![]() |
|
Log-Analyse und Auswertung: Exploit.PDF-JS.Gen,Trojan.Win32.GenericBT&Win32.BackdoorPoison entdeckt und entfernt - LogfileWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() |
|
![]() | #1 | |
/// Winkelfunktion /// TB-Süch-Tiger™ ![]() ![]() ![]() ![]() ![]() ![]() | ![]() Exploit.PDF-JS.Gen,Trojan.Win32.GenericBT&Win32.BackdoorPoison entdeckt und entfernt - LogfileZitat:
Poste alle Details, v.a. die genauen Fundorte (Ordner-/Dateinamen)!
__________________ Logfiles bitte immer in CODE-Tags posten ![]() |
![]() | #2 | |
![]() | ![]() Exploit.PDF-JS.Gen,Trojan.Win32.GenericBT&Win32.BackdoorPoison entdeckt und entfernt - LogfileZitat:
![]() Hier die Log: Logfile created: 18.09.2010 00:29:29 Ad-Aware version: 8.3.3 Extended engine: 3 Extended engine version: 3.1.2770 User performing scan: Stan *********************** Definitions database information *********************** Lavasoft definition file: 150.91 Genotype definition file version: 2010/09/17 12:57:39 Extended engine definition file: 6889.0 ******************************** Scan results: ********************************* Scan profile name: Vollständiger Scan (ID: full) Objects scanned: 155075 Objects detected: 12 Type Detected ========================== Processes.......: 0 Registry entries: 0 Hostfile entries: 0 Files...........: 11 Folders.........: 0 LSPs............: 0 Cookies.........: 1 Browser hijacks.: 0 MRU objects.....: 0 Removed items: Description: Family Name: Cookies Engine: 1 Clean status: Success Item ID: 408875 Family ID: 0 Quarantined items: Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055934.exe Family Name: Trojan.Win32.Generic!BT Engine: 3 Clean status: Success Item ID: 1 Family ID: 0 MD5: a1e8edec7a5a53417e11e90427b2fee2 Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055935.exe Family Name: Trojan.Win32.Generic!BT Engine: 3 Clean status: Success Item ID: 1 Family ID: 0 MD5: 2f8b95d4d8d0bd722f122704ffdc3213 Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055936.exe Family Name: Trojan.Win32.Generic!BT Engine: 3 Clean status: Success Item ID: 1 Family ID: 0 MD5: 9594ed68335e2472785f6afcb4c9a4e6 Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055937.exe Family Name: Trojan.Win32.Generic!BT Engine: 3 Clean status: Success Item ID: 1 Family ID: 0 MD5: 759d94e657dfcdb68b6848989c396439 Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055938.exe Family Name: Trojan.Win32.Generic!BT Engine: 3 Clean status: Success Item ID: 1 Family ID: 0 MD5: e7b0e0c146b3e2116afdf51efa2b9050 Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055939.exe Family Name: Trojan.Win32.Generic!BT Engine: 3 Clean status: Success Item ID: 1 Family ID: 0 MD5: c65035c74f78a24ede26a12ddbb4b961 Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055940.exe Family Name: Trojan.Win32.Generic!BT Engine: 3 Clean status: Success Item ID: 1 Family ID: 0 MD5: da74d75607ba5d276b9d460f28c38e00 Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055941.exe Family Name: Trojan.Win32.Generic!BT Engine: 3 Clean status: Success Item ID: 1 Family ID: 0 MD5: 4cf61d89f4e476fdcd1e8897ba9b64fa Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055942.exe Family Name: Trojan.Win32.Generic!BT Engine: 3 Clean status: Success Item ID: 1 Family ID: 0 MD5: 340a85720b3eb8a0bdfbc20648cf2e27 Description: d:\system volume information\_restore{862bfd35-5ea0-47f6-b5b1-d342d0d7075a}\rp257\a0055943.exe Family Name: Win32.Backdoor.Poison Engine: 1 Clean status: Success Item ID: 0 Family ID: 1566 MD5: f9ef5c36a0842b53de150c8b7f50bca0 Description: g:\installationsdateien\installationsdateien\winrar340d.exe Family Name: Trojan.7 Engine: 3 Clean status: Success Item ID: 2 Family ID: 0 MD5: b8c8eb355c7ae3fae2c159232aec71c9 Scan and cleaning complete: Finished correctly after 7466 seconds *********************************** Settings *********************************** Scan profile: ID: full, enabled:1, value: Vollständiger Scan ID: folderstoscan, enabled:1, value: C:\,D:\,E:\,F:\,G:\ ID: useantivirus, enabled:1, value: true ID: sections, enabled:1 ID: scancriticalareas, enabled:1, value: true ID: scanrunningapps, enabled:1, value: true ID: scanregistry, enabled:1, value: true ID: scanlsp, enabled:1, value: true ID: scanads, enabled:1, value: true ID: scanhostsfile, enabled:1, value: true ID: scanmru, enabled:1, value: true ID: scanbrowserhijacks, enabled:1, value: true ID: scantrackingcookies, enabled:1, value: true ID: closebrowsers, enabled:1, value: false ID: filescanningoptions, enabled:1 ID: archives, enabled:1, value: true ID: onlyexecutables, enabled:1, value: false ID: skiplargerthan, enabled:1, value: 20480 ID: scanrootkits, enabled:1, value: true ID: rootkitlevel, enabled:1, value: mild, domain: medium,mild,strict ID: usespywareheuristics, enabled:1, value: true Scan global: ID: global, enabled:1 ID: addtocontextmenu, enabled:1, value: true ID: playsoundoninfection, enabled:1, value: false ID: soundfile, enabled:0, value: *to be filled in automatically*\alert.wav Scheduled scan settings: <Empty> Update settings: ID: updates, enabled:1 ID: launchthreatworksafterscan, enabled:1, value: normal, domain: normal,off,silently ID: licenseandinfo, enabled:1, value: downloadandinstall, domain: dontcheck,downloadandinstall ID: schedules, enabled:1, value: true ID: updatedaily1, enabled:1, value: Daily 1 ID: time, enabled:1, value: Wed Sep 15 18:49:00 2010 ID: frequency, enabled:1, value: daily, domain: daily,monthly,once,systemstart,weekly ID: weekdays, enabled:1 ID: monday, enabled:1, value: false ID: tuesday, enabled:1, value: false ID: wednesday, enabled:1, value: false ID: thursday, enabled:1, value: false ID: friday, enabled:1, value: false ID: saturday, enabled:1, value: false ID: sunday, enabled:1, value: false ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31 ID: scanprofile, enabled:1, value: ID: auto_deal_with_infections, enabled:1, value: false ID: updatedaily2, enabled:1, value: Daily 2 ID: time, enabled:1, value: Wed Sep 15 00:49:00 2010 ID: frequency, enabled:1, value: daily, domain: daily,monthly,once,systemstart,weekly ID: weekdays, enabled:1 ID: monday, enabled:1, value: false ID: tuesday, enabled:1, value: false ID: wednesday, enabled:1, value: false ID: thursday, enabled:1, value: false ID: friday, enabled:1, value: false ID: saturday, enabled:1, value: false ID: sunday, enabled:1, value: false ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31 ID: scanprofile, enabled:1, value: ID: auto_deal_with_infections, enabled:1, value: false ID: updatedaily3, enabled:1, value: Daily 3 ID: time, enabled:1, value: Wed Sep 15 06:49:00 2010 ID: frequency, enabled:1, value: daily, domain: daily,monthly,once,systemstart,weekly ID: weekdays, enabled:1 ID: monday, enabled:1, value: false ID: tuesday, enabled:1, value: false ID: wednesday, enabled:1, value: false ID: thursday, enabled:1, value: false ID: friday, enabled:1, value: false ID: saturday, enabled:1, value: false ID: sunday, enabled:1, value: false ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31 ID: scanprofile, enabled:1, value: ID: auto_deal_with_infections, enabled:1, value: false ID: updatedaily4, enabled:1, value: Daily 4 ID: time, enabled:1, value: Wed Sep 15 12:49:00 2010 ID: frequency, enabled:1, value: daily, domain: daily,monthly,once,systemstart,weekly ID: weekdays, enabled:1 ID: monday, enabled:1, value: false ID: tuesday, enabled:1, value: false ID: wednesday, enabled:1, value: false ID: thursday, enabled:1, value: false ID: friday, enabled:1, value: false ID: saturday, enabled:1, value: false ID: sunday, enabled:1, value: false ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31 ID: scanprofile, enabled:1, value: ID: auto_deal_with_infections, enabled:1, value: false ID: updateweekly1, enabled:1, value: Weekly ID: time, enabled:1, value: Wed Sep 15 18:49:00 2010 ID: frequency, enabled:1, value: weekly, domain: daily,monthly,once,systemstart,weekly ID: weekdays, enabled:1 ID: monday, enabled:1, value: false ID: tuesday, enabled:1, value: false ID: wednesday, enabled:1, value: true ID: thursday, enabled:1, value: false ID: friday, enabled:1, value: false ID: saturday, enabled:1, value: true ID: sunday, enabled:1, value: false ID: monthly, enabled:1, value: 1, minvalue: 1, maxvalue: 31 ID: scanprofile, enabled:1, value: ID: auto_deal_with_infections, enabled:1, value: false ID: deffiles, enabled:1, value: downloadandinstall, domain: dontcheck,downloadandinstall Appearance settings: ID: appearance, enabled:1 ID: skin, enabled:1, value: default.egl, reglocation: HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Resource ID: showtrayicon, enabled:1, value: true ID: language, enabled:1, value: de, reglocation: HKEY_LOCAL_MACHINE\SOFTWARE\Lavasoft\Ad-Aware\Language ID: autoentertainmentmode, enabled:1, value: true ID: guimode, enabled:1, value: mode_simple, domain: mode_advanced,mode_simple Realtime protection settings: ID: realtime, enabled:1 ID: infomessages, enabled:1, value: onlyimportant, domain: display,dontnotify,onlyimportant ID: layers, enabled:1 ID: useantivirus, enabled:1, value: true ID: usespywareheuristics, enabled:1, value: true ID: modules, enabled:1 ID: processprotection, enabled:1, value: true ID: onaccessprotection, enabled:1, value: false ID: registryprotection, enabled:1, value: true ID: networkprotection, enabled:1, value: true ****************************** System information ****************************** Computer name: STANE Processor name: Intel(R) Core(TM)2 CPU 6400 @ 2.13GHz Processor identifier: x86 Family 6 Model 15 Stepping 6 Processor speed: ~2133MHZ Raw info: processorarchitecture 0, processortype 586, processorlevel 6, processor revision 3846, number of processors 2, processor features: [MMX,SSE,SSE2] Physical memory available: 926347264 bytes Physical memory total: 2146938880 bytes Virtual memory available: 1769267200 bytes Virtual memory total: 2147352576 bytes Memory load: 56% Microsoft Windows XP Home Edition Service Pack 3 (build 2600) Windows startup mode: Running processes: PID: 616 name: \SystemRoot\System32\smss.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 680 name: \??\D:\WINDOWS\system32\csrss.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 708 name: \??\D:\WINDOWS\system32\winlogon.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 752 name: D:\WINDOWS\system32\services.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 764 name: D:\WINDOWS\system32\lsass.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 932 name: D:\WINDOWS\system32\svchost.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 1000 name: D:\WINDOWS\system32\svchost.exe owner: NETZWERKDIENST domain: NT-AUTORITÄT PID: 1096 name: D:\WINDOWS\System32\svchost.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 1128 name: D:\WINDOWS\system32\svchost.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 1208 name: D:\WINDOWS\system32\svchost.exe owner: NETZWERKDIENST domain: NT-AUTORITÄT PID: 1300 name: D:\WINDOWS\system32\svchost.exe owner: LOKALER DIENST domain: NT-AUTORITÄT PID: 1436 name: D:\Programme\AVG\AVG9\avgchsvx.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 1444 name: D:\Programme\AVG\AVG9\avgrsx.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 1552 name: D:\Programme\AVG\AVG9\avgcsrvx.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 1884 name: D:\WINDOWS\system32\brsvc01a.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 1904 name: D:\WINDOWS\system32\brss01a.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 1900 name: D:\WINDOWS\system32\spoolsv.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 328 name: D:\WINDOWS\Explorer.EXE owner: Stan domain: STANE PID: 464 name: D:\WINDOWS\system32\rundll32.exe owner: Stan domain: STANE PID: 480 name: D:\Programme\Creative\SBAudigy4\DVDAudio\CTDVDDET.EXE owner: Stan domain: STANE PID: 488 name: D:\Programme\Creative\SBAudigy4\Surround Mixer\CTSysVol.exe owner: Stan domain: STANE PID: 496 name: D:\Programme\Creative\Shared Files\Module Loader\DLLML.exe owner: Stan domain: STANE PID: 504 name: D:\WINDOWS\CTHELPER.EXE owner: Stan domain: STANE PID: 532 name: D:\Programme\iTunes\iTunesHelper.exe owner: Stan domain: STANE PID: 544 name: D:\Programme\Gemeinsame Dateien\Java\Java Update\jusched.exe owner: Stan domain: STANE PID: 560 name: D:\PROGRA~1\AVG\AVG9\avgtray.exe owner: Stan domain: STANE PID: 604 name: D:\Programme\Gemeinsame Dateien\Adobe\ARM\1.0\AdobeARM.exe owner: Stan domain: STANE PID: 668 name: D:\Programme\HP\HP Software Update\HPWuSchd2.exe owner: Stan domain: STANE PID: 684 name: D:\Programme\Messenger\msmsgs.exe owner: Stan domain: STANE PID: 828 name: D:\Programme\RocketDock\RocketDock.exe owner: Stan domain: STANE PID: 1232 name: D:\Programme\HP\Digital Imaging\bin\hpqtra08.exe owner: Stan domain: STANE PID: 1252 name: D:\Programme\Logitech\SetPoint\SetPoint.exe owner: Stan domain: STANE PID: 1856 name: D:\Programme\Gemeinsame Dateien\Logishrd\KHAL2\KHALMNPR.EXE owner: Stan domain: STANE PID: 2408 name: D:\WINDOWS\system32\svchost.exe owner: LOKALER DIENST domain: NT-AUTORITÄT PID: 2444 name: D:\Programme\Gemeinsame Dateien\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 2456 name: D:\Programme\AVG\AVG9\avgwdsvc.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 2492 name: D:\Programme\Bonjour\mDNSResponder.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 2536 name: D:\WINDOWS\system32\svchost.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 2656 name: D:\Programme\Java\jre6\bin\jqs.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 2812 name: D:\WINDOWS\System32\svchost.exe owner: LOKALER DIENST domain: NT-AUTORITÄT PID: 2832 name: D:\WINDOWS\system32\nvsvc32.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 2900 name: D:\WINDOWS\System32\svchost.exe owner: LOKALER DIENST domain: NT-AUTORITÄT PID: 3192 name: D:\Programme\PostgreSQL\8.4\bin\pg_ctl.exe owner: postgres domain: STANE PID: 3268 name: D:\WINDOWS\system32\svchost.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 3296 name: D:\Programme\AVG\AVG9\avgnsx.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 3304 name: D:\Programme\AVG\AVG9\avgemc.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 3380 name: D:\Programme\PostgreSQL\8.4\bin\postgres.exe owner: postgres domain: STANE PID: 3604 name: D:\Programme\AVG\AVG9\avgcsrvx.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 3752 name: D:\Programme\PostgreSQL\8.4\bin\postgres.exe owner: postgres domain: STANE PID: 3960 name: D:\Programme\PostgreSQL\8.4\bin\postgres.exe owner: postgres domain: STANE PID: 3968 name: D:\Programme\PostgreSQL\8.4\bin\postgres.exe owner: postgres domain: STANE PID: 3976 name: D:\Programme\PostgreSQL\8.4\bin\postgres.exe owner: postgres domain: STANE PID: 3984 name: D:\Programme\PostgreSQL\8.4\bin\postgres.exe owner: postgres domain: STANE PID: 1336 name: D:\Programme\iPod\bin\iPodService.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 3440 name: D:\WINDOWS\system32\wbem\wmiapsrv.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 3876 name: D:\WINDOWS\System32\alg.exe owner: LOKALER DIENST domain: NT-AUTORITÄT PID: 3816 name: D:\Programme\HP\Digital Imaging\bin\hpqSTE08.exe owner: Stan domain: STANE PID: 4080 name: D:\Programme\HP\Digital Imaging\bin\hpqbam08.exe owner: Stan domain: STANE PID: 4360 name: D:\Programme\HP\Digital Imaging\bin\hpqgpc01.exe owner: Stan domain: STANE PID: 6076 name: D:\Programme\Gemeinsame Dateien\Java\Java Update\jucheck.exe owner: Stan domain: STANE PID: 5632 name: D:\Programme\Mozilla Firefox\firefox.exe owner: Stan domain: STANE PID: 4736 name: D:\Programme\HP\Digital Imaging\Smart Web Printing\hpswp_clipbook.exe owner: Stan domain: STANE PID: 5004 name: D:\Programme\Mozilla Firefox\plugin-container.exe owner: Stan domain: STANE PID: 736 name: D:\Programme\Lavasoft\Ad-Aware\AAWService.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 5756 name: D:\Programme\Lavasoft\Ad-Aware\Ad-Aware.exe owner: Stan domain: STANE PID: 5168 name: D:\WINDOWS\system32\wbem\unsecapp.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 1036 name: D:\WINDOWS\system32\wbem\wmiprvse.exe owner: SYSTEM domain: NT-AUTORITÄT PID: 2044 name: D:\Programme\Lavasoft\Ad-Aware\AAWTray.exe owner: Stan domain: STANE Startup items: Name: PostBootReminder imagepath: {7849596a-48ea-486e-8937-a2a3009f31a9} Name: CDBurn imagepath: {fbeb8a05-beee-4442-804e-409d6c4515e9} Name: WebCheck imagepath: {E6FB5E20-DE35-11CF-9C87-00AA005127ED} Name: SysTray imagepath: {35CEC8A3-2BE6-11D2-8773-92E220524153} Name: WPDShServiceObj imagepath: {AAA288BA-9A4C-45B0-95D7-94D524869DB5} Name: Logitech Hardware Abstraction Layer imagepath: KHALMNPR.EXE Name: NvCplDaemon imagepath: RUNDLL32.EXE D:\WINDOWS\system32\NvCpl.dll,NvStartup Name: nwiz imagepath: nwiz.exe /install Name: NvMediaCenter imagepath: RUNDLL32.EXE D:\WINDOWS\system32\NvMcTray.dll,NvTaskbarInit Name: GBB36X Configure imagepath: D:\WINDOWS\system32\JMRaidTool.exe boot Name: CTDVDDET imagepath: D:\Programme\Creative\SBAudigy4\DVDAudio\CTDVDDET.EXE Name: CTSysVol imagepath: D:\Programme\Creative\SBAudigy4\Surround Mixer\CTSysVol.exe /r Name: CTFMON.EXE imagepath: D:\WINDOWS\system32\CTFMON.EXE Name: {438755C2-A8BA-11D1-B96B-00A0C90312E1} imagepath: Browseui preloader Name: {8C7461EF-2B13-11d2-BE35-3078302C2030} imagepath: Component Categories cache daemon Name: imagepath: D:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\desktop.ini Name: location: D:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\HP Digital Imaging Monitor.lnk imagepath: D:\Programme\HP\Digital Imaging\bin\hpqtra08.exe Name: location: D:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\Logitech SetPoint.lnk imagepath: D:\Programme\Logitech\SetPoint\SetPoint.exe Name: imagepath: D:\WINDOWS\system32\config\systemprofile\Startmenü\Programme\Autostart\desktop.ini Bootexecute items: Name: imagepath: autocheck autochk * Name: imagepath: lsdelete Running services: Name: ALG displayname: Gatewaydienst auf Anwendungsebene Name: Apple Mobile Device displayname: Apple Mobile Device Name: AudioSrv displayname: Windows Audio Name: avg9emc displayname: AVG Free E-mail Scanner Name: avg9wd displayname: AVG Free WatchDog Name: BITS displayname: Intelligenter Hintergrundübertragungsdienst Name: Bonjour Service displayname: Bonjour-Dienst Name: Brother XP spl Service displayname: BrSplService Name: CryptSvc displayname: Kryptografiedienste Name: DcomLaunch displayname: DCOM-Server-Prozessstart Name: Dhcp displayname: DHCP-Client Name: Dnscache displayname: DNS-Client Name: ERSvc displayname: Fehlerberichterstattungsdienst Name: Eventlog displayname: Ereignisprotokoll Name: EventSystem displayname: COM+-Ereignissystem Name: FastUserSwitchingCompatibility displayname: Kompatibilität für schnelle Benutzerumschaltung Name: helpsvc displayname: Hilfe und Support Name: HidServ displayname: HID Input Service Name: hpqcxs08 displayname: hpqcxs08 Name: hpqddsvc displayname: HP CUE DeviceDiscovery Service Name: iPod Service displayname: iPod-Dienst Name: JavaQuickStarterService displayname: Java Quick Starter Name: LanmanServer displayname: Server Name: lanmanworkstation displayname: Arbeitsstationsdienst Name: Lavasoft Ad-Aware Service displayname: Lavasoft Ad-Aware Service Name: LmHosts displayname: TCP/IP-NetBIOS-Hilfsprogramm Name: Net Driver HPZ12 displayname: Net Driver HPZ12 Name: Netman displayname: Netzwerkverbindungen Name: Nla displayname: NLA (Network Location Awareness) Name: NVSvc displayname: NVIDIA Display Driver Service Name: PlugPlay displayname: Plug & Play Name: Pml Driver HPZ12 displayname: Pml Driver HPZ12 Name: PolicyAgent displayname: IPSEC-Dienste Name: postgresql-8.4 displayname: PostgreSQL Server 8.4 Name: ProtectedStorage displayname: Geschützter Speicher Name: RasMan displayname: RAS-Verbindungsverwaltung Name: RpcSs displayname: Remoteprozeduraufruf (RPC) Name: SamSs displayname: Sicherheitskontenverwaltung Name: Schedule displayname: Taskplaner Name: seclogon displayname: Sekundäre Anmeldung Name: SENS displayname: Systemereignisbenachrichtigung Name: SharedAccess displayname: Windows-Firewall/Gemeinsame Nutzung der Internetverbindung Name: ShellHWDetection displayname: Shellhardwareerkennung Name: Spooler displayname: Druckwarteschlange Name: srservice displayname: Systemwiederherstellungsdienst Name: SSDPSRV displayname: SSDP-Suchdienst Name: stisvc displayname: Windows-Bilderfassung (WIA) Name: TapiSrv displayname: Telefonie Name: TermService displayname: Terminaldienste Name: Themes displayname: Designs Name: TrkWks displayname: Überwachung verteilter Verknüpfungen (Client) Name: W32Time displayname: Windows-Zeitgeber Name: WebClient displayname: WebClient Name: winmgmt displayname: Windows-Verwaltungsinstrumentation Name: WmiApSrv displayname: WMI-Leistungsadapter Name: wscsvc displayname: Sicherheitscenter Name: wuauserv displayname: Automatische Updates Name: WudfSvc displayname: Windows Driver Foundation - User-mode Driver Framework Name: WZCSVC displayname: Konfigurationsfreie drahtlose Verbindung |
![]() |
Themen zu Exploit.PDF-JS.Gen,Trojan.Win32.GenericBT&Win32.BackdoorPoison entdeckt und entfernt - Logfile |
ad-aware, adobe, avg, avg free, bho, bonjour, converter, e-mail, einstellungen, firefox, hijack, hijackthis, hkus\s-1-5-18, internet, internet explorer, log in, logfile, mozilla, mp3, plug-in, rundll, scan, senden, server, software, system, viren, windows, windows xp |