![]() |
Mich hat es auch erwischt mit Nail.exe hab hier endlich mal etwas Hilfe gesehen und hab auch so eine Hijack-log-datei erstellt. hab die nail.exe gelöscht und in Papierkorb auch habe sie unter G: gefunden. 2 weiter sind in Qarantäne in AnitivirGuard drinnen (SVCPROC.exe+DRPMON.dll) Hier mein Log-File Logfile of HijackThis v1.99.1 Scan saved at 23:23:23, on 28.05.2005 Platform: Windows XP SP1 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106) Running processes: G:\WINDOWS\System32\smss.exe G:\WINDOWS\system32\winlogon.exe G:\WINDOWS\system32\services.exe G:\WINDOWS\system32\lsass.exe G:\WINDOWS\system32\svchost.exe G:\WINDOWS\System32\svchost.exe G:\WINDOWS\system32\spoolsv.exe G:\WINDOWS\Explorer.exe G:\Programme\AVPersonal\AVGUARD.EXE G:\Programme\Gemeinsame Dateien\AOL\ACS\AOLAcsd.exe G:\Programme\AVPersonal\AVWUPSRV.EXE G:\PROGRA~1\CACHEM~1\CachemanXP.exe G:\WINDOWS\System32\CTSvcCDA.exe G:\WINDOWS\SYSTEM32\GEARSEC.EXE G:\WINDOWS\System32\nvsvc32.exe G:\WINDOWS\System32\svchost.exe G:\WINDOWS\System32\devldr32.exe G:\Programme\AVPersonal\AVGNT.EXE D:\programme\steam\steam.exe G:\Programme\AOL 9.0\waol.exe G:\Programme\AOL 9.0\shellmon.exe G:\Programme\Gemeinsame Dateien\Aol\aoltpspd.exe G:\Programme\Trojancheck 6\tcguard.exe D:\Lili\yahoo\Messenger\YPager.exe G:\Programme\MSN Apps\Updater\01.02.3000.1001\de\msnappau.exe G:\Programme\WinSweep\WSPopup.exe G:\Programme\MSN Messenger\msnmsgr.exe D:\Software\Wincomander\WINCMD400\WINCMD32.EXE G:\DOKUME~1\ASSSSS~1\LOKALE~1\Temp\$wc\HIJACK~1.EXE R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://213.159.117.134/index.php R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://213.159.117.134/index.php R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://homepage.com%00@www.e-finder.cc/search/ (obfuscated) R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://213.159.117.134/index.php R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = http://213.159.117.134/index.php R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = http://213.159.117.134/index.php R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Anni is da R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = file://G:\Programme\WinSweep\ws.js F2 - REG:system.ini: Shell=Explorer.exe G:\WINDOWS\Nail.exe O1 - Hosts: 69.50.188.82 yahoo.com O1 - Hosts: 69.50.188.82 askjeeves.com O1 - Hosts: 69.50.188.82 www.askjeeves.com O1 - Hosts: 69.50.188.82 www.directhit.com O1 - Hosts: 69.50.188.82 directhit.com O1 - Hosts: 69.50.188.82 www.excite.com O1 - Hosts: 69.50.188.82 excite.com O1 - Hosts: 69.50.188.82 www.alltheweb.com O1 - Hosts: 69.50.188.82 go.com O1 - Hosts: 69.50.188.82 www.go.com O1 - Hosts: 69.50.188.82 goto.com O1 - Hosts: 69.50.188.82 www.goto.com O1 - Hosts: 69.50.188.82 lycos.com O1 - Hosts: 69.50.188.82 dmoz.org O2 - BHO: Yahoo! Companion BHO - {02478D38-C3F9-4efb-9B51-7695ECA05670} - D:\LILI\yahoo\COMPAN~1\INSTALLS\cpn\ycomp5_5_7_0.dll O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - G:\Programme\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll O2 - BHO: RsyncHlpr Class - {16B238D5-80DE-47CE-8F17-B3ECE2C2248D} - G:\WINDOWS\System32\rsyncmon.dll O2 - BHO: ShprRprts - {2A8A997F-BB9F-48F6-AA2B-2762D50F9289} - G:\Programme\ShopperReports\Bin\1.0.0.1\SmrtShpr.dll O2 - BHO: BolgerObj Class - {302A3240-4805-4a34-97D7-1645A0B08410} - G:\WINDOWS\Bolger.dll O2 - BHO: (no name) - {3434911C-5EA9-41B4-188E-EE7422C38E13} - (no file) O2 - BHO: ohb - {4D568F0F-8AC9-40AB-88B7-415134C78777} - G:\WINDOWS\System32\winb2s32.dll O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - G:\PROGRA~1\SPYBOT~1\SDHelper.dll O2 - BHO: UberButton Class - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Lili\yahoo\Common\yiesrvc.dll O2 - BHO: YahooTaggedBM Class - {65D886A2-7CA7-479B-BB95-14D1EFB7946A} - D:\Lili\yahoo\Common\YIeTagBm.dll O2 - BHO: ST - {9394EDE7-C8B5-483E-8773-474BF36AF6E4} - G:\Programme\MSN Apps\ST\01.03.0000.1005\en-xu\stmain.dll O2 - BHO: MSNToolBandBHO - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - G:\Programme\MSN Apps\MSN Toolbar\01.02.4000.1001\de\msntb.dll O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - G:\WINDOWS\System32\msdxm.ocx O3 - Toolbar: (no name) - {6FEA1108-02DF-0FF0-2BDE-5D0AB02931B5} - (no file) O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - D:\LILI\yahoo\COMPAN~1\INSTALLS\cpn\ycomp5_5_7_0.dll O3 - Toolbar: &WINSWEEP Toolbar - {E915E62E-41DA-40D0-8106-3438B4D24394} - G:\Programme\WinSweep\SurfBar.dll O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - G:\Programme\MSN Apps\MSN Toolbar\01.02.4000.1001\de\msntb.dll O3 - Toolbar: Begin2Search.com Bar - {52FE5233-367C-4EFB-BDD7-0BE4D212C107} - G:\WINDOWS\System32\winb2s32.dll O4 - HKLM\..\Run: [UpdReg] G:\WINDOWS\Updreg.exe O4 - HKLM\..\Run: [nwiz] nwiz.exe /install O4 - HKLM\..\Run: [RSync] G:\WINDOWS\System32\netsync.exe O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE G:\WINDOWS\System32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [AVGCtrl] G:\Programme\AVPersonal\AVGNT.EXE /min O4 - HKLM\..\Run: [fiookh] g:\windows\system32\rkxaxk.exe O4 - HKCU\..\Run: [Steam] "d:\programme\steam\steam.exe" -silent O4 - HKCU\..\Run: [Yahoo! Pager] "D:\Lili\yahoo\Messenger\ypager.exe" -quiet O8 - Extra context menu item: &Search - http://bar.mywebsearch.com/menusearch.html?p=ZS O8 - Extra context menu item: &Yahoo! Search - file:///D:\Lili\yahoo\Common/ycsrch.htm O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://G:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000 O8 - Extra context menu item: Yahoo! &Dictionary - file:///D:\Lili\yahoo\Common/ycdict.htm O8 - Extra context menu item: Yahoo! &Maps - file:///D:\Lili\yahoo\Common/ycmap.htm O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Lili\yahoo\Common\yiesrvc.dll O9 - Extra button: 50 FREE MP3s! - {686C970F-1D7D-4469-85D1-4B35763B56CC} - http://www.emusic.com?fref=149133 (file missing) O9 - Extra button: ShopperReports - Compare travel rates - {946B3E9E-E21A-49c8-9F63-900533FAFE14} - G:\Programme\ShopperReports\Bin\1.0.0.1\SmrtShpr.dll O9 - Extra button: ICQ 4.1 - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - G:\Programme\ICQLite\ICQLite.exe O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - G:\Programme\ICQLite\ICQLite.exe O9 - Extra button: Voiceglo directory - {C9B8ABB6-1CC3-4957-9CA3-053036B2EE3A} - G:\Dokumente und Einstellungen\All Users\Desktop\Glophone.lnk (file missing) O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - G:\WINDOWS\System32\Shdocvw.dll O9 - Extra button: ShopperReports - Compare product prices - {E77EDA01-3C56-4a96-8D08-02B42891C169} - G:\Programme\ShopperReports\Bin\1.0.0.1\SmrtShpr.dll O10 - Broken Internet access because of LSP provider 'rpc32vm.dll' missing O15 - Trusted Zone: *.blazefind.com O15 - Trusted Zone: *.clickspring.net O15 - Trusted Zone: *.flingstone.com O15 - Trusted Zone: *.mt-download.com O15 - Trusted Zone: *.my-internet.info O15 - Trusted Zone: *.searchbarcash.com O15 - Trusted Zone: *.searchmiracle.com O15 - Trusted Zone: *.skoobidoo.com O15 - Trusted Zone: *.slotch.com O15 - Trusted Zone: *.slotchbar.com O15 - Trusted Zone: *.windupdates.com O15 - Trusted Zone: *.xxxtoolbar.com O15 - Trusted Zone: *.ysbweb.com O15 - Trusted Zone: *.blazefind.com (HKLM) O15 - Trusted Zone: *.clickspring.net (HKLM) O15 - Trusted Zone: *.flingstone.com (HKLM) O15 - Trusted Zone: *.mt-download.com (HKLM) O15 - Trusted Zone: *.my-internet.info (HKLM) O15 - Trusted Zone: *.searchbarcash.com (HKLM) O15 - Trusted Zone: *.searchmiracle.com (HKLM) O15 - Trusted Zone: *.skoobidoo.com (HKLM) O15 - Trusted Zone: *.slotch.com (HKLM) O15 - Trusted Zone: *.slotchbar.com (HKLM) O15 - Trusted Zone: *.windupdates.com (HKLM) O15 - Trusted Zone: *.xxxtoolbar.com (HKLM) O15 - Trusted Zone: *.ysbweb.com (HKLM) O15 - Trusted IP range: 67.19.178.84 O15 - Trusted IP range: 67.19.178.84 (HKLM) O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - http://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - http://ak.imgfarm.com/images/nocache/funwebproducts/ei-2/SmileyCentralFWBInitialSetup1.0.0.8-2.cab O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - http://messenger.zone.msn.com/binary/MineSweeper.cab28177.cab O16 - DPF: {3EB4F9EA-51A6-48DA-846A-0D69DCBA39EF} (DownloadManager Control) - http://download.akamaitools.com.edgesuite.net/dlmanager/live/code/IE_1070/DownloadManager.cab O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - http://tools.ebayimg.com/eps/wl/activex/EPUWALControl_v1-0-3-17.cab O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - http://spaces.msn.com//PhotoUpload/MsnPUpld.cab O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - http://messenger.zone.msn.com/binary/MessengerStatsClient.cab O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - http://messenger.msn.com/download/msnmessengersetupdownloader.cab O16 - DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} - http://us.dl1.yimg.com/download.yahoo.com/dl/installs/suite/yautocomplete.cab O16 - DPF: {CE69F98F-2AF3-4306-BAC6-A79070EDA1B4} (Zylom Loader Object) - http://eu.download.games.yahoo.com/zylom/activex/zylomloader.cab O16 - DPF: {DA511858-B44C-439E-A0EA-704ED20035E7} (EphoxEditLive4.EditLive) - http://www.beepworld.de/hp/activexeditor/editlive4.cab O16 - DPF: {EF99BD32-C1FB-11D2-892F-0090271D4F88} (&Yahoo! Companion) - http://us.dl1.yimg.com/download.companion.yahoo.com/dl/toolbar/yiebio5_3_18_0.cab O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - http://messenger.zone.msn.com/binary/SolitaireShowdown.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{97CE0744-DA8D-4D8A-A379-50F69AEACB52}: NameServer = 205.188.146.145 O23 - Service: AntiVir Service (AntiVirService) - H+BEDV Datentechnik GmbH - G:\Programme\AVPersonal\AVGUARD.EXE O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - G:\Programme\Gemeinsame Dateien\AOL\ACS\AOLAcsd.exe O23 - Service: AntiVir Update (AVWUpSrv) - H+BEDV Datentechnik GmbH, Germany - G:\Programme\AVPersonal\AVWUPSRV.EXE O23 - Service: CachemanXP (CachemanXPService) - OuterTechnologies - G:\PROGRA~1\CACHEM~1\CachemanXP.exe O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - G:\WINDOWS\System32\CTSvcCDA.exe O23 - Service: GEARSecurity - GEAR Software - G:\WINDOWS\SYSTEM32\GEARSEC.EXE O23 - Service: McAfee Firewall - Unknown owner - G:\Programme\McAfee\McAfee Firewall\CPD.EXE" /SERVICE (file missing) O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - G:\WINDOWS\System32\nvsvc32.exe O23 - Service: System Startup Service (SvcProc) - Unknown owner - G:\WINDOWS\svcproc.exe (file missing) :heulen: danke mal für Hilfe!!! Anmerkung: Aktive Links editiert. Bitte zukünftig beachten: Posten von HijackThis-Logs Gruß, Lutz |
HI, Dein System ist ziemlich verseucht. Um feststellen zu können, ob es sich überhaupt rentiert zu bereinigen oder ob das Neuaufsetzen sinnvoller ist, bitte mal folgendes bei Jotti online scannen lasen und das Ergebnis reinposten: G:\WINDOWS\System32\rsyncmon.dll G:\WINDOWS\Bolger.dll g:\windows\system32\rkxaxk.exe cacatoa |
So ich habe das mal gemacht die 3.datei g:\windows\system32\rkxaxk.exe find ich nicht..obwohl es der Trojancheck6 Guard auch anzeigt Datei: rsyncmon.dll Status: INFIZIERT/MALWARE (Anmerkung: Es wurde nur nicht-destruktive Malware gefunden. Obwohl diese Art von Malware lästig sein kann, werden die Ergebnisse nicht in der Datenbank gespeichert.) Entdeckte Packprogramme: - AntiVir Keine Viren gefunden Avast Win32:Adan-013 gefunden AVG Antivirus Keine Viren gefunden BitDefender Keine Viren gefunden ClamAV Keine Viren gefunden Dr.Web Keine Viren gefunden F-Prot Antivirus Keine Viren gefunden Fortinet Adware/Safesurf.DLL gefunden Kaspersky Anti-Virus not-a-virus:AdWare.SafeSurfing.g gefunden mks_vir Keine Viren gefunden NOD32 Keine Viren gefunden Norman Virus Control Keine Viren gefunden VBA32 Keine Viren gefunden Datei: Bolger.dll Status: INFIZIERT/MALWARE (Anmerkung: diese Datei wurde bereits vorher gescannt. Die Scanergebnisse werden daher nicht in der Datenbank gespeichert.) (Anmerkung: Es wurde nur nicht-destruktive Malware gefunden. Obwohl diese Art von Malware lästig sein kann, werden die Ergebnisse nicht in der Datenbank gespeichert.) Entdeckte Packprogramme: - AntiVir Keine Viren gefunden Avast Win32:Bolger gefunden AVG Antivirus Keine Viren gefunden BitDefender Keine Viren gefunden ClamAV Keine Viren gefunden Dr.Web not a virus Adware.BetterInternet gefunden F-Prot Antivirus Keine Viren gefunden Fortinet Adware/Abetterintrnt gefunden Kaspersky Anti-Virus not-a-virus:AdWare.BetterInternet gefunden mks_vir .Betterinternet.J gefunden NOD32 Keine Viren gefunden Norman Virus Control W32/BetterInternet gefunden VBA32 AdWare.BetterInternet gefunden |
Hi, die Datei ist da: Linke Maustaste Arbeitsplatz, Extras, Ordneroptionen, Ansicht, hier: Haken weg bei: geschützte Systemdateien ausblenden Haken hin bei: Alle Dateien und Ordner anzeigen und: Inhalte von Sytemordnern anzeigen. cacatoa |
@Mama69LH Zitat:
Wenn du noch zur Bereinigung deines Systems Lust hast , bitte: Fixen: Zitat:
Zitat:
1.Systemwiederherstellung abschalten 2. Dieses Bereinigungsprogramm hilft dir, den ganzen Müll aus den Temp-Ordner und Papierkorb zu entfernen. 3. Infected-Ordner des Antivirus-Programms, ggf. auch von Spybot Search & Destroy, Ad-Aware usw. leeren. Der Name des Ordners sowie Pfad sind Programm- und Benutzerabhängig. Bitte RTFM zum AV-Programm. Bei einigen Programmen (z. B. AVPE) ist diese Option nicht im Programm integriert. In dem Fall soll dies manuell erfolgen. 4. eScan genau nach Anleitung (bitte ausdrucken und aufmerksam lesen) im abgesicherten Modus laufen lassen. Log hier Posten. PS: Ich denke aber, dass das Neuaufsetzen würde schneller und besser gehen. |
Zitat:
|
@ Mama69LH Entweder wurde die Datei schon von einer AV Anwendung gelöscht und der Autostartaufruf existiert lediglich noch oder es handelt sich um eine zufallsgenerierte Datei. Ersteres wäre plausibler, da diese Datei nicht als laufender Prozess zu sehen ist. Hast du die Empfehlung von Rene-gad schon abgearbeitet? |
Nein..hab ich noch nicht gemacht ..muß erst mal alles aufmerksam lesen.das ich keinen fehler mach. Kenn mich bei so Sachen überhauptt nicht aus. Normalerweise macht sowas mein Mann,aber wir grad etwas Krise haben und ihm egal ist ,meinte soll das selber machen. (Obwohl ja sein PC und heilig ist) :D Selbst ist die Frau..hab schon einiges dazugelernt. Wie ich das so mitbekommen hab muß ich die ganzen Sachen wo im Gelben Kasten stehn..mit den Hijack fixen.? (Gell im abgesicherten Modus) Was ich mich auch frag,wo ich mir das Klump eingefangen hab :confused: ...dacht erst mein Mann hätte es gelöscht.aber Explorer und MSN spinnte dann immer noch rum und Yahoo auch.Auch waren dann plötzlich lauter Spiele und so sachen auf dem Deskop ,wo ich nie draufwar. Und da ich Nail.exe wußte.hab ich einfach gesucht und euch gefunden :D und ihr seid ne große Hilfe |
sorry wegen doppelpost..hab mich grad etwas auf pc umgeshen und kam von virenprogramm ne meldung ..habs in die qarantäne gemacht G://Windows/systenm32/ LSWZPHB.exe :confused: hab sie bei http://www.wintotal.de/Spyware/index.php?Filter=L gesucht aber nix gefunden.. trau mich ja schon gar nicht mehr pc anzumachen :D |
@Mama69LH Zitat:
Zitat:
|
Zitat:
:confused: vor lauter reinschieben vergessen hab was genau aber stand etwas mit TR und war im g.windows..system32.....hab endlich im AntivirGuard die qarantäne gefunden das steht nur vir.datei ....zb die SVCPROC.exe steht da 4 mal schon drinnen erst als vir.datei und 001-003.datei hehe mit dem Pc anmachen das war mehr als Spaß gemeint,weil jeden tag was anderes komisches passiert..aber was man so alles lernen kann :daumenhoc aber ich glaub mein Mann wird neuaufsetzten,er meinte er wollte das schon lange mal machen,weil Pc schon ewig rumspinnt...na mal sehen wann er sich durchringt |
Huhu..also das wird ja immer schlimmer auf dem rechner..nur noch Meldungen an Massen...und das Blinken vom deskop auch nur noch kommt...alle alten Sachen auch grummel..mein Trojancheck nur noch aufgeht...hab noch mal neues Log-file gemacht...Würdet Ihr das bitte mal ansehen... ;) Dankeeeeeeeee Dann können wir endlich mit dem Krieg beginnen und dennen den Kampf ansagen.. :D Logfile of HijackThis v1.99.1 Scan saved at 17:04:01, on 10.06.2005 Platform: Windows XP SP1 (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106) Running processes: G:\WINDOWS\System32\smss.exe G:\WINDOWS\system32\winlogon.exe G:\WINDOWS\system32\services.exe G:\WINDOWS\system32\lsass.exe G:\WINDOWS\system32\svchost.exe G:\WINDOWS\System32\svchost.exe G:\WINDOWS\system32\spoolsv.exe G:\Programme\AVPersonal\AVGUARD.EXE G:\Programme\Gemeinsame Dateien\AOL\ACS\AOLAcsd.exe G:\Programme\AVPersonal\AVWUPSRV.EXE G:\PROGRA~1\CACHEM~1\CachemanXP.exe G:\WINDOWS\System32\CTSvcCDA.exe G:\WINDOWS\SYSTEM32\GEARSEC.EXE G:\WINDOWS\System32\nvsvc32.exe G:\WINDOWS\System32\svchost.exe G:\WINDOWS\System32\devldr32.exe G:\Programme\AVPersonal\AVGNT.EXE G:\Programme\Trojancheck 6\tcguard.exe G:\Programme\AOL 9.0\waol.exe G:\Programme\AOL 9.0\shellmon.exe G:\Programme\Gemeinsame Dateien\Aol\aoltpspd.exe G:\Programme\MSN Apps\Updater\01.02.3000.1001\de\msnappau.exe G:\Programme\WinSweep\WSPopup.exe G:\Programme\Trojancheck 6\tc6.exe g:\windows\system32\qaqkbq.exe G:\WINDOWS\Explorer.exe D:\Software\Wincomander\WINCMD400\WINCMD32.EXE G:\DOKUME~1\ASSSSS~1\LOKALE~1\Temp\$wc\HIJACK~1.EXE R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://213.159.117.134/index.php R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://213.159.117.134/index.php R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://homepage.com%00@www.e-finder.cc/search/ (obfuscated) R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://213.159.117.134/index.php R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = hxxp://213.159.117.134/index.php R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = hxxp://213.159.117.134/index.php R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Anni is da R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,AutoConfigURL = file://G:\Programme\WinSweep\ws.js F2 - REG:system.ini: Shell=Explorer.exe G:\WINDOWS\Nail.exe O1 - Hosts: 69.50.188.82 yahoo.com O1 - Hosts: 69.50.188.82 askjeeves.com O1 - Hosts: 69.50.188.82 wxw.askjeeves.com O1 - Hosts: 69.50.188.82 wxw.directhit.com O1 - Hosts: 69.50.188.82 directhit.com O1 - Hosts: 69.50.188.82 wxw.excite.com O1 - Hosts: 69.50.188.82 excite.com O1 - Hosts: 69.50.188.82 wxw.alltheweb.com O1 - Hosts: 69.50.188.82 go.com O1 - Hosts: 69.50.188.82 wxw.go.com O1 - Hosts: 69.50.188.82 goto.com O1 - Hosts: 69.50.188.82 wxw.goto.com O1 - Hosts: 69.50.188.82 lycos.com O1 - Hosts: 69.50.188.82 dmoz.org O2 - BHO: Yahoo! Companion BHO - {02478D38-C3F9-4efb-9B51-7695ECA05670} - D:\LILI\yahoo\COMPAN~1\INSTALLS\cpn\ycomp5_5_7_0.dll O2 - BHO: AcroIEHlprObj Class - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - G:\Programme\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll O2 - BHO: RsyncHlpr Class - {16B238D5-80DE-47CE-8F17-B3ECE2C2248D} - G:\WINDOWS\System32\rsyncmon.dll O2 - BHO: ShprRprts - {2A8A997F-BB9F-48F6-AA2B-2762D50F9289} - G:\Programme\ShopperReports\Bin\1.0.0.1\SmrtShpr.dll O2 - BHO: BolgerObj Class - {302A3240-4805-4a34-97D7-1645A0B08410} - G:\WINDOWS\Bolger.dll O2 - BHO: (no name) - {3434911C-5EA9-41B4-188E-EE7422C38E13} - (no file) O2 - BHO: ohb - {4D568F0F-8AC9-40AB-88B7-415134C78777} - G:\WINDOWS\System32\winb2s32.dll O2 - BHO: (no name) - {53707962-6F74-2D53-2644-206D7942484F} - G:\PROGRA~1\SPYBOT~1\SDHelper.dll O2 - BHO: UberButton Class - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Lili\yahoo\Common\yiesrvc.dll O2 - BHO: YahooTaggedBM Class - {65D886A2-7CA7-479B-BB95-14D1EFB7946A} - D:\Lili\yahoo\Common\YIeTagBm.dll O2 - BHO: ST - {9394EDE7-C8B5-483E-8773-474BF36AF6E4} - G:\Programme\MSN Apps\ST\01.03.0000.1005\en-xu\stmain.dll O2 - BHO: MSNToolBandBHO - {BDBD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - G:\Programme\MSN Apps\MSN Toolbar\01.02.4000.1001\de\msntb.dll O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - G:\WINDOWS\System32\msdxm.ocx O3 - Toolbar: (no name) - {6FEA1108-02DF-0FF0-2BDE-5D0AB02931B5} - (no file) O3 - Toolbar: &Yahoo! Companion - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - D:\LILI\yahoo\COMPAN~1\INSTALLS\cpn\ycomp5_5_7_0.dll O3 - Toolbar: &WINSWEEP Toolbar - {E915E62E-41DA-40D0-8106-3438B4D24394} - G:\Programme\WinSweep\SurfBar.dll O3 - Toolbar: MSN - {BDAD1DAD-C946-4A17-ADC1-64B5B4FF55D0} - G:\Programme\MSN Apps\MSN Toolbar\01.02.4000.1001\de\msntb.dll O3 - Toolbar: Begin2Search.com Bar - {52FE5233-367C-4EFB-BDD7-0BE4D212C107} - G:\WINDOWS\System32\winb2s32.dll O4 - HKLM\..\Run: [UpdReg] G:\WINDOWS\Updreg.exe O4 - HKLM\..\Run: [nwiz] nwiz.exe /install O4 - HKLM\..\Run: [AVGCtrl] G:\Programme\AVPersonal\AVGNT.EXE /min O4 - HKLM\..\Run: [Trojancheck 6 Guard] G:\Programme\Trojancheck 6\tcguard.exe O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE G:\WINDOWS\System32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [rhwzvd] g:\windows\system32\npases.exe r O4 - HKLM\..\Run: [cyrakjt] g:\windows\system32\eifqegx.exe r O4 - HKCU\..\Run: [Steam] "d:\programme\steam\steam.exe" -silent O8 - Extra context menu item: &Search - hxxp://bar.mywebsearch.com/menusearch.html?p=ZS O8 - Extra context menu item: &Yahoo! Search - file:///D:\Lili\yahoo\Common/ycsrch.htm O8 - Extra context menu item: Nach Microsoft &Excel exportieren - res://G:\PROGRA~1\MICROS~3\Office10\EXCEL.EXE/3000 O8 - Extra context menu item: Yahoo! &Dictionary - file:///D:\Lili\yahoo\Common/ycdict.htm O8 - Extra context menu item: Yahoo! &Maps - file:///D:\Lili\yahoo\Common/ycmap.htm O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Lili\yahoo\Common\yiesrvc.dll O9 - Extra button: 50 FREE MP3s! - {686C970F-1D7D-4469-85D1-4B35763B56CC} - http://www.emusic.com?fref=149133 (file missing) O9 - Extra button: ShopperReports - Compare travel rates - {946B3E9E-E21A-49c8-9F63-900533FAFE14} - G:\Programme\ShopperReports\Bin\1.0.0.1\SmrtShpr.dll O9 - Extra button: ICQ 4.1 - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - G:\Programme\ICQLite\ICQLite.exe O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - G:\Programme\ICQLite\ICQLite.exe O9 - Extra button: Voiceglo directory - {C9B8ABB6-1CC3-4957-9CA3-053036B2EE3A} - G:\Dokumente und Einstellungen\All Users\Desktop\Glophone.lnk (file missing) O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - G:\WINDOWS\System32\Shdocvw.dll O9 - Extra button: ShopperReports - Compare product prices - {E77EDA01-3C56-4a96-8D08-02B42891C169} - G:\Programme\ShopperReports\Bin\1.0.0.1\SmrtShpr.dll O10 - Broken Internet access because of LSP provider 'rpc32vm.dll' missing O15 - Trusted Zone: *.blazefind.com O15 - Trusted Zone: *.clickspring.net O15 - Trusted Zone: *.flingstone.com O15 - Trusted Zone: *.mt-download.com O15 - Trusted Zone: *.my-internet.info O15 - Trusted Zone: *.searchbarcash.com O15 - Trusted Zone: *.searchmiracle.com O15 - Trusted Zone: *.skoobidoo.com O15 - Trusted Zone: *.slotch.com O15 - Trusted Zone: *.slotchbar.com O15 - Trusted Zone: *.windupdates.com O15 - Trusted Zone: *.xxxtoolbar.com O15 - Trusted Zone: *.ysbweb.com O15 - Trusted Zone: *.blazefind.com (HKLM) O15 - Trusted Zone: *.clickspring.net (HKLM) O15 - Trusted Zone: *.flingstone.com (HKLM) O15 - Trusted Zone: *.mt-download.com (HKLM) O15 - Trusted Zone: *.my-internet.info (HKLM) O15 - Trusted Zone: *.searchbarcash.com (HKLM) O15 - Trusted Zone: *.searchmiracle.com (HKLM) O15 - Trusted Zone: *.skoobidoo.com (HKLM) O15 - Trusted Zone: *.slotch.com (HKLM) O15 - Trusted Zone: *.slotchbar.com (HKLM) O15 - Trusted Zone: *.windupdates.com (HKLM) O15 - Trusted Zone: *.xxxtoolbar.com (HKLM) O15 - Trusted Zone: *.ysbweb.com (HKLM) O15 - Trusted IP range: 67.19.178.84 O15 - Trusted IP range: 67.19.178.84 (HKLM) O16 - DPF: {00B71CFB-6864-4346-A978-C0A14556272C} (Checkers Class) - hxxp://messenger.zone.msn.com/binary/msgrchkr.cab31267.cab O16 - DPF: {1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB} - hxxp://ak.imgfarm.com/images/nocache/funwebproducts/ei-2/SmileyCentralFWBInitialSetup1.0.0.8-2.cab O16 - DPF: {2917297F-F02B-4B9D-81DF-494B6333150B} (Minesweeper Flags Class) - hxxp://messenger.zone.msn.com/binary/MineSweeper.cab28177.cab O16 - DPF: {3EB4F9EA-51A6-48DA-846A-0D69DCBA39EF} (DownloadManager Control) - hxxp://download.akamaitools.com.edgesuite.net/dlmanager/live/code/IE_1070/DownloadManager.cab O16 - DPF: {4C39376E-FA9D-4349-BACC-D305C1750EF3} (EPUImageControl Class) - hxxp://tools.ebayimg.com/eps/wl/activex/EPUWALControl_v1-0-3-17.cab O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - xxtp://spaces.msn.com//PhotoUpload/MsnPUpld.cab O16 - DPF: {8E0D4DE5-3180-4024-A327-4DFAD1796A8D} (MessengerStatsClient Class) - hxxp://messenger.zone.msn.com/binary/MessengerStatsClient.cab O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - hxxp://messenger.msn.com/download/msnmessengersetupdownloader.cab O16 - DPF: {B9191F79-5613-4C76-AA2A-398534BB8999} - hxxp://us.dl1.yimg.com/download.yahoo.com/dl/installs/suite/yautocomplete.cab O16 - DPF: {CE69F98F-2AF3-4306-BAC6-A79070EDA1B4} (Zylom Loader Object) - hxxp://eu.download.games.yahoo.com/zylom/activex/zylomloader.cab O16 - DPF: {DA511858-B44C-439E-A0EA-704ED20035E7} (EphoxEditLive4.EditLive) - hxxp://www.beepworld.de/hp/activexeditor/editlive4.cab O16 - DPF: {EF99BD32-C1FB-11D2-892F-0090271D4F88} (&Yahoo! Companion) - hxxp://us.dl1.yimg.com/download.companion.yahoo.com/dl/toolbar/yiebio5_3_18_0.cab O16 - DPF: {F6BF0D00-0B2A-4A75-BF7B-F385591623AF} (Solitaire Showdown Class) - hxxp://messenger.zone.msn.com/binary/SolitaireShowdown.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{97CE0744-DA8D-4D8A-A379-50F69AEACB52}: NameServer = 205.188.146.145 O23 - Service: AntiVir Service (AntiVirService) - H+BEDV Datentechnik GmbH - G:\Programme\AVPersonal\AVGUARD.EXE O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - G:\Programme\Gemeinsame Dateien\AOL\ACS\AOLAcsd.exe O23 - Service: AntiVir Update (AVWUpSrv) - H+BEDV Datentechnik GmbH, Germany - G:\Programme\AVPersonal\AVWUPSRV.EXE O23 - Service: CachemanXP (CachemanXPService) - OuterTechnologies - G:\PROGRA~1\CACHEM~1\CachemanXP.exe O23 - Service: Creative Service for CDROM Access - Creative Technology Ltd - G:\WINDOWS\System32\CTSvcCDA.exe O23 - Service: GEARSecurity - GEAR Software - G:\WINDOWS\SYSTEM32\GEARSEC.EXE O23 - Service: McAfee Firewall - Unknown owner - G:\Programme\McAfee\McAfee Firewall\CPD.EXE" /SERVICE (file missing) O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - G:\WINDOWS\System32\nvsvc32.exe O23 - Service: System Startup Service (SvcProc) - Unknown owner - G:\WINDOWS\svcproc.exe (file missing) _____________ Anm. Aktive Links editiert! Beachte zukünftig die Hinweise dieser Anleitung: HiJackThis. LG Cidre S-Mod TB |
Hi, im post Nr. 5 hat Rene-Gad Dir schon vorgeschlagen einen eScan zu machen. Gemacht hast Du ihn nicht. Allerdings muß ich sagen, so wie das aussieht, bist du 1. besser und 2. vor allem sicherer bedient, wenn du Dein System neu aufsetzt. Halte dich genauestens an alle Tipps in dem Link. cacatoa |
[QUOTE=cacatoa]Hi, im post Nr. 5 hat Rene-Gad Dir schon vorgeschlagen einen eScan zu machen. Gemacht hast Du ihn nicht. Doch hab ich nur die eine datei nicht und die find ich einfach nicht ,hab das auch gepostet und auch gefragt wegen fixen ob das so richtig sei |
@ Mama69LH Ich meine nicht den online-scan einer einzelnen Datei bei Jotti, sondern die Durchführung des eScan, wie er in dem Link von Rene-Gad steht. cacatoa |
|
] Hab das 1.schon mal gemacht....2 erst noch lesen muß wie das geht....escan auch noch mach Spyware Scan Details Start Date: 11.06.2005 11:03:17 Total Time: 4 mins 14 secs Detected Threats MediaTickets CDT Spyware more information... Details: Mediatickets is a spyware program that displays advertisements, reduces the security settings for the Trusted Sites zone in Internet Explorer, and attempts to fraudulently install trusted publishers. Status: Ignored Severe threat - Severe-risk items have an extreme potential for harm, such as a security exploit, and should be removed. Infected registry keys/values detected HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0 ppcimdnnnjbeahepfabjipfginloedkg egckak HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0 goicfboogidikkejccmclpieicihhlpo bihgbp HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\Trust Database\0 goicfboogidikkejccmclpieicihhlpo ejemdn IE Trusted Zone Hijack Spyware more information... Details: IE Trusted Zone Hijack is a spyware related Web site that is added to your Internet Explorer Trusted Zones. Status: Ignored Severe threat - Severe-risk items have an extreme potential for harm, such as a security exploit, and should be removed. Infected registry keys/values detected HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\blazefind.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\windupdates.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\xxxtoolbar.com HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\blazefind.com HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\clickspring.net HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\flingstone.com HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mt-download.com HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\my-internet.info HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\searchbarcash.com HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\searchmiracle.com HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\skoobidoo.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\clickspring.net HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\slotch.com HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\windupdates.com HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\xxxtoolbar.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\flingstone.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\mt-download.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\my-internet.info HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\searchbarcash.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\searchmiracle.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\skoobidoo.com HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\slotch.com Unclassified.Trojan.E Trojan more information... Status: Ignored Severe threat - Severe-risk items have an extreme potential for harm, such as a security exploit, and should be removed. Infected files detected g:\windows\loadnew.exe Transponder.ABetterInternet.Aurora Spyware more information... Status: Ignored Severe threat - Severe-risk items have an extreme potential for harm, such as a security exploit, and should be removed. Infected files detected g:\windows\system32\installerv34.exe Begin2Search Browser Plug-in more information... Details: Begin2Search installs third party spyware, displays pop-up advertisements, and redirects Internet Explorer. Status: Ignored High threat - High-risk items have a large potential for harm, such as loss of computer control, and should be removed unless knowingly installed. Infected files detected g:\windows\system32\winb2s32.dll g:\windows\system32\reg6523.exe g:\windows\system32\b2s_cache\bingo2.bmp g:\windows\system32\b2s_cache\but.bin g:\windows\system32\b2s_cache\mail unreaded.bmp g:\windows\system32\b2s_cache\msg.bin g:\windows\system32\b2s_cache\star.bmp g:\windows\system32\b2s_cache\weather.bmp Infected folders detected g:\windows\system32\b2s_cache Infected registry keys/values detected HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo.1\CLSID {09C14745-90FD-42D1-9276-4924D7DBC274} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo.1 amo Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo\CLSID {09C14745-90FD-42D1-9276-4924D7DBC274} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo\CurVer winb2s.amo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo amo Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi.1\CLSID {52FE5233-367C-4EFB-BDD7-0BE4D212C107} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi.1 dbi Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi\CLSID {52FE5233-367C-4EFB-BDD7-0BE4D212C107} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi\CurVer winb2s.dbi.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi dbi Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt.1\CLSID {07E9CDF4-20D2-46B1-B681-663968F527CE} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt.1 iiittt Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt\CLSID {07E9CDF4-20D2-46B1-B681-663968F527CE} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt\CurVer winb2s.iiittt.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt iiittt Class HKEY_CLASSES_ROOT\winb2s.dbi.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo.1\CLSID {7C5E5671-7A1D-4AE8-91F0-496ADF2825F7} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo.1 momo Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo\CLSID {7C5E5671-7A1D-4AE8-91F0-496ADF2825F7} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo\CurVer winb2s.momo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo momo Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb.1\CLSID {4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb.1 ohb Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb\CLSID {4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb\CurVer winb2s.ohb.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb ohb Class HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4D568F0F-8AC9-40AB-88B7-415134C78777} ohb HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7} HKEY_CLASSES_ROOT\winb2s.momo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274} HKEY_CLASSES_ROOT\winb2s.iiittt.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb.1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.iiittt.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb.1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.dbi.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.momo.1 HKEY_CLASSES_ROOT\clsid\{4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274} HKEY_CLASSES_ROOT\clsid\{4D568F0F-8AC9-40AB-88B7-415134C78777}\InprocServer32 G:\WINDOWS\System32\winb2s32.dll HKEY_CLASSES_ROOT\clsid\{4D568F0F-8AC9-40AB-88B7-415134C78777}\InprocServer32 ThreadingModel Apartment HKEY_CLASSES_ROOT\clsid\{4D568F0F-8AC9-40AB-88B7-415134C78777}\ProgID winb2s.ohb.1 HKEY_CLASSES_ROOT\clsid\{4D568F0F-8AC9-40AB-88B7-415134C78777}\TypeLib {081DE2F6-927B-4AA9-88C1-F531C9387383} HKEY_CLASSES_ROOT\clsid\{4D568F0F-8AC9-40AB-88B7-415134C78777}\VersionIndependentProgID winb2s.ohb HKEY_CLASSES_ROOT\clsid\{4D568F0F-8AC9-40AB-88B7-415134C78777} ohb Class HKEY_CURRENT_USER\Software\aaa_soft HKEY_CURRENT_USER\Software\aaa_soft\pppp pou 0 HKEY_CURRENT_USER\Software\aaa_soft\pppp lpt 1114897380;120;0 HKEY_CURRENT_USER\Software\aaa_soft ffff 277797 HKEY_CLASSES_ROOT\winb2s.amo.1 HKEY_CURRENT_USER\Software\aaa_soft cccc 7 HKEY_CURRENT_USER\Software\aaa_soft showbar 0 HKEY_CURRENT_USER\Software\aaa_soft uiui 1410264368 HKEY_CURRENT_USER\Software\aaa_soft itmm 1118479223 HKEY_CURRENT_USER\Software\aaa_soft cclts 1118478075 HKEY_CURRENT_USER\Software\aaa_soft 44444 0 HKEY_CURRENT_USER\Software\aaa_soft ssssppp 246 HKEY_CURRENT_USER\Software\aaa_soft ttttlll 1118478075 HKEY_CURRENT_USER\Software\aaa_soft iiiilll 1200000265 HKEY_CURRENT_USER\Software\aaa_soft didi 401 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE}\InprocServer32 G:\WINDOWS\System32\winb2s32.dll HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE}\InprocServer32 ThreadingModel Apartment HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE}\MiscStatus\1 131473 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE}\MiscStatus 0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE}\ProgID winb2s.iiittt.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE}\ToolboxBitmap32 G:\WINDOWS\System32\winb2s32.dll, 102 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE}\TypeLib {081DE2F6-927B-4AA9-88C1-F531C9387383} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE}\Version 1.0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE}\VersionIndependentProgID winb2s.iiittt HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{07E9CDF4-20D2-46B1-B681-663968F527CE} iiittt Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274}\InprocServer32 G:\WINDOWS\System32\winb2s32.dll HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274}\InprocServer32 ThreadingModel Apartment HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274}\ProgID winb2s.amo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274}\TypeLib {081DE2F6-927B-4AA9-88C1-F531C9387383} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274}\VersionIndependentProgID winb2s.amo HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09C14745-90FD-42D1-9276-4924D7DBC274} amo Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777}\InprocServer32 G:\WINDOWS\System32\winb2s32.dll HKEY_CLASSES_ROOT\winb2s.ohb.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777}\InprocServer32 ThreadingModel Apartment HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777}\ProgID winb2s.ohb.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777}\TypeLib {081DE2F6-927B-4AA9-88C1-F531C9387383} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777}\VersionIndependentProgID winb2s.ohb HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4D568F0F-8AC9-40AB-88B7-415134C78777} ohb Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107}\InprocServer32 G:\WINDOWS\System32\winb2s32.dll HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107}\InprocServer32 ThreadingModel Apartment HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107}\ProgID winb2s.dbi.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107}\TypeLib {081DE2F6-927B-4AA9-88C1-F531C9387383} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.ohb.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107}\VersionIndependentProgID winb2s.dbi HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52FE5233-367C-4EFB-BDD7-0BE4D212C107} Begin2Search.com Bar HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7}\InprocServer32 G:\WINDOWS\System32\winb2s32.dll HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7}\InprocServer32 ThreadingModel Apartment HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7}\ProgID winb2s.momo.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7}\TypeLib {081DE2F6-927B-4AA9-88C1-F531C9387383} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7}\VersionIndependentProgID winb2s.momo HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7C5E5671-7A1D-4AE8-91F0-496ADF2825F7} momo Class HKEY_LOCAL_MACHINE\SOFTWARE\Classes\winb2s.amo.1 |
Transponder.Bolger Adware more information... Details: Transponder.Bolger is an Internet Explorer browser helper object that monitors Web page requests and displays pop-up advertisements. Status: Ignored High threat - High-risk items have a large potential for harm, such as loss of computer control, and should be removed unless knowingly installed. Infected files detected g:\windows\bolger.dll Infected registry keys/values detected HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{302A3240-4805-4a34-97D7-1645A0B08410} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{302A3240-4805-4a34-97D7-1645A0B08410} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{302A3240-4805-4a34-97D7-1645A0B08410} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{302A3240-4805-4a34-97D7-1645A0B08410} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{302A3240-4805-4a34-97D7-1645A0B08410} SafeSurfing.RsyncMon Browser Plug-in more information... Details: SafeSurfing.RsyncMon is a SafeSurfing adware variant that installs as a Browser Helper Object (BHO) in Internet Explorer. Status: Ignored High threat - High-risk items have a large potential for harm, such as loss of computer control, and should be removed unless knowingly installed. Infected files detected g:\windows\system32\rsyncmon.dll g:\windows\system32\netsync.exe Infected registry keys/values detected HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D} HKEY_CLASSES_ROOT\clsid\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D}\InprocServer32 G:\WINDOWS\System32\rsyncmon.dll HKEY_CLASSES_ROOT\clsid\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D}\InprocServer32 ThreadingModel Apartment HKEY_CLASSES_ROOT\clsid\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D}\ProgID Var3.RsyncHlpr.1 HKEY_CLASSES_ROOT\clsid\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D}\TypeLib {227D1E33-EAD4-4ACE-BE32-4ACFAAD072DD} HKEY_CLASSES_ROOT\clsid\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D}\VersionIndependentProgID Var3.RsyncHlpr HKEY_CLASSES_ROOT\clsid\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D} RsyncHlpr Class HKEY_CLASSES_ROOT\Var3.RsyncHlpr.1 HKEY_CLASSES_ROOT\Var3.RsyncHlpr.1\CLSID {16B238D5-80DE-47CE-8F17-B3ECE2C2248D} HKEY_CLASSES_ROOT\Var3.RsyncHlpr.1 RsyncHlpr Class HKEY_CLASSES_ROOT\Var3.RsyncHlpr HKEY_CLASSES_ROOT\Var3.RsyncHlpr.1 HKEY_CLASSES_ROOT\Var3.RsyncHlpr\CLSID {16B238D5-80DE-47CE-8F17-B3ECE2C2248D} HKEY_CLASSES_ROOT\Var3.RsyncHlpr\CurVer Var3.RsyncHlpr.1 HKEY_CLASSES_ROOT\Var3.RsyncHlpr RsyncHlpr Class HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D} HKEY_LOCAL_MACHINE\Software\microsoft\windows\currentversion\uninstall\RSyncMon HKEY_LOCAL_MACHINE\Software\microsoft\windows\currentversion\uninstall\RSyncMon DisplayName RSyncMon HKEY_LOCAL_MACHINE\Software\microsoft\windows\currentversion\uninstall\RSyncMon UninstallString G:\WINDOWS\System32\RSMUninst.exe HKEY_LOCAL_MACHINE\Software\RSyncMon HKEY_LOCAL_MACHINE\Software\RSyncMon\Run\CPDEF3 Version 1.0 HKEY_LOCAL_MACHINE\Software\RSyncMon\Run\SLC Version 1.0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Var3.RsyncHlpr.1 HKEY_LOCAL_MACHINE\Software\RSyncMon\Run Version 2.01.0000 HKEY_LOCAL_MACHINE\Software\RSyncMon\Run LRunT 1118478066 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys Registered 1 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys InstallT 1115339207 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys InitFailCode 3 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys Version 2.11.0000 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys CfgXpT 14400 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys CfgVersion 24.93 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys LastReg 1118478068 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys LastTPupT_30 1118478429 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D} HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys LastTPupT 1118478429 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys LastActT 1118478429 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys LastTPupT_36 1117911084 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys CfgNMT 1118082988 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys LastPupT 1115591267 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys LastInitFail 1118412446 HKEY_LOCAL_MACHINE\Software\RSyncMon\Sys LastTPupT_37 1117095499 HKEY_LOCAL_MACHINE\Software\RSyncMon DistId 20 HKEY_LOCAL_MACHINE\Software\RSyncMon CrpId 6 HKEY_LOCAL_MACHINE\Software\RSyncMon Uninstall 0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D} HKEY_LOCAL_MACHINE\Software\RSyncMon VolId 1691691730 HKEY_CLASSES_ROOT\Var3.RsyncHlpr.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Var3.RsyncHlpr.1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D} HKEY_CLASSES_ROOT\clsid\{16B238D5-80DE-47CE-8F17-B3ECE2C2248D} webHancer Spyware more information... Details: WebHancer is a spyware program that launches at Windows startup, monitors the Web sites you view, and sends their performance data back to webHancers servers. Status: Ignored Moderate threat - Moderate-risk items have some potential for harm, but may be part of a wanted service. Users may decide to ignore such programs after review. Infected registry keys/values detected HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\whsurvey HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\whsurvey HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\app management\arpcache\whsurvey Changed 0 Popular Screensavers Software Bundler more information... Details: Popular Screensavers installs adware software on your computer. Status: Ignored Moderate threat - Moderate-risk items have some potential for harm, but may be part of a wanted service. Users may decide to ignore such programs after review. Infected files detected g:\windows\downloaded program files\f3initialsetup1.0.0.8-2.inf My Way Speedbar Browser Plug-in more information... Status: Ignored Moderate threat - Moderate-risk items have some potential for harm, but may be part of a wanted service. Users may decide to ignore such programs after review. Infected registry keys/values detected HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{147A976E-EEE1-4377-8EA7-4716E4CDD239} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{147A976E-EEE1-4377-8EA7-4716E4CDD239} NewDotNet Browser Plug-in more information... Details: New.Net is an Internet Explorer plug-in that adds extra top-level domains (such as .shop or .tech) to your name resolution system. Status: Ignored Moderate threat - Moderate-risk items have some potential for harm, but may be part of a wanted service. Users may decide to ignore such programs after review. Infected files detected g:\windows\ndnuninstall6_38.exe Overnet Software Bundler more information... Details: Overnet/eDonkey is a file sharing software that bundles third party adware and spyware with the free version. Status: Ignored Moderate threat - Moderate-risk items have some potential for harm, but may be part of a wanted service. Users may decide to ignore such programs after review. Infected files detected g:\dokumente und einstellungen\assssssssssssss\anwendungsdaten\microsoft\internet explorer\quick launch\overnet.lnk eDonkey2000 Software Bundler more information... Details: eDonkey2000 is a peer-to-peer file sharing program that installs with adware and spyware such as Webhancer, Web Search Toolbar, and New.Net. Status: Ignored Low threat - Low-risk items have little potential for harm, but users may wish to examine the item further. Infected files detected g:\dokumente und einstellungen\assssssssssssss\anwendungsdaten\microsoft\internet explorer\quick launch\edonkey2000.lnk Infected registry keys/values detected HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{320154BB-D666-48F6-990E-172B32954620} HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eDonkey2000 UninstallString "F:\eDonkey2000\uninstall_eDonkey2000.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eDonkey2000 DisplayIcon "F:\eDonkey2000\eDonkey2000.exe" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eDonkey2000 NoModify 1 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eDonkey2000 NoRepair 1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{320154BB-D666-48F6-990E-172B32954620}\InProcServer32 F:\Overnet\plugins\ed2kie.dll HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{320154BB-D666-48F6-990E-172B32954620}\InProcServer32 ThreadingModel Both HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{320154BB-D666-48F6-990E-172B32954620}\ProgID eD2KDownloadManager.object.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{320154BB-D666-48F6-990E-172B32954620}\TypeLib {379919F2-1612-45B7-B9F4-773F6D5214F5} HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{320154BB-D666-48F6-990E-172B32954620}\VersionIndependentProgID eD2KDownloadManager.object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{320154BB-D666-48F6-990E-172B32954620} eD2K downloadManager object HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eDonkey2000 HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\eDonkey2000 DisplayName eDonkey2000 Detected Spyware Cookies No spyware cookies were found during this scan. ging nicht alles in eins rein... bei c:Programme/getright/getright auch Meldung kam und zwar Hat signaturen vom Worm/SdBot.344064 geht leider nicht so schnell mit scanen und antworten ,da ich am tag 3 Kids habe und nicht immer zeit hab an rechner zu gehn |
:heulen: sorry nerv scho wieder...hab versucht den Escan im abgesicherten modus zu machen..aber geht nicht ich komm gar nicht rein ins Programm...da blinkt alles und im Tak manger kommt diese Nail.exe .......wenn ich dann explorer in task neu starte hört das blinken auf und die nail .exe ist weg,(wie ich es sonst immer mach)....aber dann muß ich auf ja drücken das abgesicherter modus weiter ausgeführt wird und dann fängt alles wieder von vorne an...grummel... |
Hast Du das removal tool für die Nail.exe schon probiert? cacatoa |
Huhu..endlich wurde pc neu aufgesetzt.... :daumenhoc .....ich hab heut mal ein scan gemacht ..hoffe Ihr könnt ihn euch mal ansehen.danke!! Logfile of HijackThis v1.99.1 Scan saved at 13:56:02, on 05.07.2005 Platform: Windows XP (WinNT 5.01.2600) MSIE: Internet Explorer v6.00 SP1 (6.00.2600.0000) Running processes: G:\WINDOWS\System32\smss.exe G:\WINDOWS\system32\winlogon.exe G:\WINDOWS\system32\services.exe G:\WINDOWS\system32\lsass.exe G:\WINDOWS\system32\svchost.exe G:\WINDOWS\System32\svchost.exe G:\WINDOWS\system32\logonui.exe G:\WINDOWS\Explorer.EXE G:\WINDOWS\system32\spoolsv.exe G:\Programme\Gemeinsame Dateien\AOL\ACS\AOLDial.exe G:\WINDOWS\System32\ctfmon.exe G:\Programme\Sitecom\Bluetooth Software\BTTray.exe G:\PROGRA~1\Sitecom\BLUETO~1\BTSTAC~1.EXE G:\Programme\Gemeinsame Dateien\AOL\ACS\AOLacsd.exe G:\Programme\AOL 9.0\waol.exe G:\Programme\AVPersonal\AVWUPSRV.EXE G:\Programme\Sitecom\Bluetooth Software\bin\btwdins.exe G:\WINDOWS\System32\nvsvc32.exe G:\WINDOWS\System32\svchost.exe G:\Programme\AOL 9.0\shellmon.exe G:\Programme\Gemeinsame Dateien\Aol\aoltpspd.exe G:\WINDOWS\System32\devldr32.exe D:\Programme\Steam\Steam.exe D:\Programme\Gammacontrol\Gammacontrol.exe F:\Overnet\overnet.exe F:\Ablage\Viren\Microsoft AntiSpyware\gcasDtServ.exe G:\Programme\WINCMD400\WINCMD32.EXE G:\DOKUME~1\assoo\LOKALE~1\Temp\$wc\HIJACK~1.EXE R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Bar = h++p://www.aol.de/e60/suche/ R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = h++p://www.worldusa.com R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = h++p://www.aol.de/e60/ R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Microsoft Internet Explorer bereitgestellt von AOL O2 - BHO: Yahoo! Companion BHO - {02478D38-C3F9-4efb-9B51-7695ECA05670} - D:\LILI\yahoo\COMPAN~1\INSTALLS\cpn0\ycomp5_6_2_0.dll O2 - BHO: UberButton Class - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Lili\yahoo\Common\yiesrvc.dll O2 - BHO: YahooTaggedBM Class - {65D886A2-7CA7-479B-BB95-14D1EFB7946A} - D:\Lili\yahoo\Common\YIeTagBm.dll O3 - Toolbar: &Radio - {8E718888-423F-11D2-876E-00A0C9082467} - G:\WINDOWS\System32\msdxm.ocx O3 - Toolbar: Yahoo! Toolbar - {EF99BD32-C1FB-11D2-892F-0090271D4F88} - D:\LILI\yahoo\COMPAN~1\INSTALLS\cpn0\ycomp5_6_2_0.dll O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE G:\WINDOWS\System32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE G:\WINDOWS\System32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [AOLDialer] G:\Programme\Gemeinsame Dateien\AOL\ACS\AOLDial.exe O4 - HKLM\..\Run: [Zone Labs Client] "G:\Programme\Zone Labs\ZoneAlarm\zlclient.exe" O4 - HKLM\..\Run: [AVGCtrl] "G:\Programme\AVPersonal\AVGNT.EXE" /min O4 - HKLM\..\Run: [Trojancheck 6 Guard] F:\Ablage\Viren\Trojancheck 6\tcguard.exe O4 - HKLM\..\Run: [fiookh] g:\windows\system32\rkxaxk.exe O4 - HKLM\..\Run: [gcasServ] "F:\Ablage\Viren\Microsoft AntiSpyware\gcasServ.exe" O4 - HKCU\..\Run: [CTFMON.EXE] G:\WINDOWS\System32\ctfmon.exe O4 - HKCU\..\Run: [Yahoo! Pager] "D:\Lili\yahoo\Messenger\ypager.exe" -quiet O4 - Global Startup: AOL 9.0 Tray-Symbol.lnk = G:\Programme\AOL 9.0\aoltray.exe O4 - Global Startup: BTTray.lnk = ? O8 - Extra context menu item: &Yahoo! Search - file:///D:\Lili\yahoo\Common/ycsrch.htm O8 - Extra context menu item: Senden an &Bluetooth - G:\Programme\Sitecom\Bluetooth Software\btsendto_ie_ctx.htm O8 - Extra context menu item: Yahoo! &Dictionary - file:///D:\Lili\yahoo\Common/ycdict.htm O8 - Extra context menu item: Yahoo! &Maps - file:///D:\Lili\yahoo\Common/ycmap.htm O8 - Extra context menu item: Yahoo! &SMS - file:///D:\Lili\yahoo\Common/ycsms.htm O9 - Extra button: Yahoo! Services - {5BAB4B5B-68BC-4B02-94D6-2FC0DE4A7897} - D:\Lili\yahoo\Common\yiesrvc.dll O9 - Extra button: Related - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - G:\WINDOWS\web\related.htm O9 - Extra 'Tools' menuitem: Show &Related Links - {c95fe080-8f5d-11d2-a20b-00aa003c157a} - G:\WINDOWS\web\related.htm O9 - Extra button: @btrez.dll,-4015 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - G:\Programme\Sitecom\Bluetooth Software\btsendto_ie.htm O9 - Extra 'Tools' menuitem: @btrez.dll,-4017 - {CCA281CA-C863-46ef-9331-5C8D4460577F} - G:\Programme\Sitecom\Bluetooth Software\btsendto_ie.htm O9 - Extra button: Real.com - {CD67F990-D8E9-11d2-98FE-00C0F0318AFE} - G:\WINDOWS\System32\Shdocvw.dll O12 - Plugin for .wav: G:\Programme\Internet Explorer\PLUGINS\npqtplugin2.dll O14 - IERESET.INF: START_PAGE_URL=http://www.aol.de/e60/ O16 - DPF: {30528230-99f7-4bb4-88d8-fa1d4f56a2ab} (YInstStarter Class) - D:\Lili\yahoo\Common\yinsthelper.dll O16 - DPF: {4F1E5B1A-2A80-42CA-8532-2D05CB959537} (MSN Photo Upload Tool) - h++p://spaces.msn.com//PhotoUpload/MsnPUpld.cab O16 - DPF: {B38870E4-7ECB-40DA-8C6A-595F0A5519FF} (MsnMessengerSetupDownloadControl Class) - h++p://messenger.msn.com/download/msnmessengersetupdownloader.cab O17 - HKLM\System\CCS\Services\Tcpip\..\{E93BFECB-4F89-4479-8E37-DEF9E2BA1E07}: NameServer = 205.188.146.145 O18 - Protocol: widimg - {EE7C2AFF-5742-44FF-BD0E-E521B0D3C3BA} - G:\WINDOWS\System32\btxppanel.dll O23 - Service: AntiVir Service (AntiVirService) - H+BEDV Datentechnik GmbH - G:\Programme\AVPersonal\AVGUARD.EXE O23 - Service: AOL Connectivity Service (AOL ACS) - America Online, Inc. - G:\Programme\Gemeinsame Dateien\AOL\ACS\AOLAcsd.exe O23 - Service: AntiVir Update (AVWUpSrv) - H+BEDV Datentechnik GmbH, Germany - G:\Programme\AVPersonal\AVWUPSRV.EXE O23 - Service: Bluetooth Service (btwdins) - Broadcom Corporation - G:\Programme\Sitecom\Bluetooth Software\bin\btwdins.exe O23 - Service: CachemanXP (CachemanXPService) - OuterTechnologies - G:\PROGRA~1\CACHEM~1\CachemanXP.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - G:\WINDOWS\System32\nvsvc32.exe O23 - Service: TrueVector Internet Monitor (vsmon) - Zone Labs Inc. - G:\WINDOWS\system32\ZoneLabs\vsmon.exe |
Alle Zeitangaben in WEZ +1. Es ist jetzt 07:50 Uhr. |
Copyright ©2000-2025, Trojaner-Board