Code:
Alles auswählen Aufklappen ATTFilter
SUPERAntiSpyware Scan Log
hxxp://www.superantispyware.com
Generated 09/14/2010 at 10:05 PM
Application Version : 4.43.1000
Core Rules Database Version : 5506
Trace Rules Database Version: 3318
Scan type : Complete Scan
Total Scan Time : 00:35:31
Memory items scanned : 729
Memory threats detected : 1
Registry items scanned : 8682
Registry threats detected : 23
File items scanned : 18202
File threats detected : 10
Adware.HBHelper
C:\PROGRAM FILES\SPEEDBIT VIDEO DOWNLOADER\TOOLBAR\TBHELPER.DLL
C:\PROGRAM FILES\SPEEDBIT VIDEO DOWNLOADER\TOOLBAR\TBHELPER.DLL
HKLM\Software\Classes\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\InprocServer32
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\InprocServer32#ThreadingModel
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\ProgID
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\TypeLib
HKCR\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}\VersionIndependentProgID
HKCR\URLSearchHook.ToolbarURLSearchHook.1
HKCR\URLSearchHook.ToolbarURLSearchHook.1\CLSID
HKCR\URLSearchHook.ToolbarURLSearchHook
HKCR\URLSearchHook.ToolbarURLSearchHook\CLSID
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\0\win32
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\FLAGS
HKCR\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}\1.0\HELPDIR
Adware.Tracking Cookie
C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Cookies\sonja@weborama[2].txt
C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Cookies\sonja@atdmt[1].txt
C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Cookies\Low\sonja@doubleclick[2].txt
C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Cookies\Low\sonja@atdmt[2].txt
C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Cookies\Low\sonja@adserv-new.20six[1].txt
C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Cookies\sonja@bs.serving-sys[1].txt
C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Cookies\sonja@atdmt[2].txt
C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Cookies\sonja@serving-sys[2].txt
Browser Hijacker.Deskbar
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\ProxyStubClsid32
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib
HKCR\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}\TypeLib#Version
Adware.Vundo/Variant-MSFake
C:\USERS\SONJA\PROGRAMME\EMOTICONS.EXE