|
Log-Analyse und Auswertung: Windows Verschlüsselungstrojaner Malware + ESET online Scanner LogWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
11.06.2012, 21:30 | #1 |
| Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log Hallo Zusammen, auch ich habe leider eine Mail bekommen und die erst für echt gehalten und im Affekt den Anhang geöffnet. Ich sitze seit 4 1/2 Stunden am PC und durchforste unser Forum, komme aber leider nicht weiter, deswegen hoffe ich auf eure Hilfe. Ich habe bis jetzt zuerst einen Scan durchgeführt mit Malwarebytes Anti-Malware, der zwei Trojaner gefunden hat. Im zweiten Schritt habe ich den Eset Online Scanner genutzt. Gerade habe ich ein Problem mit der Verschlüsselung meiner Dateien. Der DecryptHelper 0.5.3. kann bei mir keinen Schlüßel generieren. Es wäre sehr nett, wenn man mir da weiterhelfen könnte, da ich an meiner Bachelorarbeit schreibe und ich derzeit keinen Zugriff darauf habe. (Werde mir in Zukunft ein Back-Up System bei mir einführen.) Zur Info: Ich benutze Win 7 64-Bit 1.) Malwarebyte Anti-Malware Log: Code:
ATTFilter Malwarebytes Anti-Malware 1.61.0.1400 www.malwarebytes.org Datenbank Version: v2012.06.11.06 Windows 7 x64 NTFS Internet Explorer 9.0.8112.16421 Cris :: CRIS-PC [Administrator] 11.06.2012 18:40:37 mbam-log-2012-06-11 (18-40-37).txt Art des Suchlaufs: Quick-Scan Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 251570 Laufzeit: 7 Minute(n), 6 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 1 HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|847281CE (Trojan.Agent) -> Daten: C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 1 C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe (Trojan.Agent) -> Erfolgreich gelöscht und in Quarantäne gestellt. (Ende) Code:
ATTFilter ESETSmartInstaller@High as downloader log: all ok # version=7 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6583 # api_version=3.0.2 # EOSSerial=750c028c7c8b5c4ca1cd64198040b219 # end=finished # remove_checked=true # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2012-06-11 06:51:38 # local_time=2012-06-11 08:51:38 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # lang=1033 # osver=6.1.7600 NT # compatibility_mode=5893 16776573 100 94 32174 91839508 0 0 # compatibility_mode=8192 67108863 100 0 153 153 0 0 # scanned=353678 # found=24 # cleaned=24 # scan_time=6860 C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\43296140-12e58071 a variant of Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\462d3f81-714c4ee6 Java/Exploit.CVE-2011-3544.X trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12\1187ad0c-358fa33b a variant of Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\65e4bdce-436c1d29 Java/Agent.DN trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15\88743cf-213c5927 Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-766b2867 Java/Exploit.Agent.NAO trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\46f64b14-18b79fef multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22\29d74f16-65865ba0 Java/Agent.DN trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24\5062998-6e0e4f07 a variant of Java/Agent.DM trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\2474121b-1c16c826 Java/Exploit.CVE-2011-3544.AU trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29\21248e9d-6f545cc3 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\7e30b3c3-574f8301 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\a2ba8de-4453b21b multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\45d09521-18e592cd multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34\37db3fe2-58f099d5 Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\72503264-158ce69c Java/Agent.DJ trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\517555e6-7c467fd7 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42\6ac5daea-39c6bcde Java/Agent.DJ trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\3b21af6c-4cc13572 a variant of Java/Agent.DT trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\7402b232-69da5583 a variant of Java/Agent.DP trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\2aa71db6-70e7f497 Java/Exploit.Agent.NAO trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\16dbbcf7-619708cd a variant of Java/Agent.DM trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\5e44d8b8-267882d6 a variant of Java/Agent.DT trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe Win32/Trustezeb.B trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C Hier ist der Log, den ich als Admin ausgeführt habe. Vllt enthält er zusätzliche Infos: Code:
ATTFilter ESETSmartInstaller@High as downloader log: all ok # version=7 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6583 # api_version=3.0.2 # EOSSerial=750c028c7c8b5c4ca1cd64198040b219 # end=finished # remove_checked=true # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2012-06-11 06:51:38 # local_time=2012-06-11 08:51:38 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # lang=1033 # osver=6.1.7600 NT # compatibility_mode=5893 16776573 100 94 32174 91839508 0 0 # compatibility_mode=8192 67108863 100 0 153 153 0 0 # scanned=353678 # found=24 # cleaned=24 # scan_time=6860 C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0\43296140-12e58071 a variant of Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1\462d3f81-714c4ee6 Java/Exploit.CVE-2011-3544.X trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12\1187ad0c-358fa33b a variant of Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14\65e4bdce-436c1d29 Java/Agent.DN trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15\88743cf-213c5927 Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2\34a0ba42-766b2867 Java/Exploit.Agent.NAO trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20\46f64b14-18b79fef multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22\29d74f16-65865ba0 Java/Agent.DN trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24\5062998-6e0e4f07 a variant of Java/Agent.DM trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27\2474121b-1c16c826 Java/Exploit.CVE-2011-3544.AU trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29\21248e9d-6f545cc3 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3\7e30b3c3-574f8301 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\a2ba8de-4453b21b multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33\45d09521-18e592cd multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34\37db3fe2-58f099d5 Java/TrojanDownloader.Agent.ME trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36\72503264-158ce69c Java/Agent.DJ trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38\517555e6-7c467fd7 multiple threats (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42\6ac5daea-39c6bcde Java/Agent.DJ trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44\3b21af6c-4cc13572 a variant of Java/Agent.DT trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50\7402b232-69da5583 a variant of Java/Agent.DP trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54\2aa71db6-70e7f497 Java/Exploit.Agent.NAO trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55\16dbbcf7-619708cd a variant of Java/Agent.DM trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\5e44d8b8-267882d6 a variant of Java/Agent.DT trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe Win32/Trustezeb.B trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C ESETSmartInstaller@High as downloader log: all ok esets_scanner_update returned -1 esets_gle=53251 # version=7 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6583 # api_version=3.0.2 # EOSSerial=750c028c7c8b5c4ca1cd64198040b219 # end=finished # remove_checked=true # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2012-06-11 10:52:07 # local_time=2012-06-12 12:52:07 (+0100, Mitteleuropäische Sommerzeit) # country="Germany" # lang=1033 # osver=6.1.7600 NT # compatibility_mode=5893 16776573 100 94 46445 91853779 0 0 # compatibility_mode=8192 67108863 100 0 14424 14424 0 0 # scanned=330997 # found=0 # cleaned=0 # scan_time=7018 |
13.06.2012, 15:19 | #2 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log Hinweise bzgl. der verschlüsselten Dateien:
__________________Wann genau deine Daten entschlüsselt werden können wird dir niemand genau sagen können außer vllt einer es kann sein, dass du eine neuere Variante hast, deren Verschlüsselungsalgorithmus noch unbekannt ist. Sowas kann man (noch) nicht entschlüsseln und ohne Schlüssel schon garnicht - ist ja auch logisch, sonst wär es ja keine vernünftige Verschlüsselung Einfach hier nochmal reinsehen in regelmäßigen Abständen, obige Hinweise beachten. 8 Tools mitsamt hunderten Diskussionsbeiträgen stehen da schon Eine Notlösung für Vista und Win7-User => http://www.trojaner-board.de/115496-...erstellen.html Entschlüsselungsversuche der verschlüsselten Dateien sind nur auf zusätzliche Kopien der verschlüsselten Dateien anzuwenden, sonst zerhackt man sich die noch weiter ohne die "original" verschlüsselte Datei mehr zu haben. Das willst du sicher nicht! Man darf sich aber keine falschen Hoffnungen machen. Mittlerweile sieht es finster aus => Delphi-PRAXiS - Einzelnen Beitrag anzeigen - Verschlüsselungs-Trojaner, Hilfe benötigt Und in Zukunft willst du sicher mal an ein besseres Backupkonzept denken. Hier ein Denkanstoß => http://www.trojaner-board.de/115678-...r-backups.html ---- Bitte erstmal routinemäßig einen Vollscan mit Malwarebytes machen und Log posten. =>ALLE lokalen Datenträger (außer CD/DVD) überprüfen lassen! Denk daran, dass Malwarebytes vor jedem Scan manuell aktualisiert werden muss! Die Funde mit Malwarebytes bitte alle entfernen, sodass sie in der Quarantäne von Malwarebytes aufgehoben werden! NICHTS voreilig aus der Quarantäne entfernen! Falls Logs aus älteren Scans mit Malwarebytes vorhanden sind, bitte auch davon alle posten! Bitte alles nach Möglichkeit hier in CODE-Tags posten. Wird so gemacht: [code] hier steht das Log [/code] Und das ganze sieht dann so aus: Code:
ATTFilter hier steht das Log
__________________ |
14.06.2012, 20:32 | #3 |
| Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log Ich kann leider nicht alle Logs posten, da der Trojaner bekanntermaßen die Dateien verschlüsselt hat, so auch 5 Logs aus früheren Zeiten von mir.
__________________Hier die zwei letzten Logs: Vom 11. Juni 2012 Code:
ATTFilter Malwarebytes Anti-Malware 1.61.0.1400 www.malwarebytes.org Datenbank Version: v2012.06.11.06 Windows 7 x64 NTFS Internet Explorer 9.0.8112.16421 Cris :: CRIS-PC [Administrator] 11.06.2012 18:40:37 mbam-log-2012-06-11 (18-40-37).txt Art des Suchlaufs: Quick-Scan Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 251570 Laufzeit: 7 Minute(n), 6 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 1 HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|847281CE (Trojan.Agent) -> Daten: C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 1 C:\Users\Cris\AppData\Roaming\Ghrrynb\8CF393A8847281CE6551.exe (Trojan.Agent) -> Erfolgreich gelöscht und in Quarantäne gestellt. (Ende) edit: sorry, Log wird nachgereicht. Konnte den jetzigen iwie nicht abspeichern. Habe nichts entfernt bei diesem Scan und lasse gerade Maleware nochmal laufen. Hatte von heute nur einen Log von heute Mittag, bei dem ich nach 15 Sek abgebrochen hab, weil ich fälschlicherweise einen Quick-Scan eingeleitet habe. So hier der Log, der mir gefehlt hat: Code:
ATTFilter Malwarebytes Anti-Malware (Test) 1.61.0.1400 www.malwarebytes.org Datenbank Version: v2012.06.14.07 Windows 7 x64 NTFS Internet Explorer 9.0.8112.16421 Cris :: CRIS-PC [Administrator] Schutz: Aktiviert 14.06.2012 21:34:43 mbam-log-2012-06-15 (20-53-27).txt Art des Suchlaufs: Vollständiger Suchlauf Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 520336 Laufzeit: 1 Stunde(n), 13 Minute(n), 56 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 2 C:\Users\Cris\Downloads\DecryptHelper-0.5.3.exe (Trojan.FakeAlert) -> Keine Aktion durchgeführt. F:\Festplatte D\Windows.old\Windows\system32\MPK\MpkNetInstall.exe (PUP.KGBKeylogger) -> Keine Aktion durchgeführt. (Ende) |
09.07.2012, 08:56 | #4 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log Hätte da mal zwei Fragen bevor es weiter geht 1.) Geht der normale Modus von Windows (wieder) uneingeschränkt? 2.) Vermisst du irgendwas im Startmenü? Sind da leere Ordner unter alle Programme oder ist alles vorhanden?
__________________ Logfiles bitte immer in CODE-Tags posten |
13.07.2012, 17:02 | #5 |
| Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log 1.) ja 2.) nein, ich vermise nichts. Programme sind alle vorhanden, lassen sich auch öffnen, nur es ist so, wie wenn ich sie nie benutzt hätte. Bspw GoogleChrome: Es gibt keine Historie, Verlauf etc. OppenOffice muss ich auch neu konfigurieren usw |
13.07.2012, 21:26 | #6 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log adwCleaner - Toolbars und ungewollte Start-/Suchseiten aufspüren Downloade Dir bitte AdwCleaner auf deinen Desktop.
__________________ --> Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log |
15.07.2012, 13:06 | #7 |
| Windows Verschlüsselungstrojaner Malware + ESET online Scanner LogCode:
ATTFilter # AdwCleaner v1.702 - Logfile created 07/15/2012 at 14:06:04 # Updated 13/07/2012 by Xplode # Operating system : Windows 7 Professional (64 bits) # User : Cris - CRIS-PC # Running from : C:\Users\Cris\Downloads\adwcleaner.exe # Option [Search] ***** [Services] ***** ***** [Files / Folders] ***** ***** [Registry] ***** Key Found : HKCU\Software\Softonic [x64] Key Found : HKCU\Software\Softonic ***** [Registre - GUID] ***** ***** [Internet Browsers] ***** -\\ Internet Explorer v9.0.8112.16421 [OK] Registry is clean. -\\ Mozilla Firefox v [Unable to get version] Profile name : default File : C:\Users\Cris\AppData\Roaming\Mozilla\Firefox\Profiles\2n05c3xy.default\prefs.js [OK] File is clean. -\\ Google Chrome v19.0.1084.52 File : C:\Users\Cris\AppData\Local\Google\Chrome\User Data\Default\Preferences [OK] File is clean. ************************* AdwCleaner[R1].txt - [921 octets] - [15/07/2012 14:06:04] ########## EOF - C:\AdwCleaner[R1].txt - [1048 octets] ########## |
15.07.2012, 17:38 | #8 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log adwCleaner - Toolbars und ungewollte Start-/Suchseiten entfernen
__________________ Logfiles bitte immer in CODE-Tags posten |
16.07.2012, 00:35 | #9 |
| Windows Verschlüsselungstrojaner Malware + ESET online Scanner LogCode:
ATTFilter # AdwCleaner v1.702 - Logfile created 07/16/2012 at 01:21:48 # Updated 13/07/2012 by Xplode # Operating system : Windows 7 Professional (64 bits) # User : Cris - CRIS-PC # Running from : C:\Users\Cris\Downloads\adwcleaner.exe # Option [Delete] ***** [Services] ***** ***** [Files / Folders] ***** ***** [Registry] ***** Key Deleted : HKCU\Software\Softonic ***** [Registre - GUID] ***** ***** [Internet Browsers] ***** -\\ Internet Explorer v9.0.8112.16421 [OK] Registry is clean. -\\ Mozilla Firefox v [Unable to get version] Profile name : default File : C:\Users\Cris\AppData\Roaming\Mozilla\Firefox\Profiles\2n05c3xy.default\prefs.js [OK] File is clean. -\\ Google Chrome v19.0.1084.52 File : C:\Users\Cris\AppData\Local\Google\Chrome\User Data\Default\Preferences [OK] File is clean. ************************* AdwCleaner[R1].txt - [1047 octets] - [15/07/2012 14:06:04] AdwCleaner[S1].txt - [939 octets] - [16/07/2012 01:21:48] ########## EOF - C:\AdwCleaner[S1].txt - [1066 octets] ########## |
16.07.2012, 16:01 | #10 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log Mach bitte ein neues OTL-Log. Bitte alles nach Möglichkeit hier in CODE-Tags posten. Wird so gemacht: [code] hier steht das Log [/code] Und das ganze sieht dann so aus: Code:
ATTFilter hier steht das Log Lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop. Falls schon vorhanden, bitte die ältere vorhandene Datei durch die neu heruntergeladene Datei ersetzen, damit du auch wirklich mit einer aktuellen Version von OTL arbeitest.
Code:
ATTFilter netsvcs msconfig safebootminimal safebootnetwork activex drivers32 %ALLUSERSPROFILE%\Application Data\*. %ALLUSERSPROFILE%\Application Data\*.exe /s %APPDATA%\*. %APPDATA%\*.exe /s %SYSTEMDRIVE%\*.exe /md5start wininit.exe userinit.exe eventlog.dll scecli.dll netlogon.dll cngaudit.dll ws2ifsl.sys sceclt.dll ntelogon.dll winlogon.exe logevent.dll user32.DLL iaStor.sys nvstor.sys atapi.sys IdeChnDr.sys viasraid.sys AGP440.sys vaxscsi.sys nvatabus.sys viamraid.sys nvata.sys nvgts.sys iastorv.sys ViPrt.sys eNetHook.dll ahcix86.sys KR10N.sys nvstor32.sys ahcix86s.sys /md5stop %systemroot%\system32\drivers\*.sys /lockedfiles %systemroot%\System32\config\*.sav %systemroot%\*. /mp /s %systemroot%\system32\*.dll /lockedfiles CREATERESTOREPOINT
__________________ Logfiles bitte immer in CODE-Tags posten |
17.07.2012, 12:18 | #11 |
| Windows Verschlüsselungstrojaner Malware + ESET online Scanner LogCode:
ATTFilter OTL logfile created on: 17.07.2012 12:52:57 - Run 1 OTL by OldTimer - Version 3.2.53.1 Folder = C:\Users\Cris\Desktop 64bit- Professional Service Pack 1 (Version = 6.1.7601) - Type = NTWorkstation Internet Explorer (Version = 9.0.8112.16421) Locale: 00000407 | Country: Deutschland | Language: DEU | Date Format: dd.MM.yyyy 1,75 Gb Total Physical Memory | 0,92 Gb Available Physical Memory | 52,55% Memory free 3,50 Gb Paging File | 2,48 Gb Available in Paging File | 70,93% Paging File free Paging file location(s): ?:\pagefile.sys [binary data] %SystemDrive% = C: | %SystemRoot% = C:\Windows | %ProgramFiles% = C:\Program Files (x86) Drive C: | 31,15 Gb Total Space | 2,62 Gb Free Space | 8,42% Space Free | Partition Type: NTFS Drive D: | 19,53 Gb Total Space | 11,67 Gb Free Space | 59,77% Space Free | Partition Type: NTFS Drive E: | 100,00 Mb Total Space | 84,74 Mb Free Space | 84,75% Space Free | Partition Type: NTFS Drive G: | 931,51 Gb Total Space | 864,74 Gb Free Space | 92,83% Space Free | Partition Type: NTFS Computer Name: CRIS-PC | User Name: Cris | Logged in as Administrator. Boot Mode: Normal | Scan Mode: All users | Quick Scan | Include 64bit Scans Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days ========== Processes (SafeList) ========== PRC - [2012.07.17 12:49:59 | 000,595,968 | ---- | M] (OldTimer Tools) -- C:\Users\Cris\Desktop\OTL.exe PRC - [2012.05.24 01:15:25 | 004,348,008 | ---- | M] (Microsoft Corporation) -- C:\Windows\SoftwareDistribution\Download\Install\NDP40-KB2686827-x64.exe PRC - [2012.04.04 15:56:40 | 000,654,408 | ---- | M] (Malwarebytes Corporation) -- D:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe PRC - [2012.04.04 15:56:38 | 000,462,408 | ---- | M] (Malwarebytes Corporation) -- D:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe PRC - [2012.03.15 13:12:02 | 000,079,112 | ---- | M] (Microsoft Corporation) -- g:\5e67167c1320cdc3db530d2cb0f72e\Setup.exe PRC - [2010.03.18 13:16:28 | 000,130,384 | ---- | M] (Microsoft Corporation) -- C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe ========== Modules (No Company Name) ========== ========== Win32 Services (SafeList) ========== SRV:64bit: - [2009.07.14 03:40:01 | 000,193,536 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Windows\SysNative\appmgmts.dll -- (AppMgmt) SRV - [2012.04.04 15:56:40 | 000,654,408 | ---- | M] (Malwarebytes Corporation) [Auto | Running] -- D:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe -- (MBAMService) SRV - [2011.03.28 21:11:06 | 002,292,096 | ---- | M] (Microsoft Corp.) [Auto | Running] -- C:\Programme\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE -- (wlidsvc) SRV - [2010.09.22 18:10:10 | 000,057,184 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Programme\Windows Live\Mesh\wlcrasvc.exe -- (wlcrasvc) SRV - [2010.03.18 13:16:28 | 000,130,384 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -- (clr_optimization_v4.0.30319_32) SRV - [2009.06.10 23:23:09 | 000,066,384 | ---- | M] (Microsoft Corporation) [Disabled | Stopped] -- C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe -- (clr_optimization_v2.0.50727_32) SRV - [2007.05.31 17:11:54 | 000,443,784 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Windows\WindowsMobile\wcescomm.dll -- (WcesComm) SRV - [2007.05.31 17:11:46 | 000,225,672 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Windows\WindowsMobile\rapimgr.dll -- (RapiMgr) ========== Driver Services (SafeList) ========== DRV:64bit: - [2012.04.04 15:56:40 | 000,024,904 | ---- | M] (Malwarebytes Corporation) [File_System | On_Demand | Running] -- C:\Windows\SysNative\drivers\mbam.sys -- (MBAMProtector) DRV:64bit: - [2012.03.01 08:46:16 | 000,023,408 | ---- | M] (Microsoft Corporation) [Recognizer | Boot | Unknown] -- C:\Windows\SysNative\drivers\fs_rec.sys -- (Fs_Rec) DRV:64bit: - [2011.12.16 17:53:28 | 000,016,376 | ---- | M] (TeamViewer GmbH) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\TVMonitor.sys -- (MonitorFunction) DRV:64bit: - [2011.03.11 08:41:12 | 000,107,904 | ---- | M] (Advanced Micro Devices) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\amdsata.sys -- (amdsata) DRV:64bit: - [2011.03.11 08:41:12 | 000,027,008 | ---- | M] (Advanced Micro Devices) [Kernel | Boot | Running] -- C:\Windows\SysNative\drivers\amdxata.sys -- (amdxata) DRV:64bit: - [2011.01.15 18:21:04 | 000,036,352 | ---- | M] (Elaborate Bytes AG) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\VClone.sys -- (VClone) DRV:64bit: - [2010.11.20 15:33:35 | 000,078,720 | ---- | M] (Hewlett-Packard Company) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\HpSAMD.sys -- (HpSAMD) DRV:64bit: - [2010.11.20 13:07:05 | 000,059,392 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\TsUsbFlt.sys -- (TsUsbFlt) DRV:64bit: - [2010.04.29 06:55:42 | 000,032,768 | ---- | M] (Google Inc) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\androidusb.sys -- (androidusb) DRV:64bit: - [2009.07.14 03:52:20 | 000,194,128 | ---- | M] (AMD Technologies Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\amdsbs.sys -- (amdsbs) DRV:64bit: - [2009.07.14 03:48:04 | 000,065,600 | ---- | M] (LSI Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\lsi_sas2.sys -- (LSI_SAS2) DRV:64bit: - [2009.07.14 03:45:55 | 000,024,656 | ---- | M] (Promise Technology) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\stexstor.sys -- (stexstor) DRV:64bit: - [2009.07.14 02:09:50 | 000,019,968 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\usb8023x.sys -- (usb_rndisx) DRV:64bit: - [2009.06.10 22:35:35 | 000,408,960 | ---- | M] (NVIDIA Corporation) [Kernel | On_Demand | Running] -- C:\Windows\SysNative\drivers\nvm62x64.sys -- (NVENETFD) DRV:64bit: - [2009.06.10 22:34:33 | 003,286,016 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\evbda.sys -- (ebdrv) DRV:64bit: - [2009.06.10 22:34:28 | 000,468,480 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\bxvbda.sys -- (b06bdrv) DRV:64bit: - [2009.06.10 22:34:23 | 000,270,848 | ---- | M] (Broadcom Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\b57nd60a.sys -- (b57nd60a) DRV:64bit: - [2009.06.10 22:31:59 | 000,031,232 | ---- | M] (Hauppauge Computer Works, Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\SysNative\drivers\hcw85cir.sys -- (hcw85cir) DRV - [2009.07.14 03:19:10 | 000,019,008 | ---- | M] (Microsoft Corporation) [File_System | On_Demand | Stopped] -- C:\Windows\SysWOW64\drivers\wimmount.sys -- (WIMMount) ========== Standard Registry (SafeList) ========== ========== Internet Explorer ========== IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE:64bit: - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://de.msn.com/?ocid=iehp IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 1F 80 A0 25 BE 7B CC 01 [binary data] IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC IE - HKU\S-1-5-21-558247466-3247100571-1202973093-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 ========== FireFox ========== FF:64bit: - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: C:\Program Files\Microsoft Silverlight\5.1.10411.0\npctrl.dll ( Microsoft Corporation) FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll () FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin: C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.) FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: C:\Program Files (x86)\Microsoft Silverlight\5.1.10411.0\npctrl.dll ( Microsoft Corporation) FF - HKCU\Software\MozillaPlugins\@Skype Limited.com/Facebook Video Calling Plugin: C:\Users\Cris\AppData\Local\Facebook\Video\Skype\npFacebookVideoCalling.dll File not found FF - HKCU\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Users\Cris\AppData\Local\Google\Update\1.3.21.111\npGoogleUpdate3.dll File not found FF - HKCU\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Users\Cris\AppData\Local\Google\Update\1.3.21.111\npGoogleUpdate3.dll File not found ========== Chrome ========== CHR - default_search_provider: Google (Enabled) CHR - default_search_provider: search_url = {google:baseURL}search?{google:RLZ}{google:acceptedSuggestion}{google:originalQueryForSuggestion}{google:searchFieldtrialParameter}{google:instantFieldTrialGroupParameter}sourceid=chrome&ie={inputEncoding}&q={searchTerms} CHR - default_search_provider: suggest_url = {google:baseSuggestURL}search?{google:searchFieldtrialParameter}{google:instantFieldTrialGroupParameter}client=chrome&hl={language}&q={searchTerms} CHR - plugin: Remoting Viewer (Enabled) = internal-remoting-viewer CHR - plugin: Native Client (Enabled) = C:\Users\Cris\AppData\Local\Google\Chrome\Application\19.0.1084.52\ppGoogleNaClPluginChrome.dll CHR - plugin: Chrome PDF Viewer (Enabled) = C:\Users\Cris\AppData\Local\Google\Chrome\Application\19.0.1084.52\pdf.dll CHR - plugin: Shockwave Flash (Enabled) = C:\Users\Cris\AppData\Local\Google\Chrome\Application\19.0.1084.52\gcswf32.dll CHR - plugin: Shockwave Flash (Enabled) = C:\Windows\SysWOW64\Macromed\Flash\NPSWF32.dll CHR - plugin: Adobe Acrobat (Enabled) = C:\Program Files (x86)\Adobe\Reader 10.0\Reader\Browser\nppdf32.dll CHR - plugin: Java Deployment Toolkit 6.0.300.12 (Enabled) = C:\Program Files (x86)\Java\jre6\bin\new_plugin\npdeployJava1.dll CHR - plugin: Java(TM) Platform SE 6 U30 (Enabled) = C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin.dll CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin2.dll CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin3.dll CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin4.dll CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin5.dll CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin6.dll CHR - plugin: QuickTime Plug-in 7.6.9 (Enabled) = C:\Program Files (x86)\QuickTime\plugins\npqtplugin7.dll CHR - plugin: Silverlight Plug-In (Enabled) = C:\Program Files (x86)\Microsoft Silverlight\5.1.10411.0\npctrl.dll CHR - Extension: Google Kalender = C:\Users\Cris\AppData\Local\Google\Chrome\User Data\Default\Extensions\ejjicmeblgpmajnghnpcppodonldlgfn\4.5.3_0\ O1 HOSTS File: ([2009.06.10 23:00:26 | 000,000,824 | ---- | M]) - C:\Windows\SysNative\drivers\etc\hosts O2:64bit: - BHO: (Windows Live ID Sign-in Helper) - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Programme\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.) O2 - BHO: (Java(tm) Plug-In SSV Helper) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre6\bin\ssv.dll (Sun Microsystems, Inc.) O4 - HKLM..\Run: [Malwarebytes' Anti-Malware] D:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe (Malwarebytes Corporation) O4 - HKU\S-1-5-19..\Run: [Sidebar] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe (Microsoft Corporation) O4 - HKU\S-1-5-20..\Run: [Sidebar] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe (Microsoft Corporation) O4 - HKU\S-1-5-19..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found O4 - HKU\S-1-5-20..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found O4:64bit: - HKLM..\RunOnceEx: [Flags] Reg Error: Invalid data type. File not found O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3 O8:64bit: - Extra context menu item: Free YouTube Download - C:\Users\Cris\AppData\Roaming\DVDVideoSoftIEHelpers\freeyoutubedownload.htm File not found O8 - Extra context menu item: Free YouTube Download - C:\Users\Cris\AppData\Roaming\DVDVideoSoftIEHelpers\freeyoutubedownload.htm File not found O9 - Extra Button: ICQ7.5 - {7578ADEA-D65F-4C89-A249-B1C88B6FFC20} - D:\Program Files\ICQ7.5\ICQ.exe (ICQ, LLC.) O9 - Extra 'Tools' menuitem : ICQ7.5 - {7578ADEA-D65F-4C89-A249-B1C88B6FFC20} - D:\Program Files\ICQ7.5\ICQ.exe (ICQ, LLC.) O10:64bit: - NameSpace_Catalog5\Catalog_Entries64\000000000005 [] - C:\Programme\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL (Microsoft Corp.) O10:64bit: - NameSpace_Catalog5\Catalog_Entries64\000000000006 [] - C:\Programme\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL (Microsoft Corp.) O1364bit: - gopher Prefix: missing O13 - gopher Prefix: missing O16 - DPF: {5D6F45B3-9043-443D-A792-115447494D24} hxxp://messenger.zone.msn.com/MessengerGamesContent/GameContent/de/uno1/GAME_UNO1.cab (UnoCtrl Class) O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab (Java Plug-in 1.6.0_30) O16 - DPF: {C3F79A2B-B9B4-4A66-B012-3EE46475B072} hxxp://messenger.zone.msn.com/binary/MessengerStatsPAClient.cab56907.cab (MessengerStatsClient Class) O16 - DPF: {CAFEEFAC-0016-0000-0030-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab (Java Plug-in 1.6.0_30) O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab (Java Plug-in 1.6.0_30) O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} hxxp://fpdownload2.macromedia.com/pub/shockwave/cabs/flash/swflash.cab (Shockwave Flash Object) O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 195.50.140.246 195.50.140.114 O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{9D84441F-D31A-4D6B-8D16-9793877A567F}: DhcpNameServer = 195.50.140.246 195.50.140.114 O18:64bit: - Protocol\Handler\livecall - No CLSID value found O18:64bit: - Protocol\Handler\msnim - No CLSID value found O18:64bit: - Protocol\Handler\wlmailhtml - No CLSID value found O20:64bit: - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) - C:\Windows\SysNative\userinit.exe (Microsoft Corporation) O20:64bit: - HKLM Winlogon: VMApplet - (SystemPropertiesPerformance.exe) - C:\Windows\SysNative\SystemPropertiesPerformance.exe (Microsoft Corporation) O20:64bit: - HKLM Winlogon: VMApplet - (/pagefile) - File not found O20 - HKLM Winlogon: Shell - (explorer.exe) - C:\Windows\SysWow64\explorer.exe (Microsoft Corporation) O20 - HKLM Winlogon: UserInit - (userinit.exe) - C:\Windows\SysWow64\userinit.exe (Microsoft Corporation) O20 - HKLM Winlogon: VMApplet - (/pagefile) - File not found O21:64bit: - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. O32 - HKLM CDRom: AutoRun - 1 O34 - HKLM BootExecute: (autocheck autochk *) O35:64bit: - HKLM\..comfile [open] -- "%1" %* O35:64bit: - HKLM\..exefile [open] -- "%1" %* O35 - HKLM\..comfile [open] -- "%1" %* O35 - HKLM\..exefile [open] -- "%1" %* O37:64bit: - HKLM\...com [@ = comfile] -- "%1" %* O37:64bit: - HKLM\...exe [@ = exefile] -- "%1" %* O37 - HKLM\...com [@ = comfile] -- "%1" %* O37 - HKLM\...exe [@ = exefile] -- "%1" %* O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3) O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2) O38 - SubSystems\\Windows: (ServerDll=sxssrv,4) NetSvcs:64bit: AppMgmt - C:\Windows\SysNative\appmgmts.dll (Microsoft Corporation) MsConfig:64bit - StartUpFolder: C:^Users^Cris^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Dropbox.lnk - - File not found MsConfig:64bit - StartUpFolder: C:^Users^Cris^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OpenOffice.org 3.3.lnk - D:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe - () MsConfig:64bit - StartUpReg: Adobe ARM - hkey= - key= - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe (Adobe Systems Incorporated) MsConfig:64bit - StartUpReg: Adobe Reader Speed Launcher - hkey= - key= - File not found MsConfig:64bit - StartUpReg: Facebook Update - hkey= - key= - File not found MsConfig:64bit - StartUpReg: Google Update - hkey= - key= - File not found MsConfig:64bit - StartUpReg: ICQ - hkey= - key= - D:\Program Files\ICQ7.5\ICQ.exe (ICQ, LLC.) MsConfig:64bit - StartUpReg: Malwarebytes Anti-Malware - hkey= - key= - File not found MsConfig:64bit - StartUpReg: Malwarebytes' Anti-Malware - hkey= - key= - File not found MsConfig:64bit - StartUpReg: msnmsgr - hkey= - key= - C:\Program Files (x86)\Windows Live\Messenger\msnmsgr.exe (Microsoft Corporation) MsConfig:64bit - StartUpReg: QuickTime Task - hkey= - key= - C:\Program Files (x86)\QuickTime\QTTask.exe (Apple Inc.) MsConfig:64bit - StartUpReg: SkypePM - hkey= - key= - File not found MsConfig:64bit - StartUpReg: SunJavaUpdateSched - hkey= - key= - C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe (Sun Microsystems, Inc.) MsConfig:64bit - StartUpReg: Windows Mobile Device Center - hkey= - key= - File not found MsConfig:64bit - StartUpReg: Windows Mobile-based device management - hkey= - key= - C:\Windows\WindowsMobile\wmdcBase.exe (Microsoft Corporation) SafeBootMin:64bit: AppMgmt - C:\Windows\SysNative\appmgmts.dll (Microsoft Corporation) SafeBootMin:64bit: Base - Driver Group SafeBootMin:64bit: Boot Bus Extender - Driver Group SafeBootMin:64bit: Boot file system - Driver Group SafeBootMin:64bit: File system - Driver Group SafeBootMin:64bit: Filter - Driver Group SafeBootMin:64bit: HelpSvc - Service SafeBootMin:64bit: PCI Configuration - Driver Group SafeBootMin:64bit: PNP Filter - Driver Group SafeBootMin:64bit: Primary disk - Driver Group SafeBootMin:64bit: sacsvr - Service SafeBootMin:64bit: SCSI Class - Driver Group SafeBootMin:64bit: System Bus Extender - Driver Group SafeBootMin:64bit: vmms - Service SafeBootMin:64bit: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers SafeBootMin:64bit: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive SafeBootMin:64bit: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive SafeBootMin:64bit: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller SafeBootMin:64bit: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc SafeBootMin:64bit: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard SafeBootMin:64bit: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse SafeBootMin:64bit: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters SafeBootMin:64bit: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter SafeBootMin:64bit: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System SafeBootMin:64bit: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive SafeBootMin:64bit: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy SafeBootMin:64bit: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers SafeBootMin:64bit: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume SafeBootMin:64bit: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices SafeBootMin:64bit: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices SafeBootMin:64bit: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices SafeBootMin: Base - Driver Group SafeBootMin: Boot Bus Extender - Driver Group SafeBootMin: Boot file system - Driver Group SafeBootMin: File system - Driver Group SafeBootMin: Filter - Driver Group SafeBootMin: HelpSvc - Service SafeBootMin: PCI Configuration - Driver Group SafeBootMin: PNP Filter - Driver Group SafeBootMin: Primary disk - Driver Group SafeBootMin: sacsvr - Service SafeBootMin: SCSI Class - Driver Group SafeBootMin: System Bus Extender - Driver Group SafeBootMin: vmms - Service SafeBootMin: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers SafeBootMin: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive SafeBootMin: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive SafeBootMin: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller SafeBootMin: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc SafeBootMin: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard SafeBootMin: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse SafeBootMin: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters SafeBootMin: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter SafeBootMin: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System SafeBootMin: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive SafeBootMin: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy SafeBootMin: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers SafeBootMin: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume SafeBootMin: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices SafeBootMin: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices SafeBootMin: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices SafeBootNet:64bit: AppMgmt - C:\Windows\SysNative\appmgmts.dll (Microsoft Corporation) SafeBootNet:64bit: Base - Driver Group SafeBootNet:64bit: Boot Bus Extender - Driver Group SafeBootNet:64bit: Boot file system - Driver Group SafeBootNet:64bit: File system - Driver Group SafeBootNet:64bit: Filter - Driver Group SafeBootNet:64bit: HelpSvc - Service SafeBootNet:64bit: Messenger - Service SafeBootNet:64bit: NDIS Wrapper - Driver Group SafeBootNet:64bit: NetBIOSGroup - Driver Group SafeBootNet:64bit: NetDDEGroup - Driver Group SafeBootNet:64bit: Network - Driver Group SafeBootNet:64bit: NetworkProvider - Driver Group SafeBootNet:64bit: PCI Configuration - Driver Group SafeBootNet:64bit: PNP Filter - Driver Group SafeBootNet:64bit: PNP_TDI - Driver Group SafeBootNet:64bit: Primary disk - Driver Group SafeBootNet:64bit: rdsessmgr - Service SafeBootNet:64bit: sacsvr - Service SafeBootNet:64bit: SCSI Class - Driver Group SafeBootNet:64bit: Streams Drivers - Driver Group SafeBootNet:64bit: System Bus Extender - Driver Group SafeBootNet:64bit: TDI - Driver Group SafeBootNet:64bit: vmms - Service SafeBootNet:64bit: WudfUsbccidDriver - Driver SafeBootNet:64bit: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers SafeBootNet:64bit: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive SafeBootNet:64bit: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive SafeBootNet:64bit: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller SafeBootNet:64bit: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc SafeBootNet:64bit: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard SafeBootNet:64bit: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse SafeBootNet:64bit: {4D36E972-E325-11CE-BFC1-08002BE10318} - Net SafeBootNet:64bit: {4D36E973-E325-11CE-BFC1-08002BE10318} - NetClient SafeBootNet:64bit: {4D36E974-E325-11CE-BFC1-08002BE10318} - NetService SafeBootNet:64bit: {4D36E975-E325-11CE-BFC1-08002BE10318} - NetTrans SafeBootNet:64bit: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters SafeBootNet:64bit: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter SafeBootNet:64bit: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System SafeBootNet:64bit: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive SafeBootNet:64bit: {50DD5230-BA8A-11D1-BF5D-0000F805F530} - Smart card readers SafeBootNet:64bit: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy SafeBootNet:64bit: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers SafeBootNet:64bit: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume SafeBootNet:64bit: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices SafeBootNet:64bit: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices SafeBootNet:64bit: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices SafeBootNet: Base - Driver Group SafeBootNet: Boot Bus Extender - Driver Group SafeBootNet: Boot file system - Driver Group SafeBootNet: File system - Driver Group SafeBootNet: Filter - Driver Group SafeBootNet: HelpSvc - Service SafeBootNet: Messenger - Service SafeBootNet: NDIS Wrapper - Driver Group SafeBootNet: NetBIOSGroup - Driver Group SafeBootNet: NetDDEGroup - Driver Group SafeBootNet: Network - Driver Group SafeBootNet: NetworkProvider - Driver Group SafeBootNet: PCI Configuration - Driver Group SafeBootNet: PNP Filter - Driver Group SafeBootNet: PNP_TDI - Driver Group SafeBootNet: Primary disk - Driver Group SafeBootNet: rdsessmgr - Service SafeBootNet: sacsvr - Service SafeBootNet: SCSI Class - Driver Group SafeBootNet: Streams Drivers - Driver Group SafeBootNet: System Bus Extender - Driver Group SafeBootNet: TDI - Driver Group SafeBootNet: vmms - Service SafeBootNet: WudfUsbccidDriver - Driver SafeBootNet: {36FC9E60-C465-11CF-8056-444553540000} - Universal Serial Bus controllers SafeBootNet: {4D36E965-E325-11CE-BFC1-08002BE10318} - CD-ROM Drive SafeBootNet: {4D36E967-E325-11CE-BFC1-08002BE10318} - DiskDrive SafeBootNet: {4D36E969-E325-11CE-BFC1-08002BE10318} - Standard floppy disk controller SafeBootNet: {4D36E96A-E325-11CE-BFC1-08002BE10318} - Hdc SafeBootNet: {4D36E96B-E325-11CE-BFC1-08002BE10318} - Keyboard SafeBootNet: {4D36E96F-E325-11CE-BFC1-08002BE10318} - Mouse SafeBootNet: {4D36E972-E325-11CE-BFC1-08002BE10318} - Net SafeBootNet: {4D36E973-E325-11CE-BFC1-08002BE10318} - NetClient SafeBootNet: {4D36E974-E325-11CE-BFC1-08002BE10318} - NetService SafeBootNet: {4D36E975-E325-11CE-BFC1-08002BE10318} - NetTrans SafeBootNet: {4D36E977-E325-11CE-BFC1-08002BE10318} - PCMCIA Adapters SafeBootNet: {4D36E97B-E325-11CE-BFC1-08002BE10318} - SCSIAdapter SafeBootNet: {4D36E97D-E325-11CE-BFC1-08002BE10318} - System SafeBootNet: {4D36E980-E325-11CE-BFC1-08002BE10318} - Floppy disk drive SafeBootNet: {50DD5230-BA8A-11D1-BF5D-0000F805F530} - Smart card readers SafeBootNet: {533C5B84-EC70-11D2-9505-00C04F79DEAF} - Volume shadow copy SafeBootNet: {6BDD1FC1-810F-11D0-BEC7-08002BE2092F} - IEEE 1394 Bus host controllers SafeBootNet: {71A27CDD-812A-11D0-BEC7-08002BE2092F} - Volume SafeBootNet: {745A17A0-74D3-11D0-B6FE-00A0C90F57DA} - Human Interface Devices SafeBootNet: {D48179BE-EC20-11D1-B6B8-00C04FA372A7} - SBP2 IEEE 1394 Devices SafeBootNet: {D94EE5D8-D189-4994-83D2-F68D7D41B0E6} - SecurityDevices ActiveX:64bit: {22d6f312-b0f6-11d0-94ab-0080c74c7e95} - Microsoft Windows Media Player 12.0 ActiveX:64bit: {2C7339CF-2B09-4501-B3F3-F3508C9228ED} - %SystemRoot%\system32\regsvr32.exe /s /n /i:/UserInstall %SystemRoot%\system32\themeui.dll ActiveX:64bit: {3af36230-a269-11d1-b5bf-0000f8051515} - Offline Browsing Pack ActiveX:64bit: {44BBA840-CC51-11CF-AAFA-00AA00B6015C} - "%ProgramFiles%\Windows Mail\WinMail.exe" OCInstallUserConfigOE ActiveX:64bit: {44BBA855-CC51-11CF-AAFA-00AA00B6015F} - DirectDrawEx ActiveX:64bit: {45ea75a0-a269-11d1-b5bf-0000f8051515} - Internet Explorer Help ActiveX:64bit: {4f645220-306d-11d2-995d-00c04f98bbc9} - Microsoft Windows Script 5.6 ActiveX:64bit: {5fd399c0-a70a-11d1-9948-00c04f98bbc9} - Internet Explorer Setup Tools ActiveX:64bit: {630b1da0-b465-11d1-9948-00c04f98bbc9} - Browsing Enhancements ActiveX:64bit: {6BF52A52-394A-11d3-B153-00C04F79FAA6} - Microsoft Windows Media Player ActiveX:64bit: {6fab99d0-bab8-11d1-994a-00c04f98bbc9} - MSN Site Access ActiveX:64bit: {7790769C-0471-11d2-AF11-00C04FA35D02} - Address Book 7 ActiveX:64bit: {89820200-ECBD-11cf-8B85-00AA005B4340} - regsvr32.exe /s /n /i:U shell32.dll ActiveX:64bit: {89820200-ECBD-11cf-8B85-00AA005B4383} - C:\Windows\System32\ie4uinit.exe -BaseSettings ActiveX:64bit: {89B4C1CD-B018-4511-B0A1-5476DBF70820} - C:\Windows\system32\Rundll32.exe C:\Windows\system32\mscories.dll,Install ActiveX:64bit: {9381D8F2-0288-11D0-9501-00AA00B911A5} - Dynamic HTML Data Binding ActiveX:64bit: {C9E9A340-D1F1-11D0-821E-444553540600} - Internet Explorer Core Fonts ActiveX:64bit: {de5aed00-a4bf-11d1-9948-00c04f98bbc9} - HTML Help ActiveX:64bit: {E92B03AB-B707-11d2-9CBD-0000F87A369E} - Active Directory Service Interface ActiveX:64bit: {F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4} - .NET Framework ActiveX:64bit: {FEBEF00C-046D-438D-8A88-BF94A6C9E703} - .NET Framework ActiveX:64bit: >{22d6f312-b0f6-11d0-94ab-0080c74c7e95} - %SystemRoot%\system32\unregmp2.exe /ShowWMP ActiveX:64bit: >{26923b43-4d38-484f-9b9e-de460746276c} - C:\Windows\System32\ie4uinit.exe -UserIconConfig ActiveX:64bit: >{60B49E34-C7CC-11D0-8953-00A0C90347FF} - "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\iedkcs32.dll",BrandIEActiveSetup SIGNUP ActiveX: {08B0E5C0-4FCB-11CF-AAA5-00401C608500} - Java (Sun) ActiveX: {22d6f312-b0f6-11d0-94ab-0080c74c7e95} - Microsoft Windows Media Player 12.0 ActiveX: {25FFAAD0-F4A3-4164-95FF-4461E9F35D51} - .NET Framework ActiveX: {2C7339CF-2B09-4501-B3F3-F3508C9228ED} - %SystemRoot%\system32\regsvr32.exe /s /n /i:/UserInstall %SystemRoot%\system32\themeui.dll ActiveX: {3af36230-a269-11d1-b5bf-0000f8051515} - Offline Browsing Pack ActiveX: {44BBA840-CC51-11CF-AAFA-00AA00B6015C} - "%ProgramFiles(x86)%\Windows Mail\WinMail.exe" OCInstallUserConfigOE ActiveX: {44BBA855-CC51-11CF-AAFA-00AA00B6015F} - DirectDrawEx ActiveX: {45ea75a0-a269-11d1-b5bf-0000f8051515} - Internet Explorer Help ActiveX: {4f645220-306d-11d2-995d-00c04f98bbc9} - Microsoft Windows Script 5.6 ActiveX: {5fd399c0-a70a-11d1-9948-00c04f98bbc9} - Internet Explorer Setup Tools ActiveX: {630b1da0-b465-11d1-9948-00c04f98bbc9} - Browsing Enhancements ActiveX: {6BF52A52-394A-11d3-B153-00C04F79FAA6} - Microsoft Windows Media Player ActiveX: {6fab99d0-bab8-11d1-994a-00c04f98bbc9} - MSN Site Access ActiveX: {7790769C-0471-11d2-AF11-00C04FA35D02} - Address Book 7 ActiveX: {7C028AF8-F614-47B3-82DA-BA94E41B1089} - .NET Framework ActiveX: {89820200-ECBD-11cf-8B85-00AA005B4340} - regsvr32.exe /s /n /i:U shell32.dll ActiveX: {89820200-ECBD-11cf-8B85-00AA005B4383} - C:\Windows\SysWOW64\ie4uinit.exe -BaseSettings ActiveX: {89B4C1CD-B018-4511-B0A1-5476DBF70820} - C:\Windows\SysWOW64\Rundll32.exe C:\Windows\SysWOW64\mscories.dll,Install ActiveX: {9381D8F2-0288-11D0-9501-00AA00B911A5} - Dynamic HTML Data Binding ActiveX: {C9E9A340-D1F1-11D0-821E-444553540600} - Internet Explorer Core Fonts ActiveX: {de5aed00-a4bf-11d1-9948-00c04f98bbc9} - HTML Help ActiveX: {E92B03AB-B707-11d2-9CBD-0000F87A369E} - Active Directory Service Interface ActiveX: {F5B09CFD-F0B2-36AF-8DF4-1DF6B63FC7B4} - .NET Framework ActiveX: >{22d6f312-b0f6-11d0-94ab-0080c74c7e95} - %SystemRoot%\system32\unregmp2.exe /ShowWMP ActiveX: >{26923b43-4d38-484f-9b9e-de460746276c} - C:\Windows\SysWOW64\ie4uinit.exe -UserIconConfig ActiveX: >{60B49E34-C7CC-11D0-8953-00A0C90347FF} - "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\iedkcs32.dll",BrandIEActiveSetup SIGNUP Drivers32:64bit: msacm.l3acm - C:\Windows\System32\l3codeca.acm (Fraunhofer Institut Integrierte Schaltungen IIS) Drivers32: msacm.l3acm - C:\Windows\SysWOW64\l3codeca.acm (Fraunhofer Institut Integrierte Schaltungen IIS) Drivers32: vidc.cvid - C:\Windows\SysWow64\iccvid.dll (Radius Inc.) CREATERESTOREPOINT Restore point Set: OTL Restore Point ========== Files/Folders - Created Within 30 Days ========== [2012.07.17 12:49:53 | 000,595,968 | ---- | C] (OldTimer Tools) -- C:\Users\Cris\Desktop\OTL.exe [2012.07.17 08:37:22 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{8A3DD251-2393-41B7-8489-CEE2A0EF2906} [2012.07.17 08:37:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{9E355A82-D985-4A4B-A0FA-C63F9E9C7F64} [2012.07.17 00:14:08 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{65F4B8F2-A260-4D9A-B885-C3B201EF7C64} [2012.07.17 00:13:55 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{A8D02268-18F2-4FBC-8DB4-E0C93D42F0B3} [2012.07.16 22:52:46 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{561CC574-52FF-4D40-A082-8A8B45E76F82} [2012.07.16 22:52:28 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{E16C2D2C-4150-4911-A59C-6D712AB7448C} [2012.07.16 22:23:13 | 000,000,000 | ---D | C] -- C:\Windows\SysNative\SPReview [2012.07.16 22:16:16 | 000,116,224 | ---- | C] (Windows (R) Codename Longhorn DDK provider) -- C:\Windows\SysNative\fms.dll [2012.07.16 22:15:48 | 000,093,696 | ---- | C] (Windows (R) Codename Longhorn DDK provider) -- C:\Windows\SysWow64\fms.dll [2012.07.16 15:10:10 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{33C1CAF5-AC91-444C-A912-63A383A6BD64} [2012.07.16 15:09:59 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{682FB522-773F-4F8A-8607-FB24A493520A} [2012.07.16 06:44:10 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EE539925-7048-45FC-A65A-5601B20F3D07} [2012.07.16 06:43:59 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{86147753-E400-44E3-AACA-140EC4C4A448} [2012.07.16 01:34:03 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EE143669-1B15-420D-B3BD-E66A6FE1895D} [2012.07.16 01:33:52 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{23E9328D-BCBD-4B41-82E6-97A2A3A08947} [2012.07.16 01:01:14 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{AAC62578-F8E6-4DAB-BA24-157C6D48D960} [2012.07.16 01:01:02 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{7353D542-E281-49F9-917D-534C593967A8} [2012.07.15 16:00:48 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{2B786EBA-6D9C-4A5D-A779-347BA9548955} [2012.07.15 16:00:37 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5E0F4505-910F-4ED6-A180-C532D76EAA01} [2012.07.15 15:51:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5C5FFAB7-E7DD-406D-AAD8-54E57E0820BD} [2012.07.15 15:51:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{34E1E285-4671-4BF9-B628-0E551DB2C9C7} [2012.07.15 14:04:52 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{3D97A957-57F8-4630-A1F7-C6F8995D40CB} [2012.07.15 14:04:40 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{08E714D7-6C22-4257-9FAA-E1A588735184} [2012.07.15 09:23:05 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{9E8D07E3-EB5A-4927-A42A-F0E1164F5557} [2012.07.15 09:22:52 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{F5234CFE-AFCC-4264-9695-2FB64BFA7976} [2012.07.14 22:42:08 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{35442443-D43C-499F-AE49-1272BEF58AAF} [2012.07.14 22:41:57 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{668F1424-93F5-4C18-9E10-C404A07A7E9A} [2012.07.14 12:44:56 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{52D1540E-980D-4BEA-B6AD-12468370C2FD} [2012.07.14 12:44:45 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EDD0AD4B-49D3-4172-9958-D476E2C8EEC8} [2012.07.14 09:57:18 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{113BEABD-1372-4FE6-BF5F-DD99D90C53F5} [2012.07.14 09:57:04 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{97D8A040-7F89-48D3-9567-AD4E975F6842} [2012.07.13 08:45:41 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{05647DDB-E55A-411A-800E-8106BB010907} [2012.07.13 08:45:30 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5D7F58F2-A95E-4DC9-A3B1-CE4C6D7442F8} [2012.07.12 17:53:50 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{BFBA13BA-4A0C-451E-953C-52BCF9528A73} [2012.07.12 17:53:39 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{D220E39C-264E-4595-822C-26EF3B31863A} [2012.07.12 00:00:38 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5812F087-E806-4CC2-82D3-4FAEB0B49242} [2012.07.12 00:00:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{FC84E8FB-9B0B-48E7-869B-85C120E7BCA8} [2012.07.11 14:54:23 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{FD5783AA-3FDD-4FD2-961C-29DB226C4476} [2012.07.11 14:54:12 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{BF7E4A95-48B8-4C42-90EB-105F5D012B0C} [2012.07.11 10:02:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{414CE7E4-4F9A-40E9-BB77-C1E89AAD5FA1} [2012.07.11 10:01:58 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{9653867E-1EB7-4F10-9498-A63AA17E5F2B} [2012.07.10 08:54:51 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{65BCE396-927D-4EBE-BD1D-481870AF8D9A} [2012.07.10 08:54:38 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{74F7C429-1D15-40D9-A8FB-0B0C318994B5} [2012.07.09 12:05:29 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{1D3AF251-BA9B-4E96-932E-D5F2DF0FFE81} [2012.07.09 12:05:18 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{FF8ABEDC-DEDE-4842-8C1F-98A836F3CABF} [2012.07.09 06:31:19 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{D7F4EF3F-04D9-4850-8F39-33B361427989} [2012.07.09 06:31:08 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EB01D3A0-5F8E-487D-9155-9D4B803EFC2A} [2012.07.08 17:20:56 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{7645F5DF-C276-4F3C-9C8E-12D68C338FBC} [2012.07.08 17:20:45 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{A8773CA6-5694-40D9-9437-3C50D9F09B2B} [2012.07.08 12:02:43 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{79FD47EE-EB65-471E-9B4F-6F784A4035F8} [2012.07.08 12:02:30 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{641BDFFF-6E51-40E6-A0E0-5C557EC0F23C} [2012.07.07 17:04:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{E860AE1D-2ADB-4D70-9DE0-E477E9913EA5} [2012.07.07 17:04:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5C4BCDA6-836E-4856-95D5-297BB354B1DC} [2012.07.06 16:27:27 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{25F5F9AE-5AE6-4C95-A426-C845CF4258DB} [2012.07.06 16:27:14 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{EE6382BA-E2C9-440C-B2B1-9A46B4FBC4DD} [2012.07.05 13:23:38 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{39B5C022-2890-4D59-91CC-F814C5C59B58} [2012.07.05 13:23:27 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{7DEB5185-DB6C-4E6F-A6AA-5A491CC3E7E1} [2012.07.04 21:03:02 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{B6831CD6-B9DD-46A3-9C2F-F154450C1397} [2012.07.04 21:02:48 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{61953AC0-6FBB-45B3-848E-B77323B12738} [2012.07.03 21:01:26 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{C5EC49DA-169B-475D-B6AC-E29B06E5B88B} [2012.07.01 10:18:29 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{5AF337A7-B2B0-4C4F-B89B-5AC455F5939C} [2012.07.01 10:18:07 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{116ABFCC-80AF-4795-AD91-950BB06D5AB0} [2012.06.30 11:13:42 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{B8814BF1-D1A2-4455-BA62-C8AB2D903769} [2012.06.30 11:13:30 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{43399625-2933-4FF9-850F-96FED302AB64} [2012.06.29 21:29:54 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{0BCF0318-A4BA-4237-BE95-8C10B368B8DC} [2012.06.29 21:29:42 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{3C5B38BE-BF0A-4607-A298-2810C16D6477} [2012.06.27 17:18:25 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{680986D0-A909-4740-8558-0D26A1D3F93F} [2012.06.27 17:18:13 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{FEE13981-CCBC-46B8-90B0-46CCB34C4A8E} [2012.06.27 13:46:34 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{3CF85D47-1852-4A3A-89E5-A0F4C344D480} [2012.06.27 13:46:22 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{E0A1C294-F42F-404A-B8CD-18090B6B94FB} [2012.06.25 21:25:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{BB1E30EB-C152-4A12-8B23-518E3328A79E} [2012.06.25 21:25:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{A952AE45-6334-4D89-9149-7F99A555C600} [2012.06.24 22:24:23 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{3F88239F-7287-4B57-BBDF-3B3100CC3961} [2012.06.24 22:24:11 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{8CCB21B0-7B9E-4E2F-B8ED-799F553B068C} [2012.06.24 12:25:57 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{24C18AC0-5556-4198-9643-51FDA154F248} [2012.06.24 12:25:46 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{9B01D8BE-17B2-4167-9A6D-0C692A81E0C8} [2012.06.23 10:49:07 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{DC631595-7BBF-4981-BED4-1100B4925CF7} [2012.06.23 10:48:54 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{67C1E72B-CD9C-4B7E-A3B1-7AFCB97DBD85} [2012.06.22 20:35:21 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{44B69A68-9B91-4C45-A7A4-82132925084B} [2012.06.22 20:35:09 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{973EE23F-9F31-4163-877E-C015D08AFEB9} [2012.06.20 14:47:16 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{E3F574D4-E30B-4E07-AED0-A0F4CF509575} [2012.06.20 14:47:01 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{989C171A-141B-4F0E-9686-0ABFCAB42BC9} [2012.06.19 20:39:13 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{F4C82822-0A91-4D4F-9C8B-23A124041324} [2012.06.17 14:05:59 | 000,000,000 | ---D | C] -- C:\Users\Cris\AppData\Local\{B5C2276F-BCA3-41D4-9898-46D47A8193EA} [1 C:\Users\Cris\AppData\Roaming\*.tmp files -> C:\Users\Cris\AppData\Roaming\*.tmp -> ] ========== Files - Modified Within 30 Days ========== [2012.07.17 12:49:59 | 000,595,968 | ---- | M] (OldTimer Tools) -- C:\Users\Cris\Desktop\OTL.exe [2012.07.17 12:47:27 | 000,629,122 | ---- | M] () -- C:\Windows\SysNative\perfh007.dat [2012.07.17 12:47:27 | 000,594,766 | ---- | M] () -- C:\Windows\SysNative\perfh009.dat [2012.07.17 12:47:27 | 000,119,994 | ---- | M] () -- C:\Windows\SysNative\perfc007.dat [2012.07.17 12:47:27 | 000,099,136 | ---- | M] () -- C:\Windows\SysNative\perfc009.dat [2012.07.17 12:47:26 | 001,434,104 | ---- | M] () -- C:\Windows\SysNative\PerfStringBackup.INI [2012.07.17 12:46:26 | 000,014,752 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 [2012.07.17 12:46:25 | 000,014,752 | -H-- | M] () -- C:\Windows\SysNative\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 [2012.07.17 12:41:00 | 000,001,116 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001UA.job [2012.07.17 12:40:44 | 000,292,816 | ---- | M] () -- C:\Windows\SysNative\FNTCACHE.DAT [2012.07.17 12:40:32 | 000,067,584 | --S- | M] () -- C:\Windows\bootstat.dat [2012.07.17 12:39:46 | 1408,688,128 | -HS- | M] () -- C:\hiberfil.sys [2012.07.17 12:13:00 | 000,000,924 | ---- | M] () -- C:\Windows\tasks\FacebookUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001UA.job [2012.07.17 11:41:00 | 000,001,064 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001Core.job [2012.07.16 15:13:03 | 000,000,902 | ---- | M] () -- C:\Windows\tasks\FacebookUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001Core.job [2012.07.15 15:35:37 | 000,008,192 | RHS- | M] () -- C:\BOOTSECT.BAK [2012.07.15 14:11:03 | 000,002,544 | ---- | M] () -- C:\Windows\diagwrn.xml [2012.07.15 14:10:59 | 000,001,890 | ---- | M] () -- C:\Windows\diagerr.xml [1 C:\Users\Cris\AppData\Roaming\*.tmp files -> C:\Users\Cris\AppData\Roaming\*.tmp -> ] ========== Files Created - No Company Name ========== [2012.07.16 22:17:34 | 000,347,904 | ---- | C] () -- C:\Windows\SysNative\systemsf.ebd [2012.07.16 22:15:21 | 000,010,429 | ---- | C] () -- C:\Windows\SysNative\ScavengeSpace.xml [2012.07.16 22:15:04 | 000,105,559 | ---- | C] () -- C:\Windows\SysWow64\RacRules.xml [2012.07.16 22:15:04 | 000,105,559 | ---- | C] () -- C:\Windows\SysNative\RacRules.xml [2012.07.16 22:14:32 | 000,146,389 | ---- | C] () -- C:\Windows\SysWow64\printmanagement.msc [2012.07.16 22:14:32 | 000,001,041 | ---- | C] () -- C:\Windows\SysWow64\tcpbidi.xml [2012.07.15 14:10:56 | 000,002,544 | ---- | C] () -- C:\Windows\diagwrn.xml [2012.07.15 14:10:56 | 000,001,890 | ---- | C] () -- C:\Windows\diagerr.xml [2012.06.24 12:29:21 | 000,186,752 | ---- | C] () -- C:\Windows\SysNative\wuwebv.dll [2012.06.08 15:31:58 | 000,001,206 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\CamStudio.Producer.ini [2012.06.08 15:31:58 | 000,000,000 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\CamStudio.Producer.Data.ini [2012.06.08 15:29:07 | 000,000,408 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\CamShapes.ini [2012.06.08 15:29:07 | 000,000,408 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\CamLayout.ini [2012.06.08 15:29:07 | 000,000,102 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\Camdata.ini [2011.11.09 15:48:07 | 000,000,008 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\nt16bmj6slpr3ghp.dat [2011.11.09 11:06:10 | 000,000,008 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\pi04uu2dmwq0ultr.dat [1601.02.13 10:28:18 | 000,004,416 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\JtvTVjsvofOsGopOqGup [1601.02.13 10:28:18 | 000,000,065 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\tNstTTjjJvfVsso [1601.02.13 10:28:18 | 000,000,016 | ---- | C] () -- C:\Users\Cris\AppData\Roaming\VTfAeJoVOexopgyGQXdy ========== LOP Check ========== [2012.06.11 18:19:12 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Dropbox [2012.03.13 23:51:01 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\DVDVideoSoft [2012.06.11 18:19:12 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\DVDVideoSoftIEHelpers [2012.06.11 19:26:08 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Ghrrynb [2012.06.11 18:19:56 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\ICQ [2012.03.16 00:38:05 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\kock [2011.05.24 23:27:31 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\OpenOffice.org [2011.05.25 00:05:29 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Windows Live Writer [2012.03.16 00:38:23 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\xmldm [2012.07.16 15:13:03 | 000,000,902 | ---- | M] () -- C:\Windows\Tasks\FacebookUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001Core.job [2012.07.17 12:13:00 | 000,000,924 | ---- | M] () -- C:\Windows\Tasks\FacebookUpdateTaskUserS-1-5-21-558247466-3247100571-1202973093-1001UA.job [2012.06.22 20:34:45 | 000,032,632 | ---- | M] () -- C:\Windows\Tasks\SCHEDLGU.TXT ========== Purity Check ========== ========== Custom Scans ========== < %ALLUSERSPROFILE%\Application Data\*. > < %ALLUSERSPROFILE%\Application Data\*.exe /s > < %APPDATA%\*. > [2011.05.28 14:19:13 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Adobe [2012.06.11 18:19:12 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Dropbox [2012.03.03 19:21:43 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\dvdcss [2012.03.13 23:51:01 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\DVDVideoSoft [2012.06.11 18:19:12 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\DVDVideoSoftIEHelpers [2012.06.11 19:26:08 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Ghrrynb [2012.06.11 18:19:56 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\ICQ [2011.05.24 00:48:22 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Identities [2012.03.16 00:38:05 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\kock [2012.06.11 18:19:56 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\kodak [2011.05.24 00:54:20 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Macromedia [2011.11.09 16:05:53 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Malwarebytes [2009.07.14 20:18:34 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Media Center Programs [2011.11.09 15:55:47 | 000,000,000 | --SD | M] -- C:\Users\Cris\AppData\Roaming\Microsoft [2011.05.24 23:27:31 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\OpenOffice.org [2012.06.11 18:20:10 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Skype [2012.06.11 18:20:11 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\vlc [2011.05.25 00:05:29 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\Windows Live Writer [2011.05.25 01:21:28 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\WinRAR [2012.03.16 00:38:23 | 000,000,000 | ---D | M] -- C:\Users\Cris\AppData\Roaming\xmldm < %APPDATA%\*.exe /s > [2011.04.22 20:15:04 | 012,993,904 | ---- | M] (Microsoft Corporation) -- C:\Users\Cris\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\OUTLOOK.EXE [2010.08.13 13:00:16 | 000,521,080 | ---- | M] (Microsoft Corporation) -- C:\Users\Cris\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\POWERPNT.EXE < %SYSTEMDRIVE%\*.exe > < MD5 for: AGP440.SYS > [2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\SysNative\drivers\AGP440.sys [2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\SysNative\DriverStore\FileRepository\machine.inf_amd64_neutral_a2f120466549d68b\AGP440.sys [2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\winsxs\amd64_machine.inf_31bf3856ad364e35_6.1.7600.16385_none_1607dee2d861e021\AGP440.sys [2009.07.14 03:52:21 | 000,061,008 | ---- | M] (Microsoft Corporation) MD5=608C14DBA7299D8CB6ED035A68A15799 -- C:\Windows\winsxs\amd64_machine.inf_31bf3856ad364e35_6.1.7601.17514_none_1838f2aad55063bb\AGP440.sys < MD5 for: ATAPI.SYS > [2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\SysNative\drivers\atapi.sys [2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\SysNative\DriverStore\FileRepository\mshdc.inf_amd64_neutral_aad30bdeec04ea5e\atapi.sys [2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\winsxs\amd64_mshdc.inf_31bf3856ad364e35_6.1.7600.16385_none_392d19c13b3ad543\atapi.sys [2009.07.14 03:52:21 | 000,024,128 | ---- | M] (Microsoft Corporation) MD5=02062C0B390B7729EDC9E69C680A6F3C -- C:\Windows\winsxs\amd64_mshdc.inf_31bf3856ad364e35_6.1.7601.17514_none_3b5e2d89382958dd\atapi.sys < MD5 for: CNGAUDIT.DLL > [2009.07.14 03:15:06 | 000,012,288 | ---- | M] (Microsoft Corporation) MD5=50BA656134F78AF64E4DD3C8B6FEFD7E -- C:\Windows\SysWOW64\cngaudit.dll [2009.07.14 03:15:06 | 000,012,288 | ---- | M] (Microsoft Corporation) MD5=50BA656134F78AF64E4DD3C8B6FEFD7E -- C:\Windows\winsxs\x86_microsoft-windows-cngaudit-dll_31bf3856ad364e35_6.1.7600.16385_none_e83a414890e8132b\cngaudit.dll [2009.07.14 03:40:20 | 000,018,944 | ---- | M] (Microsoft Corporation) MD5=86FE1B1F8FD42CD0DB641AB1CDB13093 -- C:\Windows\SysNative\cngaudit.dll [2009.07.14 03:40:20 | 000,018,944 | ---- | M] (Microsoft Corporation) MD5=86FE1B1F8FD42CD0DB641AB1CDB13093 -- C:\Windows\winsxs\amd64_microsoft-windows-cngaudit-dll_31bf3856ad364e35_6.1.7600.16385_none_4458dccc49458461\cngaudit.dll < MD5 for: IASTORV.SYS > [2010.11.20 15:33:38 | 000,410,496 | ---- | M] (Intel Corporation) MD5=3DF4395A7CF8B7A72A5F4606366B8C2D -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.17514_none_0d3757e79e6784d0\iaStorV.sys [2010.11.20 15:33:38 | 000,410,496 | ---- | M] (Intel Corporation) MD5=3DF4395A7CF8B7A72A5F4606366B8C2D -- C:\Windows\SysNative\DriverStore\FileRepository\iastorv.inf_amd64_neutral_668286aa35d55928\iaStorV.sys [2010.11.20 15:33:38 | 000,410,496 | ---- | M] (Intel Corporation) MD5=3DF4395A7CF8B7A72A5F4606366B8C2D -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.17514_none_0d3757e79e6784d0\iaStorV.sys [2011.03.11 08:19:16 | 000,410,496 | ---- | M] (Intel Corporation) MD5=5B3DE7208E5000D5B451B9D290D2579C -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.21680_none_0d714416b7c182d5\iaStorV.sys [2011.03.11 08:41:26 | 000,410,496 | ---- | M] (Intel Corporation) MD5=AAAF44DB3BD0B9D1FB6969B23ECC8366 -- C:\Windows\SysNative\drivers\iaStorV.sys [2011.03.11 08:41:26 | 000,410,496 | ---- | M] (Intel Corporation) MD5=AAAF44DB3BD0B9D1FB6969B23ECC8366 -- C:\Windows\SysNative\DriverStore\FileRepository\iastorv.inf_amd64_neutral_0bcee2057afcc090\iaStorV.sys [2011.03.11 08:41:26 | 000,410,496 | ---- | M] (Intel Corporation) MD5=AAAF44DB3BD0B9D1FB6969B23ECC8366 -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7601.17577_none_0cf9793d9e95787b\iaStorV.sys [2011.03.11 08:23:00 | 000,410,496 | ---- | M] (Intel Corporation) MD5=B75E45C564E944A2657167D197AB29DA -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7600.16778_none_0b141c81a16e25e6\iaStorV.sys [2011.03.11 08:25:49 | 000,410,496 | ---- | M] (Intel Corporation) MD5=BFDC9D75698800CFE4D1698BF2750EA2 -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7600.20921_none_0bccc8c8ba6985c1\iaStorV.sys [2009.07.14 03:48:04 | 000,410,688 | ---- | M] (Intel Corporation) MD5=D83EFB6FD45DF9D55E9A1AFC63640D50 -- C:\Windows\winsxs\amd64_iastorv.inf_31bf3856ad364e35_6.1.7600.16385_none_0b06441fa1790136\iaStorV.sys < MD5 for: NETLOGON.DLL > [2009.07.14 03:41:52 | 000,692,736 | ---- | M] (Microsoft Corporation) MD5=956D030D375F207B22FB111E06EF9C35 -- C:\Windows\winsxs\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7600.16385_none_59aca8ea51aaeefe\netlogon.dll [2010.11.20 15:27:22 | 000,695,808 | ---- | M] (Microsoft Corporation) MD5=AA339DD8BB128EF66660DFBBB59043D3 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_5bddbcb24e997298\netlogon.dll [2010.11.20 15:27:22 | 000,695,808 | ---- | M] (Microsoft Corporation) MD5=AA339DD8BB128EF66660DFBBB59043D3 -- C:\Windows\SysNative\netlogon.dll [2010.11.20 15:27:22 | 000,695,808 | ---- | M] (Microsoft Corporation) MD5=AA339DD8BB128EF66660DFBBB59043D3 -- C:\Windows\winsxs\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_5bddbcb24e997298\netlogon.dll [2010.11.20 14:20:28 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=C1809B9907ADEDAF16F50C894100883B -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\wow64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_6632670482fa3493\netlogon.dll [2010.11.20 14:20:28 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=C1809B9907ADEDAF16F50C894100883B -- C:\Windows\SysWOW64\netlogon.dll [2010.11.20 14:20:28 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=C1809B9907ADEDAF16F50C894100883B -- C:\Windows\winsxs\wow64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_6632670482fa3493\netlogon.dll [2009.07.14 03:16:02 | 000,563,712 | ---- | M] (Microsoft Corporation) MD5=EAA75D9000B71F10EEC04D2AE6C60E81 -- C:\Windows\winsxs\wow64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7600.16385_none_6401533c860bb0f9\netlogon.dll < MD5 for: NVSTOR.SYS > [2009.07.14 03:45:45 | 000,167,488 | ---- | M] (NVIDIA Corporation) MD5=477DC4D6DEB99BE37084C9AC6D013DA1 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7600.16385_none_95cfb4ced8afab0e\nvstor.sys [2011.03.11 08:23:06 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=6C1D5F70E7A6A3FD1C90D840EDC048B9 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7600.16778_none_95dd8d30d8a4cfbe\nvstor.sys [2011.03.11 08:25:53 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=AE274836BA56518E279087363A781214 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7600.20921_none_96963977f1a02f99\nvstor.sys [2011.03.11 08:19:21 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=D23C7E8566DA2B8A7C0DBBB761D54888 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.21680_none_983ab4c5eef82cad\nvstor.sys [2011.03.11 08:41:34 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=DAB0E87525C10052BF65F06152F37E4A -- C:\Windows\SysNative\drivers\nvstor.sys [2011.03.11 08:41:34 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=DAB0E87525C10052BF65F06152F37E4A -- C:\Windows\SysNative\DriverStore\FileRepository\nvraid.inf_amd64_neutral_0276fc3b3ea60d41\nvstor.sys [2011.03.11 08:41:34 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=DAB0E87525C10052BF65F06152F37E4A -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.17577_none_97c2e9ecd5cc2253\nvstor.sys [2010.11.20 15:33:48 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=F7CD50FE7139F07E77DA8AC8033D1832 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.17514_none_9800c896d59e2ea8\nvstor.sys [2010.11.20 15:33:48 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=F7CD50FE7139F07E77DA8AC8033D1832 -- C:\Windows\SysNative\DriverStore\FileRepository\nvraid.inf_amd64_neutral_dd659ed032d28a14\nvstor.sys [2010.11.20 15:33:48 | 000,166,272 | ---- | M] (NVIDIA Corporation) MD5=F7CD50FE7139F07E77DA8AC8033D1832 -- C:\Windows\winsxs\amd64_nvraid.inf_31bf3856ad364e35_6.1.7601.17514_none_9800c896d59e2ea8\nvstor.sys < MD5 for: SCECLI.DLL > [2009.07.14 03:16:13 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=26073302DAEA83CC5B944C546D6B47D2 -- C:\Windows\winsxs\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7600.16385_none_9e577e55272d37b4\scecli.dll [2009.07.14 03:41:53 | 000,232,448 | ---- | M] (Microsoft Corporation) MD5=398712DDDAEFB85EDF61DF6A07B65C79 -- C:\Windows\winsxs\amd64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7600.16385_none_9402d402f2cc75b9\scecli.dll [2010.11.20 14:21:04 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=8124944EC89D6A1815E4E53F5B96AAF4 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_a088921d241bbb4e\scecli.dll [2010.11.20 14:21:04 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=8124944EC89D6A1815E4E53F5B96AAF4 -- C:\Windows\SysWOW64\scecli.dll [2010.11.20 14:21:04 | 000,175,616 | ---- | M] (Microsoft Corporation) MD5=8124944EC89D6A1815E4E53F5B96AAF4 -- C:\Windows\winsxs\wow64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_a088921d241bbb4e\scecli.dll [2010.11.20 15:27:25 | 000,232,960 | ---- | M] (Microsoft Corporation) MD5=ED78427259134C63ED69804D2132B86C -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_9633e7caefbaf953\scecli.dll [2010.11.20 15:27:25 | 000,232,960 | ---- | M] (Microsoft Corporation) MD5=ED78427259134C63ED69804D2132B86C -- C:\Windows\SysNative\scecli.dll [2010.11.20 15:27:25 | 000,232,960 | ---- | M] (Microsoft Corporation) MD5=ED78427259134C63ED69804D2132B86C -- C:\Windows\winsxs\amd64_microsoft-windows-s..urationengineclient_31bf3856ad364e35_6.1.7601.17514_none_9633e7caefbaf953\scecli.dll < MD5 for: USER32.DLL > [2010.11.20 14:08:57 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=5E0DB2D8B2750543CD2EBB9EA8E6CDD3 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll [2010.11.20 14:08:57 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=5E0DB2D8B2750543CD2EBB9EA8E6CDD3 -- C:\Windows\SysWOW64\user32.dll [2010.11.20 14:08:57 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=5E0DB2D8B2750543CD2EBB9EA8E6CDD3 -- C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_35b31c02b85ccb6e\user32.dll [2009.07.14 03:41:56 | 001,008,640 | ---- | M] (Microsoft Corporation) MD5=72D7B3EA16946E8F0CF7458150031CC6 -- C:\Windows\winsxs\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_292d5de8870d85d9\user32.dll [2009.07.14 03:11:24 | 000,833,024 | ---- | M] (Microsoft Corporation) MD5=E8B0FFC209E504CB7E79FC24E6C085F0 -- C:\Windows\winsxs\wow64_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_3382083abb6e47d4\user32.dll [2010.11.20 15:27:27 | 001,008,128 | ---- | M] (Microsoft Corporation) MD5=FE70103391A64039A921DBFFF9C7AB1B -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_2b5e71b083fc0973\user32.dll [2010.11.20 15:27:27 | 001,008,128 | ---- | M] (Microsoft Corporation) MD5=FE70103391A64039A921DBFFF9C7AB1B -- C:\Windows\SysNative\user32.dll [2010.11.20 15:27:27 | 001,008,128 | ---- | M] (Microsoft Corporation) MD5=FE70103391A64039A921DBFFF9C7AB1B -- C:\Windows\winsxs\amd64_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_2b5e71b083fc0973\user32.dll < MD5 for: USERINIT.EXE > [2010.11.20 14:17:48 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=61AC3EFDFACFDD3F0F11DD4FD4044223 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_de3024012ff21116\userinit.exe [2010.11.20 14:17:48 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=61AC3EFDFACFDD3F0F11DD4FD4044223 -- C:\Windows\SysWOW64\userinit.exe [2010.11.20 14:17:48 | 000,026,624 | ---- | M] (Microsoft Corporation) MD5=61AC3EFDFACFDD3F0F11DD4FD4044223 -- C:\Windows\winsxs\x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_de3024012ff21116\userinit.exe [2009.07.14 03:14:43 | 000,026,112 | ---- | M] (Microsoft Corporation) MD5=6DE80F60D7DE9CE6B8C2DDFDF79EF175 -- C:\Windows\winsxs\x86_microsoft-windows-userinit_31bf3856ad364e35_6.1.7600.16385_none_dbff103933038d7c\userinit.exe [2009.07.14 03:39:48 | 000,030,208 | ---- | M] (Microsoft Corporation) MD5=6F8F1376A13114CC10C0E69274F5A4DE -- C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7600.16385_none_381dabbceb60feb2\userinit.exe [2010.11.20 15:25:24 | 000,030,720 | ---- | M] (Microsoft Corporation) MD5=BAFE84E637BF7388C96EF48D4D3FDD53 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_3a4ebf84e84f824c\userinit.exe [2010.11.20 15:25:24 | 000,030,720 | ---- | M] (Microsoft Corporation) MD5=BAFE84E637BF7388C96EF48D4D3FDD53 -- C:\Windows\SysNative\userinit.exe [2010.11.20 15:25:24 | 000,030,720 | ---- | M] (Microsoft Corporation) MD5=BAFE84E637BF7388C96EF48D4D3FDD53 -- C:\Windows\winsxs\amd64_microsoft-windows-userinit_31bf3856ad364e35_6.1.7601.17514_none_3a4ebf84e84f824c\userinit.exe < MD5 for: WININIT.EXE > [2009.07.14 03:39:52 | 000,129,024 | ---- | M] (Microsoft Corporation) MD5=94355C28C1970635A31B3FE52EB7CEBA -- C:\Windows\SysNative\wininit.exe [2009.07.14 03:39:52 | 000,129,024 | ---- | M] (Microsoft Corporation) MD5=94355C28C1970635A31B3FE52EB7CEBA -- C:\Windows\winsxs\amd64_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_8ce7aa761e01ad49\wininit.exe [2009.07.14 03:14:45 | 000,096,256 | ---- | M] (Microsoft Corporation) MD5=B5C5DCAD3899512020D135600129D665 -- C:\Windows\SysWOW64\wininit.exe [2009.07.14 03:14:45 | 000,096,256 | ---- | M] (Microsoft Corporation) MD5=B5C5DCAD3899512020D135600129D665 -- C:\Windows\winsxs\x86_microsoft-windows-wininit_31bf3856ad364e35_6.1.7600.16385_none_30c90ef265a43c13\wininit.exe < MD5 for: WINLOGON.EXE > [2010.11.20 15:25:30 | 000,390,656 | ---- | M] (Microsoft Corporation) MD5=1151B1BAA6F350B1DB6598E0FEA7C457 -- C:\Windows\SoftwareDistribution\Download\488053cdbca3231eeb2c2af7236d09ed\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7601.17514_none_cde90685eb910636\winlogon.exe [2010.11.20 15:25:30 | 000,390,656 | ---- | M] (Microsoft Corporation) MD5=1151B1BAA6F350B1DB6598E0FEA7C457 -- C:\Windows\SysNative\winlogon.exe [2010.11.20 15:25:30 | 000,390,656 | ---- | M] (Microsoft Corporation) MD5=1151B1BAA6F350B1DB6598E0FEA7C457 -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7601.17514_none_cde90685eb910636\winlogon.exe [2009.07.14 03:39:52 | 000,389,120 | ---- | M] (Microsoft Corporation) MD5=132328DF455B0028F13BF0ABEE51A63A -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.16385_none_cbb7f2bdeea2829c\winlogon.exe [2009.10.28 09:01:57 | 000,389,632 | ---- | M] (Microsoft Corporation) MD5=A93D41A4D4B0D91C072D11DD8AF266DE -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.20560_none_cc522fd507b468f8\winlogon.exe [2009.10.28 08:24:40 | 000,389,632 | ---- | M] (Microsoft Corporation) MD5=DA3E2A6FA9660CC75B471530CE88453A -- C:\Windows\winsxs\amd64_microsoft-windows-winlogon_31bf3856ad364e35_6.1.7600.16447_none_cbe534e7ee8042ad\winlogon.exe < MD5 for: WS2IFSL.SYS > [2009.07.14 02:10:33 | 000,021,504 | ---- | M] (Microsoft Corporation) MD5=6BCC1D7D2FD2453957C5479A32364E52 -- C:\Windows\SysNative\drivers\ws2ifsl.sys [2009.07.14 02:10:33 | 000,021,504 | ---- | M] (Microsoft Corporation) MD5=6BCC1D7D2FD2453957C5479A32364E52 -- C:\Windows\winsxs\amd64_microsoft-windows-w..rastructure-ws2ifsl_31bf3856ad364e35_6.1.7600.16385_none_ab7b927be17eace8\ws2ifsl.sys < %systemroot%\system32\drivers\*.sys /lockedfiles > < %systemroot%\System32\config\*.sav > < %systemroot%\*. /mp /s > < %systemroot%\system32\*.dll /lockedfiles > < > < End of report > Geändert von CrisJano (17.07.2012 um 12:34 Uhr) |
17.07.2012, 12:32 | #12 |
| Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log Sorry, Dopplung... Problem: Der Trojaner hat sich am 11.06. bei mir draufgespielt. Ergo: Vor über 30 Tagen. OTL scannt die Dateien, die bis vor max. 30 Tagen verändert wurden. Vorschlag: Soll ich dann einen "normalen" Scan durchführen mit der Einstellung 60 Tage? Oder reicht das so? |
18.07.2012, 11:13 | #13 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log Achso, danke für den Hinweis, mach mal Einstellung 90 Tage, ansonsten alles wie oben
__________________ Logfiles bitte immer in CODE-Tags posten |
18.07.2012, 13:22 | #14 |
| Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log kann es sein, dass es garnicht möglich ist, mit dem Quick-Scan die 90 Tage einzustellen? |
18.07.2012, 19:44 | #15 |
/// Winkelfunktion /// TB-Süch-Tiger™ | Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log Ja das ist möglich. Mach dann eben keinen QuickScan
__________________ Logfiles bitte immer in CODE-Tags posten |
Themen zu Windows Verschlüsselungstrojaner Malware + ESET online Scanner Log |
administrator, anti-malware, autostart, dateisystem, downloader, escan, explorer, forum, gelöscht, helper, heuristiks/extra, heuristiks/shuriken, java, java/agent.dm, java/agent.dp, java/agent.dt, java/trojandownloader.agent.me, log, mail, malware, malwarebytes, microsoft, online, problem, rojaner gefunden, scan, software, system, trojan.agent, trojaner, trojaner gefunden, variant, verschlüsselung, windows, windows verschlüsselungstrojaner, windows verschlüsserungs trojaner entschlüsseln? |