|
Log-Analyse und Auswertung: Infizierung mit locked-TrojanerWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
10.06.2012, 20:51 | #16 | |
/// Winkelfunktion /// TB-Süch-Tiger™ | Infizierung mit locked-Trojaner Dann bitte jetzt CF ausführen: ComboFix Ein Leitfaden und Tutorium zur Nutzung von ComboFix
Combofix darf ausschließlich ausgeführt werden, wenn ein Kompetenzler dies ausdrücklich empfohlen hat! Solltest du nach der Ausführung von Combofix Probleme beim Starten von Anwendungen haben und Meldungen erhalten wie Zitat:
__________________ Logfiles bitte immer in CODE-Tags posten |
10.06.2012, 22:06 | #17 |
| Infizierung mit locked-Trojaner Combofix Logfile:
__________________Code:
ATTFilter ComboFix 12-06-10.01 - *** 10.06.2012 22:49:22.1.4 - x64 Microsoft Windows 7 Ultimate 6.1.7601.1.1252.49.1031.18.8160.5630 [GMT 2:00] ausgeführt von:: c:\users\***\Desktop\ComboFix.exe AV: Microsoft Security Essentials *Disabled/Updated* {9765EA51-0D3C-7DFB-6091-10E4E1F341F6} SP: Microsoft Security Essentials *Disabled/Updated* {2C040BB5-2B06-7275-5A21-2B969A740B4B} SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} . . (((((((((((((((((((((((((((((((((((( Weitere Löschungen )))))))))))))))))))))))))))))))))))))))))))))))) . . C:\Install.exe c:\program files (x86)\KeePass Password Safe 2\KeePass.exe c:\program files (x86)\xp-AntiSpy c:\program files (x86)\xp-AntiSpy\Uninstall.exe c:\program files (x86)\xp-AntiSpy\xp-AntiSpy.chm c:\program files (x86)\xp-AntiSpy\xp-AntiSpy.exe c:\program files (x86)\xp-AntiSpy\xp-AntiSpy.url c:\users\***\AppData\Local\Microsoft\Windows\Temporary Internet Files\CTcontrol2.00dt0.gadget c:\windows\29010534D5F9D78C.log c:\windows\SysWow64\setup.ini c:\windows\SysWow64\tmpCD25.tmp c:\windows\SysWow64\tmpCD36.tmp . . ((((((((((((((((((((((( Dateien erstellt von 2012-05-10 bis 2012-06-10 )))))))))))))))))))))))))))))) . . 2012-06-10 20:55 . 2012-06-10 20:55 -------- d-----w- c:\users\DefaultAppPool\AppData\Local\temp 2012-06-10 20:55 . 2012-06-10 20:55 -------- d-----w- c:\users\Default\AppData\Local\temp 2012-06-10 19:45 . 2012-05-08 17:02 8955792 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{96E38853-A479-493B-8A0F-8611C24B51F0}\mpengine.dll 2012-06-10 15:38 . 2012-06-10 15:47 -------- d-----w- C:\_OTL 2012-06-08 23:20 . 2012-05-08 17:02 8955792 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll 2012-06-08 15:06 . 2012-06-08 15:06 -------- d-----w- c:\program files (x86)\ESET 2012-06-07 14:48 . 2012-06-07 15:12 -------- d-----w- c:\users\***\AppData\Local\GOG.com 2012-06-06 12:33 . 2012-06-06 12:33 -------- d-----w- c:\users\***\AppData\Roaming\Malwarebytes 2012-06-06 12:33 . 2012-06-06 12:33 -------- d-----w- c:\programdata\Malwarebytes 2012-06-06 12:33 . 2012-04-04 13:56 24904 ----a-w- c:\windows\system32\drivers\mbam.sys 2012-06-06 12:33 . 2012-06-06 12:33 -------- d-----w- c:\program files (x86)\Malwarebytes' Anti-Malware 2012-06-05 16:34 . 2012-06-05 16:34 -------- d-----w- C:\CloneDVDTemp 2012-06-05 16:08 . 2012-06-05 16:08 -------- d-----w- c:\programdata\Elaborate Bytes 2012-06-05 16:06 . 2012-06-06 12:28 -------- d-----w- c:\program files (x86)\Elaborate Bytes 2012-06-05 15:55 . 2012-06-05 15:55 -------- d-----w- c:\programdata\SlySoft 2012-06-05 15:51 . 2012-06-06 12:27 -------- d-----w- c:\program files (x86)\SlySoft 2012-05-26 18:08 . 2012-05-26 18:08 -------- d-----w- c:\users\***\AppData\Local\FLT 2012-05-24 15:03 . 2012-06-07 00:15 -------- d-----w- c:\users\***\AppData\Local\ZinioTabletReader 2012-05-22 15:18 . 2012-05-22 15:18 -------- d-----w- c:\users\***\AppData\Roaming\ZinioReader4.9310D8F796442B71068C511E15D70529A702D19D.1 2012-05-19 23:58 . 2012-05-19 23:58 -------- d-----w- c:\program files (x86)\Mozilla Maintenance Service 2012-05-19 23:58 . 2012-04-21 01:16 43960 ----a-w- c:\program files (x86)\Mozilla Firefox\mozglue.dll 2012-05-19 23:58 . 2012-04-21 01:16 157352 ----a-w- c:\program files (x86)\Mozilla Firefox\maintenanceservice_installer.exe 2012-05-19 23:58 . 2012-04-21 01:16 129976 ----a-w- c:\program files (x86)\Mozilla Firefox\maintenanceservice.exe 2012-05-19 23:58 . 2012-04-21 01:16 588728 ----a-w- c:\program files (x86)\Mozilla Firefox\gkmedias.dll 2012-05-19 23:58 . 2012-04-21 01:15 626688 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcr80.dll 2012-05-19 23:58 . 2012-04-21 01:15 548864 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcp80.dll 2012-05-19 23:58 . 2012-04-21 01:15 479232 ----a-w- c:\program files (x86)\Mozilla Firefox\msvcm80.dll . . . (((((((((((((((((((((((((((((((((((( Find3M Bericht )))))))))))))))))))))))))))))))))))))))))))))))))))))) . 2012-05-06 00:47 . 2012-03-29 08:21 419488 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe 2012-05-06 00:47 . 2011-07-26 00:22 70304 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl 2012-05-06 00:47 . 2012-03-29 08:47 8744608 ----a-w- c:\windows\SysWow64\FlashPlayerInstaller.exe 2012-05-05 11:38 . 2011-04-09 21:37 122904 ----a-w- c:\windows\system32\OpenAL32.dll 2012-05-05 11:38 . 2011-04-09 21:37 109080 ----a-w- c:\windows\SysWow64\OpenAL32.dll 2012-05-01 13:02 . 2012-05-01 13:02 283200 ----a-w- c:\windows\system32\drivers\dtsoftbus01.sys 2012-04-18 18:56 . 2012-04-18 18:56 94208 ----a-w- c:\windows\SysWow64\QuickTimeVR.qtx 2012-04-18 18:56 . 2012-04-18 18:56 69632 ----a-w- c:\windows\SysWow64\QuickTime.qts 2012-04-06 05:22 . 2012-04-06 05:22 11174400 ----a-w- c:\windows\system32\drivers\atikmdag.sys 2012-04-06 02:22 . 2012-04-06 02:22 159744 ----a-w- c:\windows\system32\atiapfxx.exe 2012-04-06 02:21 . 2011-04-20 02:09 909312 ----a-w- c:\windows\SysWow64\aticfx32.dll 2012-04-06 02:20 . 2011-03-09 04:55 1067520 ----a-w- c:\windows\system32\aticfx64.dll 2012-04-06 02:16 . 2012-04-06 02:16 442368 ----a-w- c:\windows\system32\ATIDEMGX.dll 2012-04-06 02:16 . 2012-04-06 02:16 503808 ----a-w- c:\windows\system32\atieclxx.exe 2012-04-06 02:16 . 2012-04-06 02:16 236544 ----a-w- c:\windows\system32\atiesrxx.exe 2012-04-06 02:14 . 2012-04-06 02:14 120320 ----a-w- c:\windows\system32\atitmm64.dll 2012-04-06 02:14 . 2012-04-06 02:14 21504 ----a-w- c:\windows\system32\atimuixx.dll 2012-04-06 02:14 . 2012-04-06 02:14 59392 ----a-w- c:\windows\system32\atiedu64.dll 2012-04-06 02:14 . 2012-04-06 02:14 43520 ----a-w- c:\windows\SysWow64\ati2edxx.dll 2012-04-06 02:13 . 2012-04-06 02:13 6800896 ----a-w- c:\windows\SysWow64\atidxx32.dll 2012-04-06 02:10 . 2012-04-06 02:10 26181632 ----a-w- c:\windows\system32\atio6axx.dll 2012-04-06 02:00 . 2011-03-09 04:11 64000 ----a-w- c:\windows\system32\coinst.dll 2012-04-06 01:54 . 2011-03-09 04:40 7479296 ----a-w- c:\windows\system32\atidxx64.dll 2012-04-06 01:50 . 2012-04-06 01:50 19753984 ----a-w- c:\windows\SysWow64\atioglxx.dll 2012-04-06 01:35 . 2012-04-06 01:35 1120768 ----a-w- c:\windows\system32\atiumd6v.dll 2012-04-06 01:34 . 2012-04-06 01:34 1831424 ----a-w- c:\windows\SysWow64\atiumdmv.dll 2012-04-06 01:34 . 2012-04-06 01:34 4731904 ----a-w- c:\windows\system32\atiumd6a.dll 2012-04-06 01:34 . 2011-04-20 01:38 6203392 ----a-w- c:\windows\SysWow64\atiumdag.dll 2012-04-06 01:30 . 2012-04-06 01:30 51200 ----a-w- c:\windows\system32\aticalrt64.dll 2012-04-06 01:30 . 2012-04-06 01:30 46080 ----a-w- c:\windows\SysWow64\aticalrt.dll 2012-04-06 01:30 . 2012-04-06 01:30 44544 ----a-w- c:\windows\system32\aticalcl64.dll 2012-04-06 01:30 . 2012-04-06 01:30 44032 ----a-w- c:\windows\SysWow64\aticalcl.dll 2012-04-06 01:29 . 2012-04-06 01:29 16090624 ----a-w- c:\windows\system32\aticaldd64.dll 2012-04-06 01:25 . 2012-04-06 01:25 13764096 ----a-w- c:\windows\SysWow64\aticaldd.dll 2012-04-06 01:23 . 2012-04-06 01:23 7431680 ----a-w- c:\windows\system32\atiumd64.dll 2012-04-06 01:22 . 2011-04-20 01:30 4795904 ----a-w- c:\windows\SysWow64\atiumdva.dll 2012-04-06 01:11 . 2012-04-06 01:11 514560 ----a-w- c:\windows\system32\atiadlxx.dll 2012-04-06 01:11 . 2012-04-06 01:11 360448 ----a-w- c:\windows\SysWow64\atiadlxy.dll 2012-04-06 01:11 . 2012-04-06 01:11 17408 ----a-w- c:\windows\system32\atig6pxx.dll 2012-04-06 01:11 . 2012-04-06 01:11 14848 ----a-w- c:\windows\SysWow64\atiglpxx.dll 2012-04-06 01:11 . 2012-04-06 01:11 14848 ----a-w- c:\windows\system32\atiglpxx.dll 2012-04-06 01:11 . 2012-04-06 01:11 41984 ----a-w- c:\windows\system32\atig6txx.dll 2012-04-06 01:10 . 2012-04-06 01:10 33280 ----a-w- c:\windows\SysWow64\atigktxx.dll 2012-04-06 01:10 . 2012-04-06 01:10 343040 ----a-w- c:\windows\system32\drivers\atikmpag.sys 2012-04-06 01:09 . 2011-03-09 04:17 54784 ----a-w- c:\windows\system32\atiuxp64.dll 2012-04-06 01:09 . 2012-04-06 01:09 41984 ----a-w- c:\windows\SysWow64\atiuxpag.dll 2012-04-06 01:09 . 2012-04-06 01:09 44544 ----a-w- c:\windows\system32\atiu9p64.dll 2012-04-06 01:09 . 2011-03-09 04:16 32256 ----a-w- c:\windows\SysWow64\atiu9pag.dll 2012-04-06 01:09 . 2012-04-06 01:09 53248 ----a-w- c:\windows\system32\drivers\ati2erec.dll 2012-04-06 01:06 . 2012-04-06 01:06 54784 ----a-w- c:\windows\system32\atimpc64.dll 2012-04-06 01:06 . 2012-04-06 01:06 54784 ----a-w- c:\windows\system32\amdpcom64.dll 2012-04-06 01:06 . 2012-04-06 01:06 53760 ----a-w- c:\windows\SysWow64\atimpc32.dll 2012-04-06 01:06 . 2012-04-06 01:06 53760 ----a-w- c:\windows\SysWow64\amdpcom32.dll 2012-04-05 20:34 . 2012-04-05 20:34 187392 ----a-w- c:\windows\system32\clinfo.exe 2012-04-05 20:34 . 2012-04-05 20:34 74752 ----a-w- c:\windows\system32\OpenVideo64.dll 2012-04-05 20:34 . 2012-04-05 20:34 64512 ----a-w- c:\windows\SysWow64\OpenVideo.dll 2012-04-05 20:33 . 2012-04-05 20:33 63488 ----a-w- c:\windows\system32\OVDecode64.dll 2012-04-05 20:33 . 2012-04-05 20:33 56320 ----a-w- c:\windows\SysWow64\OVDecode.dll 2012-04-05 20:33 . 2012-04-05 20:33 16457216 ----a-w- c:\windows\system32\amdocl64.dll 2012-04-05 20:32 . 2012-04-05 20:32 13007872 ----a-w- c:\windows\SysWow64\amdocl.dll 2012-03-31 06:05 . 2012-05-09 13:10 5559664 ----a-w- c:\windows\system32\ntoskrnl.exe 2012-03-31 04:39 . 2012-05-09 13:10 3968368 ----a-w- c:\windows\SysWow64\ntkrnlpa.exe 2012-03-31 04:39 . 2012-05-09 13:10 3913072 ----a-w- c:\windows\SysWow64\ntoskrnl.exe 2012-03-31 03:10 . 2012-05-09 13:10 3146240 ----a-w- c:\windows\system32\win32k.sys 2012-03-30 11:35 . 2012-05-09 13:09 1918320 ----a-w- c:\windows\system32\drivers\tcpip.sys 2012-03-22 19:12 . 2012-03-22 19:12 4435968 ----a-w- c:\windows\SysWow64\GPhotos.scr 2012-03-20 18:44 . 2010-10-24 19:25 98688 ----a-w- c:\windows\system32\drivers\NisDrvWFP.sys 2012-03-20 18:44 . 2010-10-24 19:25 203888 ----a-w- c:\windows\system32\drivers\MpFilter.sys 2012-03-17 07:58 . 2012-05-09 13:10 75120 ----a-w- c:\windows\system32\drivers\partmgr.sys . . (((((((((((((((((((((((((((( Autostartpunkte der Registrierung )))))))))))))))))))))))))))))))))))))))) . . *Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt. REGEDIT4 . [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1] @="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}] 2012-02-14 22:58 94208 ----a-w- c:\users\***\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll . [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2] @="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}] 2012-02-14 22:58 94208 ----a-w- c:\users\***\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll . [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3] @="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}] 2012-02-14 22:58 94208 ----a-w- c:\users\***\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll . [HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "TVgenial"="c:\program files (x86)\TVgenial\TVgenial.exe" [2010-01-14 4950656] "ncid.Net"="c:\program files (x86)\ncid.Net\ncid.Net.exe" [2012-05-07 2240512] "Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2010-11-20 1475584] . [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] "AMD AVT"="start AMD Accelerated Video Transcoding device initialization" [X] "NUSB3MON"="c:\program files (x86)\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe" [2010-11-17 113288] "Logitech G35"="c:\program files (x86)\Logitech\G35\G35.exe" [2010-10-05 1811800] "BrStsWnd"="c:\program files (x86)\Brownie\BrstsW64.exe" [2009-08-19 3695928] "JMB36X IDE Setup"="c:\windows\RaidTool\xInsIDE.exe" [2010-09-07 43608] "Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-01-03 843712] "APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-02-20 59240] "RemoteControl11"="c:\program files (x86)\CyberLink\PowerDVD11\PDVD11Serv.exe" [2011-09-14 230696] "DivXUpdate"="c:\program files (x86)\DivX\DivX Update\DivXUpdate.exe" [2011-07-28 1259376] "SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2012-01-18 254696] "iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2012-03-27 421736] "StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2012-04-05 641664] "QuickTime Task"="c:\program files (x86)\QuickTime\QTTask.exe" [2012-04-18 421888] "Malwarebytes' Anti-Malware"="c:\program files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" [2012-04-04 462408] . c:\users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ Dropbox.lnk - c:\users\***\AppData\Roaming\Dropbox\bin\Dropbox.exe [2012-5-24 27112840] . c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\ Quicken 2012 Zahlungserinnerung.lnk - c:\windows\Installer\{2FC7CE3A-23E5-41E8-975B-AA0236D649FD}\BillMinder.8C5DA79E_7079_4AB3_81F7_712153351D0D.exe [2011-4-17 40960] TwonkyServer.lnk - c:\program files (x86)\Twonky\TwonkyServer\twonkytray.exe [2012-3-29 631624] . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system] "EnableUIADesktopToggle"= 0 (0x0) . [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager] BootExecute REG_MULTI_SZ autocheck autochk *\0OODBS . [HKEY_LOCAL_MACHINE\system\currentcontrolset\control\lsa] Security Packages REG_MULTI_SZ kerberos msv1_0 schannel wdigest tspkg pku2u livessp . [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc] @="Service" . R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384] R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576] R2 gupdate;Google Update Service (gupdate);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-04-10 136176] R2 SetupARService;SetupARService;c:\program files (x86)\Realtek\Audio\SetupAfterRebootService.exe [2011-12-22 24576] R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe [2012-05-03 158856] R3 AdobeFlashPlayerUpdateSvc;Adobe Flash Player Update Service;c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-05-06 257696] R3 DAUpdaterSvc;Dragon Age: Origins - Content Updater;c:\program files (x86)\steam\steamapps\common\dragon age ultimate edition\bin_ship\DAUpdaterSvc.Service.exe [2011-05-03 25832] R3 gupdatem;Google Update-Dienst (gupdatem);c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-04-10 136176] R3 HTCAND64;HTC Device Driver;c:\windows\system32\Drivers\ANDROIDUSB.sys [x] R3 htcnprot;HTC NDIS Protocol Driver;c:\windows\system32\DRIVERS\htcnprot.sys [x] R3 LADF_DHP2;G35 DHP2 Filter Driver;c:\windows\system32\DRIVERS\ladfDHP2amd64.sys [x] R3 LADF_SBVM;G35 SBVM Filter Driver;c:\windows\system32\DRIVERS\ladfSBVMamd64.sys [x] R3 MBfilt;MBfilt;c:\windows\system32\drivers\MBfilt64.sys [x] R3 MozillaMaintenance;Mozilla Maintenance Service;c:\program files (x86)\Mozilla Maintenance Service\maintenanceservice.exe [2012-04-21 129976] R3 MSI_MSIBIOS_010507;MSI_MSIBIOS_010507;c:\program files (x86)\MSI\Live Update 5\msibios64_100507.sys [2010-05-10 33592] R3 MSICDSetup;MSICDSetup;E:\CDriver64.sys [x] R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [x] R3 NisSrv;Microsoft-Netzwerkinspektion;c:\program files\Microsoft Security Client\NisSrv.exe [2012-03-26 291696] R3 NTIOLib_1_0_3;NTIOLib_1_0_3;c:\program files (x86)\MSI\Super-Charger\NTIOLib_X64.sys [x] R3 NTIOLib_1_0_4;NTIOLib_1_0_4;c:\program files (x86)\MSI\Live Update 5\NTIOLib_X64.sys [2010-10-22 14136] R3 NTIOLib_1_0_6;NTIOLib_1_0_6;c:\program files (x86)\Setup Files\Ms7681v1G0\NTIOLib_X64.sys [2011-01-06 11888] R3 osppsvc;Office Software Protection Platform;c:\program files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE [2010-01-09 4925184] R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [x] R3 Synth3dVsc;Synth3dVsc;c:\windows\system32\drivers\synth3dvsc.sys [x] R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x] R3 tsusbhub;tsusbhub;c:\windows\system32\drivers\tsusbhub.sys [x] R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [x] R3 VGPU;VGPU;c:\windows\system32\drivers\rdvgkmd.sys [x] R3 vpcuxd;USB-Virtualisierungsstubdienst;c:\windows\system32\DRIVERS\vpcuxd.sys [x] R3 WatAdminSvc;Windows-Aktivierungstechnologieservice;c:\windows\system32\Wat\WatAdminSvc.exe [x] R4 CLHNServiceForPowerDVD;CLHNServiceForPowerDVD;c:\program files (x86)\CyberLink\PowerDVD11\Kernel\DMP\CLHNServiceForPowerDVD.exe [2011-08-24 83240] R4 CyberLink PowerDVD 11.0 Monitor Service;CyberLink PowerDVD 11.0 Monitor Service;c:\program files (x86)\CyberLink\PowerDVD11\Common\MediaServer\CLMSMonitorService.exe [2011-09-02 75048] R4 CyberLink PowerDVD 11.0 Service;CyberLink PowerDVD 11.0 Service;c:\program files (x86)\CyberLink\PowerDVD11\Common\MediaServer\CLMSServerForPDVD11.exe [2011-09-02 292136] S0 mv91cons;Marvell 91xx Config Device Driver;c:\windows\system32\DRIVERS\mv91cons.sys [x] S0 mv91xx;mv91xx;c:\windows\system32\DRIVERS\mv91xx.sys [x] S1 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\DRIVERS\dtsoftbus01.sys [x] S1 nm3;Microsoft Network Monitor 3 Driver;c:\windows\system32\DRIVERS\nm3.sys [x] S2 {329F96B6-DF1E-4328-BFDA-39EA953C1312};Power Control [2011/10/20 10:54];c:\program files (x86)\CyberLink\PowerDVD11\Common\NavFilter\000.fcl [2011-09-02 10:08 148976] S2 acedrv11;acedrv11;c:\windows\system32\drivers\acedrv11.sys [x] S2 AdobeARMservice;Adobe Acrobat Update Service;c:\program files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe [2012-01-03 63928] S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [x] S2 cpuz135;cpuz135;c:\windows\system32\drivers\cpuz135_x64.sys [x] S2 MBAMService;MBAMService;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2012-04-04 654408] S2 ntk_PowerDVD;ntk_PowerDVD;c:\program files (x86)\CyberLink\PowerDVD11\Kernel\DMP\ntk_PowerDVD_64.sys [2011-08-24 75248] S2 OODefragAgent;O&O Defrag;c:\program files\OO Software\Defrag\oodag.exe [2012-02-27 3280208] S2 PassThru Service;Internet Pass-Through Service;c:\program files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe [2011-03-31 80896] S2 TwonkyProxy;TwonkyProxy;c:\program files (x86)\Twonky\TwonkyServer\twonkyproxy.exe [2012-03-29 545608] S2 TwonkyServer;TwonkyServer;c:\program files (x86)\Twonky\TwonkyServer\twonkystarter.exe [2012-03-29 537416] S2 TwonkyWebDav;TwonkyWebDav;c:\program files (x86)\Twonky\TwonkyServer\twonkywebdav.exe [2012-03-29 267080] S3 amdkmdag;amdkmdag;c:\windows\system32\DRIVERS\atikmdag.sys [x] S3 amdkmdap;amdkmdap;c:\windows\system32\DRIVERS\atikmpag.sys [x] S3 AtiHDAudioService;AMD Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdW76.sys [x] S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [x] S3 MEIx64;Intel(R) Management Engine Interface;c:\windows\system32\DRIVERS\HECIx64.sys [x] S3 nusb3hub;Renesas Electronics USB 3.0 Hub Driver;c:\windows\system32\DRIVERS\nusb3hub.sys [x] S3 nusb3xhc;Renesas Electronics USB 3.0 Host Controller Driver;c:\windows\system32\DRIVERS\nusb3xhc.sys [x] S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [x] . . --- Andere Dienste/Treiber im Speicher --- . *NewlyCreated* - WS2IFSL . [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\svchost] iissvcs REG_MULTI_SZ w3svc was apphost REG_MULTI_SZ apphostsvc . Inhalt des "geplante Tasks" Ordners . 2012-06-10 c:\windows\Tasks\Adobe Flash Player Updater.job - c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-03-29 00:47] . 2012-06-10 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job - c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-04-10 18:12] . 2012-06-10 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job - c:\program files (x86)\Google\Update\GoogleUpdate.exe [2011-04-10 18:12] . 2012-06-10 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2332116217-2143763194-2837301324-1000Core.job - c:\users\***\AppData\Local\Google\Update\GoogleUpdate.exe [2012-06-06 17:21] . 2012-06-10 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2332116217-2143763194-2837301324-1000UA.job - c:\users\***\AppData\Local\Google\Update\GoogleUpdate.exe [2012-06-06 17:21] . . --------- X64 Entries ----------- . . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1] @="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}] 2012-02-14 22:58 97792 ----a-w- c:\users\***\AppData\Roaming\Dropbox\bin\DropboxExt64.14.dll . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2] @="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}] 2012-02-14 22:58 97792 ----a-w- c:\users\***\AppData\Roaming\Dropbox\bin\DropboxExt64.14.dll . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3] @="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}] 2012-02-14 22:58 97792 ----a-w- c:\users\***\AppData\Roaming\Dropbox\bin\DropboxExt64.14.dll . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt4] @="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}] 2012-02-14 22:58 97792 ----a-w- c:\users\***\AppData\Roaming\Dropbox\bin\DropboxExt64.14.dll . [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "Windows Mobile Device Center"="c:\windows\WindowsMobile\wmdc.exe" [2007-05-31 660360] "Start WingMan Profiler"="c:\program files\Logitech\Gaming Software\LWEMon.exe" [2010-06-14 190536] "EvtMgr6"="c:\program files\Logitech\SetPointP\SetPoint.exe" [2011-06-23 1744152] "OODefragTray"="c:\program files\OO Software\Defrag\oodtray.exe" [2012-02-27 3994960] "MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2012-03-26 1271168] . [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows] "LoadAppInit_DLLs"=0x0 . ------- Zusätzlicher Suchlauf ------- . uLocal Page = c:\windows\system32\blank.htm uStart Page = about:blank uDefault_Search_URL = hxxp://www.google.com/ie mLocal Page = c:\windows\SysWOW64\blank.htm uInternet Settings,ProxyOverride = *.local uSearchAssistant = hxxp://www.google.com/ie uSearchURL,(Default) = hxxp://www.google.com/search?q=%s IE: Add to Playlist - c:\program files (x86)\Twonky\TwonkyBeam\Internet Explorer\TwonkyIEPlugin.dll/314 IE: An OneNote s&enden - c:\progra~2\MICROS~3\Office14\ONBttnIE.dll/105 IE: Nach Microsoft E&xcel exportieren - c:\progra~2\MICROS~3\Office14\EXCEL.EXE/3000 TCP: DhcpNameServer = 192.168.2.1 FF - ProfilePath - c:\users\***\AppData\Roaming\Mozilla\Firefox\Profiles\y418s5aa.default\ FF - prefs.js: browser.search.defaulturl - hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2319825&SearchSource=3&q={searchTerms} FF - prefs.js: browser.startup.homepage - about:blank FF - prefs.js: keyword.URL - hxxp://de.search.yahoo.com/search?fr=greentree_ff1&ei=utf-8&type=302398&p= . - - - - Entfernte verwaiste Registrierungseinträge - - - - . Wow6432Node-HKCU-Run-KeePass Password Safe 2 - c:\program files (x86)\KeePass Password Safe 2\KeePass.exe Wow6432Node-HKLM-Run-KeePass 2 PreLoad - c:\program files (x86)\KeePass Password Safe 2\KeePass.exe AddRemove-ESET Online Scanner - c:\program files (x86)\ESET\ESET Online Scanner\OnlineScannerUninstaller.exe AddRemove-PunkBusterSvc - d:\spiele\Electronic Arts\Battlefield 3\pbsvc.exe AddRemove-xp-AntiSpy - c:\program files (x86)\xp-AntiSpy\Uninstall.exe AddRemove-Yesterday (de) - d:\spiele\warez\CRIMSON COW\Der Fall John Yesterday\uninst.exe AddRemove-{75D84EF7-0D8C-4e70-B3FA-7B42A5D4E0EB} - c:\program files (x86)\Common Files\BioWare\Uninstall Mass Effect 2.exe . . . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\{329F96B6-DF1E-4328-BFDA-39EA953C1312}] "ImagePath"="\??\c:\program files (x86)\CyberLink\PowerDVD11\Common\NavFilter\000.fcl" . --------------------- Gesperrte Registrierungsschluessel --------------------- . [HKEY_USERS\S-1-5-21-2332116217-2143763194-2837301324-1000\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*] "??"=hex:3e,2d,dd,cf,6b,d8,80,e1,04,9a,ae,3d,a1,7b,db,b1,df,b1,d6,51,ea,55,65, 04,bc,af,b1,bd,7a,9e,a7,4a,6e,41,b2,a9,7e,c7,81,1e,41,cd,ae,82,be,ea,52,4f,\ "??"=hex:51,8f,e7,96,9a,c9,39,de,41,93,e2,14,4c,a7,40,6c . [HKEY_USERS\S-1-5-21-2332116217-2143763194-2837301324-1000\Software\SecuROM\License information*] "datasecu"=hex:39,93,f8,8f,03,b7,d5,1a,f9,19,45,5b,67,35,4c,38,22,2d,be,c2,89, e7,19,cd,44,ee,79,79,af,c3,8e,14,41,60,f9,92,46,06,5f,2a,ea,44,77,96,e8,40,\ "rkeysecu"=hex:14,6a,56,f9,48,64,e4,16,de,1f,83,0c,c1,63,26,15 . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}] @Denied: (A 2) (Everyone) @="FlashBroker" "LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_2_202_235_ActiveX.exe,-101" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation] "Enabled"=dword:00000001 . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_2_202_235_ActiveX.exe" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}] @Denied: (A 2) (Everyone) @="Shockwave Flash Object" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_2_202_235.ocx" "ThreadingModel"="Apartment" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus] @="0" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID] @="ShockwaveFlash.ShockwaveFlash.11" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_2_202_235.ocx, 1" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib] @="{D27CDB6B-AE6D-11cf-96B8-444553540000}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version] @="1.0" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID] @="ShockwaveFlash.ShockwaveFlash" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}] @Denied: (A 2) (Everyone) @="Macromedia Flash Factory Object" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_2_202_235.ocx" "ThreadingModel"="Apartment" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID] @="FlashFactory.FlashFactory.1" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_2_202_235.ocx, 1" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib] @="{D27CDB6B-AE6D-11cf-96B8-444553540000}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version] @="1.0" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID] @="FlashFactory.FlashFactory" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}] @Denied: (A 2) (Everyone) @="IFlashBroker4" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" "Version"="1.0" . [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\System*] "OODEFRAG14.00.00.01PROFESSIONAL"="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" "OODEFRAG15.00.00.01PROFESSIONAL"="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" . [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\Common\Smart Tag\Actions\{B7EFF951-E52F-45CC-9EF7-57124F2177CC}] @Denied: (A) (Everyone) "Solution"="{15727DE6-F92D-4E46-ACB4-0E2C58B31A18}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3] @Denied: (A) (Everyone) . [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3\0] "Key"="ActionsPane3" "Location"="c:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTO\\ActionsPane3.xsd" . [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows CE Services] "SymbolicLinkValue"=hex(6):5c,00,72,00,65,00,67,00,69,00,73,00,74,00,72,00,79, 00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,4f,00,46,00,\ . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security] @Denied: (Full) (Everyone) . ------------------------ Weitere laufende Prozesse ------------------------ . c:\program files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe c:\windows\SysWOW64\PnkBstrA.exe c:\windows\SysWOW64\PnkBstrB.exe c:\program files (x86)\Twonky\TwonkyServer\TwonkyServer.exe c:\program files (x86)\Google\Update\1.3.21.111\GoogleCrashHandler.exe . ************************************************************************** . Zeit der Fertigstellung: 2012-06-10 23:01:28 - PC wurde neu gestartet ComboFix-quarantined-files.txt 2012-06-10 21:01 . Vor Suchlauf: 18 Verzeichnis(se), 257.517.387.776 Bytes frei Nach Suchlauf: 22 Verzeichnis(se), 257.804.075.008 Bytes frei . - - End Of File - - 1B63EA4A7D4F07BF4EF7BC403E1D9AED |
11.06.2012, 10:08 | #18 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Infizierung mit locked-Trojaner Hm, CF hat die keepass2.exe gelöscht, warum weiß ich nicht. Wird wohl ein flasse positive sein, notfalls KP2 neu installieren
__________________Bitte nun Logs mit GMER und OSAM erstellen und posten. GMER stürzt häufiger ab, wenn das Tool auch beim 2. Mal nicht will, lass es einfach weg und führ nur OSAM aus - die Online-Abfrage durch OSAM bitte überspringen. Bei OSAM bitte darauf auch achten, dass Du das Log auch als *.log und nicht *.html oder so abspeicherst. Hinweis: Zum Entpacken von OSAM bitte WinRAR oder 7zip verwenden! Stell auch unbedingt den Virenscanner ab, besonders der Scanner von McAfee meldet oft einen Fehalarm in OSAM! Downloade dir bitte aswMBR.exe und speichere die Datei auf deinem Desktop.
Wichtig: Drücke keinesfalls einen der Fix Buttons ohne Anweisung Hinweis: Sollte der Scan Button ausgeblendet sein, schließe das Tool und starte es erneut. Sollte der Scan abbrechen und das Programm abstürzen, dann teile mir das mit und wähle unter AV Scan die Einstellung (none). Noch ein Hinweis: Sollte aswMBR abstürzen und es kommt eine Meldung wie "aswMBR.exe funktioniert nicht mehr, dann mach Folgendes: Starte aswMBR neu, wähle unten links im Drop-Down-Menü (unten links im Fenster von aswMBR) bei "AV scan" (none) aus und klick nochmal auf den Scan-Button.
__________________ |
11.06.2012, 11:47 | #19 |
| Infizierung mit locked-Trojaner GMER Logfile: Code:
ATTFilter GMER 1.0.15.15641 - hxxp://www.gmer.net Rootkit scan 2012-06-11 12:32:46 Windows 6.1.7601 Service Pack 1 Running: lmp77xe7.exe ---- Registry - GMER 1.0.15 ---- Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\NewShortcuts@C:\Users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\EA Games\Need for Speed\x2122 Most Wanted\Elektronische Registrierung.lnk 1 Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\NewShortcuts@C:\ProgramData\Microsoft\Windows\Start Menu\Programs\EA Games\Need for Speed\x2122 Most Wanted\Elektronische Registrierung.lnk 1 Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\NewShortcuts@C:\Users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\EA Games\Need for Speed\x2122 Most Wanted\Need for Speed\x2122 Most Wanted Abgesicherter Modus.lnk 1 Reg HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\NewShortcuts@C:\ProgramData\Microsoft\Windows\Start Menu\Programs\EA Games\Need for Speed\x2122 Most Wanted\Need for Speed\x2122 Most Wanted Abgesicherter Modus.lnk 1 ---- EOF - GMER 1.0.15 ---- OSAM Logfile: Code:
ATTFilter Report of OSAM: Autorun Manager v5.0.11926.0 hxxp://www.online-solutions.ru/en/ Saved at 12:38:47 on 11.06.2012 OS: Windows 7 Ultimate Edition Service Pack 1 (Build 7601), 64-bit Default Browser: Google Inc. Google Chrome 19.0.1084.52 Scanner Settings [x] Rootkits detection (hidden registry) [x] Rootkits detection (hidden files) [x] Retrieve files information [x] Check Microsoft signatures Filters [ ] Trusted entries [ ] Empty entries [x] Hidden registry entries (rootkit activity) [x] Exclusively opened files [x] Not found files [x] Files without detailed information [x] Existing files [ ] Non-startable services [ ] Non-startable drivers [x] Active entries [x] Disabled entries [Boot Execute] -----( HKLM\SYSTEM\CurrentControlSet\Control\Session Manager )----- "BootExecute" - "O&O Software GmbH" - C:\Windows\system32\OODBS.exe [Common] -----( %SystemRoot%\Tasks )----- "GoogleUpdateTaskMachineCore.job" - "Google Inc." - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe "GoogleUpdateTaskMachineUA.job" - "Google Inc." - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe "GoogleUpdateTaskUserS-1-5-21-2332116217-2143763194-2837301324-1000Core.job" - "Google Inc." - C:\Users\***\AppData\Local\Google\Update\GoogleUpdate.exe "GoogleUpdateTaskUserS-1-5-21-2332116217-2143763194-2837301324-1000UA.job" - "Google Inc." - C:\Users\***\AppData\Local\Google\Update\GoogleUpdate.exe "Adobe Flash Player Updater.job" - "Adobe Systems Incorporated" - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [Control Panel Objects] -----( HKLM\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls )----- "mlcfg32.cpl" - "Microsoft Corporation" - C:\PROGRA~2\MICROS~3\Office14\MLCFG32.CPL "QuickTime" - "Apple Inc." - C:\Program Files (x86)\QuickTime\QTSystem\QuickTime.cpl [Drivers] -----( HKLM\SYSTEM\CurrentControlSet\Services )----- "@%SystemRoot%\system32\drivers\tsusbhub.sys,-1" (tsusbhub) - ? - C:\Windows\System32\drivers\tsusbhub.sys (File not found) "acedrv11" (acedrv11) - "Protect Software GmbH" - C:\Windows\system32\drivers\acedrv11.sys "Apple Mobile USB Driver" (USBAAPL64) - "Apple, Inc." - C:\Windows\System32\Drivers\usbaapl64.sys "catchme" (catchme) - ? - C:\ComboFix\catchme.sys (File not found) "cpuz135" (cpuz135) - "CPUID" - C:\Windows\system32\drivers\cpuz135_x64.sys "MBAMProtector" (MBAMProtector) - "Malwarebytes Corporation" - C:\Windows\system32\drivers\mbam.sys "MBfilt" (MBfilt) - ? - C:\Windows\System32\drivers\MBfilt64.sys (File not found) "Microsoft Network Monitor 3 Driver" (nm3) - "Microsoft Corporation" - C:\Windows\System32\DRIVERS\nm3.sys "MSICDSetup" (MSICDSetup) - ? - E:\CDriver64.sys (File not found) "MSI_MSIBIOS_010507" (MSI_MSIBIOS_010507) - "Your Corporation" - C:\Program Files (x86)\MSI\Live Update 5\msibios64_100507.sys "NTIOLib_1_0_3" (NTIOLib_1_0_3) - ? - C:\Program Files (x86)\MSI\Super-Charger\NTIOLib_X64.sys (File not found) "NTIOLib_1_0_4" (NTIOLib_1_0_4) - "MSI" - C:\Program Files (x86)\MSI\Live Update 5\NTIOLib_X64.sys "NTIOLib_1_0_6" (NTIOLib_1_0_6) - "MSI" - C:\Program Files (x86)\Setup Files\Ms7681v1G0\NTIOLib_X64.sys "ntk_PowerDVD" (ntk_PowerDVD) - "Cyberlink Corp." - C:\Program Files (x86)\CyberLink\PowerDVD11\Kernel\DMP\ntk_PowerDVD_64.sys "Power Control [2011/10/20 10:54:49]" ({329F96B6-DF1E-4328-BFDA-39EA953C1312}) - ? - C:\Program Files (x86)\CyberLink\PowerDVD11\Common\NavFilter\000.fcl "Service for Realtek HD Audio (WDM)" (IntcAzAudAddService) - ? - C:\Windows\System32\drivers\RTKVHD64.sys (File not found) "SetPoint Keyboard Driver" (L8042Kbd) - "Logitech, Inc." - C:\Windows\System32\DRIVERS\L8042Kbd.sys "Synth3dVsc" (Synth3dVsc) - ? - C:\Windows\System32\drivers\synth3dvsc.sys (File not found) "VGPU" (VGPU) - ? - C:\Windows\System32\drivers\rdvgkmd.sys (File not found) [Explorer] -----( HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved )----- {FB314ED9-A251-47B7-93E1-CDD82E34AF8B} "DropboxExt" - ? - (File not found | COM-object registry key not found) {FB314EDA-A251-47B7-93E1-CDD82E34AF8B} "DropboxExt" - ? - (File not found | COM-object registry key not found) {FB314EDB-A251-47B7-93E1-CDD82E34AF8B} "DropboxExt" - ? - (File not found | COM-object registry key not found) {FB314EDC-A251-47B7-93E1-CDD82E34AF8B} "DropboxExt" - ? - (File not found | COM-object registry key not found) -----( HKLM\Software\Classes\Folder\shellex\ColumnHandlers )----- {A9AACA72-1C51-4F84-804D-90EDBA0D58F4} "MyMagazinesColumn Class" - "Zinio, LLC" - C:\Program Files (x86)\Common Files\Zinio\ZShext.dll {F9DB5320-233E-11D1-9F84-707F02C10627} "PDF Shell Extension" - "Adobe Systems, Inc." - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\PDFShell.dll -----( HKLM\Software\Classes\Protocols\Filter )----- {807573E5-5146-11D5-A672-00B0D022E945} "Microsoft Office InfoPath XML Mime Filter" - "Microsoft Corporation" - C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLMF.DLL -----( HKLM\Software\Classes\Protocols\Handler )----- {314111c7-a502-11d2-bbca-00c04f8ec294} "HxProtocol Class" - "Microsoft Corporation" - C:\Program Files (x86)\Common Files\Microsoft Shared\Help\hxds.dll {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} "IEProtocolHandler Class" - "Skype Technologies" - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL -----( HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved )----- {5E2121EE-0300-11D4-8D3B-444553540000} "Catalyst Context Menu extension" - ? - (File not found | COM-object registry key not found) {D8D1CE8C-B1EB-4E95-B63B-1531BA60E992} "DivX Property Handler" - "DivX, Inc." - C:\Program Files (x86)\DivX\DivX Plus Media Foundation Components\DivXPropertyHandler.dll {83238FAE-D346-4E12-8734-D42F7554B3E6} "DivX Thumbnail Provider" - "DivX, Inc." - C:\Program Files (x86)\DivX\DivX Plus Media Foundation Components\DivXThumbnailProvider.dll {42042206-2D85-11D3-8CFF-005004838597} "Microsoft Office HTML Icon Handler" - "Microsoft Corporation" - C:\Program Files (x86)\Microsoft Office\Office14\msohevi.dll {993BE281-6695-4BA5-8A2A-7AACBFAAB69E} "Microsoft Office Metadata Handler" - "Microsoft Corporation" - C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\msoshext.dll {C41662BB-1FA0-4CE0-8DC5-9B7F8279FF97} "Microsoft Office Thumbnail Handler" - "Microsoft Corporation" - C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\msoshext.dll {0875DCB6-C686-4243-9432-ADCCF0B9F2D7} "Microsoft OneNote Namespace Extension for Windows Desktop Search" - "Microsoft Corporation" - C:\Program Files (x86)\Microsoft Office\Office14\ONFILTER.DLL {00020D75-0000-0000-C000-000000000046} "Microsoft Outlook" - "Microsoft Corporation" - C:\PROGRA~2\MICROS~3\Office14\MLSHEXT.DLL {A9AACA72-1C51-4F84-804D-90EDBA0D58F4} "MyMagazinesColumn Class" - "Zinio, LLC" - C:\Program Files (x86)\Common Files\Zinio\ZShext.dll {0006F045-0000-0000-C000-000000000046} "Outlook File Icon Extension" - "Microsoft Corporation" - C:\Program Files (x86)\Microsoft Office\Office14\OLKFSTUB.DLL {AC0B5D2E-B691-4E12-A4F9-CA88492579A2} "Zinio Magazine" - "Zinio, LLC" - C:\Program Files (x86)\Common Files\Zinio\ZShext.dll [Internet Explorer] -----( HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser )----- ITBar7Height64 "ITBar7Height64" - ? - (File not found | COM-object registry key not found) <binary data> "ITBar7Layout" - ? - (File not found | COM-object registry key not found) -----( HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units )----- {8AD9C840-044E-11D1-B3E9-00805F499D93} "Java Plug-in 1.6.0_31" - "Sun Microsystems, Inc." - C:\Program Files (x86)\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab {CAFEEFAC-0016-0000-0031-ABCDEFFEDCBA} "Java Plug-in 1.6.0_31" - "Sun Microsystems, Inc." - C:\Program Files (x86)\Java\jre6\bin\jp2iexp.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} "Java Plug-in 1.6.0_31" - "Sun Microsystems, Inc." - C:\Program Files (x86)\Java\jre6\bin\npjpi160_31.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab {17492023-C23A-453E-A040-C7C580BBF700} "Windows Genuine Advantage Validation Tool" - "Microsoft Corporation" - C:\Windows\SysWow64\LegitCheckControl.DLL / hxxp://download.microsoft.com/download/E/5/6/E5611B10-0D6D-4117-8430-A67417AA88CD/LegitCheckControl.cab -----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Extensions )----- {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} "@C:\Windows\WindowsMobile\INetRepl.dll,-222" - "Microsoft Corporation" - C:\Windows\WindowsMobile\INetRepl.dll {48E73304-E1D6-4330-914C-F5F514E3486C} "An OneNote senden" - "Microsoft Corporation" - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIE.dll {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} "ClsidExtension" - "Microsoft Corporation" - C:\Windows\WindowsMobile\INetRepl.dll "PokerStars" - "PokerStars" - C:\Program Files (x86)\PokerStars\PokerStarsUpdate.exe "PokerStars.net" - "PokerStars" - C:\Program Files (x86)\PokerStars.NET\PokerStarsUpdate.exe {FFFDC614-B694-4AE6-AB38-5D6374584B52} "Verknüpfte &OneNote-Notizen" - "Microsoft Corporation" - C:\Program Files (x86)\Microsoft Office\Office14\ONBttnIELinkedNotes.dll -----( HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects )----- {18DF081C-E8AD-4283-A596-FA578C2EBDC3} "Adobe PDF Link Helper" - "Adobe Systems Incorporated" - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll {326E768D-4182-46FD-9C16-1449A49795F4} "DivX Plus Web Player HTML5 <video>" - "DivX, LLC" - C:\Program Files (x86)\DivX\DivX Plus Web Player\ie\DivXHTML5\DivXHTML5.dll {DBC80044-A445-435b-BC74-9C25C1C588A9} "Java(tm) Plug-In 2 SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} "Java(tm) Plug-In SSV Helper" - "Sun Microsystems, Inc." - C:\Program Files (x86)\Java\jre6\bin\ssv.dll {B4F3A835-0E21-4959-BA22-42B3008E02FF} "Office Document Cache Handler" - "Microsoft Corporation" - C:\PROGRA~2\MICROS~3\Office14\URLREDIR.DLL {9030D464-4C02-4ABF-8ECC-5164760863C6} "Windows Live ID Sign-in Helper" - "Microsoft Corporation" - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [LSA Providers] -----( HKLM\SYSTEM\CurrentControlSet\Control\Lsa )----- "Security Packages" - "Microsoft Corporation" - C:\Windows\system32\livessp.dll [Logon] -----( %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup )----- "desktop.ini" - ? - C:\Users\***\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini "Dropbox.lnk" - "Dropbox, Inc." - C:\Users\***\AppData\Roaming\Dropbox\bin\Dropbox.exe (Shortcut exists | File exists) -----( %AllUsersProfile%\Microsoft\Windows\Start Menu\Programs\Startup )----- "desktop.ini" - ? - C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini "Quicken 2012 Zahlungserinnerung.lnk" - "Haufe-Lexware GmbH & Co. KG" - C:\Program Files (x86)\Lexware\Quicken\2012\billmind.exe (Shortcut exists | File exists) "TwonkyServer.lnk" - "PacketVideo" - C:\Program Files (x86)\Twonky\TwonkyServer\twonkytray.exe (Shortcut exists | File exists) -----( HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run )----- "ncid.Net" - "Gerhard Junker" - "C:\Program Files (x86)\ncid.Net\ncid.Net.exe" wait "TVgenial" - "ARAKON TVgenial Systems GbR" - "C:\Program Files (x86)\TVgenial\TVgenial.exe" -d -----( HKLM\Software\Microsoft\Windows\CurrentVersion\Run )----- "Adobe ARM" - "Adobe Systems Incorporated" - "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" "APSDaemon" - "Apple Inc." - "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" "BrStsWnd" - "brother" - C:\Program Files (x86)\Brownie\BrstsW64.exe Autorun "DivXUpdate" - ? - "C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe" /CHECKNOW "iTunesHelper" - "Apple Inc." - "C:\Program Files (x86)\iTunes\iTunesHelper.exe" "JMB36X IDE Setup" - ? - C:\Windows\RaidTool\xInsIDE.exe (File found, but it contains no detailed information) "KeePass 2 PreLoad" - "Dominik Reichl" - "C:\Program Files (x86)\KeePass Password Safe 2\KeePass.exe" --preload "Logitech G35" - "Logitech(c)" - C:\Program Files (x86)\Logitech\G35\G35.exe "Malwarebytes' Anti-Malware" - "Malwarebytes Corporation" - "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe" /starttray "NUSB3MON" - "Renesas Electronics Corporation" - "C:\Program Files (x86)\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe" "QuickTime Task" - "Apple Inc." - "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime "RemoteControl11" - "CyberLink Corp." - C:\Program Files (x86)\CyberLink\PowerDVD11\PDVD11Serv.exe "StartCCC" - "Advanced Micro Devices, Inc." - "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun "SunJavaUpdateSched" - "Sun Microsystems, Inc." - "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" [Services] -----( HKLM\SYSTEM\CurrentControlSet\Services )----- "@%ProgramFiles%\Windows Defender\MsMpRes.dll,-103" (WinDefend) - ? - C:\Program Files (x86)\Windows Defender\mpsvc.dll (File not found) "@%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101" (WMPNetworkSvc) - ? - "C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe" (File not found) "@c:\Program Files\Microsoft Security Client\MpAsDesc.dll,-243" (NisSrv) - "Microsoft Corporation" - c:\Program Files\Microsoft Security Client\NisSrv.exe "@C:\Windows\Microsoft.NET\Framework64\v4.0.30319\\ServiceModelInstallRC.dll,-8197" (NetPipeActivator) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe "@C:\Windows\Microsoft.NET\Framework64\v4.0.30319\\ServiceModelInstallRC.dll,-8199" (NetTcpActivator) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe "@C:\Windows\Microsoft.NET\Framework64\v4.0.30319\\ServiceModelInstallRC.dll,-8201" (NetTcpPortSharing) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe "Adobe Acrobat Update Service" (AdobeARMservice) - "Adobe Systems Incorporated" - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe "Adobe Flash Player Update Service" (AdobeFlashPlayerUpdateSvc) - "Adobe Systems Incorporated" - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe "Apple Mobile Device" (Apple Mobile Device) - "Apple Inc." - C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe "ASP.NET State Service" (aspnet_state) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe "Bonjour Service" (Bonjour Service) - "Apple Inc." - C:\Program Files\Bonjour\mDNSResponder.exe "Dragon Age: Origins - Content Updater" (DAUpdaterSvc) - "BioWare" - c:\program files (x86)\steam\steamapps\common\dragon age ultimate edition\bin_ship\DAUpdaterSvc.Service.exe "Google Update Service (gupdate)" (gupdate) - "Google Inc." - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe "Google Update-Dienst (gupdatem)" (gupdatem) - "Google Inc." - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe "Google Updater Service" (gusvc) - "Google" - C:\Program Files (x86)\Google\Common\Google Updater\GoogleUpdaterService.exe "Internet Pass-Through Service" (PassThru Service) - ? - C:\Program Files (x86)\HTC\Internet Pass-Through\PassThruSvr.exe "iPod Service" (iPod Service) - "Apple Inc." - C:\Program Files\iPod\bin\iPodService.exe "MBAMService" (MBAMService) - "Malwarebytes Corporation" - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe "Microsoft .NET Framework NGEN v4.0.30319_X64" (clr_optimization_v4.0.30319_64) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe "Microsoft .NET Framework NGEN v4.0.30319_X86" (clr_optimization_v4.0.30319_32) - "Microsoft Corporation" - C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe "Microsoft Antimalware Service" (MsMpSvc) - "Microsoft Corporation" - c:\Program Files\Microsoft Security Client\MsMpEng.exe "Mozilla Maintenance Service" (MozillaMaintenance) - "Mozilla Foundation" - C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe "O&O Defrag" (OODefragAgent) - "O&O Software GmbH" - C:\Program Files\OO Software\Defrag\oodag.exe "Office Source Engine" (ose) - "Microsoft Corporation" - C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE "Office Software Protection Platform" (osppsvc) - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE "PnkBstrA" (PnkBstrA) - ? - C:\Windows\system32\PnkBstrA.exe (File not found) "PnkBstrB" (PnkBstrB) - ? - C:\Windows\system32\PnkBstrB.exe (File not found) "SetupARService" (SetupARService) - "Realtek Semiconductor." - C:\Program Files (x86)\Realtek\Audio\SetupAfterRebootService.exe "Skype Updater" (SkypeUpdate) - "Skype Technologies" - C:\Program Files (x86)\Skype\Updater\Updater.exe "Steam Client Service" (Steam Client Service) - "Valve Corporation" - C:\Program Files (x86)\Common Files\Steam\SteamService.exe "TwonkyProxy" (TwonkyProxy) - ? - C:\Program Files (x86)\Twonky\TwonkyServer\twonkyproxy.exe (File found, but it contains no detailed information) "TwonkyServer" (TwonkyServer) - "PacketVideo" - C:\Program Files (x86)\Twonky\TwonkyServer\twonkystarter.exe "TwonkyWebDav" (TwonkyWebDav) - ? - C:\Program Files (x86)\Twonky\TwonkyServer\twonkywebdav.exe (File found, but it contains no detailed information) "Windows Live ID Sign-in Assistant" (wlidsvc) - "Microsoft Corporation" - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE [Winsock Providers] -----( HKLM\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters\NameSpace_Catalog5\Catalog_Entries )----- "mdnsNSP" - "Apple Inc." - C:\Program Files (x86)\Bonjour\mdnsNSP.dll "WindowsLive Local NSP" - "Microsoft Corporation" - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL "WindowsLive NSP" - "Microsoft Corporation" - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL ===[ Logfile end ]=========================================[ Logfile end ]=== QuickScan mit aswMBR hat nicht geklappt, ist wie von Dir beschrieben abgestürzt. Code:
ATTFilter aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software Run date: 2012-06-11 13:03:30 ----------------------------- 13:03:30.309 OS Version: Windows x64 6.1.7601 Service Pack 1 13:03:30.324 Number of processors: 4 586 0x2A07 13:03:30.324 ComputerName: COMPUTER677 UserName: *** 13:03:35.800 Initialize success 13:03:38.748 AVAST engine defs: 12061001 13:03:42.383 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 13:03:42.399 Disk 0 Vendor: ST31000524AS JC45 Size: 953869MB BusType: 11 13:03:42.399 Disk 1 \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP1T0L0-1 13:03:42.399 Disk 1 Vendor: ST31000524AS JC45 Size: 953869MB BusType: 11 13:03:42.430 Disk 0 MBR read successfully 13:03:42.430 Disk 0 MBR scan 13:03:42.430 Disk 0 Windows 7 default MBR code 13:03:42.446 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 100 MB offset 2048 13:03:42.446 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 953767 MB offset 206848 13:03:42.477 Disk 0 scanning C:\Windows\system32\drivers 13:03:54.723 Service scanning 13:04:20.213 Modules scanning 13:04:20.213 Disk 0 trace - called modules: 13:04:20.229 ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys ataport.SYS PCIIDEX.SYS hal.dll msahci.sys 13:04:20.244 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa80082d3060] 13:04:20.244 3 CLASSPNP.SYS[fffff88001b9f43f] -> nt!IofCallDriver -> [0xfffffa8007b23e40] 13:04:20.244 5 ACPI.sys[fffff88000ef27a1] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-0[0xfffffa8007a42680] 13:04:20.260 Scan finished successfully 13:05:28.931 Disk 0 MBR has been saved successfully to "C:\Users\***\Desktop\MBR.dat" 13:05:28.931 The log file has been saved successfully to "C:\Users\***\Desktop\aswMBR.log" Geändert von Hypocrite666 (11.06.2012 um 12:07 Uhr) |
11.06.2012, 12:53 | #20 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Infizierung mit locked-Trojaner Sieht ok aus. Wir sollten fast durch sein. Mach bitte zur Kontrolle Vollscans mit Malwarebytes und SUPERAntiSpyware und poste die Logs. Denk dran beide Tools zu updaten vor dem Scan!!
__________________ Logfiles bitte immer in CODE-Tags posten |
11.06.2012, 17:23 | #21 |
| Infizierung mit locked-TrojanerCode:
ATTFilter Malwarebytes Anti-Malware (Test) 1.61.0.1400 www.malwarebytes.org Datenbank Version: v2012.06.11.04 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 9.0.8112.16421 *** :: COMPUTER677 [Administrator] Schutz: Aktiviert 11.06.2012 16:25:58 mbam-log-2012-06-11 (16-25-58).txt Art des Suchlaufs: Vollständiger Suchlauf Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 880397 Laufzeit: 1 Stunde(n), 45 Minute(n), 55 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 0 (Keine bösartigen Objekte gefunden) (Ende) |
11.06.2012, 20:25 | #22 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Infizierung mit locked-Trojaner Ok, sieht ja gut aus, fehlt nur noch das SUPERAntiSpyware Log
__________________ Logfiles bitte immer in CODE-Tags posten |
11.06.2012, 21:43 | #23 |
| Infizierung mit locked-TrojanerCode:
ATTFilter SUPERAntiSpyware Scan Log hxxp://www.superantispyware.com Generated 06/11/2012 at 10:34 PM Application Version : 5.0.1150 Core Rules Database Version : 8713 Trace Rules Database Version: 6525 Scan type : Complete Scan Total Scan Time : 04:08:26 Operating System Information Windows 7 Ultimate 64-bit, Service Pack 1 (Build 6.01.7601) UAC On - Limited User Memory items scanned : 879 Memory threats detected : 0 Registry items scanned : 68131 Registry threats detected : 0 File items scanned : 633126 File threats detected : 355 Adware.Tracking Cookie C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\YXDMA3BL.txt [ /www.etracker.de ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\SQ1P6RJE.txt [ /traffictrack.de ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\524PNVQN.txt [ /burstnet.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\MJV6MTX7.txt [ /www.burstnet.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\O8T9MEFY.txt [ /casalemedia.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\WL5A3SR7.txt [ /ad2.adfarm1.adition.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\7278E517.txt [ /tradedoubler.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\ATSGJDCQ.txt [ /doubleclick.net ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\R5Q1E5U9.txt [ /serving-sys.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\HW83KOC0.txt [ /bs.serving-sys.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\C1OK5ZZW.txt [ /apmebf.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\OGBGJDEH.txt [ /ad3.adfarm1.adition.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\CDO0JL9W.txt [ /ads2.zeusclicks.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\R766OZT4.txt [ /ad.360yield.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\Q5F6AR56.txt [ /ad.zanox.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\BYG93VF0.txt [ /adtech.de ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\GGV7BUHZ.txt [ /ads.undertone.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\9LFUH9OS.txt [ /atdmt.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\4LDTGZE4.txt [ /mediaplex.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\RWJIJB5X.txt [ /ad4.adfarm1.adition.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\25LBCE1Q.txt [ /adform.net ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\G7EDMHZM.txt [ /adfarm1.adition.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\4Y3JR44J.txt [ /ad1.adfarm1.adition.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\9U989OAZ.txt [ /statse.webtrendslive.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\OIMCPF4B.txt [ /ad.yieldmanager.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\H8FNNRSY.txt [ /ad.adnet.de ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\TLJE72Z0.txt [ /track.adform.net ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\5YOCE2XI.txt [ /imrworldwide.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\D0NXGFFR.txt [ /webmasterplan.com ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\OQS7G27U.txt [ /2o7.net ] C:\Users\***\AppData\Roaming\Microsoft\Windows\Cookies\QMIZF14F.txt [ /c.atdmt.com ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\FIRXN744.txt [ Cookie:***@specificclick.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\DSETQEEY.txt [ Cookie:***@tracking.quisma.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\Z79PY1XA.txt [ Cookie:***@server.adform.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\QQD1JR7E.txt [ Cookie:***@www.etracker.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\KUR5WR4R.txt [ Cookie:***@naked.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\73Q6GVBB.txt [ Cookie:***@smartadserver.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\L0BC2WZ3.txt [ Cookie:***@revsci.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\FYF460LB.txt [ Cookie:***@myroitracking.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\TCARM52B.txt [ Cookie:***@zanox.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\ZR260W5H.txt [ Cookie:***@adultfriendfinder.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\4PEL7NKJ.txt [ Cookie:***@ads.247activemedia.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\M66WC24K.txt [ Cookie:***@optimize.indieclick.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\AXR0QULH.txt [ Cookie:***@traffictrack.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\632NX7NC.txt [ Cookie:***@burstnet.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\W313HQUM.txt [ Cookie:***@fastclick.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\G3PU7RDE.txt [ Cookie:***@www.burstnet.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\XB1I7WC0.txt [ Cookie:***@casalemedia.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\DJX7Z3IK.txt [ Cookie:***@ad.adition.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\OAHJOUN7.txt [ Cookie:***@fidelity.rotator.hadj7.adjuggler.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\VCGSY5VD.txt [ Cookie:***@gostats.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\RIVBVASQ.txt [ Cookie:***@zedo.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\F6VBVALV.txt [ Cookie:***@doubleclick.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\GS3HYKYN.txt [ Cookie:***@adformdsp.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\Z8P4P1OB.txt [ Cookie:***@zanox-affiliate.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\A68ODPEW.txt [ Cookie:***@statcounter.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\UZI303T8.txt [ Cookie:***@apmebf.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\R420MZZA.txt [ Cookie:***@serving-sys.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\QDFCJ70U.txt [ Cookie:***@bs.serving-sys.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\AJB94H4A.txt [ Cookie:***@ads2.zeusclicks.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\O1AL3PBN.txt [ Cookie:***@adserver.sevenload.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\0RDMDEHV.txt [ Cookie:***@ad.zanox.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\YXBKNMTI.txt [ Cookie:***@adtech.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\9KSSVRGU.txt [ Cookie:***@atdmt.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\PVSW2HY4.txt [ Cookie:***@mediaplex.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\5HAF14OR.txt [ Cookie:***@ad4.adfarm1.adition.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\YH43WW71.txt [ Cookie:***@yieldmanager.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\F0USQSDP.txt [ Cookie:***@ad.dyntracker.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\VJ4U0QA0.txt [ Cookie:***@advertising.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\8VJAFL7M.txt [ Cookie:***@tribalfusion.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\E4AWIM02.txt [ Cookie:***@www.easymedia-gmbh.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\STSFKZ7G.txt [ Cookie:***@girlsteachsex.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\LJHS8HA4.txt [ Cookie:***@collective-media.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\WX6KH74U.txt [ Cookie:***@eas.apm.emediate.eu/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\GZ6FV5D9.txt [ Cookie:***@ad.adnet.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\I70AVWNF.txt [ Cookie:***@invitemedia.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\D4QZN6RV.txt [ Cookie:***@c.gigcount.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\HICYX4K1.txt [ Cookie:***@track.adform.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\3G2SOSWQ.txt [ Cookie:***@www.gayadserver.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\AOE0VN4K.txt [ Cookie:***@imrworldwide.com/cgi-bin ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\1NB2TM1G.txt [ Cookie:***@banners.adultfriendfinder.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\H2K3M0RT.txt [ Cookie:***@itsyourporn.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\5C6GK1QS.txt [ Cookie:***@a.revenuemax.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\4ALZBAQQ.txt [ Cookie:***@www.addfreestats.com/cgi-bin ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\GAHMNC6Z.txt [ Cookie:***@indieclick.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\XJIV3OQG.txt [ Cookie:***@adnet.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\QRNKBQU7.txt [ Cookie:***@ww251.smartadserver.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\AQ8FLAOZ.txt [ Cookie:***@eyewonder.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\EQ8CTWE8.txt [ Cookie:***@adnetwork.net/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\H9F5IAHE.txt [ Cookie:***@adinterax.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\A2QXV29T.txt [ Cookie:***@adserver.adtechus.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\LHZGLM94.txt [ Cookie:***@insightexpressai.com/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\9POLVNJI.txt [ Cookie:***@tracking.mindshare.de/ ] C:\USERS\***\AppData\Roaming\Microsoft\Windows\Cookies\Low\6H12HLPU.txt [ Cookie:***@www.zanox-affiliate.de/ ] C:\USERS\***\Cookies\YXDMA3BL.txt [ Cookie:***@www.etracker.de/ ] C:\USERS\***\Cookies\SQ1P6RJE.txt [ Cookie:***@traffictrack.de/ ] C:\USERS\***\Cookies\524PNVQN.txt [ Cookie:***@burstnet.com/ ] C:\USERS\***\Cookies\MJV6MTX7.txt [ Cookie:***@www.burstnet.com/ ] C:\USERS\***\Cookies\O8T9MEFY.txt [ Cookie:***@casalemedia.com/ ] C:\USERS\***\Cookies\ATSGJDCQ.txt [ Cookie:***@doubleclick.net/ ] C:\USERS\***\Cookies\R5Q1E5U9.txt [ Cookie:***@serving-sys.com/ ] C:\USERS\***\Cookies\HW83KOC0.txt [ Cookie:***@bs.serving-sys.com/ ] C:\USERS\***\Cookies\C1OK5ZZW.txt [ Cookie:***@apmebf.com/ ] C:\USERS\***\Cookies\CDO0JL9W.txt [ Cookie:***@ads2.zeusclicks.com/ ] C:\USERS\***\Cookies\Q5F6AR56.txt [ Cookie:***@ad.zanox.com/ ] C:\USERS\***\Cookies\BYG93VF0.txt [ Cookie:***@adtech.de/ ] C:\USERS\***\Cookies\9LFUH9OS.txt [ Cookie:***@atdmt.com/ ] C:\USERS\***\Cookies\4LDTGZE4.txt [ Cookie:***@mediaplex.com/ ] C:\USERS\***\Cookies\RWJIJB5X.txt [ Cookie:***@ad4.adfarm1.adition.com/ ] C:\USERS\***\Cookies\H8FNNRSY.txt [ Cookie:***@ad.adnet.de/ ] C:\USERS\***\Cookies\TLJE72Z0.txt [ Cookie:***@track.adform.net/ ] C:\USERS\***\Cookies\5YOCE2XI.txt [ Cookie:***@imrworldwide.com/cgi-bin ] C:\USERS\***\Cookies\OQS7G27U.txt [ Cookie:***@2o7.net/ ] C:\USERS\***\Cookies\QMIZF14F.txt [ Cookie:***@c.atdmt.com/ ] .doubleclick.net [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .invitemedia.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .invitemedia.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .invitemedia.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] ad.yieldmanager.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] ad.yieldmanager.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] de.sitestat.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .weborama.fr [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .groupecarmignac.solution.weborama.fr [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .groupecarmignac.solution.weborama.fr [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .groupecarmignac.solution.weborama.fr [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .groupecarmignac.solution.weborama.fr [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .imrworldwide.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .imrworldwide.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .eaeacom.112.2o7.net [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] www.etracker.de [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] www.rockstarwarehouse.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .rockstarwarehouse.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .rockstarwarehouse.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .rockstarwarehouse.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .arvatodigitalservices.112.2o7.net [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] de.sitestat.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .apmebf.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .serving-sys.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .serving-sys.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .serving-sys.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .invitemedia.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .invitemedia.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .invitemedia.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .invitemedia.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .invitemedia.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .adtech.de [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .adtech.de [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .specificclick.net [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] .im.banner.t-online.de [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] ad.yieldmanager.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] ad.yieldmanager.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] ad.yieldmanager.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] ad.yieldmanager.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] ad.yieldmanager.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] ad.yieldmanager.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] accounts.google.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] accounts.google.com [ C:\USERS\***\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\PROFILE 1\COOKIES ] delivery.ibanner.de [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] ia.media-imdb.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] media.amctv.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] media.mtvnservices.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] media.rockstargames.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] playah.amateurcouplessex.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] playah.castingforporn.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] playah.creampiefucking.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] playah.fuckmybonsai.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] playah.itsyourporn.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] playah.youngteenmodels.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] secure-us.imrworldwide.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] www.adultdvdfeeds.com [ C:\USERS\***\APPDATA\ROAMING\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\KGFCWPFC ] .doubleclick.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\8GEUZG0I.DEFAULT\COOKIES.SQLITE ] .interclick.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\8GEUZG0I.DEFAULT\COOKIES.SQLITE ] .specificclick.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\8GEUZG0I.DEFAULT\COOKIES.SQLITE ] .interclick.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\8GEUZG0I.DEFAULT\COOKIES.SQLITE ] .interclick.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\8GEUZG0I.DEFAULT\COOKIES.SQLITE ] statse.webtrendslive.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\8GEUZG0I.DEFAULT\COOKIES.SQLITE ] .atdmt.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\8GEUZG0I.DEFAULT\COOKIES.SQLITE ] .atdmt.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\8GEUZG0I.DEFAULT\COOKIES.SQLITE ] .msnportal.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\8GEUZG0I.DEFAULT\COOKIES.SQLITE ] .eaeacom.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .liveperson.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.3dstats.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .gostats.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .msnportal.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .paypal.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .atdmt.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .atdmt.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .traffictrack.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .microsoftsto.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .revsci.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] uk.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] uk.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .imrworldwide.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .imrworldwide.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .premiumtv.122.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .traffictrack.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .invitemedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .apmebf.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .mediaplex.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .deutschepostag.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .xiti.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .vodafonegroup.122.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] wstat.wibiya.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] us.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] us.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .divx.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .centurymedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .centurymedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] de.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] de.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] warez2go.us [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .warez2go.us [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .warez2go.us [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] mediafiles-express.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .adtech.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .yadro.ru [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .thefind.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .thefind.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .thefind.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .thefind.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .thefind.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] counters.gigya.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] counter2.hitslink.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] int.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] int.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .microsoftxbox.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .mswmw7mobilemainprod.122.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .opodo.122.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .clickandbuy.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .clickandbuy.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .mediaplex.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] user.lucidmedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.etracker.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] weihnachtsmarkt-finder.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .rambler.ru [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .openstat.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .spylog.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .revsci.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .revsci.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .revsci.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] de.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .mediafire.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .mediafire.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .mediafire.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .hansenet.122.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .kalypsomedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .kalypsomedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .kalypsomedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .kalypsomedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .mtvn.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .orbita.starmedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .orbita.starmedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .bs.serving-sys.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] eas.apm.emediate.eu [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] ad.yieldmanager.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] fr.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] fr.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .ps3mediaserver.org [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .ps3mediaserver.org [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .ps3mediaserver.org [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .ps3mediaserver.org [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .microsoftwindows.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.elitepvpers.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.elitepvpers.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .elitepvpers.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.elitepvpers.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .elitepvpers.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] de.sitestat.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .surveymonkey.122.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .mediaplex.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .doubleclick.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .e-2dj6wfkoclazglp.stats.esomniture.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .secmedia.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] in.getclicky.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.clickmanage.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.clickmanage.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .viewablemedia.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] track.effiliation.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] tracking.klicktel.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .pressextranet.ubisoft.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .pressextranet.ubisoft.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.mediamarkt.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .mediamarkt.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .examinercom.122.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .szmstat.sueddeutsche.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .szmstat.sueddeutsche.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] szmstat.sueddeutsche.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] szmstat.sueddeutsche.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .htc.122.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] stats.o2more.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] stats.o2more.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.etracker.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .cmp.112.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .broadwaycom.122.2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .trafficmp.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .trafficmp.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .trafficmp.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.count24.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.count24.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.count24.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.count24.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.count24.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.count24.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.count24.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.etracker.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .stats.paypal.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .invitemedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .invitemedia.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .liveperson.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .adfarm1.adition.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] ad1.adfarm1.adition.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] statse.webtrendslive.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .trackalyzer.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.findmyorder.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .2o7.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www7.addfreestats.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .statcounter.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .webmasterplan.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .webmasterplan.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .serving-sys.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .serving-sys.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .serving-sys.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.etracker.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .webmasterplan.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .webmasterplan.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .webmasterplan.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] track.effiliation.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] track.effiliation.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] track.effiliation.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] track.effiliation.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .tradedoubler.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] ad.zanox.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .zanox-affiliate.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] www.etracker.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .zanox.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] ad.zanox.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .tradedoubler.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .tradedoubler.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .traffictrack.de [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .superstats.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .webmasterplan.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .webmasterplan.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .adlegend.com [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .yieldmanager.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] .yieldmanager.net [ C:\USERS\***\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\Y418S5AA.DEFAULT\COOKIES.SQLITE ] Heur.Agent/Gen-GalPic D:\SPIELE\VSPC\UNINSTALL.EXE |
11.06.2012, 22:04 | #24 | |
/// Winkelfunktion /// TB-Süch-Tiger™ | Infizierung mit locked-TrojanerZitat:
Sieht ok aus, da wurden nur Cookies gefunden. Cookies sind keine Schädlinge direkt, aber es besteht die Gefahr der missbräuchlichen Verwendung (eindeutige Wiedererkennung zB für gezielte Werbung o.ä. => HTTP-Cookie ) Wegen Cookies und anderer Dinge im Web: Um die Pest von vornherein zu blocken (also TrackingCookies, Werbebanner etc.) müsstest du dir mal sowas wie MVPS Hosts File anschauen => Blocking Unwanted Parasites with a Hosts File - sinnvollerweise solltest du alle 4 Wochen mal bei MVPS nachsehen, ob er eine neue Hosts Datei herausgebracht hat. Ansonsten gibt es noch gute Cookiemanager, Erweiterungen für den Firefox zB wäre da CookieCuller http://filepony.de/download-cookie_culler/ Wenn du aber damit leben kannst, dich bei jeder Browsersession überall neu einzuloggen (zB Facebook, Ebay, GMX, oder auch Trojaner-Board) dann stell den Browser einfach so ein, dass einfach alles beim Beenden des Browser inkl. Cookies gelöscht wird. Ich halte es so, dass ich zum "wilden Surfen" den Opera-Browser oder Chromium unter meinem Linux verwende. Mein Hauptbrowser (Firefox) speichert nur die Cookies von den Sites die ich auch will, alles andere lehne ich manuell ab (der FF fragt mich immer) - die anderen Browser nehmen alles an Cookies zwar an, aber spätestens beim nächsten Start von Opera oder Chromium sind keine Cookies mehr da. Ist dein System nun wieder in Ordnung oder gibt's noch andere Funde oder Probleme?
__________________ Logfiles bitte immer in CODE-Tags posten |
11.06.2012, 22:18 | #25 |
| Infizierung mit locked-Trojaner Über die verschiedenen Methoden zur Cookieverwaltung mach ich mir mal Gedanken, danke für den Tipp. Ansonsten scheint momentan alles zu laufen. Daher auch dafür nochmal vielen Dank. Was mich noch interessieren würde, ist, wo der Trojaner eigentlich herkam. Wurde der tatsächlich über Windows-Update verteilt? Ich kann mich nicht erinnern, sonst irgendwas ausgeführt zu haben und Anhänge in Emails öffne ich ohnehin nur dann, wenn ich 100%ig sicher bin, dass es ungefährlich ist. Und innerhalb der letzten Woche habe ich gar keine Anhänge geöffnet. |
12.06.2012, 10:09 | #26 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Infizierung mit locked-Trojaner Wenn du keinen sch... Mailanhang geöffnet hast kann ich das nicht nachvollziehen. Bisher hatte man bei der harmlosen Ransomware, also Erpresserschädlinge die nicht verschlüsselt/zerstört haben, Lücken in den Browserplugins in dringenden Tatverdacht, also sowas wie JavaRuntime, AdobeReader-Browserplugin, Flashplayer Wegen der Verschlüsselung: Obige Hinweise beachten Da sind mittlerweile 8 Tools, musst du ausprobieren. Mit der locked-Variante sollte man gute Chancen mit dem decrypthelper von Matthias haben Man darf aber keine falschen Hoffnungen machen. Mittlerweile sieht es finster aus => Delphi-PRAXiS - Einzelnen Beitrag anzeigen - Verschlüsselungs-Trojaner, Hilfe benötigt Für die Zukunft unbedingt mal das Backup-Konzept überdenken! Denkanstoß hier => http://www.trojaner-board.de/115678-...r-backups.html Abgesehen davon wären wir aber durch Entfern bitte noch nichts aus der Quarantäne, die schädlichen Dateien, Ordner etc die wir gelöscht haben, liegen noch als Sicherheitskopie in diversen Ordner wie Qoobox oder _OTL/MovedFiles - die werden evtl. noch für eine Entschlüsselung benötigt Malwarebytes zu behalten ist zu empfehlen. Kannst ja 1x im Monat damit einen Vollscan machen, aber immer vorher ans Update denken. Bitte abschließend die Updates prüfen, unten mein Leitfaden dazu. Um in Zukunft die Aktualität der installierten Programme besser im Überblick zu halten, kannst du zB Secunia PSI verwenden. Für noch mehr Sicherheit solltest Du nach der beseitigten Infektion auch möglichst alle Passwörter ändern. Microsoftupdate Windows XP: Besuch mit dem IE die MS-Updateseite und lass Dir alle wichtigen Updates installieren. Windows Vista/7: Anleitung Windows-Update PDF-Reader aktualisieren Ein veralteter AdobeReader stellt ein großes Sicherheitsrisiko dar. Du solltest daher besser alte Versionen vom AdobeReader über Systemsteuerung => Software bzw. Programme und Funktionen deinstallieren, indem Du dort auf "Adobe Reader x.0" klickst und das Programm entfernst. (falls du AdobeReader installiert hast) Ich empfehle einen alternativen PDF-Reader wie PDF Xchange Viewer, SumatraPDF oder Foxit PDF Reader, die sind sehr viel schlanker und flotter als der AdobeReader. Bitte überprüf bei der Gelegenheit auch die Aktualität des Flashplayers: Adobe - Andere Version des Adobe Flash Player installieren Notfalls kann man auch von Chip.de runterladen => http://filepony.de/?q=Flash+Player Natürlich auch darauf achten, dass andere installierte Browser wie zB Firefox, Opera oder Chrome aktuell sind. Java-Update Veraltete Java-Installationen sind ein Sicherheitsrisiko, daher solltest Du die alten Versionen löschen (falls vorhanden, am besten mit JavaRa) und auf die neuste aktualisieren. Beende dazu alle Programme (v.a. die Browser), klick danach auf Start, Systemsteuerung, Software und deinstalliere darüber alle aufgelisteten Java-Versionen. Lad Dir danach von hier das aktuelle Java SE Runtime Environment (JRE) herunter und installiere es.
__________________ Logfiles bitte immer in CODE-Tags posten |
12.06.2012, 11:40 | #27 |
| Infizierung mit locked-Trojaner Kam denn letzte Woche ein offizielles Win7-Update? Eigentlich ist doch heute erst Patchday, oder habe ich das falsch im Kopf? Und wann taucht eigentlich die RansomNote auf? Die hab hab ich nämlich nie gesehen. Wie auch immer, ist jetzt alles auf dem neuesten Stand, alle locked-Dateien sind per DecryptHelper wieder entschlüsselt und der PC läuft rund. Also nochmal vielen Dank für Deine Hilfe! |
12.06.2012, 13:12 | #28 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Infizierung mit locked-Trojaner Na da haste nochmal Glück gehabt, dass du nur die locked Variante hattest
__________________ Logfiles bitte immer in CODE-Tags posten |
12.06.2012, 14:24 | #29 |
| Infizierung mit locked-Trojaner In der Tat |
12.06.2012, 14:32 | #30 | |
/// Winkelfunktion /// TB-Süch-Tiger™ | Infizierung mit locked-Trojaner Wie gesagt, denk mal in Zukunft an ein besseres Backupkonzept Ich weise hier nochmal drauf hin => http://www.trojaner-board.de/115678-...tml#post844876 Zitat:
__________________ Logfiles bitte immer in CODE-Tags posten |
Themen zu Infizierung mit locked-Trojaner |
7-zip, alternate, bho, bonjour, browser, call of duty, document, downloader, error, firefox, flash player, google, google earth, grand theft auto, helper, iexplore.exe, install.exe, jdownloader, langs, launch, locker, microsoft office word, monkey island, mozilla, mp3, plug-in, prima, realtek, registry, rundll, scan, searchscopes, security, senden, software, starten, svchost.exe, teamspeak, usb, usb 3.0, wieder herstellen, windows, windows xp |