so malwarebyte ist durch hat etliches gefunden Code:
Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org
Datenbank Version: v2013.01.11.08
Windows 7 Service Pack 1 x64 NTFS
Internet Explorer 9.0.8112.16421
Rico :: R.......E-LAPPI [limitiert]
20.01.2013 23:40:53
MBAM-log-2013-01-21 (02-07-23).txt
Art des Suchlaufs: Vollständiger Suchlauf (C:\|)
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 478369
Laufzeit: 2 Stunde(n), 24 Minute(n), 19 Sekunde(n)
Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)
Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)
Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)
Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)
Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)
Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)
Infizierte Dateien: 18
C:\Program Files (x86)\TMbot\rt\jetrt\XCRB72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XEND72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XIMG72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XJCE72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XMIA72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XMIS72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XMNG72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XMSC72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XPKC72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XRMI72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XSCR72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XSEC72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XSND72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XSQL72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XSSE72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XSWN72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XXML72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
C:\Program Files (x86)\TMbot\rt\jetrt\XXXL72020.dll (Backdoor.Agent.FU) -> Keine Aktion durchgeführt.
(Ende) und noch einen Spybot S&D scan resultat. Code:
--- Spybot - Search & Destroy version: 1.6.2 (build: 20090126) ---
2009-01-26 blindman.exe (1.0.0.8)
2009-01-26 SDFiles.exe (1.6.1.7)
2009-01-26 SDMain.exe (1.0.0.6)
2009-01-26 SDShred.exe (1.0.2.5)
2009-01-26 SDUpdate.exe (1.6.0.12)
2009-01-26 SDWinSec.exe (1.0.0.12)
2009-01-26 SpybotSD.exe (1.6.2.46)
2009-01-26 TeaTimer.exe (1.6.4.26)
2013-01-21 unins000.exe (51.49.0.0)
2009-01-26 Update.exe (1.6.0.7)
2009-01-26 advcheck.dll (1.6.2.15)
2007-04-02 aports.dll (2.1.0.0)
2008-06-14 DelZip179.dll (1.79.11.1)
2009-01-26 SDHelper.dll (1.6.2.14)
2008-06-19 sqlite3.dll
2009-01-26 Tools.dll (2.1.6.10)
2009-01-16 UninsSrv.dll (1.0.0.0)
2012-12-18 Includes\Adware.sbi
2013-01-15 Includes\AdwareC.sbi
2010-08-13 Includes\Cookies.sbi
2012-11-14 Includes\Dialer.sbi
2012-11-14 Includes\DialerC.sbi
2012-11-14 Includes\HeavyDuty.sbi
2012-11-14 Includes\Hijackers.sbi
2012-11-14 Includes\HijackersC.sbi
2012-11-14 Includes\iPhone.sbi
2012-11-14 Includes\Keyloggers.sbi
2012-12-18 Includes\KeyloggersC.sbi
2004-11-29 Includes\LSP.sbi
2012-11-21 Includes\Malware.sbi
2013-01-15 Includes\MalwareC.sbi
2012-11-14 Includes\PUPS.sbi
2013-01-15 Includes\PUPSC.sbi
2010-01-25 Includes\Revision.sbi
2012-11-14 Includes\Security.sbi
2012-11-14 Includes\SecurityC.sbi
2008-06-03 Includes\Spybots.sbi
2008-06-03 Includes\SpybotsC.sbi
2012-11-14 Includes\Spyware.sbi
2012-11-14 Includes\SpywareC.sbi
2012-11-19 Includes\Tracks.uti
2013-01-16 Includes\Trojans.sbi
2013-01-09 Includes\TrojansC-02.sbi
2013-01-15 Includes\TrojansC-03.sbi
2012-12-21 Includes\TrojansC-04.sbi
2012-11-14 Includes\TrojansC-05.sbi
2012-12-03 Includes\TrojansC.sbi
2008-03-04 Plugins\Chai.dll
2008-03-05 Plugins\Fennel.dll
2008-02-26 Plugins\Mate.dll
2007-12-24 Plugins\TCPIPAddress.dll
--- System information ---
Unknown Windows version 6.1 (Build: 7601) Service Pack 1 (6.1.7601)
--- Startup entries list ---
Located: HK_LM:Run, Adobe ARM
command: "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
file: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
size: 946352
MD5: 3CB07566302BCEEB898DE270A0BEC175
Located: HK_LM:Run, avast
command: "C:\Program Files\Alwil Software\Avast5\avastUI.exe" /nogui
file: C:\Program Files\Alwil Software\Avast5\avastUI.exe
size: 4297136
MD5: 083649EF692A066880C9326020915AFE
Located: HK_LM:Run, KiesTrayAgent
command: C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe
file: C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe
size: 3524536
MD5: 6B115CE521D96900373775ECAC975D59
Located: HK_LM:Run, NPSStartup
command:
file:
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_LM:Run, Realtime Audio Engine
command: "mmrtkrnl.exe" /i
file: C:\Windows\system32\mmrtkrnl.exe
size: 46592
MD5: CB7A6A9F873115183F950C193F278967
Located: HK_LM:RunOnce, DeleteOnReboot
command: C:\Windows\DeleteOnReboot.bat
file: C:\Windows\DeleteOnReboot.bat
size: 186
MD5: 88FC8FA687A13246CF71BA0D7BE1174B
Located: HK_LM:RunOnce, InnoSetupRegFile.0000000001
command: "C:\Windows\is-PGG40.exe" /REG /REGSVRMODE
file: C:\Windows\is-PGG40.exe
size: 710504
MD5: B68770B9ED42428A11DE53796EC46BB0
Located: HK_LM:RunOnce, Malwarebytes Anti-Malware
command: C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent
file: C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe
size: 512360
MD5: 7853D2AB445C10F97610B2B05FA4CF0A
Located: HK_LM:Run, BrMfcWnd (DISABLED)
command: C:\Program Files (x86)\Brother\Brmfcmon\BrMfcWnd.exe /AUTORUN
file: C:\Program Files (x86)\Brother\Brmfcmon\BrMfcWnd.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_LM:Run, ControlCenter3 (DISABLED)
command: C:\Program Files (x86)\Brother\ControlCenter3\brctrcen.exe /autorun
file: C:\Program Files (x86)\Brother\ControlCenter3\brctrcen.exe
size: 0
MD5: D41D8CD98F00B204E9800998ECF8427E
Warning: if the file is actually larger than 0 bytes,
the checksum could not be properly calculated!
Located: HK_LM:Run, Seagate Dashboard (DISABLED)
command: C:\Program Files (x86)\Seagate\Seagate Dashboard\MemeoLauncher.exe --silent --no_ui
file: C:\Program Files (x86)\Seagate\Seagate Dashboard\MemeoLauncher.exe
size: 79112
MD5: A853FB4774AAA16D7D57E26F46196ABF
Located: HK_LM:RunOnce, ICQ6setup (DISABLED)
command: cmd.exe /c rmdir /S /Q "C:\Program Files (x86)\ICQ7.7"
file: C:\Windows\system32\cmd.exe
size: 302592
MD5: AD7B9C14083B52BC532FBA5948342B98
Located: HK_CU:Run, Skype
where: S-1-5-21-1344020824-1739450101-1975360036-1009...
command: "C:\Program Files (x86)\Skype\Phone\Skype.exe" /minimized /regrun
file: C:\Program Files (x86)\Skype\Phone\Skype.exe
size: 17877168
MD5: 2C6DFC761F1DAE61940C7EAE97EBDB19
--- Browser helper object list ---
{18DF081C-E8AD-4283-A596-FA578C2EBDC3} (AcroIEHelperStub)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name: AcroIEHelperStub
CLSID name: Adobe PDF Link Helper
Path: C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\
Long name: AcroIEHelperShim.dll
Short name: ACROIE~2.DLL
Date (created): 18.12.2012 15:28:18
Date (last access): 21.01.2013 01:37:34
Date (last write): 18.12.2012 15:28:18
Filesize: 66280
Attributes: archive
MD5: 40986A81053401E5379154818FA8733C
CRC32: 3BDD1A22
Version: 10.1.5.33
{53707962-6F74-2D53-2644-206D7942484F} (Spybot-S&D IE Protection)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Spybot-S&D IE Protection
description: Spybot-S&D IE Browser plugin
classification: Legitimate
known filename: SDhelper.dll
info link: hxxp://spybot.eon.net.au/
info source: Patrick M. Kolla
Path: C:\Program Files (x86)\Spybot - Search & Destroy\
Long name: SDHelper.dll
Short name:
Date (created): 21.01.2013 01:25:12
Date (last access): 21.01.2013 02:27:44
Date (last write): 26.01.2009 15:31:02
Filesize: 1879896
Attributes: archive
MD5: 022C2F6DCCDFA0AD73024D254E62AFAC
CRC32: 5BA24007
Version: 1.6.2.14
{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} (Java(tm) Plug-In SSV Helper)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Java(tm) Plug-In SSV Helper
Path: C:\Program Files (x86)\Java\jre7\bin\
Long name: ssv.dll
Short name:
Date (created): 29.11.2012 21:26:40
Date (last access): 21.01.2013 01:52:12
Date (last write): 29.11.2012 21:26:40
Filesize: 449512
Attributes: archive
MD5: A7A6954E500715117B64B414AB81CB44
CRC32: EE09721D
Version: 10.9.2.5
{9030D464-4C02-4ABF-8ECC-5164760863C6} (Windows Live ID-Anmelde-Hilfsprogramm)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Windows Live ID-Anmelde-Hilfsprogramm
Path: C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\
Long name: WindowsLiveLogin.dll
Short name: WINDOW~1.DLL
Date (created): 21.09.2010 14:08:38
Date (last access): 21.01.2013 02:21:30
Date (last write): 21.09.2010 14:08:38
Filesize: 439168
Attributes: archive
MD5: 6BF01E200063D7274F3AF06D226671F5
CRC32: C8953126
Version: 7.250.4225.0
{9FDDE16B-836F-4806-AB1F-1455CBEFF289} (Windows Live Messenger Companion Helper)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Windows Live Messenger Companion Helper
Path: C:\Program Files (x86)\Windows Live\Companion\
Long name: companioncore.dll
Short name: COMPAN~1.DLL
Date (created): 10.11.2010 02:07:26
Date (last access): 21.01.2013 02:21:30
Date (last write): 10.11.2010 02:07:26
Filesize: 393600
Attributes: archive
MD5: 47BDBCE3E2D819B17AB9FA4539B9DF71
CRC32: 420F228A
Version: 15.4.3508.1109
{B4F3A835-0E21-4959-BA22-42B3008E02FF} (URLRedirectionBHO)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name: URLRedirectionBHO
CLSID name: Office Document Cache Handler
Path: C:\PROGRA~2\MICROS~1\Office14\
Long name: URLREDIR.DLL
Short name:
Date (created): 21.12.2010 01:05:22
Date (last access): 21.01.2013 02:21:32
Date (last write): 21.12.2010 01:05:22
Filesize: 561552
Attributes: archive
MD5: A5D08B86E8A437AA6DEAF7A187BF6CA5
CRC32: CEA4973B
Version: 14.0.6015.1000
{DBC80044-A445-435b-BC74-9C25C1C588A9} (Java(tm) Plug-In 2 SSV Helper)
location: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\
BHO name:
CLSID name: Java(tm) Plug-In 2 SSV Helper
Path: C:\Program Files (x86)\Java\jre7\bin\
Long name: jp2ssv.dll
Short name:
Date (created): 29.11.2012 21:26:38
Date (last access): 21.01.2013 01:27:36
Date (last write): 29.11.2012 21:26:38
Filesize: 155384
Attributes: archive
MD5: EB47E405A9222CA595E5E763B4156529
CRC32: 712D0563
Version: 10.9.2.5
--- ActiveX list ---
{8AD9C840-044E-11D1-B3E9-00805F499D93} (Java Runtime Environment 1.6.0)
DPF name: Java Runtime Environment 1.6.0
CLSID name:
Installer:
Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
description: Sun Java
classification: Legitimate
known filename: %PROGRAM FILES%\JabaSoft\JRE\*\Bin\npjava131.dll
info link:
info source: Patrick M. Kolla
Path: C:\Program Files (x86)\Java\jre7\bin\
Long name: jp2iexp.dll
Short name:
Date (created): 29.11.2012 21:26:36
Date (last access): 21.01.2013 02:22:38
Date (last write): 29.11.2012 21:26:36
Filesize: 184808
Attributes: archive
MD5: B8BDDBB345E30359F9A83B4A963ACC06
CRC32: 27CFBF7E
Version: 10.9.2.5
{CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
DPF name: Java Runtime Environment 1.6.0
CLSID name: Java Plug-in 1.6.0_24
Installer:
Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_24-windows-i586.cab
Path: C:\Program Files (x86)\Java\jre7\bin\
Long name: jp2iexp.dll
Short name:
Date (created): 29.11.2012 21:26:36
Date (last access): 21.01.2013 02:22:38
Date (last write): 29.11.2012 21:26:36
Filesize: 184808
Attributes: archive
MD5: B8BDDBB345E30359F9A83B4A963ACC06
CRC32: 27CFBF7E
Version: 10.9.2.5
{CAFEEFAC-0016-0000-0031-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
DPF name: Java Runtime Environment 1.6.0
CLSID name: Java Plug-in 1.6.0_31
Installer:
Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
Path: C:\Program Files (x86)\Java\jre7\bin\
Long name: jp2iexp.dll
Short name:
Date (created): 29.11.2012 21:26:36
Date (last access): 21.01.2013 02:22:38
Date (last write): 29.11.2012 21:26:36
Filesize: 184808
Attributes: archive
MD5: B8BDDBB345E30359F9A83B4A963ACC06
CRC32: 27CFBF7E
Version: 10.9.2.5
{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} (Java Runtime Environment 1.6.0)
DPF name: Java Runtime Environment 1.6.0
CLSID name: Java Plug-in 10.9.2
Installer:
Codebase: hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
Path: C:\Program Files (x86)\Java\jre7\bin\
Long name: jp2iexp.dll
Short name:
Date (created): 29.11.2012 21:26:36
Date (last access): 21.01.2013 02:22:38
Date (last write): 29.11.2012 21:26:36
Filesize: 184808
Attributes: archive
MD5: B8BDDBB345E30359F9A83B4A963ACC06
CRC32: 27CFBF7E
Version: 10.9.2.5
{D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object)
DPF name:
CLSID name: Shockwave Flash Object
Installer: C:\Windows\Downloaded Program Files\swflash64.inf
Codebase: hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
description: Macromedia Shockwave Flash Player
classification: Legitimate
known filename:
info link:
info source: Patrick M. Kolla
Path: C:\Windows\SysWOW64\Macromed\Flash\
Long name: Flash32_11_5_502_146.ocx
Short name: FLASH3~1.OCX
Date (created): 09.01.2013 09:10:14
Date (last access): 21.01.2013 02:22:48
Date (last write): 09.01.2013 09:10:16
Filesize: 14461448
Attributes: readonly archive
MD5: 7E57B6D3D74CB9EF3055BA4E89F038D4
CRC32: 3D83C88C
Version: 11.5.502.146
--- Process list ---
PID: 0 ( 0) [System]
PID: 5028 (4508) C:\Windows\BisonCam\BisonAPP.exe
size: 49152
MD5: 326137C46B4A977BD953FFA964FA17CA
PID: 1720 ( 732) C:\Program Files\Alwil Software\Avast5\AvastUI.exe
size: 4297136
MD5: 083649EF692A066880C9326020915AFE
PID: 5192 ( 732) C:\Windows\SysWOW64\mmrtkrnl.exe
size: 46592
MD5: CB7A6A9F873115183F950C193F278967
PID: 5280 ( 732) C:\Program Files (x86)\Samsung\Kies\KiesTrayAgent.exe
size: 3524536
MD5: 6B115CE521D96900373775ECAC975D59
PID: 1208 ( 884) C:\Program Files\Motorola\Bluetooth\btplayerctrl.exe
size: 1376304
MD5: DFEF49B5CAF4D0A19C370FB056B596D4
PID: 3592 (4508) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
size: 917400
MD5: 4990B19FE86D7D07BD51B6FD9BF353A4
PID: 5076 (3592) C:\Program Files (x86)\Mozilla Firefox\plugin-container.exe
size: 17304
MD5: 9165949AAED0EA74EE4531D8603D59B0
PID: 2928 (5076) C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_11_5_502_146.exe
size: 1808392
MD5: 4EBF0CF9B48781DA145A147AA7E9E505
PID: 6704 (2928) C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_11_5_502_146.exe
size: 1808392
MD5: 4EBF0CF9B48781DA145A147AA7E9E505
PID: 3872 (4508) C:\Users\Rico\Downloads\HijackThis.exe
size: 388608
MD5: 9A2347903D6EDB84C10F288BC0578C1C
PID: 1444 (1084) C:\Program Files (x86)\Spybot - Search & Destroy\SpybotSD.exe
size: 5365592
MD5: 0477C2F9171599CA5BC3307FDFBA8D89
PID: 4364 (1084) C:\Program Files (x86)\Spybot - Search & Destroy\TeaTimer.exe
size: 2144088
MD5: 896A1DB9A972AD2339C2E8569EC926D1
PID: 6024 (4508) C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbam.exe
size: 824232
MD5: 339DFA98DDDA7DDF735CE21C82E6F1DD
PID: 4 ( 0) System
PID: 372 ( 4) smss.exe
PID: 492 ( 440) csrss.exe
PID: 596 ( 372) psxss.exe
PID: 616 ( 604) csrss.exe
PID: 628 ( 440) wininit.exe
size: 96256
PID: 672 ( 628) services.exe
PID: 712 ( 604) winlogon.exe
PID: 756 ( 628) lsass.exe
PID: 764 ( 628) lsm.exe
PID: 884 ( 672) svchost.exe
size: 20992
PID: 956 ( 672) nvvsvc.exe
PID: 980 ( 672) nvSCPAPISvr.exe
PID: 1020 ( 672) svchost.exe
size: 20992
PID: 752 ( 672) svchost.exe
size: 20992
PID: 1036 ( 672) svchost.exe
size: 20992
PID: 1064 ( 672) svchost.exe
size: 20992
PID: 1156 ( 672) svchost.exe
size: 20992
PID: 1192 ( 672) svchost.exe
size: 20992
PID: 1264 ( 672) svchost.exe
size: 20992
PID: 1448 ( 956) nvxdsync.exe
PID: 1460 ( 956) nvvsvc.exe
PID: 1668 ( 672) AvastSvc.exe
PID: 1696 ( 672) afwServ.exe
PID: 1796 ( 672) spoolsv.exe
PID: 1872 ( 672) svchost.exe
size: 20992
PID: 2016 ( 672) PhotoshopElementsFileAgent.exe
PID: 1576 ( 672) armsvc.exe
PID: 1616 ( 672) svchost.exe
size: 20992
PID: 1592 ( 672) ALDITALKVerbindungsassistent_Service.exe
PID: 1240 ( 672) svchost.exe
size: 20992
PID: 1824 ( 672) devmgrsrv.exe
PID: 2092 ( 672) audiosrv.exe
PID: 2124 ( 672) CISVC.EXE
PID: 2232 ( 672) svchost.exe
size: 20992
PID: 2564 ( 672) C:\Windows\System32\taskhost.exe
PID: 2752 ( 672) FileZilla server.exe
PID: 2832 ( 672) svchost.exe
size: 20992
PID: 2852 ( 672) inetinfo.exe
PID: 2880 ( 672) svchost.exe
size: 20992
PID: 2904 ( 672) svchost.exe
size: 20992
PID: 2668 ( 672) MemeoBackgroundService.exe
PID: 384 (1448) C:\Program Files\NVIDIA Corporation\Display\nvtray.exe
size: 2448744
MD5: 315CE3F09A3E945A50B1F412CAAE5F14
PID: 3104 ( 672) mqsvc.exe
PID: 3132 ( 672) SMSvcHost.exe
PID: 3268 ( 672) PnkBstrA.exe
size: 76888
PID: 3312 ( 672) ProgDvbService.exe
PID: 3436 ( 672) SeagateDashboardService.exe
PID: 3480 ( 672) TCPSVCS.EXE
size: 9216
PID: 3540 ( 672) snmp.exe
size: 47616
PID: 3580 ( 672) svchost.exe
size: 20992
PID: 3620 ( 672) TeamViewer_Service.exe
PID: 3756 ( 672) VMCService.exe
PID: 3788 ( 672) svchost.exe
size: 20992
PID: 3816 ( 672) WLIDSVC.EXE
PID: 3908 ( 672) LEsrv.exe
PID: 3928 (3816) WLIDSVCM.EXE
PID: 4044 ( 672) obexsrv.exe
PID: 4076 ( 672) mqtgsvc.exe
PID: 3308 ( 672) SMSvcHost.exe
PID: 1924 ( 672) nfsclnt.exe
PID: 4428 ( 672) FNPLicensingService64.exe
PID: 4512 ( 672) sppsvc.exe
PID: 4644 ( 672) svchost.exe
size: 20992
PID: 2844 (1036) C:\Windows\System32\dwm.exe
PID: 4508 (4128) C:\Windows\explorer.exe
size: 2871808
MD5: 332FEAB1435662FC6C672E25BEB37BE3
PID: 5016 (4508) C:\Program Files\Logitech\SetPointP\SetPoint.exe
size: 1744152
MD5: DF72D700CC33611206675B8A2FD4D4F9
PID: 5048 (4508) C:\Windows\System32\rundll32.exe
size: 44544
MD5: 51138BEEA3E2C21EC44D0932C71762A8
PID: 4956 ( 672) SearchIndexer.exe
size: 427520
PID: 4960 (4508) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
size: 13374568
MD5: D007799BCE71206A5783DD510D4BC36A
PID: 4948 (4508) C:\Windows\WindowsMobile\wmdc.exe
size: 660360
MD5: 233A10D4B3F6897899112E4EC60F1906
PID: 3688 ( 672) svchost.exe
size: 20992
PID: 5492 (5016) C:\Program Files\Common Files\Logishrd\KHAL3\KHALMNPR.exe
size: 231704
MD5: 03CC97EC838FBBA69E6E5FD744012C31
PID: 5352 ( 884) unsecapp.exe
PID: 4204 ( 884) WmiPrvSE.exe
PID: 2456 ( 672) wmpnetwk.exe
PID: 5380 ( 672) IAStorDataMgrSvc.exe
PID: 5696 ( 672) NASvc.exe
PID: 5008 ( 672) svchost.exe
size: 20992
PID: 5512 ( 672) svchost.exe
size: 20992
PID: 6328 ( 672) svchost.exe
size: 20992
PID: 2076 ( 884) dllhost.exe
size: 7168
PID: 6904 (4508) Defogger.exe
PID: 6184 ( 616) conhost.exe
PID: 6524 (4508) OTL.exe
PID: 2252 (4956) SearchProtocolHost.exe
size: 164352
PID: 5832 ( 752) audiodg.exe
PID: 5040 (4956) SearchFilterHost.exe
size: 86528
--- Browser start & search pages list ---
Spybot - Search & Destroy browser pages report, 21.01.2013 02:27:49
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Local Page
C:\Windows\system32\blank.htm
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Search Page
hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page
hxxp://go.microsoft.com/fwlink/?LinkId=69157
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Local Page
C:\Windows\SysWOW64\blank.htm
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Search Page
hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Start Page
hxxp://go.microsoft.com/fwlink/?LinkId=69157
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Page_URL
hxxp://go.microsoft.com/fwlink/?LinkId=69157
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\Default_Search_URL
hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Search\SearchAssistant
hxxp://www.google.com
--- Winsock Layered Service Provider list ---
Protocol 0: MSAFD-Tcpip [TCP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip [*]
Protocol 1: MSAFD-Tcpip [UDP/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip [*]
Protocol 2: MSAFD-Tcpip [RAW/IP]
GUID: {E70F1AA0-AB8B-11CF-8CA3-00805F48A192}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IP protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip [*]
Protocol 3: MSAFD-Tcpip [TCP/IPv6]
GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IPv6 protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip [*]
Protocol 4: MSAFD-Tcpip [UDP/IPv6]
GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IPv6 protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip [*]
Protocol 5: MSAFD-Tcpip [RAW/IPv6]
GUID: {F9EAB0C0-26D4-11D0-BBBF-00AA006C34E4}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP IPv6 protocol
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD Tcpip [*]
Protocol 6: RSVP-TCPv6-Dienstanbieter
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider
Protocol 7: RSVP-TCP-Dienstanbieter
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider
Protocol 8: RSVP-UDPv6-Dienstanbieter
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider
Protocol 9: RSVP-UDP-Dienstanbieter
GUID: {9D60A9E0-337A-11D0-BD88-0000C082E69A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Microsoft Windows NT/2k/XP RVSP
DB filename: %SystemRoot%\system32\rsvpsp.dll
DB protocol: RSVP * Service Provider
Protocol 10: MSAFD RfComm [Bluetooth]
GUID: {9FC48064-7298-43E4-B7BD-181F2089792A}
Filename: %SystemRoot%\system32\mswsock.dll
Description: Bluetooth
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: MSAFD RfComm [Bluetooth]
Protocol 11: MSAFD Pgm (RDM)
GUID: {803FB283-D664-4FD0-B5F7-5FF85B8E8AA0}
Filename: %SystemRoot%\system32\mswsock.dll
Protocol 12: MSAFD Pgm (Stream)
GUID: {803FB283-D664-4FD0-B5F7-5FF85B8E8AA0}
Filename: %SystemRoot%\system32\mswsock.dll
Namespace Provider 0: NLA (Network Location Awareness, NLAv1)-Namespace
GUID: {6642243A-3BA8-4AA6-BAA5-2E0BD71FDD83}
Filename:
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: NLA-Namespace
Namespace Provider 1: E-Mail-Namenshimanbieter
GUID: {964ACBA2-B2BC-40EB-8C6A-A6DB40161CAE}
Filename:
Namespace Provider 2: PNRP-Wolken-Namespaceanbieter
GUID: {03FE89CE-766D-4976-B9C1-BB9BC42C7B4D}
Filename:
Namespace Provider 3: PNRP-Namen-Namespaceanbieter
GUID: {03FE89CD-766D-4976-B9C1-BB9BC42C7B4D}
Filename:
Namespace Provider 4: Bluetooth-Namespace
GUID: {06AA63E0-7D60-41FF-AFB2-3EE6D2D9392D}
Filename: %SystemRoot%\system32\wshbth.dll
Description: Bluetooth
DB filename: %SystemRoot%\system32\wshbth.dll
DB protocol: Bluetooth-Namespace
Namespace Provider 5: WindowsLive NSP
GUID: {4177DDE9-6028-479E-B7B7-03591A63FF3A}
Filename: C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
Namespace Provider 6: WindowsLive Local NSP
GUID: {229F2A2C-5F18-4A06-8F89-3A372170624D}
Filename: C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL
Namespace Provider 7: TCP/IP
GUID: {22059D40-7E9E-11CF-AE5A-00AA00A7112B}
Filename:
Description: Microsoft Windows NT/2k/XP TCP/IP name space provider
DB filename: %SystemRoot%\system32\mswsock.dll
DB protocol: TCP/IP
Namespace Provider 8: NTDS
GUID: {3B2637EE-E580-11CF-A555-00C04FD8D4AC}
Filename: %SystemRoot%\System32\winrnr.dll
Description: Microsoft Windows NT/2k/XP name space provider
DB filename: %SystemRoot%\system32\winrnr.dll
DB protocol: NTDS
Namespace Provider 9: mdnsNSP
GUID: {B600E6E9-553B-4A19-8696-335E5C896153}
Filename: C:\Program Files (x86)\Bonjour\mdnsNSP.dll
Description: Apple Rendezvous protocol
DB filename: %ProgramFiles%\Rendezvous\bin\mdnsNSP.dll
DB protocol: mdnsNSP so war heute früh beim MDK (medizin Dienst krankenkasse) und lappi lief noch!!
bin vorm mittag wieder zu hause angekommen und lappi aus gestartet systemreperatur .... versucht wiederherzustellen schlägt fehl kann nicht ausgeführt werden !!!!!:headbang::headbang::headbang::headbang::headbang:
das heist alle daten weg!! muß system neu aufsetzen!!
bin aktuell am großen PC !!
versuche gerade die Bilder meiner kamera zu retten hab Festplatte ausgebaut und an Hama adapter dran . melde mich wieder wenn es neues giebt!! |