found | COM-object registry key not found) {42042206-2D85-11D3-8CFF-005004838597} "Microsoft Office HTML Icon Handler" - "Microsoft Corporation" - C:\Program Files\Microsoft Office\Office12\msohevi.dll {993BE281-6695-4BA5-8A2A-7AACBFAAB69E} "Microsoft Office Metadata Handler" - "Microsoft Corporation" - c:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\msoshext.dll {5858A72C-C2B4-4dd7-B2BF-B76DB1BD9F6C} "Microsoft Office OneNote Namespace Extension for Windows Desktop Search" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~2\Office12\ONFILTER.DLL {C41662BB-1FA0-4CE0-8DC5-9B7F8279FF97} "Microsoft Office Thumbnail Handler" - "Microsoft Corporation" - c:\PROGRA~1\COMMON~1\MICROS~1\OFFICE12\msoshext.dll {416651E4-9C3C-11D9-8BDE-F66BAD1E3F3A} "Nokia Phone Browser" - "Nokia" - C:\Program Files\Nokia\Nokia PC Suite 6\PhoneBrowser.dll {C8494E42-ACDD-4739-B0FB-217361E4894F} "Sam Account Folder" - ? - (File not found | COM-object registry key not found) {E29F9716-5C08-4FCD-955A-119FDB5A522D} "Sam Account Folder" - ? - (File not found | COM-object registry key not found) {45AC2688-0253-4ED8-97DE-B5370FA7D48A} "Shell Extension for Malware scanning" - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\shlext.dll {da67b8ad-e81b-4c70-9b91b417b5e33527} "Windows Search Shell Service" - ? - (File not found | COM-object registry key not found) {B41DB860-8EE4-11D2-9906-E49FADC173CA} "WinRAR" - "Alexander Roshal" - C:\Program Files\WinRAR\rarext.dll [Internet Explorer] -----( HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser )----- ITBar7Height "ITBar7Height" - ? - (File not found | COM-object registry key not found) <binary data> "ITBar7Layout" - ? - (File not found | COM-object registry key not found) <binary data> "{EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107}" - ? - (File not found | COM-object registry key not found) <binary data> "{FC2B76FC-2132-4D80-A9A3-1F5C6E49066B}" - ? - (File not found | COM-object registry key not found) -----( HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units )----- {CAFEEFAC-0016-0000-0006-ABCDEFFEDCBA} "Java Plug-in 1.6.0_06" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_06-windows-i586.cab {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} "Java Plug-in 1.6.0_07" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_07-windows-i586.cab {8AD9C840-044E-11D1-B3E9-00805F499D93} "Java Plug-in 1.6.0_17" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab {CAFEEFAC-0016-0000-0017-ABCDEFFEDCBA} "Java Plug-in 1.6.0_17" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} "Java Plug-in 1.6.0_17" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\npjpi160_17.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_17-windows-i586.cab -----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions )----- "Amazon.de" - ? - hxxp://www.amazon.de/exec/obidos/redirect-home?tag=Toshibadebholink-21&site=home (HTTP value) {48E73304-E1D6-4330-914C-F5F514E3486C} "An OneNote senden" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~2\Office12\ONBttnIE.dll {898EA8C8-E7FF-479B-8935-AEC46303B9E5} "Click to call with Skype" - "Skype Technologies S.A." - C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll "eBay - Der weltweite Online Marktplatz" - ? - hxxp://rover.ebay.com/rover/1/707-44556-9400-3/4 (HTTP value) {FF059E31-CC5A-4E2E-BF3B-96E929D65503} "Research" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL -----( HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects )----- {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} "Adobe PDF Reader" - "Adobe Systems Incorporated" - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll {DBC80044-A445-435b-BC74-9C25C1C588A9} "Java(tm) Plug-In 2 SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2ssv.dll {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} "Skype Browser Helper" - "Skype Technologies S.A." - C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll [Logon] -----( %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup )----- "desktop.ini" - ? - C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini -----( %AllUsersProfile%\Microsoft\Windows\Start Menu\Programs\Startup )----- "desktop.ini" - ? - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini -----( HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run )----- "TOSCDSPD" - "TOSHIBA" - C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe -----( HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce )----- "Shockwave Updater" - "Adobe Systems, Inc." - C:\Windows\system32\Adobe\Shockwave 11\SwHelper_1151601.exe -Update -1151601 -"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.5.30729; .NET CLR 3.0.30729)" -"hxxp://kabeleins.king.com/single_play.jsp?game=jungle_bubble&altVer=false&gameMode=2" -----( HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd )----- "StartupPrograms" - ? - rdpclip (File not found) -----( HKLM\Software\Microsoft\Windows\CurrentVersion\Run )----- "00TCrdMain" - "TOSHIBA Corporation" - %ProgramFiles%\TOSHIBA\FlashCards\TCrdMain.exe "Adobe ARM" - "Adobe Systems Incorporated" - "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" "Adobe Reader Speed Launcher" - "Adobe Systems Incorporated" - "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" "avgnt" - "Avira Operations GmbH & Co. KG" - "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min "Camera Assistant Software" - "Chicony" - "C:\Program Files\Camera Assistant Software for Toshiba\traybar.exe" /start "Google Desktop Search" - "Google" - "C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe" /startup "Google EULA Launcher" - " " - c:\Program Files\Google\Google EULA\GoogleEULALauncher.exe IE PA "PCSuiteTrayApplication" - "Nokia" - C:\Program Files\Nokia\Nokia PC Suite 6\LaunchApplication.exe -startup "SmoothView" - "TOSHIBA Corporation" - %ProgramFiles%\Toshiba\SmoothView\SmoothView.exe "SunJavaUpdateSched" - "Sun Microsystems, Inc." - "C:\Program Files\Java\jre6\bin\jusched.exe" "topi" - "TOSHIBA" - C:\Program Files\TOSHIBA\Toshiba Online Product Information\topi.exe -startup "Toshiba Registration" - "Toshiba" - C:\Program Files\Toshiba\Registration\ToshibaRegistration.exe "Toshiba TEMPO" - "Toshiba Europe GmbH" - C:\Program Files\Toshiba TEMPRO\Toshiba.Tempo.UI.TrayApplication.exe "TPwrMain" - "TOSHIBA Corporation" - %ProgramFiles%\TOSHIBA\Power Saver\TPwrMain.EXE [Print Monitors] -----( HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors )----- "Send To Microsoft OneNote Monitor" - "Microsoft Corporation" - C:\Windows\system32\msonpmon.dll [Services] -----( HKLM\SYSTEM\CurrentControlSet\Services )----- "@C:\Program Files\NOS\bin\getPlus_Helper.dll,-101" (getPlusHelper) - "NOS Microsystems Ltd." - C:\Program Files\NOS\bin\getPlus_Helper.dll "@C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe,-100" (WPFFontCache_v0400) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe "Avira Echtzeit Scanner" (AntiVirService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\avguard.exe "Avira Planer" (AntiVirSchedulerService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\sched.exe "ConfigFree Service" (ConfigFree Service) - "TOSHIBA CORPORATION" - C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe "Google Desktop Manager 5.9.1005.12335" (GoogleDesktopManager-051210-111108) - "Google" - C:\Program Files\Google\Google Desktop Search\GoogleDesktop.exe "Jumpstart Wifi Protected Setup" (jswpsapi) - "Atheros Communications, Inc." - C:\Program Files\Jumpstart\jswpsapi.exe "Microsoft .NET Framework NGEN v4.0.30319_X86" (clr_optimization_v4.0.30319_32) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe "Microsoft Office Diagnostics Service" (odserv) - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\OFFICE12\ODSERV.EXE "Notebook Performance Tuning Service " (TempoMonitoringService) - "Toshiba Europe GmbH" - C:\Program Files\Toshiba TEMPRO\TempoSVC.exe "Office Source Engine" (ose) - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE "PostgreSQL Database Server 8.3" (pgsql-8.3) - "PostgreSQL Global Development Group" - C:\Program Files\PostgreSQL\8.3\bin\pg_ctl.exe "ServiceLayer" (ServiceLayer) - "Nokia." - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe "SmartFaceVWatchSrv" (SmartFaceVWatchSrv) - "Toshiba" - C:\Program Files\TOSHIBA\SmartFaceV\SmartFaceVWatchSrv.exe "TOSHIBA Navi Support Service" (TNaviSrv) - "TOSHIBA Corporation" - C:\Program Files\TOSHIBA\TOSHIBA DVD PLAYER\TNaviSrv.exe "TOSHIBA Optical Disc Drive Service" (TODDSrv) - "TOSHIBA Corporation" - C:\Windows\system32\TODDSrv.exe "TOSHIBA Power Saver" (TosCoSrv) - "TOSHIBA Corporation" - C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe "TOSHIBA SMART Log Service" (TOSHIBA SMART Log Service) - "TOSHIBA Corporation" - C:\Program Files\TOSHIBA\SMARTLogService\TosIPCSrv.exe "Ulead Burning Helper" (UleadBurningHelper) - "Ulead Systems, Inc." - C:\Program Files\Common Files\Ulead Systems\DVD\ULCDRSvr.exe ===[ Logfile end ]=========================================[ Logfile end ]=== If You have questions or want to get some help, You can visit hxxp://forum.online-solutions.ru aswMBR aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software Run date: 2011-10-30 02:18:29 ----------------------------- 02:18:29.878 OS Version: Windows 6.0.6002 Service Pack 2 02:18:29.878 Number of processors: 2 586 0x170A 02:18:29.878 ComputerName: NINJAI-PC UserName: Ninjai 02:18:31.111 Initialize success 02:21:23.138 AVAST engine defs: 11102901 02:21:54.525 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 02:21:54.541 Disk 0 Vendor: WDC_WD25 11.0 Size: 238475MB BusType: 3 02:21:54.790 Disk 0 MBR read successfully 02:21:54.790 Disk 0 MBR scan 02:21:54.790 Disk 0 Windows VISTA default MBR code 02:21:54.977 Disk 0 scanning sectors +488395120 02:21:55.399 Disk 0 scanning C:\Windows\system32\drivers 02:22:57.643 Service scanning 02:22:58.953 Modules scanning 02:24:30.275 Disk 0 trace - called modules: 02:24:30.369 ntkrnlpa.exe CLASSPNP.SYS disk.sys iaStor.sys hal.dll 02:24:30.369 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x863d9188] 02:24:30.385 3 CLASSPNP.SYS[8a31a8b3] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0x84aac028] 02:24:30.915 AVAST engine scan C:\Windows 02:25:26.186 AVAST engine scan C:\Windows\system32 02:31:01.336 AVAST engine scan C:\Windows\system32\drivers 02:31:13.473 AVAST engine scan C:\Users\Ninjai 02:35:35.710 AVAST engine scan C:\ProgramData 02:41:07.116 Scan finished successfully 02:42:43.805 Disk 0 MBR has been saved successfully to "C:\Users\Ninjai\Desktop\MBR.dat" 02:42:43.821 The log file has been saved successfully to "C:\Users\Ninjai\Desktop\aswMBR.txt" Ok? |
30.10.2011, 03:07 | #23 |
/// Winkelfunktion /// TB-Süch-Tiger™ | youtube seitenladefehler Sieht ok aus. Mach bitte zur Kontrolle Vollscans mit Malwarebytes und SUPERAntiSpyware und poste die Logs. Denk dran beide Tools zu updaten vor dem Scan!! Anschließend über den OnlineScanner von ESET eine zusätzliche Meinung zu holen ist auch nicht verkehrt: ESET Online Scanner
__________________ Logfiles bitte immer in CODE-Tags posten |
30.10.2011, 12:18 | #24 |
| youtube seitenladefehler ESET -> No threats found anbei einige logfiles ( kenn mich vor lauter logfiles nicht mehr ganz aus also falls was doppelt ist oder fehlt bitte kurz bescheidgeben) SUPERAntiSpyware Scan Log hxxp://www.superantispyware.com Generated 10/30/2011 at 03:41 AM Application Version : 5.0.1134 Core Rules Database Version : 7868 Trace Rules Database Version: 5680 Scan type : Quick Scan Total Scan Time : 00:04:20 Operating System Information Windows Vista Home Premium 32-bit, Service Pack 2 (Build 6.00.6002) UAC On - Limited User (Administrator User) Memory items scanned : 735 Memory threats detected : 0 Registry items scanned : 31947 Registry threats detected : 0 File items scanned : 7749 File threats detected : 141 Adware.Tracking Cookie C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@2o7[2].txt [ /2o7 ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@ad.adition[1].txt [ /ad.adition ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@adfarm1.adition[1].txt [ /adfarm1.adition ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@ads.heias[1].txt [ /ads.heias ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@adtech[1].txt [ /adtech ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@advertiser.contextmatters[1].txt [ /advertiser.contextmatters ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@adx.chip[2].txt [ /adx.chip ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@apmebf[1].txt [ /apmebf ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@atdmt[2].txt [ /atdmt ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@bwincom.122.2o7[2].txt [ /bwincom.122.2o7 ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@doubleclick[1].txt [ /doubleclick ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@eas.apm.emediate[1].txt [ /eas.apm.emediate ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@euros4click[2].txt [ /euros4click ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@fastclick[1].txt [ /fastclick ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@im.banner.t-online[1].txt [ /im.banner.t-online ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@mediaplex[1].txt [ /mediaplex ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@questionmarket[2].txt [ /questionmarket ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@smartadserver[1].txt [ /smartadserver ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@tracking.mindshare[2].txt [ /tracking.mindshare ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@tradedoubler[2].txt [ /tradedoubler ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@webmasterplan[1].txt [ /webmasterplan ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@www.windowsmedia[1].txt [ /www.windowsmedia ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@xiti[1].txt [ /xiti ] C:\Users\Ninjai\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@zanox[1].txt [ /zanox ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@admax.quisma[3].txt [ Cookie:ninjai@admax.quisma.com/tracking/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\ninjai@admax.quisma[2].txt [ Cookie:ninjai@admax.quisma.com/tracking/view/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@admax.quisma[4].txt [ Cookie:ninjai@admax.quisma.com/tracking/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@im.banner.t-online[1].txt [ Cookie:ninjai@im.banner.t-online.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@stats.paypal[2].txt [ Cookie:ninjai@stats.paypal.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@smartadserver[1].txt [ Cookie:ninjai@smartadserver.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@de.sitestat[2].txt [ Cookie:ninjai@de.sitestat.com/styria/ichkoche/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@livestat.derstandard[1].txt [ Cookie:ninjai@livestat.derstandard.at/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@stat.dealtime[1].txt [ Cookie:ninjai@stat.dealtime.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@apmebf[1].txt [ Cookie:ninjai@apmebf.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@media.adrevolver[1].txt [ Cookie:ninjai@media.adrevolver.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@euros4click[1].txt [ Cookie:ninjai@euros4click.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@eas4.emediate[1].txt [ Cookie:ninjai@eas4.emediate.eu/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@de.at.atwola[2].txt [ Cookie:ninjai@de.at.atwola.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@zedo[2].txt [ Cookie:ninjai@zedo.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@ww57.smartadserver[2].txt [ Cookie:ninjai@ww57.smartadserver.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@bs.serving-sys[1].txt [ Cookie:ninjai@bs.serving-sys.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@adfarm1.adition[1].txt [ Cookie:ninjai@adfarm1.adition.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@www.etracker[2].txt [ Cookie:ninjai@www.etracker.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\SZE3X8Z2.txt [ Cookie:ninjai@doubleclick.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@banner.dhl-systems[1].txt [ Cookie:ninjai@banner.dhl-systems.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@overture[2].txt [ Cookie:ninjai@overture.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@www.googleadservices[3].txt [ Cookie:ninjai@www.googleadservices.com/pagead/conversion/1070455227/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@ehg-upcchellomedia.hitbox[1].txt [ Cookie:ninjai@ehg-upcchellomedia.hitbox.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@adx.chip[2].txt [ Cookie:ninjai@adx.chip.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@de.sitestat[1].txt [ Cookie:ninjai@de.sitestat.com/kittelberger/bosch-pt-de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@stat.aldi[2].txt [ Cookie:ninjai@stat.aldi.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@xiti[1].txt [ Cookie:ninjai@xiti.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@ad.zanox[1].txt [ Cookie:ninjai@ad.zanox.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@adsrv.admediate[1].txt [ Cookie:ninjai@adsrv.admediate.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@traffictrack.3gnet[1].txt [ Cookie:ninjai@traffictrack.3gnet.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@sevenoneintermedia.112.2o7[1].txt [ Cookie:ninjai@sevenoneintermedia.112.2o7.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@track.webtrekk[1].txt [ Cookie:ninjai@track.webtrekk.de/888882135571237/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@2o7[1].txt [ Cookie:ninjai@2o7.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@at.atwola[1].txt [ Cookie:ninjai@at.atwola.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@bwincom.122.2o7[1].txt [ Cookie:ninjai@bwincom.122.2o7.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@tracking.mindshare[2].txt [ Cookie:ninjai@tracking.mindshare.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@ads.quartermedia[1].txt [ Cookie:ninjai@ads.quartermedia.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@server.iad.liveperson[1].txt [ Cookie:ninjai@server.iad.liveperson.net/hc/46858887 ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@www.googleadservices[1].txt [ Cookie:ninjai@www.googleadservices.com/pagead/conversion/1043498277/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@hitbox[2].txt [ Cookie:ninjai@hitbox.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@fastclick[1].txt [ Cookie:ninjai@fastclick.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@webmasterplan[2].txt [ Cookie:ninjai@webmasterplan.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@trafficmp[1].txt [ Cookie:ninjai@trafficmp.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@a6.adserver01[1].txt [ Cookie:ninjai@a6.adserver01.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@server.iad.liveperson[2].txt [ Cookie:ninjai@server.iad.liveperson.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@tracking.quisma[2].txt [ Cookie:ninjai@tracking.quisma.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@guj.122.2o7[1].txt [ Cookie:ninjai@guj.122.2o7.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@adrevolver[2].txt [ Cookie:ninjai@adrevolver.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@track.adform[2].txt [ Cookie:ninjai@track.adform.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@atdmt[1].txt [ Cookie:ninjai@atdmt.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@bluestreak[2].txt [ Cookie:ninjai@bluestreak.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@zanox-affiliate[1].txt [ Cookie:ninjai@zanox-affiliate.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@adserver.sevenload[1].txt [ Cookie:ninjai@adserver.sevenload.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\TFX2U3RX.txt [ Cookie:ninjai@adtech.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@zanox[2].txt [ Cookie:ninjai@zanox.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@tto2.traffictrack[2].txt [ Cookie:ninjai@tto2.traffictrack.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@adultfriendfinder[2].txt [ Cookie:ninjai@adultfriendfinder.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@clicks.pangora[2].txt [ Cookie:ninjai@clicks.pangora.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@findagrave[2].txt [ Cookie:ninjai@findagrave.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@ad.yieldmanager[1].txt [ Cookie:ninjai@ad.yieldmanager.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@readersdigest.122.2o7[1].txt [ Cookie:ninjai@readersdigest.122.2o7.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@statse.webtrendslive[2].txt [ Cookie:ninjai@statse.webtrendslive.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@mediaplex[1].txt [ Cookie:ninjai@mediaplex.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@xxxlutz[1].txt [ Cookie:ninjai@xxxlutz.at/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@eas.apm.emediate[2].txt [ Cookie:ninjai@eas.apm.emediate.eu/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@4stats[2].txt [ Cookie:ninjai@4stats.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@revsci[2].txt [ Cookie:ninjai@revsci.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@ad.adition[2].txt [ Cookie:ninjai@ad.adition.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@content.yieldmanager[2].txt [ Cookie:ninjai@content.yieldmanager.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@mediamarkt[1].txt [ Cookie:ninjai@mediamarkt.at/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@tradedoubler[2].txt [ Cookie:ninjai@tradedoubler.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@microsoftmachinetranslation.112.2o7[1].txt [ Cookie:ninjai@microsoftmachinetranslation.112.2o7.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@247realmedia[2].txt [ Cookie:ninjai@247realmedia.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@admax.quisma[3].txt [ Cookie:ninjai@admax.quisma.com/tracking/view/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@advertiser.contextmatters[1].txt [ Cookie:ninjai@advertiser.contextmatters.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@www.gratiscounter[2].txt [ Cookie:ninjai@www.gratiscounter.at/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@media.gan-online[1].txt [ Cookie:ninjai@media.gan-online.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@paypal.112.2o7[1].txt [ Cookie:ninjai@paypal.112.2o7.net/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@www.googleadservices[2].txt [ Cookie:ninjai@www.googleadservices.com/pagead/conversion/1059763134/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@kontera[2].txt [ Cookie:ninjai@kontera.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@statcounter[2].txt [ Cookie:ninjai@statcounter.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@adserv.chirurgie-portal[2].txt [ Cookie:ninjai@adserv.chirurgie-portal.de/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@adbrite[1].txt [ Cookie:ninjai@adbrite.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@ehg-artnetworldwide.hitbox[2].txt [ Cookie:ninjai@ehg-artnetworldwide.hitbox.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@tracking.mlsat02[1].txt [ Cookie:ninjai@tracking.mlsat02.de/tmobile/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@www3.smartadserver[1].txt [ Cookie:ninjai@www3.smartadserver.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@fl01.ct2.comclick[2].txt [ Cookie:ninjai@fl01.ct2.comclick.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@adsrv1.admediate[1].txt [ Cookie:ninjai@adsrv1.admediate.com/ ] C:\USERS\NINJAI\AppData\Roaming\Microsoft\Windows\Cookies\Low\ninjai@www.zanox-affiliate[2].txt [ Cookie:ninjai@www.zanox-affiliate.de/ ] C:\USERS\NINJAI\Cookies\ninjai@im.banner.t-online[1].txt [ Cookie:ninjai@im.banner.t-online.de/ ] C:\USERS\NINJAI\Cookies\ninjai@advertiser.contextmatters[1].txt [ Cookie:ninjai@advertiser.contextmatters.de/ ] C:\USERS\NINJAI\Cookies\ninjai@admax.quisma[3].txt [ Cookie:ninjai@admax.quisma.com/tracking/ ] C:\USERS\NINJAI\Cookies\ninjai@admax.quisma[2].txt [ Cookie:ninjai@admax.quisma.com/tracking/view/ ] C:\USERS\NINJAI\Cookies\ninjai@smartadserver[1].txt [ Cookie:ninjai@smartadserver.com/ ] C:\USERS\NINJAI\Cookies\ninjai@apmebf[1].txt [ Cookie:ninjai@apmebf.com/ ] C:\USERS\NINJAI\Cookies\ninjai@euros4click[2].txt [ Cookie:ninjai@euros4click.de/ ] C:\USERS\NINJAI\Cookies\ninjai@adfarm1.adition[1].txt [ Cookie:ninjai@adfarm1.adition.com/ ] C:\USERS\NINJAI\Cookies\ninjai@doubleclick[1].txt [ Cookie:ninjai@doubleclick.net/ ] C:\USERS\NINJAI\Cookies\ninjai@adx.chip[2].txt [ Cookie:ninjai@adx.chip.de/ ] C:\USERS\NINJAI\Cookies\ninjai@xiti[1].txt [ Cookie:ninjai@xiti.com/ ] C:\USERS\NINJAI\Cookies\ninjai@2o7[2].txt [ Cookie:ninjai@2o7.net/ ] C:\USERS\NINJAI\Cookies\ninjai@bwincom.122.2o7[2].txt [ Cookie:ninjai@bwincom.122.2o7.net/ ] C:\USERS\NINJAI\Cookies\ninjai@tracking.mindshare[2].txt [ Cookie:ninjai@tracking.mindshare.de/ ] C:\USERS\NINJAI\Cookies\ninjai@fastclick[1].txt [ Cookie:ninjai@fastclick.net/ ] C:\USERS\NINJAI\Cookies\ninjai@webmasterplan[1].txt [ Cookie:ninjai@webmasterplan.com/ ] C:\USERS\NINJAI\Cookies\ninjai@atdmt[2].txt [ Cookie:ninjai@atdmt.com/ ] C:\USERS\NINJAI\Cookies\ninjai@adtech[1].txt [ Cookie:ninjai@adtech.de/ ] C:\USERS\NINJAI\Cookies\ninjai@zanox[1].txt [ Cookie:ninjai@zanox.com/ ] C:\USERS\NINJAI\Cookies\ninjai@mediaplex[1].txt [ Cookie:ninjai@mediaplex.com/ ] C:\USERS\NINJAI\Cookies\ninjai@eas.apm.emediate[1].txt [ Cookie:ninjai@eas.apm.emediate.eu/ ] C:\USERS\NINJAI\Cookies\ninjai@ad.adition[1].txt [ Cookie:ninjai@ad.adition.net/ ] C:\USERS\NINJAI\Cookies\ninjai@tradedoubler[2].txt [ Cookie:ninjai@tradedoubler.com/ ] C:\USERS\ZENTRALE\AppData\Roaming\Microsoft\Windows\Cookies\zentrale@atdmt[2].txt [ Cookie:zentrale@atdmt.com/ ] C:\USERS\ZENTRALE\AppData\Roaming\Microsoft\Windows\Cookies\zentrale@hitbox[2].txt [ Cookie:zentrale@hitbox.com/ ] C:\USERS\ZENTRALE\Cookies\zentrale@atdmt[2].txt [ Cookie:zentrale@atdmt.com/ ] C:\USERS\ZENTRALE\Cookies\zentrale@hitbox[2].txt [ Cookie:zentrale@hitbox.com/ ] SUPERAntiSpyware Scan Log hxxp://www.superantispyware.com Generated 10/30/2011 at 07:41 AM Application Version : 5.0.1134 Core Rules Database Version : 7868 Trace Rules Database Version: 5680 Scan type : Complete Scan Total Scan Time : 03:28:22 Operating System Information Windows Vista Home Premium 32-bit, Service Pack 2 (Build 6.00.6002) UAC Off - Administrator Memory items scanned : 310 Memory threats detected : 0 Registry items scanned : 36871 Registry threats detected : 0 File items scanned : 132555 File threats detected : 32 Trojan.Agent/Gen-Autorun[Swisyn] H:\PRIVAT\PROGRAMME\ULEAD VIDEOSTUDIO PLUS 11.5 WITH DOLBY DIGITAL POWERPACK\KEYGEN.EXE Adware.Tracking Cookie objects.tremormedia.com [ C:\USERS\NINJAI\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\SKZMESN3 ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@AD1.KING[1].TXT [ /AD1.KING ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@MEDIA.PHOTOBUCKET[2].TXT [ /MEDIA.PHOTOBUCKET ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@ROTATOR.ADJUGGLER[2].TXT [ /ROTATOR.ADJUGGLER ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@ADSERVER.GUTEKUECHE[1].TXT [ /ADSERVER.GUTEKUECHE ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@WWW.SMARTADSERVER[2].TXT [ /WWW.SMARTADSERVER ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@ADVIVA[2].TXT [ /ADVIVA ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@DEALTIME[1].TXT [ /DEALTIME ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@CONTENT.YIELDMANAGER[3].TXT [ /CONTENT.YIELDMANAGER ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@WWW.GOOGLEADSERVICES[4].TXT [ /WWW.GOOGLEADSERVICES ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@WWW.GOOGLEADSERVICES[5].TXT [ /WWW.GOOGLEADSERVICES ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@WW251.SMARTADSERVER[1].TXT [ /WW251.SMARTADSERVER ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@AD.BAUERVERLAG[1].TXT [ /AD.BAUERVERLAG ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@AD.AD-SRV[2].TXT [ /AD.AD-SRV ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@AD1.CHEFKOCH[2].TXT [ /AD1.CHEFKOCH ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@SERVING-SYS[2].TXT [ /SERVING-SYS ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@ADS.THESMOKINGGUN[1].TXT [ /ADS.THESMOKINGGUN ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@ADS.BARTIME[2].TXT [ /ADS.BARTIME ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@CDN5.SPECIFICCLICK[2].TXT [ /CDN5.SPECIFICCLICK ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@TRAFFICTRACK[1].TXT [ /TRAFFICTRACK ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@SPECIFICCLICK[2].TXT [ /SPECIFICCLICK ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@TACODA[2].TXT [ /TACODA ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@SKYPE.122.2O7[1].TXT [ /SKYPE.122.2O7 ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@KOMTRACK[2].TXT [ /KOMTRACK ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@ADVERTISING[1].TXT [ /ADVERTISING ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@IMRWORLDWIDE[2].TXT [ /IMRWORLDWIDE ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@ADS.AUDXCH[1].TXT [ /ADS.AUDXCH ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@COLLECTIVE-MEDIA[1].TXT [ /COLLECTIVE-MEDIA ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@AD.HTTPOOL[1].TXT [ /AD.HTTPOOL ] C:\USERS\NINJAI\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\LOW\NINJAI@INTERCLICK[2].TXT [ /INTERCLICK ] C:\USERS\ZENTRALE\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\ZENTRALE@EHG-NOKIAFIN.HITBOX[2].TXT [ /EHG-NOKIAFIN.HITBOX ] Malwarebytes' Anti-Malware 1.51.2.1300 www.malwarebytes.org Database version: 8046 Windows 6.0.6002 Service Pack 2 Internet Explorer 9.0.8112.16421 30.10.2011 03:22:54 mbam-log-2011-10-30 (03-22-54).txt Scan type: Quick scan Objects scanned: 195162 Time elapsed: 3 minute(s), 21 second(s) Memory Processes Infected: 0 Memory Modules Infected: 0 Registry Keys Infected: 0 Registry Values Infected: 0 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 0 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: (No malicious items detected) Registry Keys Infected: (No malicious items detected) Registry Values Infected: (No malicious items detected) Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: (No malicious items detected) aswMBR version 0.9.8.986 Copyright(c) 2011 AVAST Software Run date: 2011-10-30 02:18:29 ----------------------------- 02:18:29.878 OS Version: Windows 6.0.6002 Service Pack 2 02:18:29.878 Number of processors: 2 586 0x170A 02:18:29.878 ComputerName: NINJAI-PC UserName: Ninjai 02:18:31.111 Initialize success 02:21:23.138 AVAST engine defs: 11102901 02:21:54.525 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 02:21:54.541 Disk 0 Vendor: WDC_WD25 11.0 Size: 238475MB BusType: 3 02:21:54.790 Disk 0 MBR read successfully 02:21:54.790 Disk 0 MBR scan 02:21:54.790 Disk 0 Windows VISTA default MBR code 02:21:54.977 Disk 0 scanning sectors +488395120 02:21:55.399 Disk 0 scanning C:\Windows\system32\drivers 02:22:57.643 Service scanning 02:22:58.953 Modules scanning 02:24:30.275 Disk 0 trace - called modules: 02:24:30.369 ntkrnlpa.exe CLASSPNP.SYS disk.sys iaStor.sys hal.dll 02:24:30.369 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x863d9188] 02:24:30.385 3 CLASSPNP.SYS[8a31a8b3] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0x84aac028] 02:24:30.915 AVAST engine scan C:\Windows 02:25:26.186 AVAST engine scan C:\Windows\system32 02:31:01.336 AVAST engine scan C:\Windows\system32\drivers 02:31:13.473 AVAST engine scan C:\Users\Ninjai 02:35:35.710 AVAST engine scan C:\ProgramData 02:41:07.116 Scan finished successfully 02:42:43.805 Disk 0 MBR has been saved successfully to "C:\Users\Ninjai\Desktop\MBR.dat" 02:42:43.821 The log file has been saved successfully to "C:\Users\Ninjai\Desktop\aswMBR.txt" was sagst du dazu, arne? |
30.10.2011, 12:21 | #25 |
| youtube seitenladefehler ESETSmartInstaller@High as downloader log: all ok # version=7 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6583 # api_version=3.0.2 # EOSSerial=baa95602c671f8429dc49d6d8f276756 # end=finished # remove_checked=false # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2011-10-27 06:19:02 # local_time=2011-10-27 08:19:02 (+0100, Mitteleuropäische Sommerzeit) # country="Austria" # lang=1033 # osver=6.0.6002 NT Service Pack 2 # compatibility_mode=1792 16777215 100 0 805637 805637 0 0 # compatibility_mode=5892 16776573 100 100 33171 157263512 0 0 # compatibility_mode=8192 67108863 100 0 305 305 0 0 # compatibility_mode=9217 16777214 75 66 19873926 21687886 0 0 # scanned=130356 # found=2 # cleaned=0 # scan_time=8757 C:\Users\Ninjai\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\7bb99554-721adea4 Java/TrojanDownloader.Agent.NBL trojan (unable to clean) 00000000000000000000000000000000 I C:\Users\Ninjai\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29\7adbb65d-2dcc702f Java/TrojanDownloader.Agent.NBK trojan (unable to clean) 00000000000000000000000000000000 I ESETSmartInstaller@High as downloader log: all ok esets_scanner_update returned -1 esets_gle=12 # version=8 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=5.0.0.143 # api_version=3.0.2 # EOSSerial=baa95602c671f8429dc49d6d8f276756 # end=finished # remove_checked=false # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2011-10-30 10:30:45 # local_time=2011-10-30 11:30:45 (+0100, Mitteleuropäische Zeit) # country="Austria" # lang=3079 # osver=6.0.6002 NT Service Pack 2 # compatibility_mode=1792 16777215 100 0 1041351 1041351 0 0 # compatibility_mode=5892 16776573 100 100 4170 157499226 0 0 # compatibility_mode=8192 67108863 100 0 236019 236019 0 0 # scanned=137415 # found=0 # cleaned=0 # scan_time=4147 |
30.10.2011, 18:14 | #26 |
/// Winkelfunktion /// TB-Süch-Tiger™ | youtube seitenladefehler Sieht ok aus, da wurden nur Cookies gefunden. Noch Probleme oder weitere Funde in der Zwischenzeit?
__________________ Logfiles bitte immer in CODE-Tags posten |
30.10.2011, 18:51 | #27 |
| youtube seitenladefehler nein, keine probleme soweit. keine weiteren funde heißt das, ich bin jetzt "sauber"? |
30.10.2011, 18:55 | #28 |
/// Winkelfunktion /// TB-Süch-Tiger™ | youtube seitenladefehler Dann wären wir durch! Die Programme, die hier zum Einsatz kamen, können alle wieder runter. CF kann über Start, Ausführen mit combofix /uninstall entfernt werden. Melde dich falls es da Fehlermeldungen zu gibt. Malwarebytes zu behalten ist kein Fehler. Kannst ja 1x im Monat damit scannen, aber immer vorher ans Update denken. Bitte abschließend die Updates prüfen, unten mein Leitfaden dazu. Um in Zukunft die Aktualität der installierten Programme besser im Überblick zu halten, kannst du zB Secunia PSI verwenden. Für noch mehr Sicherheit solltest Du nach der beseitigten Infektion auch möglichst alle Passwörter ändern. Microsoftupdate Windows XP: Besuch mit dem IE die MS-Updateseite und lass Dir alle wichtigen Updates installieren. Windows Vista/7: Anleitung Windows-Update PDF-Reader aktualisieren Ein veralteter AdobeReader stellt ein großes Sicherheitsrisiko dar. Du solltest daher besser alte Versionen vom AdobeReader über Systemsteuerung => Software bzw. Programme und Funktionen deinstallieren, indem Du dort auf "Adobe Reader x.0" klickst und das Programm entfernst. (falls du AdobeReader installiert hast) Ich empfehle einen alternativen PDF-Reader wie PDF Xchange Viewer, SumatraPDF oder Foxit PDF Reader, die sind sehr viel schlanker und flotter als der AdobeReader. Bitte überprüf bei der Gelegenheit auch die Aktualität des Flashplayers, hier der direkte Downloadlink: Mozilla und andere Browser => http://filepony.de/?q=Flash+Player Internet Explorer => http://fpdownload.adobe.com/get/flas..._player_ax.exe Natürlich auch darauf achten, dass andere installierte Browser wie zB Firefox, Opera oder Chrome aktuell sind. Java-Update Veraltete Java-Installationen sind ein Sicherheitsrisiko, daher solltest Du die alten Versionen löschen (falls vorhanden, am besten mit JavaRa) und auf die neuste aktualisieren. Beende dazu alle Programme (v.a. die Browser), klick danach auf Start, Systemsteuerung, Software und deinstalliere darüber alle aufgelisteten Java-Versionen. Lad Dir danach von hier das aktuelle Java SE Runtime Environment (JRE) herunter und installiere es.
__________________ Logfiles bitte immer in CODE-Tags posten |
30.10.2011, 22:18 | #29 |
| youtube seitenladefehler ja super lässig folgende aktionen hab ich bereits durchgeführt: update erfolgt: adobe (AR X (10.1.1) adobe (FP (11.0.1.152) Windowos Java (6 Updatet 29) pdf (aktualisiert) ESET deinstalliert GMER, OSAM und Combofix konnt ich nur vom desktop löschen (paßt das so?) soll ich McAfee auch deinstallieren? |
30.10.2011, 23:47 | #30 |
/// Winkelfunktion /// TB-Süch-Tiger™ | youtube seitenladefehler McAfee kann runter wenn du einen anderen Virenscanner willst. Kannst es ja gegen Avast oder MSe tauschen. Oder meinst du was anderes von McAfee? Und die anderen Tools wie OTL usw einfach vom Desktop löschen. Und das mit CF passt auch.
__________________ Logfiles bitte immer in CODE-Tags posten |
Themen zu youtube seitenladefehler |
checkpoint, conduit, dankbar, erklärung, heute, häufig, install.exe, intranet, ladefehler, microsoft office word, neu, notwendig, plug-in, problem, seite, seitenladefehler, shell32.dll, thema, usb 2.0, youtube, youtube seitenladefehler |