Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: BOO/Whistler gefunden - wie entfernen? bitte kurz helfen

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML.

Antwort
Alt 28.02.2012, 20:46   #16
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Dann bitte jetzt CF ausführen:

ComboFix

Ein Leitfaden und Tutorium zur Nutzung von ComboFix
  • Schliesse alle Programme, vor allem dein Antivirenprogramm und andere Hintergrundwächter sowie deinen Internetbrowser.
  • Starte combofix.exe von deinem Desktop aus, bestätige die Warnmeldungen, führe die Updates durch (falls vorgeschlagen), installiere die Wiederherstellungskonsole (falls vorgeschlagen) und lass dein System durchsuchen.
    Vermeide es auch während Combofix läuft die Maus und Tastatur zu benutzen.
  • Im Anschluss öffnet sich automatisch eine combofix.txt, diesen Inhalt bitte kopieren ([Strg]a, [Strg]c) und in deinen Beitrag einfügen ([Strg]v). Die Datei findest du außerdem unter: C:\ComboFix.txt.
Wichtiger Hinweis:
Combofix darf ausschließlich ausgeführt werden, wenn ein Kompetenzler dies ausdrücklich empfohlen hat!

Es sollte nie auf eigene Initiative hin ausgeführt werden! Eine falsche Benutzung kann ernsthafte Computerprobleme nach sich ziehen und eine Bereinigung der Infektion noch erschweren.

Solltest du nach der Ausführung von Combofix Probleme beim Starten von Anwendungen haben und Meldungen erhalten wie

Zitat:
Es wurde versucht, einen Registrierungsschlüssel einem ungültigen Vorgang zu unterziehen, der zum Löschen markiert wurde.
startest du Windows dann manuell neu und die Fehlermeldungen sollten nicht mehr auftauchen.
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 29.02.2012, 13:06   #17
loco-dubai
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Code:
ATTFilter
ComboFix 12-02-29.01 - OWNER 29.02.2012  12:13:28.1.2 - x86
Microsoft® Windows Vista™ Business   6.0.6002.2.1252.1.1033.18.3070.1870 [GMT 1:00]
Running from: c:\users\OWNER\Downloads\ComboFix.exe
AV: Avira Desktop *Disabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
SP: Avira Desktop *Disabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\program files\StartSearch plugin
c:\program files\StartSearch plugin\IEhelperActiveX.dll
c:\program files\StartSearch plugin\uninst.exe
c:\program files\StartSearch plugin\vShareBar.dll
c:\program files\StartSearch plugin\vshareplg.crx
c:\windows\XSxS
.
.
(((((((((((((((((((((((((   Files Created from 2012-01-28 to 2012-02-29  )))))))))))))))))))))))))))))))
.
.
2012-02-29 11:19 . 2012-02-29 11:19	--------	d-----w-	c:\users\Default\AppData\Local\temp
2012-02-29 00:37 . 2012-02-29 00:37	56200	----a-w-	c:\programdata\Microsoft\Windows Defender\Definition Updates\{EF16A7BF-1466-465E-952F-752A3BAEE7A1}\offreg.dll
2012-02-28 15:47 . 2012-02-28 15:47	--------	d-----w-	C:\TDSSKiller_Quarantine
2012-02-28 12:09 . 2012-02-28 12:09	--------	d-----w-	C:\_OTL
2012-02-28 08:11 . 2012-02-08 06:03	6552120	----a-w-	c:\programdata\Microsoft\Windows Defender\Definition Updates\{EF16A7BF-1466-465E-952F-752A3BAEE7A1}\mpengine.dll
2012-02-27 12:14 . 2012-02-27 12:14	--------	d-----w-	c:\program files\ESET
2012-02-27 09:08 . 2012-02-27 09:08	--------	d-----w-	c:\users\OWNER\AppData\Roaming\Malwarebytes
2012-02-27 09:08 . 2012-02-27 09:08	--------	d-----w-	c:\programdata\Malwarebytes
2012-02-27 09:08 . 2012-02-27 09:08	--------	d-----w-	c:\program files\Malwarebytes' Anti-Malware
2012-02-27 09:08 . 2011-12-10 14:24	20464	----a-w-	c:\windows\system32\drivers\mbam.sys
2012-02-27 07:03 . 2012-02-27 07:03	19416	----a-w-	c:\program files\Mozilla Firefox\AccessibleMarshal.dll
2012-02-27 07:03 . 2012-02-27 07:03	2106216	----a-w-	c:\program files\Mozilla Firefox\D3DCompiler_43.dll
2012-02-27 07:03 . 2012-02-27 07:03	134104	----a-w-	c:\program files\Mozilla Firefox\components\browsercomps.dll
2012-02-27 07:03 . 2012-02-27 07:03	125912	----a-w-	c:\program files\Mozilla Firefox\crashreporter.exe
2012-02-27 07:03 . 2012-02-27 07:03	1998168	----a-w-	c:\program files\Mozilla Firefox\d3dx9_43.dll
2012-02-20 16:58 . 2011-03-12 21:55	876032	----a-w-	c:\windows\system32\XpsPrint.dll
2012-02-20 08:43 . 2012-02-28 12:09	--------	d-----w-	c:\program files\Spybot - Search & Destroy
2012-02-20 08:43 . 2012-02-20 09:05	--------	d-----w-	c:\programdata\Spybot - Search & Destroy
2012-02-20 08:42 . 2012-02-20 08:42	--------	d-----w-	c:\users\OWNER\AppData\Roaming\Avira
2012-02-20 08:40 . 2012-02-20 08:47	137416	----a-w-	c:\windows\system32\drivers\avipbb.sys
2012-02-20 08:40 . 2011-10-11 14:06	36000	----a-w-	c:\windows\system32\drivers\avkmgr.sys
2012-02-20 08:40 . 2012-02-20 08:40	--------	d-----w-	c:\programdata\Avira
2012-02-20 08:40 . 2012-02-20 08:40	--------	d-----w-	c:\program files\Avira
2012-02-20 08:07 . 2012-02-20 08:07	--------	d-----w-	c:\program files\Windows Portable Devices
2012-02-19 23:00 . 2009-09-10 02:01	3023360	----a-w-	c:\windows\system32\UIRibbon.dll
2012-02-19 23:00 . 2009-09-10 02:00	1164800	----a-w-	c:\windows\system32\UIRibbonRes.dll
2012-02-19 23:00 . 2009-09-10 02:00	92672	----a-w-	c:\windows\system32\UIAnimation.dll
2012-02-19 20:08 . 2011-10-27 08:01	3602816	----a-w-	c:\windows\system32\ntkrnlpa.exe
2012-02-19 20:08 . 2011-10-27 08:01	3550080	----a-w-	c:\windows\system32\ntoskrnl.exe
2012-02-19 20:08 . 2011-10-14 16:03	189952	----a-w-	c:\windows\system32\winmm.dll
2012-02-19 20:08 . 2011-10-14 16:00	23552	----a-w-	c:\windows\system32\mciseq.dll
2012-02-19 20:05 . 2011-10-14 16:02	429056	----a-w-	c:\windows\system32\EncDec.dll
2012-02-19 20:03 . 2011-11-25 15:59	376320	----a-w-	c:\windows\system32\winsrv.dll
2012-02-19 20:03 . 2011-12-14 16:17	680448	----a-w-	c:\windows\system32\msvcrt.dll
2012-02-19 19:58 . 2011-09-20 21:02	905088	----a-w-	c:\windows\system32\drivers\tcpip.sys
2012-02-19 19:58 . 2012-01-12 19:52	2044416	----a-w-	c:\windows\system32\win32k.sys
2012-02-19 19:54 . 2011-10-25 15:56	49152	----a-w-	c:\windows\system32\csrsrv.dll
2012-02-19 19:54 . 2011-10-25 15:58	1314816	----a-w-	c:\windows\system32\quartz.dll
2012-02-19 19:54 . 2011-10-25 15:58	497152	----a-w-	c:\windows\system32\qdvd.dll
2012-02-19 19:49 . 2011-11-17 06:48	440192	----a-w-	c:\windows\system32\drivers\ksecdd.sys
2012-02-19 19:49 . 2011-11-16 16:23	377344	----a-w-	c:\windows\system32\winhttp.dll
2012-02-19 19:49 . 2011-11-16 16:23	72704	----a-w-	c:\windows\system32\secur32.dll
2012-02-19 19:49 . 2011-11-16 16:23	278528	----a-w-	c:\windows\system32\schannel.dll
2012-02-19 19:49 . 2011-11-16 16:21	1259008	----a-w-	c:\windows\system32\lsasrv.dll
2012-02-19 19:49 . 2011-11-16 14:12	9728	----a-w-	c:\windows\system32\lsass.exe
2012-02-19 19:49 . 2011-11-08 14:42	2048	----a-w-	c:\windows\system32\tzres.dll
2012-02-19 19:49 . 2011-12-20 10:56	2409784	----a-w-	c:\program files\Windows Mail\OESpamFilter.dat
2012-02-19 19:48 . 2011-08-25 16:15	555520	----a-w-	c:\windows\system32\UIAutomationCore.dll
2012-02-19 19:48 . 2011-08-25 16:14	563712	----a-w-	c:\windows\system32\oleaut32.dll
2012-02-19 19:48 . 2011-08-25 16:14	238080	----a-w-	c:\windows\system32\oleacc.dll
2012-02-19 19:48 . 2011-08-25 13:31	4096	----a-w-	c:\windows\system32\oleaccrc.dll
2012-02-19 19:48 . 2011-09-30 15:57	707584	----a-w-	c:\program files\Common Files\System\wab32.dll
2012-02-19 19:41 . 2010-05-04 19:13	231424	----a-w-	c:\windows\system32\msshsq.dll
2012-02-19 14:00 . 2012-02-19 14:01	--------	d-----w-	c:\windows\system32\ca-ES
2012-02-19 14:00 . 2012-02-19 14:01	--------	d-----w-	c:\windows\system32\eu-ES
2012-02-19 14:00 . 2012-02-19 14:01	--------	d-----w-	c:\windows\system32\vi-VN
2012-02-19 12:22 . 2012-02-19 12:22	--------	d-----w-	c:\windows\system32\EventProviders
2012-02-19 12:15 . 2012-02-19 12:14	476904	----a-w-	c:\program files\Mozilla Firefox\plugins\npdeployJava1.dll
2012-02-19 12:15 . 2012-02-19 12:14	472808	----a-w-	c:\windows\system32\deployJava1.dll
2012-02-19 12:14 . 2012-02-19 12:14	--------	d-----w-	c:\program files\Java
2012-02-13 19:23 . 2012-02-18 15:34	--------	d-----w-	c:\users\OWNER\AppData\Roaming\Izva
2012-02-13 19:23 . 2012-02-16 07:39	--------	d-----w-	c:\users\OWNER\AppData\Roaming\Upsyc
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-01-29 04:10 . 2009-10-03 09:52	237072	------w-	c:\windows\system32\MpSigStub.exe
2011-12-09 09:36 . 2011-12-09 09:36	404640	----a-w-	c:\windows\system32\FlashPlayerCPLApp.cpl
2012-02-27 07:03 . 2012-02-27 07:03	134104	----a-w-	c:\program files\mozilla firefox\components\browsercomps.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]
"swg"="c:\program files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2009-06-15 39408]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Matrox PowerDesk SE"="c:\program files\Matrox Graphics Inc\PowerDesk SE\Matrox.PowerDesk SE.exe" [2005-09-23 163840]
"Google Quick Search Box"="c:\program files\Google\Quick Search Box\GoogleQuickSearchBox.exe" [2009-06-15 68592]
"ToolBoxFX"="c:\program files\HP\ToolBoxFX\bin\HPTLBXFX.exe" [2008-08-01 53248]
"HP Software Update"="c:\program files\HP\HP Software Update\HPWuSchd2.exe" [2007-10-14 49152]
"HPUsageTracking"="c:\program files\HP\HP UT\bin\hppusg.exe" [2008-08-04 36864]
"VirtualCloneDrive"="c:\program files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" [2008-06-29 52168]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2012-01-03 37296]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-01-02 843712]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2011-10-11 258512]
"Malwarebytes' Anti-Malware"="c:\program files\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-01-13 460872]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2007-10-14 214360]
McAfee Security Scan Plus.lnk - c:\program files\McAfee Security Scan\2.0.181\SSScheduler.exe [2010-1-15 255536]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
S3 3xHybrid;ASUSTek SAA713x PCI Card;c:\windows\system32\DRIVERS\3xHybrid.sys [2007-01-26 2831232]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - 49122395
*Deregistered* - 49122395
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork	REG_MULTI_SZ   	PLA DPS BFE mpssvc
HPZ12	REG_MULTI_SZ   	Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt	REG_MULTI_SZ   	hpqcxs08 hpqddsvc
LocalServiceAndNoImpersonation	REG_MULTI_SZ   	FontCache
.
Contents of the 'Scheduled Tasks' folder
.
2012-02-29 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-22 16:39]
.
2012-02-29 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-02-22 16:39]
.
2012-02-28 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3062086142-2646581309-1385036962-1000Core.job
- c:\users\OWNER\AppData\Local\Google\Update\GoogleUpdate.exe [2010-05-26 06:10]
.
2012-02-29 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-3062086142-2646581309-1385036962-1000UA.job
- c:\users\OWNER\AppData\Local\Google\Update\GoogleUpdate.exe [2010-05-26 06:10]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
IE: Nach Microsoft &Excel exportieren - c:\progra~1\MICROS~1\OFFICE11\EXCEL.EXE/3000
LSP: c:\program files\Avira\AntiVir Desktop\avsda.dll
TCP: DhcpNameServer = 213.132.63.25 80.227.2.4
TCP: Interfaces\{C095790D-7D25-4D96-A430-09ACA1D03712}: NameServer = 208.67.222.222 208.67.220.220
FF - ProfilePath - c:\users\OWNER\AppData\Roaming\Mozilla\Firefox\Profiles\wwnnjdtx.default\
FF - prefs.js: browser.search.selectedEngine - 
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - user.js: network.cookie.cookieBehavior - 0
FF - user.js: privacy.clearOnShutdown.cookies - false
FF - user.js: security.warn_viewing_mixed - false
FF - user.js: security.warn_viewing_mixed.show_once - false
FF - user.js: security.warn_submit_insecure - false
FF - user.js: security.warn_submit_insecure.show_once - false
.
- - - - ORPHANS REMOVED - - - -
.
HKLM-Run-HPPQVideo - c:\program files\HP\ScheduledLaunch\HP Color LaserJet CM2320 MFP Series\bin\hppschlnch.exe -r SOFTWARE\Hewlett-Packard\ScheduledLaunch\CLJ_CM2320_MFP_Series -f PQOptimizerVideo.xml
AddRemove-vShare plugin - c:\program files\StartSearch plugin\uninst.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, hxxp://www.gmer.net
Rootkit scan 2012-02-29 12:19
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ... 
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
Completion time: 2012-02-29  12:23:28
ComboFix-quarantined-files.txt  2012-02-29 11:23
.
Pre-Run: 402.099.834.880 bytes free
Post-Run: 402.031.480.832 bytes free
.
- - End Of File - - B15C98F13CD1FF3B144E654F3C213739
         
__________________


Alt 29.02.2012, 15:18   #18
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Ok. Bitte nun Logs mit GMER und OSAM erstellen und posten.
GMER stürzt häufiger ab, wenn das Tool auch beim 2. Mal nicht will, lass es einfach weg und führ nur OSAM aus - die Online-Abfrage durch OSAM bitte überspringen.
Bei OSAM bitte darauf auch achten, dass Du das Log auch als *.log und nicht *.html oder so abspeicherst.

Hinweis: Zum Entpacken von OSAM bitte WinRAR oder 7zip verwenden! Stell auch unbedingt den Virenscanner ab, besonders der Scanner von McAfee meldet oft einen Fehalarm in OSAM!

Downloade dir bitte aswMBR.exe und speichere die Datei auf deinem Desktop.
  • Starte die aswMBR.exe - (aswMBR.exe Anleitung)
    Ab Windows Vista (oder höher) bitte mit Rechtsklick "als Administrator ausführen" starten".
  • Das Tool wird dich fragen, ob Du mit der aktuellen Virendefinition von AVAST! dein System scannen willst. Beantworte diese Frage bitte mit Ja. (Sollte deine Firewall fragen, bitte den Zugriff auf das Internet zulassen )
    Der Download der Definitionen kann je nach Verbindung eine Weile dauern.
  • Klicke auf Scan.
  • Warte bitte bis Scan finished successfully im DOS-Fenster steht.
  • Drücke auf Save Log und speichere diese auf dem Desktop.
Poste mir die aswMBR.txt in deiner nächsten Antwort.

Wichtig: Drücke keinesfalls einen der Fix Buttons ohne Anweisung

Hinweis: Sollte der Scan Button ausgeblendet sein, schließe das Tool und starte es erneut. Sollte der Scan abbrechen und das Programm abstürzen, dann teile mir das mit und wähle unter AV Scan die Einstellung (none).

__________________
__________________

Alt 01.03.2012, 11:01   #19
loco-dubai
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Code:
ATTFilter
GMER 1.0.15.15641 - hxxp://www.gmer.net
Rootkit scan 2012-03-01 10:55:06
Windows 6.0.6002 Service Pack 2 Harddisk0\DR0 -> \Device\00000058 Hitachi_ rev.GM4O
Running: qn01pe4n.exe; Driver: C:\Users\OWNER\AppData\Local\Temp\kxndruod.sys


---- System - GMER 1.0.15 ----

SSDT     8B028C3E                                                                                                                                                                                         ZwCreateSection
SSDT     8B028C16                                                                                                                                                                                         ZwCreateSymbolicLinkObject
SSDT     8B028C1B                                                                                                                                                                                         ZwLoadDriver
SSDT     8B028C11                                                                                                                                                                                         ZwOpenSection
SSDT     8B028C48                                                                                                                                                                                         ZwRequestWaitReplyPort
SSDT     8B028C43                                                                                                                                                                                         ZwSetContextThread
SSDT     8B028C4D                                                                                                                                                                                         ZwSetSecurityObject
SSDT     8B028C20                                                                                                                                                                                         ZwSetSystemInformation
SSDT     8B028C52                                                                                                                                                                                         ZwSystemDebugControl
SSDT     8B028BDF                                                                                                                                                                                         ZwTerminateProcess
SSDT     8B028BDA                                                                                                                                                                                         ZwWriteVirtualMemory

---- Kernel code sections - GMER 1.0.15 ----

.text    ntkrnlpa.exe!KeSetEvent + 215                                                                                                                                                                    820FB998 4 Bytes  [3E, 8C, 02, 8B]
.text    ntkrnlpa.exe!KeSetEvent + 21D                                                                                                                                                                    820FB9A0 4 Bytes  [16, 8C, 02, 8B]
.text    ntkrnlpa.exe!KeSetEvent + 37D                                                                                                                                                                    820FBB00 4 Bytes  [1B, 8C, 02, 8B]
.text    ntkrnlpa.exe!KeSetEvent + 3FD                                                                                                                                                                    820FBB80 4 Bytes  [11, 8C, 02, 8B]
.text    ntkrnlpa.exe!KeSetEvent + 539                                                                                                                                                                    820FBCBC 4 Bytes  [48, 8C, 02, 8B]
.text    ...                                                                                                                                                                                              

---- User code sections - GMER 1.0.15 ----

.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!LdrLoadDll                                                                                                                                   77279378 5 Bytes  JMP 00832D30 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!LdrShutdownThread                                                                                                                            77291D42 5 Bytes  JMP 008524F0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!LdrGetDllHandle                                                                                                                              77295717 5 Bytes  JMP 00850C20 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtAllocateVirtualMemory                                                                                                                      772B3FA4 5 Bytes  JMP 008268F0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtAreMappedFilesTheSame                                                                                                                      772B4114 5 Bytes  JMP 00827E60 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCancelIoFile                                                                                                                               772B4154 5 Bytes  JMP 00832C80 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtClose                                                                                                                                      772B4184 5 Bytes  JMP 0082F940 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCompactKeys                                                                                                                                772B41A4 5 Bytes  JMP 0082DE20 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCompressKey                                                                                                                                772B41D4 5 Bytes  JMP 0082DD70 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateEvent                                                                                                                                772B4224 5 Bytes  JMP 0082ED10 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateFile                                                                                                                                 772B4244 5 Bytes  JMP 00832B20 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateKey                                                                                                                                  772B4284 5 Bytes  JMP 0082DC60 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateMailslotFile                                                                                                                         772B42A4 5 Bytes  JMP 00832A10 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateMutant                                                                                                                               772B42B4 5 Bytes  JMP 0082F160 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateNamedPipeFile                                                                                                                        772B42C4 5 Bytes  JMP 008328E0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreatePagingFile                                                                                                                           772B42E4 5 Bytes  JMP 00832820 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateProcess                                                                                                                              772B4304 5 Bytes  JMP 00850A50 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateProcessEx                                                                                                                            772B4314 5 Bytes  JMP 00850970 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateSection                                                                                                                              772B4334 5 Bytes  JMP 00828480 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateSemaphore                                                                                                                            772B4344 5 Bytes  JMP 0082EE80 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateThread                                                                                                                               772B4364 5 Bytes  JMP 008507C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtDeleteFile                                                                                                                                 772B4624 5 Bytes  JMP 00832750 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtDeleteKey                                                                                                                                  772B4634 5 Bytes  JMP 0082DB90 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtDeleteValueKey                                                                                                                             772B4664 5 Bytes  JMP 0082DAD0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtDeviceIoControlFile                                                                                                                        772B4674 5 Bytes  JMP 00832670 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtDuplicateObject                                                                                                                            772B4694 5 Bytes  JMP 0082F870 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtEnumerateKey                                                                                                                               772B46D4 5 Bytes  JMP 0082DA00 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtEnumerateValueKey                                                                                                                          772B4704 5 Bytes  JMP 0082D930 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtExtendSection                                                                                                                              772B4714 5 Bytes  JMP 008283B0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtFlushBuffersFile                                                                                                                           772B4744 5 Bytes  JMP 008325C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtFlushKey                                                                                                                                   772B4764 5 Bytes  JMP 0082D880 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtFsControlFile                                                                                                                              772B47E4 5 Bytes  JMP 008324E0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtLoadKey                                                                                                                                    772B48E4 5 Bytes  JMP 0082D7D0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtLoadKey2                                                                                                                                   772B48F4 5 Bytes  JMP 0082D710 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtLoadKeyEx                                                                                                                                  772B4904 5 Bytes  JMP 0082D650 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtLockFile                                                                                                                                   772B4914 5 Bytes  JMP 008323D0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtLockRegistryKey                                                                                                                            772B4934 5 Bytes  JMP 0082D5A0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtMakeTemporaryObject                                                                                                                        772B4964 5 Bytes  JMP 0082F7C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtMapViewOfSection                                                                                                                           772B4994 5 Bytes  JMP 008282A0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtNotifyChangeDirectoryFile                                                                                                                  772B49C4 5 Bytes  JMP 008322F0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtNotifyChangeKey                                                                                                                            772B49D4 5 Bytes  JMP 0082D4C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtNotifyChangeMultipleKeys                                                                                                                   772B49E4 5 Bytes  JMP 0082D3E0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtOpenEvent                                                                                                                                  772B4A04 5 Bytes  JMP 0082EF80 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtOpenFile                                                                                                                                   772B4A24 5 Bytes  JMP 00832000 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtOpenKey                                                                                                                                    772B4A54 5 Bytes  JMP 0082D300 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtOpenMutant                                                                                                                                 772B4A74 5 Bytes  JMP 0082F070 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtOpenProcess                                                                                                                                772B4AA4 5 Bytes  JMP 00850B30 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtOpenSection                                                                                                                                772B4AD4 5 Bytes  JMP 008281B0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtOpenSemaphore                                                                                                                              772B4AE4 5 Bytes  JMP 0082ED90 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryAttributesFile                                                                                                                        772B4BC4 5 Bytes  JMP 00831F30 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryDirectoryFile                                                                                                                         772B4C24 5 Bytes  JMP 00831E40 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryEaFile                                                                                                                                772B4C54 5 Bytes  JMP 00831D60 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryFullAttributesFile                                                                                                                    772B4C74 5 Bytes  JMP 00831C90 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryInformationFile                                                                                                                       772B4C94 5 Bytes  JMP 00831BC0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryKey                                                                                                                                   772B4D24 5 Bytes  JMP 0082D150 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryMultipleValueKey                                                                                                                      772B4D34 5 Bytes  JMP 0082D070 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryObject                                                                                                                                772B4D54 5 Bytes  JMP 0082F6E0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryOpenSubKeys                                                                                                                           772B4D64 5 Bytes  JMP 0082CFC0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryOpenSubKeysEx                                                                                                                         772B4D74 5 Bytes  JMP 0082CF00 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryQuotaInformationFile                                                                                                                  772B4D94 5 Bytes  JMP 008312E0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQuerySection                                                                                                                               772B4DA4 5 Bytes  JMP 008280D0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQuerySecurityObject                                                                                                                        772B4DB4 5 Bytes  JMP 0082F310 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryValueKey                                                                                                                              772B4E44 5 Bytes  JMP 0082CE30 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryVirtualMemory                                                                                                                         772B4E54 5 Bytes  JMP 00827F20 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryVolumeInformationFile                                                                                                                 772B4E64 5 Bytes  JMP 00831AF0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtReadFile                                                                                                                                   772B4EA4 5 Bytes  JMP 00831A00 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtReadFileScatter                                                                                                                            772B4EB4 5 Bytes  JMP 00831910 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtRenameKey                                                                                                                                  772B4F34 5 Bytes  JMP 0082CD70 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtReplaceKey                                                                                                                                 772B4F44 5 Bytes  JMP 0082CCB0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtRestoreKey                                                                                                                                 772B5004 5 Bytes  JMP 0082CBF0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSaveKey                                                                                                                                    772B5034 5 Bytes  JMP 0082CB40 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSaveKeyEx                                                                                                                                  772B5044 5 Bytes  JMP 0082CA80 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSaveMergedKeys                                                                                                                             772B5054 5 Bytes  JMP 0082C9C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSetEaFile                                                                                                                                  772B50F4 5 Bytes  JMP 00831850 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSetInformationFile                                                                                                                         772B5154 5 Bytes  JMP 00831780 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSetInformationKey                                                                                                                          772B5174 5 Bytes  JMP 0082C900 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSetInformationObject                                                                                                                       772B5184 5 Bytes  JMP 0082F620 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSetInformationProcess                                                                                                                      772B5194 5 Bytes  JMP 00850700 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSetQuotaInformationFile                                                                                                                    772B5214 5 Bytes  JMP 00831220 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSetSecurityObject                                                                                                                          772B5224 5 Bytes  JMP 0082F250 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSetValueKey                                                                                                                                772B52C4 5 Bytes  JMP 0082C820 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSetVolumeInformationFile                                                                                                                   772B52D4 5 Bytes  JMP 008316B0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtSignalAndWaitForSingleObject                                                                                                               772B52F4 5 Bytes  JMP 0082F530 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtTerminateProcess                                                                                                                           772B5364 5 Bytes  JMP 00852430 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtTranslateFilePath                                                                                                                          772B53D4 5 Bytes  JMP 00831160 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtUnloadKey                                                                                                                                  772B53F4 5 Bytes  JMP 0082C770 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtUnloadKey2                                                                                                                                 772B5404 5 Bytes  JMP 0082C6B0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtUnloadKeyEx                                                                                                                                772B5414 5 Bytes  JMP 0082C5F0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtUnlockFile                                                                                                                                 772B5424 5 Bytes  JMP 008315C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtUnmapViewOfSection                                                                                                                         772B5444 5 Bytes  JMP 00827FF0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtWaitForMultipleObjects                                                                                                                     772B5474 5 Bytes  JMP 0082F3E0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtWaitForSingleObject                                                                                                                        772B5484 5 Bytes  JMP 0082EAE0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtWriteFile                                                                                                                                  772B54B4 5 Bytes  JMP 008314C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtWriteFileGather                                                                                                                            772B54C4 5 Bytes  JMP 008313C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtCreateUserProcess                                                                                                                          772B5674 5 Bytes  JMP 00850890 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!KiUserCallbackDispatcher                                                                                                                     772B5BE0 5 Bytes  JMP 00827260 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!SetConsoleTitleW                                                                                                                          75E0CC8A 5 Bytes  JMP 00851D50 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!QueryActCtxW                                                                                                                              75E0E185 5 Bytes  JMP 00845B30 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!CreateActCtxW                                                                                                                             75E1C7B9 5 Bytes  JMP 008458C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!CreateProcessInternalW                                                                                                                    75E25477 5 Bytes  JMP 00852260 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!GetCommandLineW                                                                                                                           75E29D20 5 Bytes  JMP 00850680 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!GetConsoleTitleW                                                                                                                          75E2E0E9 5 Bytes  JMP 00851B70 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!GetCommandLineA                                                                                                                           75E43E8B 5 Bytes  JMP 008505E0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!ExitProcess                                                                                                                               75E443F4 5 Bytes  JMP 00852400 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!CreateRemoteThread                                                                                                                        75E4CB55 5 Bytes  JMP 00852720 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!SetConsoleTitleA                                                                                                                          75EA6CDD 5 Bytes  JMP 00851E10 
.text    c:\blp\API\office tools\bxlartd.exe[6132] kernel32.dll!GetConsoleTitleA                                                                                                                          75EA6E93 5 Bytes  JMP 00851C50 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!StartServiceCtrlDispatcherA                                                                                                               759E2036 5 Bytes  JMP 0084B560 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!RegisterServiceCtrlHandlerA                                                                                                               759E308C 5 Bytes  JMP 0084BB10 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!RegisterServiceCtrlHandlerExA                                                                                                             759E6678 5 Bytes  JMP 0084B970 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!StartServiceA                                                                                                                             759EA24D 5 Bytes  JMP 0084B380 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!StartServiceCtrlDispatcherW                                                                                                               759EE495 5 Bytes  JMP 0084B450 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!RegisterServiceCtrlHandlerW                                                                                                               759EE988 5 Bytes  JMP 0084BA40 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!SetServiceStatus                                                                                                                          759EF20C 5 Bytes  JMP 0084B670 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!RegisterServiceCtrlHandlerExW                                                                                                             759EFB59 5 Bytes  JMP 0084B8A0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!OpenSCManagerA                                                                                                                            75A02D93 5 Bytes  JMP 0084C3F0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!OpenServiceA                                                                                                                              75A02EBD 5 Bytes  JMP 0084C270 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!StartServiceW                                                                                                                             75A03E0B 5 Bytes  JMP 0084B2B0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!QueryServiceStatusEx                                                                                                                      75A04FFE 5 Bytes  JMP 0084BBE0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!QueryServiceConfigW                                                                                                                       75A050A4 5 Bytes  JMP 0084BFF0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!QueryServiceConfigA                                                                                                                       75A051AD 5 Bytes  JMP 0084C0C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!OpenSCManagerW                                                                                                                            75A07137 5 Bytes  JMP 0084C360 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!CloseServiceHandle                                                                                                                        75A082A5 5 Bytes  JMP 0084D100 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!OpenServiceW                                                                                                                              75A08354 5 Bytes  JMP 0084C190 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!QueryServiceStatus                                                                                                                        75A0842C 5 Bytes  JMP 0084BCC0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!CreateServiceW                                                                                                                            75A29EB4 5 Bytes  JMP 0084CCD0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!ControlService                                                                                                                            75A29FB8 5 Bytes  JMP 0084D030 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!DeleteService                                                                                                                             75A2A07E 5 Bytes  JMP 0084CC40 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!GetServiceDisplayNameW                                                                                                                    75A2B0B3 5 Bytes  JMP 0084C480 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!GetServiceKeyNameW                                                                                                                        75A2B164 5 Bytes  JMP 0084C620 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!EnumServicesStatusExA                                                                                                                     75A2B31B 5 Bytes  JMP 0084C870 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!EnumServicesStatusExW                                                                                                                     75A66909 5 Bytes  JMP 0084C7C0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!SetServiceBits                                                                                                                            75A66B11 5 Bytes  JMP 0084B7D0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!EnumServicesStatusA                                                                                                                       75A66B47 5 Bytes  JMP 0084C9D0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!QueryServiceObjectSecurity                                                                                                                75A66C21 5 Bytes  JMP 0084BD90 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!SetServiceObjectSecurity                                                                                                                  75A66CD9 5 Bytes  JMP 0084B740 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!ChangeServiceConfigA                                                                                                                      75A66DD9 5 Bytes  JMP 0084CF40 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!ChangeServiceConfigW                                                                                                                      75A66F81 5 Bytes  JMP 0084CE50 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!CreateServiceA                                                                                                                            75A672A1 5 Bytes  JMP 0084CD90 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!EnumDependentServicesA                                                                                                                    75A67505 5 Bytes  JMP 0084CB60 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!EnumDependentServicesW                                                                                                                    75A675D9 5 Bytes  JMP 0084CA80 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!GetServiceDisplayNameA                                                                                                                    75A676B1 5 Bytes  JMP 0084C550 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!GetServiceKeyNameA                                                                                                                        75A67759 5 Bytes  JMP 0084C6F0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!QueryServiceConfig2A                                                                                                                      75A67891 5 Bytes  JMP 0084BF10 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!QueryServiceConfig2W                                                                                                                      75A67A19 5 Bytes  JMP 0084BE30 
.text    c:\blp\API\office tools\bxlartd.exe[6132] advapi32.dll!EnumServicesStatusW                                                                                                                       75A67F61 5 Bytes  JMP 0084C920 
.text    c:\blp\API\office tools\bxlartd.exe[6132] GDI32.dll!GdiAddFontResourceW                                                                                                                          773DD4BF 5 Bytes  JMP 00850F70 
.text    c:\blp\API\office tools\bxlartd.exe[6132] GDI32.dll!RemoveFontResourceExW                                                                                                                        773FCCDC 5 Bytes  JMP 00850D30 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!SetWindowsHookExA                                                                                                                           76186322 5 Bytes  JMP 00853980 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!SetWindowsHookExW                                                                                                                           761887AD 5 Bytes  JMP 00853850 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!FindWindowA                                                                                                                                 76189D76 5 Bytes  JMP 00854050 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!GetWindowTextA                                                                                                                              7618F63C 5 Bytes  JMP 00853BC0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!FindWindowExA                                                                                                                               7618F6C1 5 Bytes  JMP 00853F30 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!GetWindowTextW                                                                                                                              76192069 5 Bytes  JMP 00853AB0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!SetWindowTextW                                                                                                                              76199815 5 Bytes  JMP 00853CE0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!FindWindowW                                                                                                                                 7619A441 5 Bytes  JMP 00853FC0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!SetWindowTextA                                                                                                                              761AA4E6 5 Bytes  JMP 00853DB0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] USER32.dll!FindWindowExW                                                                                                                               761B260C 5 Bytes  JMP 00853EA0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ole32.dll!CoResumeClassObjects + 7                                                                                                                     76342C12 5 Bytes  JMP 00840DC0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ole32.dll!CoRegisterClassObject                                                                                                                        76347DBE 5 Bytes  JMP 00840EC0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ole32.dll!CoGetClassObject                                                                                                                             7636FAE8 5 Bytes  JMP 00841020 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ole32.dll!CoRevokeClassObject                                                                                                                          7637B109 5 Bytes  JMP 00840E20 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ole32.dll!CoCreateInstance                                                                                                                             76389F3E 5 Bytes  JMP 008411A0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ole32.dll!CoCreateInstanceEx                                                                                                                           76389F81 5 Bytes  JMP 008410E0 
.text    c:\blp\API\office tools\bxlartd.exe[6132] ole32.dll!CoGetInstanceFromFile                                                                                                                        763DC595 5 Bytes  JMP 008414D0 

---- User IAT/EAT - GMER 1.0.15 ----

IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusShutdown]                                                                                                            [73D97817] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCloneImage]                                                                                                             [73DEA86D] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDrawImageRectI]                                                                                                         [73D9BB22] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetInterpolationMode]                                                                                                   [73D8F695] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdiplusStartup]                                                                                                             [73D975E9] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateFromHDC]                                                                                                          [73D8E7CA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStreamICM]                                                                                              [73DC8395] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipCreateBitmapFromStream]                                                                                                 [73D9DA60] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageHeight]                                                                                                         [73D8FFFA] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipGetImageWidth]                                                                                                          [73D8FF61] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDisposeImage]                                                                                                           [73D871CF] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFileICM]                                                                                                   [73E1CAE2] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipLoadImageFromFile]                                                                                                      [73DBC8D8] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipDeleteGraphics]                                                                                                         [73D8D968] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipFree]                                                                                                                   [73D86853] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipAlloc]                                                                                                                  [73D8687E] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
IAT      C:\Windows\Explorer.EXE[3464] @ C:\Windows\Explorer.EXE [gdiplus.dll!GdipSetCompositingMode]                                                                                                     [73D92AD1] C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.0.6002.18342_none_9e54f8aaca13c773\gdiplus.dll (Microsoft GDI+/Microsoft Corporation)
---- Processes - GMER 1.0.15 ----

Library  C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\415f12bc5874cee471c12d31d41812bf\mscorlib.ni.dll (*** hidden *** ) @ c:\blp\API\office tools\bxlartd.exe [6132]                          0x638D0000                                                                                                                                                           
Library  C:\Windows\assembly\NativeImages_v2.0.50727_32\System\ece12e1b68509d8489de783ace3d21b1\System.ni.dll (*** hidden *** ) @ c:\blp\API\office tools\bxlartd.exe [6132]                              0x63140000                                                                                                                                                           
Library  C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\eecd056989bb157d03094acde93890e2\System.Configuration.ni.dll (*** hidden *** ) @ c:\blp\API\office tools\bxlartd.exe [6132]  0x64DD0000                                                                                                                                                           
Library  C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Xml\b48bb64ff5b083c6afb5ecd439235077\System.Xml.ni.dll (*** hidden *** ) @ c:\blp\API\office tools\bxlartd.exe [6132]                      0x62C00000                                                                                                                                                           
Library  C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\6f728d300a977f19baf982b0e84df806\System.Drawing.ni.dll (*** hidden *** ) @ c:\blp\API\office tools\bxlartd.exe [6132]              0x64C40000                                                                                                                                                           
Library  C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Messaging\0d1cc1d6b56d6c15bdc56cfb1d3a345b\System.Messaging.ni.dll (*** hidden *** ) @ c:\blp\API\office tools\bxlartd.exe [6132]          0x67250000                                                                                                                                                           
Library  C:\Windows\assembly\NativeImages_v2.0.50727_32\System.Data.SqlXml\c455910808f8d8165d4c9127c1ff8735\System.Data.SqlXml.ni.dll (*** hidden *** ) @ c:\blp\API\office tools\bxlartd.exe [6132]      0x64760000                                                                                                                                                           

---- EOF - GMER 1.0.15 ----
         

Alt 01.03.2012, 11:03   #20
loco-dubai
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Code:
ATTFilter
Report of OSAM: Autorun Manager v5.0.11926.0
hxxp://www.online-solutions.ru/en/
Saved at 10:59:18 on 01.03.2012

OS: Windows Vista Business Edition Service Pack 2 (Build 6002), 32-bit
Default Browser: Mozilla Corporation Firefox 10.0.2

Scanner Settings
[x] Rootkits detection (hidden registry)
[x] Rootkits detection (hidden files)
[x] Retrieve files information
[x] Check Microsoft signatures

Filters
[ ] Trusted entries
[ ] Empty entries
[x] Hidden registry entries (rootkit activity)
[x] Exclusively opened files
[x] Not found files
[x] Files without detailed information
[x] Existing files
[ ] Non-startable services
[ ] Non-startable drivers
[x] Active entries
[x] Disabled entries


[Common]
-----( %SystemRoot%\Tasks )-----
"GoogleUpdateTaskUserS-1-5-21-3062086142-2646581309-1385036962-1000Core.job" - "Google Inc." - C:\Users\OWNER\AppData\Local\Google\Update\GoogleUpdate.exe
"GoogleUpdateTaskUserS-1-5-21-3062086142-2646581309-1385036962-1000UA.job" - "Google Inc." - C:\Users\OWNER\AppData\Local\Google\Update\GoogleUpdate.exe
"GoogleUpdateTaskMachineCore.job" - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"GoogleUpdateTaskMachineUA.job" - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe

[Control Panel Objects]
-----( %SystemRoot%\system32 )-----
"ATCPanel.cpl" - "AuthenTec, Inc." - C:\Windows\system32\ATCPanel.cpl
"FlashPlayerCPLApp.cpl" - "Adobe Systems Incorporated" - C:\Windows\system32\FlashPlayerCPLApp.cpl

[Drivers]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
"avgntflt" (avgntflt) - "Avira GmbH" - C:\Windows\System32\DRIVERS\avgntflt.sys
"avipbb" (avipbb) - "Avira GmbH" - C:\Windows\System32\DRIVERS\avipbb.sys
"avkmgr" (avkmgr) - "Avira GmbH" - C:\Windows\System32\DRIVERS\avkmgr.sys
"catchme" (catchme) - ? - C:\Users\OWNER\AppData\Local\Temp\catchme.sys  (File not found)
"ElbyCDIO Driver" (ElbyCDIO) - "Elaborate Bytes AG" - C:\Windows\System32\Drivers\ElbyCDIO.sys
"hoplfb" (hoplfb) - ? - C:\Windows\System32\drivers\jxle.sys  (File not found)
"HPFXBULK" (HPFXBULK) - "Hewlett Packard" - C:\Windows\System32\drivers\hpfxbulk.sys
"HPFXFAX" (HPFXFAX) - "Hewlett Packard" - C:\Windows\System32\drivers\hpfxfax.sys
"IP in IP Tunnel Driver" (IpInIp) - ? - C:\Windows\System32\DRIVERS\ipinip.sys  (File not found)
"IPX Traffic Filter Driver" (NwlnkFlt) - ? - C:\Windows\System32\DRIVERS\nwlnkflt.sys  (File not found)
"IPX Traffic Forwarder Driver" (NwlnkFwd) - ? - C:\Windows\System32\DRIVERS\nwlnkfwd.sys  (File not found)
"kxndruod" (kxndruod) - ? - C:\Users\OWNER\AppData\Local\Temp\kxndruod.sys  (Hidden registry entry, rootkit activity | File not found)
"MBAMProtector" (MBAMProtector) - "Malwarebytes Corporation" - C:\Windows\system32\drivers\mbam.sys
"MTXPAR" (MTXPAR) - "Matrox Graphics Inc." - C:\Windows\System32\DRIVERS\MTXPARM.sys
"ssmdrv" (ssmdrv) - "Avira GmbH" - C:\Windows\System32\DRIVERS\ssmdrv.sys

[Explorer]
-----( HKLM\Software\Classes\Folder\shellex\ColumnHandlers )-----
{F9DB5320-233E-11D1-9F84-707F02C10627} "PDF Shell Extension" - "Adobe Systems, Inc." - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll
-----( HKLM\Software\Classes\Protocols\Filter )-----
{807553E5-5146-11D5-A672-00B0D022E945} "text/xml" - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\OFFICE11\MSOXMLMF.DLL
-----( HKLM\Software\Classes\Protocols\Handler )-----
{32505114-5902-49B2-880A-1F7738E5A384} "Data Page Plugable Protocal mso-offdap11 Handler" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\WEBCOM~1\11\OWC11.DLL
{3D9F03FA-7A94-11D3-BE81-0050048385D1} "Data Page Pluggable Protocol mso-offdap Handler" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\WEBCOM~1\10\OWC10.DLL
{FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} "IEProtocolHandler Class" - "Skype Technologies" - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved )-----
{911051fa-c21c-4246-b470-070cd8df6dc4} ".cab or .zip files" - ? -   (File not found | COM-object registry key not found)
{1b24a030-9b20-49bc-97ac-1be4426f9e59} "ActiveDirectory Folder" - ? -   (File not found | COM-object registry key not found)
{34449847-FD14-4fc8-A75A-7432F5181EFB} "ActiveDirectory Folder" - ? -   (File not found | COM-object registry key not found)
{0F8604A5-4ECE-4DE1-BA7D-CF10F8AA4F48} "Contacts folder" - ? -   (File not found | COM-object registry key not found)
{2C2577C2-63A7-40e3-9B7F-586602617ECB} "Explorer Query Band" - ? -   (File not found | COM-object registry key not found)
{FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75} "IE User Assist" - ? -   (File not found | COM-object registry key not found)
{42042206-2D85-11D3-8CFF-005004838597} "Microsoft Office HTML Icon Handler" - "Microsoft Corporation" - C:\Program Files\Microsoft Office\OFFICE11\msohev.dll
{00020d75-0000-0000-c000-000000000046} "Microsoft Office Outlook" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~1\OFFICE11\MLSHEXT.DLL
{0006F045-0000-0000-C000-000000000046} "Outlook-Dateisymbolerweiterung" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~1\OFFICE11\OLKFSTUB.DLL
{C8494E42-ACDD-4739-B0FB-217361E4894F} "Sam Account Folder" - ? -   (File not found | COM-object registry key not found)
{E29F9716-5C08-4FCD-955A-119FDB5A522D} "Sam Account Folder" - ? -   (File not found | COM-object registry key not found)
{45AC2688-0253-4ED8-97DE-B5370FA7D48A} "Shell Extension for Malware scanning" - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\shlext.dll
{B7056B8E-4F99-44f8-8CBD-282390FE5428} "VirtualCloneDrive Shell Extension" - "Elaborate Bytes AG" - C:\Program Files\Elaborate Bytes\VirtualCloneDrive\ElbyVCDShell.dll
{BDEADF00-C265-11D0-BCED-00A0C90AB50F} "Webordner" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\WEBFOL~1\MSONSEXT.DLL
{da67b8ad-e81b-4c70-9b91b417b5e33527} "Windows Search Shell Service" - ? -   (File not found | COM-object registry key not found)
{B41DB860-8EE4-11D2-9906-E49FADC173CA} "WinRAR" - ? - C:\Program Files\WinRAR\rarext.dll

[Internet Explorer]
-----( HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser )-----
<binary data> "Google Toolbar" - "Google Inc." - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
ITBar7Height "ITBar7Height" - ? -   (File not found | COM-object registry key not found)
<binary data> "ITBar7Layout" - ? -   (File not found | COM-object registry key not found)
-----( HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units )-----
{8AD9C840-044E-11D1-B3E9-00805F499D93} "Java Plug-in 1.6.0_31" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
{CAFEEFAC-0016-0000-0031-ABCDEFFEDCBA} "Java Plug-in 1.6.0_31" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} "Java Plug-in 1.6.0_31" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\npjpi160_31.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
{D27CDB6E-AE6D-11CF-96B8-444553540000} "Shockwave Flash Object" - "Adobe Systems, Inc." - C:\Windows\system32\Macromed\Flash\Flash10b.ocx / hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
-----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions )-----
{53707962-6F74-2D53-2644-206D7942484F} "ClsidExtension" - ? -   (File not found | COM-object registry key not found)
{FF059E31-CC5A-4E2E-BF3B-96E929D65503} "Recherchieren" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL
-----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar )-----
<binary data> "Google Toolbar" - "Google Inc." - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects )-----
{18DF081C-E8AD-4283-A596-FA578C2EBDC3} "Adobe PDF Link Helper" - "Adobe Systems Incorporated" - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
{AA58ED58-01DD-4d91-8333-CF10577473F7} "Google Toolbar Helper" - "Google Inc." - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
{DBC80044-A445-435b-BC74-9C25C1C588A9} "Java(tm) Plug-In 2 SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2ssv.dll
{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} "Java(tm) Plug-In SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\ssv.dll

[Logon]
-----( %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup )-----
"desktop.ini" - ? - C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
-----( %AllUsersProfile%\Microsoft\Windows\Start Menu\Programs\Startup )-----
"desktop.ini" - ? - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
"HP Digital Imaging Monitor.lnk" - "Hewlett-Packard Co." - C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe  (Shortcut exists | File exists)
"McAfee Security Scan Plus.lnk" - "McAfee, Inc." - C:\Program Files\McAfee Security Scan\2.0.181\SSScheduler.exe  (Shortcut exists | File exists)
-----( HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run )-----
"swg" - "Google Inc." - "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Run )-----
"Adobe ARM" - "Adobe Systems Incorporated" - "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
"Adobe Reader Speed Launcher" - "Adobe Systems Incorporated" - "C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe"
"avgnt" - "Avira Operations GmbH & Co. KG" - "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
"Google Quick Search Box" - "Google Inc." - "C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe"  /autorun
"HP Software Update" - "Hewlett-Packard" - C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
"HPUsageTracking" - ? - "C:\Program Files\HP\HP UT\bin\hppusg.exe" "C:\Program Files\HP\HP UT\"
"Malwarebytes' Anti-Malware" - "Malwarebytes Corporation" - "C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
"Matrox PowerDesk SE" - "Matrox Graphics Inc." - "C:\Program Files\Matrox Graphics Inc\PowerDesk SE\Matrox.PowerDesk SE.exe"
"ToolBoxFX" - "HP" - "C:\Program Files\HP\ToolBoxFX\bin\HPTLBXFX.exe" /enum:on /alerts:on /notifications:on /fl:on /fr:on /appData:on /tmcp:on
"VirtualCloneDrive" - "Elaborate Bytes AG" - "C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /s

[Print Monitors]
-----( HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors )-----
"HP Fax Port" - "Hewlett-Packard Company" - C:\Windows\system32\hppfaxprintermon5.dll
"HP Standard TCP/IP Port" - "Hewlett Packard" - C:\Windows\system32\HpTcpMon.dll
"Microsoft Document Imaging Writer Monitor" - "Microsoft Corporation" - C:\Windows\system32\mdimon.dll
"PCL hpz3l4v2" - "Hewlett-Packard Company" - C:\Windows\system32\hpz3l4v2.dll

[Services]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
"@c:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe,-100" (WPFFontCache_v0400) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe
"Avira Mail Protection" (AntiVirMailService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\avmailc.exe
"Avira Realtime Protection" (AntiVirService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
"Avira Scheduler" (AntiVirSchedulerService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\sched.exe
"Avira Web Protection" (AntiVirWebService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE
"Google Software Updater" (gusvc) - "Google" - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
"Google Update Service (gupdate)" (gupdate) - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"Google Update Service (gupdatem)" (gupdatem) - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"HP CUE DeviceDiscovery Service" (hpqddsvc) - "Hewlett-Packard Co." - C:\Program Files\HP\Digital Imaging\bin\hpqddsvc.dll
"hpqcxs08" (hpqcxs08) - "Hewlett-Packard Co." - C:\Program Files\HP\Digital Imaging\bin\hpqcxs08.dll
"MBAMService" (MBAMService) - "Malwarebytes Corporation" - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
"McAfee Security Scan Component Host Service" (McComponentHostService) - "McAfee, Inc." - C:\Program Files\McAfee Security Scan\2.0.181\McCHSvc.exe
"Microsoft .NET Framework NGEN v4.0.30319_X86" (clr_optimization_v4.0.30319_32) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
"MtxDrvService" (MtxDrvService) - ? - C:\Windows\system32\MtxDrvService.exe
"Net Driver HPZ12" (Net Driver HPZ12) - "Hewlett-Packard" - C:\Windows\system32\HPZinw12.dll
"Office Source Engine" (ose) - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
"Pml Driver HPZ12" (Pml Driver HPZ12) - "Hewlett-Packard" - C:\Windows\system32\HPZipm12.dll
"SBSD Security Center Service" (SBSDWSCService) - "Safer Networking Ltd." - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
"TeamViewer 5" (TeamViewer5) - "TeamViewer GmbH" - C:\Program Files\TeamViewer\Version5\TeamViewer_Service.exe
"VNC Server Version 4" (WinVNC4) - "RealVNC Ltd." - C:\Program Files\RealVNC\VNC4\WinVNC4.exe

[Winsock Providers]
-----( HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries )-----
"AVSDA" - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\avsda.dll

===[ Logfile end ]=========================================[ Logfile end ]===

If You have questions or want to get some help, You can visit hxxp://forum.online-solutions.
         


Alt 01.03.2012, 11:23   #21
loco-dubai
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Code:
ATTFilter
aswMBR version 0.9.9.1649 Copyright(c) 2011 AVAST Software
Run date: 2012-03-01 11:03:27
-----------------------------
11:03:27.257    OS Version: Windows 6.0.6002 Service Pack 2
11:03:27.257    Number of processors: 2 586 0x6B02
11:03:27.260    ComputerName: TOBIASROLLEHOME  UserName: OWNER
11:03:29.544    Initialize success
11:04:14.501    AVAST engine defs: 12030100
11:04:18.240    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\00000058
11:04:18.244    Disk 0 Vendor: Hitachi_ GM4O Size: 476940MB BusType: 8
11:04:18.776    Disk 0 MBR read successfully
11:04:18.780    Disk 0 MBR scan
11:04:18.787    Disk 0 Windows VISTA default MBR code
11:04:18.945    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS       469203 MB offset 63
11:04:19.040    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS         7734 MB offset 960927975
11:04:19.438    Disk 0 scanning sectors +976768065
11:04:19.866    Disk 0 scanning C:\Windows\system32\drivers
11:06:09.480    Service scanning
11:06:37.194    Modules scanning
11:08:22.473    Disk 0 trace - called modules:
11:08:22.551    ntkrnlpa.exe CLASSPNP.SYS disk.sys acpi.sys hal.dll storport.sys nvstor.sys 
11:08:22.885    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x85911ac8]
11:08:22.897    3 CLASSPNP.SYS[8a3a08b3] -> nt!IofCallDriver -> [0x85359f08]
11:08:22.907    5 acpi.sys[8060b6bc] -> nt!IofCallDriver -> \Device\00000058[0x85373b88]
11:08:23.961    AVAST engine scan C:\Windows
11:08:44.985    AVAST engine scan C:\Windows\system32
11:13:39.335    AVAST engine scan C:\Windows\system32\drivers
11:13:56.801    AVAST engine scan C:\Users\OWNER
11:21:34.161    Disk 0 MBR has been saved successfully to "C:\Users\OWNER\Documents\MBR.dat"
11:21:34.175    The log file has been saved successfully to "C:\Users\OWNER\Documents\aswMBR.txt"
         

Alt 01.03.2012, 13:55   #22
loco-dubai
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Gerade eben wurde eine Mail von meiner Email an meine Email gesendet mit Spam Inhalt (Viagra etc)
Ich vermute da läuft irgendwas richtig falsch.

Was denkst du dazu? Absender sitzt in Pakistan

Code:
ATTFilter
From meineemail@yahoo.de Thu Mar  1 12:15:01 2012
X-Apparently-To: meineemail@yahoo.de via 77.238.189.171; Thu, 01 Mar 2012 12:15:01 +0000
Return-Path: <meineemail@yahoo.de>
X-YahooFilteredBulk: 182.179.110.94
Received-SPF: none (domain of yahoo.de does not designate permitted sender hosts)
X-YMailISG: TeYHagIWLDvTqCQVCEatlIyEu0SGzD2K4Ux6mBNv0NOWq18d
 e2trlcMzAOCWXTIwSmt5k529soM7ZsHEQ3JP44U7nBv1MC3EcVak7wYqwcxQ
 mPvhN72e.97DT_JLcYb.6Ay22dBAfGML_nrJGAjtWt8X44hwS.ck9bz_o1Xl
 gX2R_DS.mRK45Cv3eNupgRz.jQ64HMzOQdhUL6RrVZm3eIumnyUXhbJcrLmH
 Oi_neSopER2EIzvDECpCYzjZywSYHJN4TYrN9So3auhh4QDWiOoi3e_cFoEN
 LwUF2SeUAbY5og3U1.owecBdkq2DTVf8yo6RVLR6OFjZgIr.W4EitBU5ciPW
 l6XVFPyhlNGCW7oWs7sXac6flm6kx0A3lj_zKxcQz5teNiDUSuJiSMchOyOF
 cJl5bBjPw9pBw35c1yjkfg9RxQDxCInlu8XXrqZvszSTKV4HRzvUj0Mcm5Ub
 aidD_PZsjR0PCoGEU4.9aEN6x1xE_nKMX7f1XiUcCsD2jWdf4f.IwBjR7fq4
 p8NBkSGhEWljUwCPwFnGE_93xG_GG6vRyudLKiCO9P44cYEVMX1cvINI9rhf
 VmZNfm9E.z0fzvmOZa2FtnMLepKl1dxlTw6XhdEkJxGJY12ki5wR6dJdUBb8
 Qyia1HECt8Ucmn1r6M18eMYXIf0M9oG_ioI_p28FVuuYLL5AMsghm0NXvm66
 55EiRzyManbuTc3pwodLN1r5L5Kixs3404l58KTjMKPXzV73piURUs8fmw7X
 j3S_BSgiOrsvHEpAwKup8YI8fS9WndNjjY3t_f5WXYrwlBB0illJfa3ZZid7
 Sj42hLkHq2LMzyARDps3648oUG6DEUkwaXo537E8XKYLWl4jeWffwYJzYDn2
 0gCBiaY7bfxQGEzDMA_pGs039AiRuqQDESeRndRKyG.dUUiwEQ--
X-Originating-IP: [182.179.110.94]
Authentication-Results: mta1011.mail.ird.yahoo.com  from=yahoo.de; domainkeys=neutral (no sig);  from=yahoo.de; dkim=neutral (no sig)
Received: from 127.0.0.1  (HELO nj) (182.179.110.94)
  by mta1011.mail.ird.yahoo.com with SMTP; Thu, 01 Mar 2012 12:15:01 +0000
To: <meineemail@yahoo.de>
Subject: meineemail@yahoo.de Pf|zer Discount ID162501
From: <meineemail@yahoo.de>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
Content-Length: 223
         

Geändert von loco-dubai (01.03.2012 um 14:37 Uhr)

Alt 01.03.2012, 18:10   #23
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Spammer können problemlos die Absendeadressen fälchen. Nur weil deine Mail angeblich der Absender ist, heißt das noch lange nicht, dass das auch von deinem Konto oder gar deinem Rechner ausging

Zitat:
c:\blp\API\office tools\bxlartd.exe[6132] ntdll.dll!NtQueryObject
Hast du einen Bloomberg Server? Was macht das Teil genau?


Zitat:
"hoplfb" (hoplfb) - ? - C:\Windows\System32\drivers\jxle.sys (File not found)
Bitte mit OSAM deaktivieren und löschen
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 02.03.2012, 08:36   #24
loco-dubai
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Bloomberg war alt. Hab ich nun auch de-installed.
Beim Osam Neustart war der Report leer
"(Failed) Cannot find object "

Code:
ATTFilter
Report of OSAM: Autorun Manager v5.0.11926.0
hxxp://www.online-solutions.ru/en/
Saved at 08:33:06 on 02.03.2012

OS: Windows Vista Business Edition Service Pack 2 (Build 6002), 32-bit
Default Browser: Mozilla Corporation Firefox 10.0.2

Scanner Settings
[x] Rootkits detection (hidden registry)
[x] Rootkits detection (hidden files)
[x] Retrieve files information
[x] Check Microsoft signatures

Filters
[ ] Trusted entries
[ ] Empty entries
[x] Hidden registry entries (rootkit activity)
[x] Exclusively opened files
[x] Not found files
[x] Files without detailed information
[x] Existing files
[ ] Non-startable services
[ ] Non-startable drivers
[x] Active entries
[x] Disabled entries


[Common]
-----( %SystemRoot%\Tasks )-----
"GoogleUpdateTaskUserS-1-5-21-3062086142-2646581309-1385036962-1000Core.job" - "Google Inc." - C:\Users\OWNER\AppData\Local\Google\Update\GoogleUpdate.exe
"GoogleUpdateTaskUserS-1-5-21-3062086142-2646581309-1385036962-1000UA.job" - "Google Inc." - C:\Users\OWNER\AppData\Local\Google\Update\GoogleUpdate.exe
"GoogleUpdateTaskMachineCore.job" - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"GoogleUpdateTaskMachineUA.job" - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe

[Control Panel Objects]
-----( %SystemRoot%\system32 )-----
"ATCPanel.cpl" - "AuthenTec, Inc." - C:\Windows\system32\ATCPanel.cpl
"FlashPlayerCPLApp.cpl" - "Adobe Systems Incorporated" - C:\Windows\system32\FlashPlayerCPLApp.cpl

[Drivers]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
"avgntflt" (avgntflt) - "Avira GmbH" - C:\Windows\System32\DRIVERS\avgntflt.sys
"avipbb" (avipbb) - "Avira GmbH" - C:\Windows\System32\DRIVERS\avipbb.sys
"avkmgr" (avkmgr) - "Avira GmbH" - C:\Windows\System32\DRIVERS\avkmgr.sys
"catchme" (catchme) - ? - C:\Users\OWNER\AppData\Local\Temp\catchme.sys  (File not found)
"ElbyCDIO Driver" (ElbyCDIO) - "Elaborate Bytes AG" - C:\Windows\System32\Drivers\ElbyCDIO.sys
"HPFXBULK" (HPFXBULK) - "Hewlett Packard" - C:\Windows\System32\drivers\hpfxbulk.sys
"HPFXFAX" (HPFXFAX) - "Hewlett Packard" - C:\Windows\System32\drivers\hpfxfax.sys
"IP in IP Tunnel Driver" (IpInIp) - ? - C:\Windows\System32\DRIVERS\ipinip.sys  (File not found)
"IPX Traffic Filter Driver" (NwlnkFlt) - ? - C:\Windows\System32\DRIVERS\nwlnkflt.sys  (File not found)
"IPX Traffic Forwarder Driver" (NwlnkFwd) - ? - C:\Windows\System32\DRIVERS\nwlnkfwd.sys  (File not found)
"MBAMProtector" (MBAMProtector) - "Malwarebytes Corporation" - C:\Windows\system32\drivers\mbam.sys
"MTXPAR" (MTXPAR) - "Matrox Graphics Inc." - C:\Windows\System32\DRIVERS\MTXPARM.sys
"ssmdrv" (ssmdrv) - "Avira GmbH" - C:\Windows\System32\DRIVERS\ssmdrv.sys

[Explorer]
-----( HKLM\Software\Classes\Folder\shellex\ColumnHandlers )-----
{F9DB5320-233E-11D1-9F84-707F02C10627} "PDF Shell Extension" - "Adobe Systems, Inc." - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll
-----( HKLM\Software\Classes\Protocols\Filter )-----
{807553E5-5146-11D5-A672-00B0D022E945} "text/xml" - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\OFFICE11\MSOXMLMF.DLL
-----( HKLM\Software\Classes\Protocols\Handler )-----
{32505114-5902-49B2-880A-1F7738E5A384} "Data Page Plugable Protocal mso-offdap11 Handler" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\WEBCOM~1\11\OWC11.DLL
{3D9F03FA-7A94-11D3-BE81-0050048385D1} "Data Page Pluggable Protocol mso-offdap Handler" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\WEBCOM~1\10\OWC10.DLL
{FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} "IEProtocolHandler Class" - "Skype Technologies" - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved )-----
{911051fa-c21c-4246-b470-070cd8df6dc4} ".cab or .zip files" - ? -   (File not found | COM-object registry key not found)
{1b24a030-9b20-49bc-97ac-1be4426f9e59} "ActiveDirectory Folder" - ? -   (File not found | COM-object registry key not found)
{34449847-FD14-4fc8-A75A-7432F5181EFB} "ActiveDirectory Folder" - ? -   (File not found | COM-object registry key not found)
{0F8604A5-4ECE-4DE1-BA7D-CF10F8AA4F48} "Contacts folder" - ? -   (File not found | COM-object registry key not found)
{2C2577C2-63A7-40e3-9B7F-586602617ECB} "Explorer Query Band" - ? -   (File not found | COM-object registry key not found)
{FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75} "IE User Assist" - ? -   (File not found | COM-object registry key not found)
{42042206-2D85-11D3-8CFF-005004838597} "Microsoft Office HTML Icon Handler" - "Microsoft Corporation" - C:\Program Files\Microsoft Office\OFFICE11\msohev.dll
{00020d75-0000-0000-c000-000000000046} "Microsoft Office Outlook" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~1\OFFICE11\MLSHEXT.DLL
{0006F045-0000-0000-C000-000000000046} "Outlook-Dateisymbolerweiterung" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~1\OFFICE11\OLKFSTUB.DLL
{C8494E42-ACDD-4739-B0FB-217361E4894F} "Sam Account Folder" - ? -   (File not found | COM-object registry key not found)
{E29F9716-5C08-4FCD-955A-119FDB5A522D} "Sam Account Folder" - ? -   (File not found | COM-object registry key not found)
{45AC2688-0253-4ED8-97DE-B5370FA7D48A} "Shell Extension for Malware scanning" - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\shlext.dll
{B7056B8E-4F99-44f8-8CBD-282390FE5428} "VirtualCloneDrive Shell Extension" - "Elaborate Bytes AG" - C:\Program Files\Elaborate Bytes\VirtualCloneDrive\ElbyVCDShell.dll
{BDEADF00-C265-11D0-BCED-00A0C90AB50F} "Webordner" - "Microsoft Corporation" - C:\PROGRA~1\COMMON~1\MICROS~1\WEBFOL~1\MSONSEXT.DLL
{da67b8ad-e81b-4c70-9b91b417b5e33527} "Windows Search Shell Service" - ? -   (File not found | COM-object registry key not found)
{B41DB860-8EE4-11D2-9906-E49FADC173CA} "WinRAR" - ? - C:\Program Files\WinRAR\rarext.dll

[Internet Explorer]
-----( HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser )-----
<binary data> "Google Toolbar" - "Google Inc." - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
ITBar7Height "ITBar7Height" - ? -   (File not found | COM-object registry key not found)
<binary data> "ITBar7Layout" - ? -   (File not found | COM-object registry key not found)
-----( HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units )-----
{8AD9C840-044E-11D1-B3E9-00805F499D93} "Java Plug-in 1.6.0_31" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
{CAFEEFAC-0016-0000-0031-ABCDEFFEDCBA} "Java Plug-in 1.6.0_31" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} "Java Plug-in 1.6.0_31" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\npjpi160_31.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
{D27CDB6E-AE6D-11CF-96B8-444553540000} "Shockwave Flash Object" - "Adobe Systems, Inc." - C:\Windows\system32\Macromed\Flash\Flash10b.ocx / hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
-----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions )-----
{53707962-6F74-2D53-2644-206D7942484F} "ClsidExtension" - ? -   (File not found | COM-object registry key not found)
{FF059E31-CC5A-4E2E-BF3B-96E929D65503} "Recherchieren" - "Microsoft Corporation" - C:\PROGRA~1\MICROS~1\OFFICE11\REFIEBAR.DLL
-----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar )-----
<binary data> "Google Toolbar" - "Google Inc." - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects )-----
{18DF081C-E8AD-4283-A596-FA578C2EBDC3} "Adobe PDF Link Helper" - "Adobe Systems Incorporated" - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
{AA58ED58-01DD-4d91-8333-CF10577473F7} "Google Toolbar Helper" - "Google Inc." - C:\Program Files\Google\Google Toolbar\GoogleToolbar_32.dll
{AF69DE43-7D58-4638-B6FA-CE66B5AD205D} "Google Toolbar Notifier BHO" - "Google Inc." - C:\Program Files\Google\GoogleToolbarNotifier\5.7.7227.1100\swg.dll
{DBC80044-A445-435b-BC74-9C25C1C588A9} "Java(tm) Plug-In 2 SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\jp2ssv.dll
{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} "Java(tm) Plug-In SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files\Java\jre6\bin\ssv.dll

[Logon]
-----( %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup )-----
"desktop.ini" - ? - C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
-----( %AllUsersProfile%\Microsoft\Windows\Start Menu\Programs\Startup )-----
"desktop.ini" - ? - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini
"HP Digital Imaging Monitor.lnk" - "Hewlett-Packard Co." - C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe  (Shortcut exists | File exists)
"McAfee Security Scan Plus.lnk" - "McAfee, Inc." - C:\Program Files\McAfee Security Scan\2.0.181\SSScheduler.exe  (Shortcut exists | File exists)
-----( HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run )-----
"swg" - "Google Inc." - "C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe"
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Run )-----
"Adobe ARM" - "Adobe Systems Incorporated" - "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
"avgnt" - "Avira Operations GmbH & Co. KG" - "C:\Program Files\Avira\AntiVir Desktop\avgnt.exe" /min
"Google Quick Search Box" - "Google Inc." - "C:\Program Files\Google\Quick Search Box\GoogleQuickSearchBox.exe"  /autorun
"HP Software Update" - "Hewlett-Packard" - C:\Program Files\HP\HP Software Update\HPWuSchd2.exe
"HPUsageTracking" - ? - "C:\Program Files\HP\HP UT\bin\hppusg.exe" "C:\Program Files\HP\HP UT\"
"Malwarebytes' Anti-Malware" - "Malwarebytes Corporation" - "C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray
"Matrox PowerDesk SE" - "Matrox Graphics Inc." - "C:\Program Files\Matrox Graphics Inc\PowerDesk SE\Matrox.PowerDesk SE.exe"
"ToolBoxFX" - "HP" - "C:\Program Files\HP\ToolBoxFX\bin\HPTLBXFX.exe" /enum:on /alerts:on /notifications:on /fl:on /fr:on /appData:on /tmcp:on
"VirtualCloneDrive" - "Elaborate Bytes AG" - "C:\Program Files\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /s

[Print Monitors]
-----( HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors )-----
"HP Fax Port" - "Hewlett-Packard Company" - C:\Windows\system32\hppfaxprintermon5.dll
"HP Standard TCP/IP Port" - "Hewlett Packard" - C:\Windows\system32\HpTcpMon.dll
"Microsoft Document Imaging Writer Monitor" - "Microsoft Corporation" - C:\Windows\system32\mdimon.dll
"PCL hpz3l4v2" - "Hewlett-Packard Company" - C:\Windows\system32\hpz3l4v2.dll

[Services]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
"@c:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe,-100" (WPFFontCache_v0400) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe
"Adobe Acrobat Update Service" (AdobeARMservice) - "Adobe Systems Incorporated" - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
"Avira Mail Protection" (AntiVirMailService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\avmailc.exe
"Avira Realtime Protection" (AntiVirService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\avguard.exe
"Avira Scheduler" (AntiVirSchedulerService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\sched.exe
"Avira Web Protection" (AntiVirWebService) - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE
"Google Software Updater" (gusvc) - "Google" - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
"Google Update Service (gupdate)" (gupdate) - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"Google Update Service (gupdatem)" (gupdatem) - "Google Inc." - C:\Program Files\Google\Update\GoogleUpdate.exe
"HP CUE DeviceDiscovery Service" (hpqddsvc) - "Hewlett-Packard Co." - C:\Program Files\HP\Digital Imaging\bin\hpqddsvc.dll
"hpqcxs08" (hpqcxs08) - "Hewlett-Packard Co." - C:\Program Files\HP\Digital Imaging\bin\hpqcxs08.dll
"MBAMService" (MBAMService) - "Malwarebytes Corporation" - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
"McAfee Security Scan Component Host Service" (McComponentHostService) - "McAfee, Inc." - C:\Program Files\McAfee Security Scan\2.0.181\McCHSvc.exe
"Microsoft .NET Framework NGEN v4.0.30319_X86" (clr_optimization_v4.0.30319_32) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
"MtxDrvService" (MtxDrvService) - ? - C:\Windows\system32\MtxDrvService.exe
"Net Driver HPZ12" (Net Driver HPZ12) - "Hewlett-Packard" - C:\Windows\system32\HPZinw12.dll
"Office Source Engine" (ose) - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
"Pml Driver HPZ12" (Pml Driver HPZ12) - "Hewlett-Packard" - C:\Windows\system32\HPZipm12.dll
"SBSD Security Center Service" (SBSDWSCService) - "Safer Networking Ltd." - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe
"TeamViewer 5" (TeamViewer5) - "TeamViewer GmbH" - C:\Program Files\TeamViewer\Version5\TeamViewer_Service.exe
"VNC Server Version 4" (WinVNC4) - "RealVNC Ltd." - C:\Program Files\RealVNC\VNC4\WinVNC4.exe

[Winsock Providers]
-----( HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\Protocol_Catalog9\Catalog_Entries )-----
"AVSDA" - "Avira Operations GmbH & Co. KG" - C:\Program Files\Avira\AntiVir Desktop\avsda.dll

===[ Logfile end ]=========================================[ Logfile end ]===

If You have questions or want to get some help, You can visit hxxp://forum.online-solutions.ru
         

Alt 02.03.2012, 13:43   #25
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Sieht ok aus. Mach bitte zur Kontrolle Vollscans mit Malwarebytes und SUPERAntiSpyware und poste die Logs.
Denk dran beide Tools zu updaten vor dem Scan!!
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 06.03.2012, 07:51   #26
loco-dubai
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Code:
ATTFilter
 Malwarebytes Anti-Malware  (Trial) 1.60.1.1000
www.malwarebytes.org

Database version: v2012.03.04.06

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 8.0.6001.19190
OWNER :: TOBIASROLLEHOME [administrator]

Protection: Disabled

05.03.2012 21:52:38
mbam-log-2012-03-05 (21-52-38).txt

Scan type: Full scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 381878
Time elapsed: 1 hour(s), 35 minute(s), 22 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)
         

Alt 06.03.2012, 11:23   #27
loco-dubai
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Code:
ATTFilter
SUPERAntiSpyware Scan Log
hxxp://www.superantispyware.com

Generated 03/06/2012 at 10:11 AM

Application Version : 5.0.1144

Core Rules Database Version : 8306
Trace Rules Database Version: 6118

Scan type       : Complete Scan
Total Scan Time : 02:16:28

Operating System Information
Windows Vista Business 32-bit, Service Pack 2 (Build 6.00.6002)
UAC Off - Administrator

Memory items scanned      : 759
Memory threats detected   : 0
Registry items scanned    : 33869
Registry threats detected : 0
File items scanned        : 211972
File threats detected     : 289

Adware.Tracking Cookie
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad.zanox[2].txt [ /ad.zanox ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad1.adfarm1.adition[1].txt [ /ad1.adfarm1.adition ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\owner@ad2.adfarm1.adition[2].txt [ /ad2.adfarm1.adition ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\owner@adfarm1.adition[2].txt [ /adfarm1.adition ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\owner@adultfriendfinder[2].txt [ /adultfriendfinder ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\owner@edates.traffective-tracking[1].txt [ /edates.traffective-tracking ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\owner@webmasterplan[2].txt [ /webmasterplan ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\GS0FPG9M.txt [ /atdmt.com ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\ZMMNZJR2.txt [ /c.atdmt.com ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\NNPDQG0A.txt [ /accounts.google.com ]
	C:\Users\OWNER\AppData\Roaming\Microsoft\Windows\Cookies\Q77UYNYZ.txt [ /doubleclick.net ]
	C:\USERS\OWNER\Cookies\owner@ad.zanox[2].txt [ Cookie:owner@ad.zanox.com/ ]
	C:\USERS\OWNER\Cookies\owner@adfarm1.adition[2].txt [ Cookie:owner@adfarm1.adition.com/ ]
	C:\USERS\OWNER\Cookies\owner@ad1.adfarm1.adition[1].txt [ Cookie:owner@ad1.adfarm1.adition.com/ ]
	C:\USERS\OWNER\Cookies\ZMMNZJR2.txt [ Cookie:owner@c.atdmt.com/ ]
	C:\USERS\OWNER\Cookies\NNPDQG0A.txt [ Cookie:owner@accounts.google.com/ ]
	C:\USERS\OWNER\Cookies\Q77UYNYZ.txt [ Cookie:owner@doubleclick.net/ ]
	C:\USERS\OWNER\Cookies\owner@ad2.adfarm1.adition[2].txt [ Cookie:owner@ad2.adfarm1.adition.com/ ]
	C:\USERS\OWNER\Cookies\owner@adultfriendfinder[2].txt [ Cookie:owner@adultfriendfinder.com/ ]
	C:\USERS\OWNER\Cookies\owner@webmasterplan[2].txt [ Cookie:owner@webmasterplan.com/ ]
	.adtech.de [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	ww251.smartadserver.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.imrworldwide.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.imrworldwide.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.adinterax.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.adinterax.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.serving-sys.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.serving-sys.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.serving-sys.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	ad3.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\DEFAULT\COOKIES ]
	files.youporn.com [ C:\USERS\OWNER\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\U4XMY67F ]
	mediadb.kicker.de [ C:\USERS\OWNER\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\U4XMY67F ]
	s0.2mdn.net [ C:\USERS\OWNER\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\U4XMY67F ]
	accounts.youtube.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.doubleclick.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.getclicky.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.static.getclicky.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	in.getclicky.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.serving-sys.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.apmebf.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.mediaplex.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	de.sitestat.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	accounts.youtube.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.unitymedia.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.unitymedia.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.tracking.quisma.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.tracking.quisma.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.tradedoubler.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.im.banner.t-online.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adtech.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.revsci.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.olympiaverlag.122.2o7.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.specificclick.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	www.youporn.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.zedo.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	accounts.youtube.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	accounts.youtube.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.accounts.google.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.accounts.google.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.accounts.google.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.xiti.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.imrworldwide.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.imrworldwide.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.serving-sys.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.tradedoubler.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.tradedoubler.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	eas4.emediate.eu [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad1.emediate.dk [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad1.emediate.dk [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.tracking.quisma.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad1.emediate.dk [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	www.youporn.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	rts.pgmediaserve.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	rts.pgmediaserve.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	rts.pgmediaserve.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.de.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.partypoker.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.zedo.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.delivery.trafficjunky.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ads.crakmedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.youporn.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.youporn.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.youporn.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.sexad.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.exoclick.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.exoclick.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.syndication.traffichaus.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.syndication.traffichaus.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.syndication.traffichaus.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	eas4.emediate.eu [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.rambler.ru [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.bs.serving-sys.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.rambler.ru [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.tradedoubler.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.hightraffic.hugoboss.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.hightraffic.hugoboss.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.hightraffic.hugoboss.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.invitemedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.fastclick.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.casalemedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.invitemedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.casalemedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.casalemedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.casalemedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.casalemedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.casalemedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.invitemedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.2o7.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.2o7.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.2o7.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.atdmt.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.atdmt.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.247realmedia.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.revsci.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad.dyntracker.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	track.adform.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	track.adform.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adform.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	media.gan-online.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.tracking.quisma.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.im.banner.t-online.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.zanox-affiliate.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.traffictrack.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.a.revenuemax.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.im.banner.t-online.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.ad.adnet.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.advertising.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.advertising.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.advertising.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.mediaplex.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.serving-sys.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.overture.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	www.googleadservices.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.bizrate.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.smartadserver.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ww251.smartadserver.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.webmasterplan.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.tribalfusion.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.emiratesintegratedtelecommunicationscompany.112.2o7.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.fastclick.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad.yieldmanager.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	accounts.google.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.doubleclick.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.serving-sys.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.serving-sys.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad3.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad1.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.revsci.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad4.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad2.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.adfarm1.adition.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.im.banner.t-online.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	ad.zanox.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.zanox.com [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.revsci.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.revsci.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.revsci.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.revsci.net [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	.im.banner.t-online.de [ C:\USERS\OWNER\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\WWNNJDTX.DEFAULT\COOKIES.SQLITE ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@ADSERVER.ADTECHUS[1].TXT [ /ADSERVER.ADTECHUS ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@TRIBALFUSION[1].TXT [ /TRIBALFUSION ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@AD.YIELDMANAGER[1].TXT [ /AD.YIELDMANAGER ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@REALMEDIA[2].TXT [ /REALMEDIA ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@C7.ZEDO[1].TXT [ /C7.ZEDO ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@FASTCLICK[2].TXT [ /FASTCLICK ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@DOUBLECLICK[2].TXT [ /DOUBLECLICK ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@REVSCI[1].TXT [ /REVSCI ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@ZEDO[1].TXT [ /ZEDO ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@BURSTNET[2].TXT [ /BURSTNET ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@ADVERTISING[2].TXT [ /ADVERTISING ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@ATDMT[1].TXT [ /ATDMT ]
	C:\WINDOWS.OLD\USERS\OWNER\APPDATA\ROAMING\MICROSOFT\WINDOWS\COOKIES\OWNER@MICROSOFTWINDOWS.112.2O7[1].TXT [ /MICROSOFTWINDOWS.112.2O7 ]

Trojan.Agent/Gen-FakeAV
	C:\PROGRAM FILES\WINRAR\DEFAULT.SFX

Trojan.Dropper/Win-NV
	C:\WINDOWS.OLD\PROGRAM FILES\PC-DOCTOR 5 FOR WINDOWS\HTTP.DLL
         

Alt 06.03.2012, 13:44   #28
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Sieht ok aus, da wurden nur Cookies gefunden - und zwei Fehlalarme waren dabei
Cookies sind keine Schädlinge direkt, aber es besteht die Gefahr der missbräuchlichen Verwendung (eindeutige Wiedererkennung zB für gezielte Werbung o.ä. => HTTP-Cookie )

Ist dein System nun wieder in Ordnung oder gibt's noch andere Funde oder Probleme?
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 06.03.2012, 17:29   #29
loco-dubai
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Sieht sehr sehr gut aus!
Danke Arne - ohne dich wäre ich echt aufgeschmissen.

TOP SERVICE !!!!

Alt 06.03.2012, 20:05   #30
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Standard

BOO/Whistler gefunden - wie entfernen? bitte kurz helfen



Dann wären wir durch!

Die Programme, die hier zum Einsatz kamen, können alle wieder runter. CF kann über Start, Ausführen mit combofix /uninstall entfernt werden. Melde dich falls es da Fehlermeldungen zu gibt.
Malwarebytes zu behalten ist kein Fehler. Kannst ja 1x im Monat damit scannen, aber immer vorher ans Update denken.

Bitte abschließend die Updates prüfen, unten mein Leitfaden dazu. Um in Zukunft die Aktualität der installierten Programme besser im Überblick zu halten, kannst du zB Secunia PSI verwenden.
Für noch mehr Sicherheit solltest Du nach der beseitigten Infektion auch möglichst alle Passwörter ändern.


Microsoftupdate

Windows XP: Besuch mit dem IE die MS-Updateseite und lass Dir alle wichtigen Updates installieren.

Windows Vista/7: Anleitung Windows-Update


PDF-Reader aktualisieren
Ein veralteter AdobeReader stellt ein großes Sicherheitsrisiko dar. Du solltest daher besser alte Versionen vom AdobeReader über Systemsteuerung => Software bzw. Programme und Funktionen deinstallieren, indem Du dort auf "Adobe Reader x.0" klickst und das Programm entfernst. (falls du AdobeReader installiert hast)

Ich empfehle einen alternativen PDF-Reader wie PDF Xchange Viewer, SumatraPDF oder Foxit PDF Reader, die sind sehr viel schlanker und flotter als der AdobeReader.

Bitte überprüf bei der Gelegenheit auch die Aktualität des Flashplayers:

Adobe - Andere Version des Adobe Flash Player installieren

Notfalls kann man auch von Chip.de runterladen => http://filepony.de/?q=Flash+Player

Natürlich auch darauf achten, dass andere installierte Browser wie zB Firefox, Opera oder Chrome aktuell sind.


Java-Update
Veraltete Java-Installationen sind ein Sicherheitsrisiko, daher solltest Du die alten Versionen löschen (falls vorhanden, am besten mit JavaRa) und auf die neuste aktualisieren. Beende dazu alle Programme (v.a. die Browser), klick danach auf Start, Systemsteuerung, Software und deinstalliere darüber alle aufgelisteten Java-Versionen. Lad Dir danach von hier das aktuelle Java SE Runtime Environment (JRE) herunter und installiere es.
__________________
Logfiles bitte immer in CODE-Tags posten

Antwort

Themen zu BOO/Whistler gefunden - wie entfernen? bitte kurz helfen
anbei, antivirus, avira, datei, datein, entferne, entfernen, gefunde, kurze, laufwerke, leute, log, log datei, schonmal, tagen, verschiedene, verschiedenen, wie entfernen, wie entfernen?




Ähnliche Themen: BOO/Whistler gefunden - wie entfernen? bitte kurz helfen


  1. Virus BOO/Whistler.DB im Masterbootsektor HD1 gefunden(Avira)
    Plagegeister aller Art und deren Bekämpfung - 16.08.2012 (5)
  2. boo/whistler.db im Masterbootsektor gefunden
    Plagegeister aller Art und deren Bekämpfung - 09.08.2012 (33)
  3. Avira meldet BOO/Whistler.A [virus] gefunden
    Plagegeister aller Art und deren Bekämpfung - 21.06.2012 (27)
  4. BOO/Whistler.A in Masterbootsektor HD0, sowie in beiden Partitionen gefunden
    Log-Analyse und Auswertung - 02.01.2012 (27)
  5. BOO/whistler.A virus entfernen?
    Plagegeister aller Art und deren Bekämpfung - 23.12.2011 (2)
  6. Whistler entfernen
    Log-Analyse und Auswertung - 25.11.2011 (19)
  7. BOO/Whistler.A in Masterbootsektor gefunden F und I
    Log-Analyse und Auswertung - 21.11.2011 (22)
  8. BOO/Whistler.A in Masterbootsektor gefunden,Lfw D: ist verschwunden
    Log-Analyse und Auswertung - 11.08.2011 (25)
  9. BOO/Whistler.A von AntiVir in "Bootsector G" gefunden
    Plagegeister aller Art und deren Bekämpfung - 28.07.2011 (24)
  10. Whistler / Black Internet - Wie entfernen?
    Plagegeister aller Art und deren Bekämpfung - 16.10.2010 (3)
  11. Bitte nur mal kurz gucken ;-)
    Mülltonne - 27.01.2009 (0)
  12. Mal kurz helfen ?
    Log-Analyse und Auswertung - 11.01.2008 (4)
  13. Trojaner gefunden -Wer kann mir bitte helfen?
    Plagegeister aller Art und deren Bekämpfung - 05.02.2007 (3)
  14. Trojaner gefunden -Wer kann mir bitte helfen?
    Plagegeister aller Art und deren Bekämpfung - 05.02.2007 (1)
  15. bitte mal kurz ansehen
    Plagegeister aller Art und deren Bekämpfung - 16.09.2005 (3)
  16. Adware gefunden, bitte helfen
    Log-Analyse und Auswertung - 01.08.2005 (1)
  17. Kurz drüberfliegen bitte
    Log-Analyse und Auswertung - 26.05.2005 (1)

Zum Thema BOO/Whistler gefunden - wie entfernen? bitte kurz helfen - Dann bitte jetzt CF ausführen: ComboFix Ein Leitfaden und Tutorium zur Nutzung von ComboFix Lade dir ComboFix hier herunter auf deinen Desktop . Schliesse alle Programme, vor allem dein Antivirenprogramm - BOO/Whistler gefunden - wie entfernen? bitte kurz helfen...
Archiv
Du betrachtest: BOO/Whistler gefunden - wie entfernen? bitte kurz helfen auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.