|
Log-Analyse und Auswertung: Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht?Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
17.11.2013, 02:46 | #1 |
| Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? Hallo zusammen, ich wende mich an euch, da das Windows-Sicherheitscenter, sowie Windows Defender nicht mehr aufrufbar sind. AntiVir meldet eine Verseuchung der Windows-eigenen services.exe. Außerdem scheint der standardmäßige IMAP-Port geblockt zu sein, da darauf kein Zugriff mehr möglich ist. Nachfolgend hänge ich die Logfiles von FRST, GMER und Defogger an: FRST: Code:
ATTFilter Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 17-11-2013 Ran by ***** (administrator) on ***** on 17-11-2013 02:15:15 Running from C:\Users\*****\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GYG31I2D Windows 7 Enterprise Service Pack 1 (X64) OS Language: German Standard Internet Explorer Version 10 Boot Mode: Normal ==================== Processes (Whitelisted) ================= () C:\Windows\system32\services.exe (AMD) C:\Windows\system32\atiesrxx.exe (AMD) C:\Windows\system32\atieclxx.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe (Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe (Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe (Hendrik Eifert) C:\Program Files\EDP\server\EDPServer.exe (Firebird Project) C:\Program Files\Firebird\Firebird_2_1\bin\fbguard.exe (Intel(R) Corporation) C:\Program Files\Intel\iCLS Client\HeciServer.exe () C:\Program Files\Intel\Intel(R) Smart Connect Technology Agent\iSCTAgent.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe (LogMeIn, Inc.) C:\Program Files (x86)\LogMeIn Hamachi\LMIGuardianSvc.exe (Microsoft Corporation) C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe () C:\Windows\SysWOW64\PnkBstrA.exe () C:\Windows\SysWOW64\PnkBstrB.exe (Microsoft Corporation) C:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe (Microsoft Corporation) C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe (TeamViewer GmbH) C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe (Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE (LogMeIn Inc.) C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2.exe (Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avshadow.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\LCore.exe (Dropbox, Inc.) C:\Users\*****\AppData\Roaming\Dropbox\bin\Dropbox.exe (Adobe Systems Incorporated) C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\AAM Updates Notifier.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe (Geek Software GmbH) C:\Program Files (x86)\PDF24\pdf24.exe (Advanced Micro Devices Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe (Razer Inc.) C:\Program Files (x86)\Razer\Synapse\RzSynapse.exe (Apple Inc.) C:\Program Files (x86)\iTunes\iTunesHelper.exe (LogMeIn Inc.) C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\Applets\LCDRSS.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\Applets\LCDPictureViewer.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\Applets\LCDClock.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\Applets\LCDMovieViewer.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\Applets\LCDYT.exe (ATI Technologies Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\Applets\LCDMedia.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\Applets\LCDPop3.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\Applets\LCDWebCam.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\Applets\LCDCountdown.exe (Mozilla Corporation) C:\Program Files (x86)\Mozilla Firefox\firefox.exe (Firebird Project) C:\Program Files\Firebird\Firebird_2_1\bin\fbserver.exe (Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe (Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe ==================== Registry (Whitelisted) ================== HKLM\...\Run: [Launch LCore] - C:\Program Files\Logitech Gaming Software\LCore.exe [7406392 2012-11-29] (Logitech Inc.) HKLM\...\Run: [AdobeAAMUpdater-1.0] - C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\updaterstartuputility.exe [444904 2012-09-20] (Adobe Systems Incorporated) HKCU\...\Run: [AdobeBridge] - [x] HKLM-x32\...\Run: [avgnt] - C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe [347192 2013-09-02] (Avira Operations GmbH & Co. KG) HKLM-x32\...\Run: [] - [x] HKLM-x32\...\Run: [StartCCC] - C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe [642808 2012-12-19] (Advanced Micro Devices, Inc.) HKLM-x32\...\Run: [AdobeCS6ServiceManager] - C:\Program Files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe [1075296 2013-04-25] (Adobe Systems Incorporated) HKLM-x32\...\Run: [PDFPrint] - C:\Program Files (x86)\PDF24\pdf24.exe [163000 2012-12-12] (Geek Software GmbH) HKLM-x32\...\Run: [Razer Synapse] - C:\Program Files (x86)\Razer\Synapse\RzSynapse.exe [442200 2013-09-28] (Razer Inc.) HKLM-x32\...\Run: [Adobe ARM] - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [958576 2013-04-04] (Adobe Systems Incorporated) HKLM-x32\...\Run: [QuickTime Task] - C:\Program Files (x86)\QuickTime\QTTask.exe [421888 2013-05-01] (Apple Inc.) HKLM-x32\...\Run: [iTunesHelper] - C:\Program Files (x86)\iTunes\iTunesHelper.exe [152392 2013-11-02] (Apple Inc.) HKLM-x32\...\Run: [LogMeIn Hamachi Ui] - C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe [2349392 2013-11-11] (LogMeIn Inc.) HKU\Julian\...\Run: [Spotify Web Helper] - C:\Users\*****\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe [1168896 2013-11-13] (Spotify Ltd) HKU\Julian\...\Run: [Skype] - C:\Program Files (x86)\Skype\Phone\Skype.exe [20551328 2013-10-21] (Skype Technologies S.A.) HKU\Julian\...\Run: [Exetender_148] - "C:\Program Files (x86)\FreeRide Games\GPlayer.exe" /schedule 300000 HKU\Julian\...\Run: [Spotify] - C:\Users\*****\AppData\Roaming\Spotify\spotify.exe [5955072 2013-11-13] (Spotify Ltd) HKU\*****\...\Run: [AdobeBridge] - [x] HKU\*****\...\Run: [Spotify] - C:\Users\*****\AppData\Roaming\Spotify\spotify.exe [5955072 2013-11-13] (Spotify Ltd) HKU\*****\...\Run: [Spotify Web Helper] - C:\Users\*****\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe [1168896 2013-11-13] (Spotify Ltd) Startup: C:\Users\******\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk ShortcutTarget: Dropbox.lnk -> C:\Users\*****\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.) Startup: C:\Users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CurseClientStartup.ccip () Startup: C:\Users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk ShortcutTarget: Dropbox.lnk -> C:\Users\******\AppData\Roaming\Dropbox\bin\Dropbox.exe (No File) Startup: C:\Users\*****\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk ShortcutTarget: Dropbox.lnk -> C:\Users\******\AppData\Roaming\Dropbox\bin\Dropbox.exe (No File) ==================== Internet (Whitelisted) ==================== HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://de.msn.com/?ocid=iehp HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0x0CDCCAFAE7FBCD01 HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de-DE StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe SearchScopes: HKLM - DefaultScope value is missing. BHO: Lync Browser Helper - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files\Microsoft Office\Office15\OCHelper.dll (Microsoft Corporation) BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation) BHO: Office Document Cache Handler - {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\Program Files\Microsoft Office\Office15\URLREDIR.DLL (Microsoft Corporation) BHO: Microsoft SkyDrive Pro Browser Helper - {D0498E0A-45B7-42AE-A9AA-ABA463DBD3BF} - C:\Program Files\Microsoft Office\Office15\GROOVEEX.DLL (Microsoft Corporation) BHO-x32: Lync Browser Helper - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office15\OCHelper.dll (Microsoft Corporation) BHO-x32: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation) BHO-x32: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\microsoft shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation) BHO-x32: Office Document Cache Handler - {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\Program Files (x86)\Microsoft Office\Office15\URLREDIR.DLL (Microsoft Corporation) BHO-x32: Microsoft SkyDrive Pro Browser Helper - {D0498E0A-45B7-42AE-A9AA-ABA463DBD3BF} - C:\Program Files (x86)\Microsoft Office\Office15\GROOVEEX.DLL (Microsoft Corporation) BHO-x32: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation) DPF: HKLM-x32 {4FF78044-96B4-4312-A5B7-FDA3CB328095} Handler: osf - {D924BDC6-C83A-4BD5-90D0-095128A113D1} - C:\Program Files\Microsoft Office\Office15\MSOSB.DLL (Microsoft Corporation) Handler-x32: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll (Skype Technologies) Winsock: Catalog5 01 mswsock.dll [326144] () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll" Winsock: Catalog5 05 mswsock.dll [326144] () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll" Winsock: Catalog9 01 mswsock.dll [326144] () Winsock: Catalog9 02 mswsock.dll [326144] () Winsock: Catalog9 03 mswsock.dll [326144] () Winsock: Catalog9 04 mswsock.dll [326144] () Winsock: Catalog9 05 mswsock.dll [326144] () Winsock: Catalog9 06 mswsock.dll [326144] () Winsock: Catalog9 07 mswsock.dll [326144] () Winsock: Catalog9 08 mswsock.dll [326144] () Winsock: Catalog9 09 mswsock.dll [326144] () Winsock: Catalog9 10 mswsock.dll [326144] () Winsock: Catalog5-x64 01 mswsock.dll [326144] () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll" Winsock: Catalog5-x64 05 mswsock.dll [326144] () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll" Winsock: Catalog9-x64 01 mswsock.dll [326144] () Winsock: Catalog9-x64 02 mswsock.dll [326144] () Winsock: Catalog9-x64 03 mswsock.dll [326144] () Winsock: Catalog9-x64 04 mswsock.dll [326144] () Winsock: Catalog9-x64 05 mswsock.dll [326144] () Winsock: Catalog9-x64 06 mswsock.dll [326144] () Winsock: Catalog9-x64 07 mswsock.dll [326144] () Winsock: Catalog9-x64 08 mswsock.dll [326144] () Winsock: Catalog9-x64 09 mswsock.dll [326144] () Winsock: Catalog9-x64 10 mswsock.dll [326144] () Tcpip\Parameters: [DhcpNameServer] 192.168.2.1 FireFox: ======== FF ProfilePath: C:\Users\******\AppData\Roaming\Mozilla\Firefox\Profiles\lf2hkcfy.default FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_11_9_900_117.dll () FF Plugin: @Microsoft.com/NpCtrl,version=1.0 - C:\Program Files\Microsoft Silverlight\5.1.20125.0\npctrl.dll ( Microsoft Corporation) FF Plugin: @microsoft.com/SharePoint,version=14.0 - C:\PROGRA~1\MICROS~2\Office15\NPSPWRAP.DLL (Microsoft Corporation) FF Plugin: @videolan.org/vlc,version=2.0.5 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN) FF Plugin: adobe.com/AdobeAAMDetect - C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\CCM\Utilities\npAdobeAAMDetect64.dll (Adobe Systems) FF Plugin: adobe.com/AdobeExManDetect - C:\Program Files (x86)\Adobe\Adobe Extension Manager CS6\Win64Plugin\npAdobeExManDetectX64.dll (Adobe Systems) FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_9_900_117.dll () FF Plugin-x32: @Apple.com/iTunes,version=1.0 - C:\Program Files (x86)\iTunes\Mozilla Plugins\npitunes.dll () FF Plugin-x32: @esn.me/esnsonar,version=0.70.4 - C:\Program Files (x86)\Battlelog Web Plugins\Sonar\0.70.4\npesnsonar.dll (ESN Social Software AB) FF Plugin-x32: @esn/esnlaunch,version=2.1.7 - C:\Program Files (x86)\Battlelog Web Plugins\2.1.7\npesnlaunch.dll (ESN Social Software AB) FF Plugin-x32: @intel-webapi.intel.com/Intel WebAPI ipt;version=2.1.42 - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT\npIntelWebAPIIPT.dll (Intel Corporation) FF Plugin-x32: @intel-webapi.intel.com/Intel WebAPI updater - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT\npIntelWebAPIUpdater.dll (Intel Corporation) FF Plugin-x32: @java.com/DTPlugin,version=10.45.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation) FF Plugin-x32: @java.com/JavaPlugin,version=10.45.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation) FF Plugin-x32: @microsoft.com/Lync,version=15.0 - C:\Program Files (x86)\Mozilla Firefox\plugins\npmeetingjoinpluginoc.dll (Microsoft Corporation) FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 - C:\Program Files (x86)\Microsoft Silverlight\5.1.20125.0\npctrl.dll ( Microsoft Corporation) FF Plugin-x32: @microsoft.com/SharePoint,version=14.0 - C:\PROGRA~2\MICROS~2\Office15\NPSPWRAP.DLL (Microsoft Corporation) FF Plugin-x32: @nielsen/FirefoxTracker - C:\Program Files (x86)\NetRatingsNetSight\NetSight\meter2\FirefoxAddOns\npfirefoxtracker.dll No File FF Plugin-x32: @tools.google.com/Google Update;version=3 - C:\Program Files (x86)\Google\Update\1.3.21.165\npGoogleUpdate3.dll (Google Inc.) FF Plugin-x32: @tools.google.com/Google Update;version=9 - C:\Program Files (x86)\Google\Update\1.3.21.165\npGoogleUpdate3.dll (Google Inc.) FF Plugin-x32: Adobe Reader - C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.) FF Plugin-x32: adobe.com/AdobeAAMDetect - C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\CCM\Utilities\npAdobeAAMDetect32.dll (Adobe Systems) FF Plugin-x32: adobe.com/AdobeExManDetect - C:\Program Files (x86)\Adobe\Adobe Extension Manager CS6\npAdobeExManDetectX86.dll (Adobe Systems) FF SearchPlugin: C:\Users\******\AppData\Roaming\Mozilla\Firefox\Profiles\lf2hkcfy.default\searchplugins\youtube-videosuche.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml FF Extension: exif_viewer - C:\Users\******\AppData\Roaming\Mozilla\Firefox\Profiles\lf2hkcfy.default\Extensions\exif_viewer@mozilla.doslash.org.xpi FF Extension: firefox-hotfix - C:\Users\******\AppData\Roaming\Mozilla\Firefox\Profiles\lf2hkcfy.default\Extensions\firefox-hotfix@mozilla.org.xpi FF HKLM-x32\...\Firefox\Extensions: [netsight@nielsen.com] - C:\Program Files (x86)\NetRatingsNetSight\NetSight\meter2\FirefoxAddOns\netsight@nielsen.xpi ==================== Services (Whitelisted) ================= R2 AntiVirSchedulerService; C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe [84024 2013-09-02] (Avira Operations GmbH & Co. KG) R2 AntiVirService; C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe [108088 2013-09-02] (Avira Operations GmbH & Co. KG) R2 EDPSrv; C:\Program Files\EDP\server\EDPServer.exe [1964032 2012-11-30] (Hendrik Eifert) R2 FirebirdGuardianDefaultInstance; C:\Program Files\Firebird\Firebird_2_1\bin\fbguard.exe [114688 2011-02-01] (Firebird Project) R3 FirebirdServerDefaultInstance; C:\Program Files\Firebird\Firebird_2_1\bin\fbserver.exe [4000768 2011-02-01] (Firebird Project) R2 ISCTAgent; C:\Program Files\Intel\Intel(R) Smart Connect Technology Agent\iSCTAgent.exe [146984 2012-07-24] () R2 jhi_service; C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe [165760 2012-07-17] (Intel Corporation) R2 LMIGuardianSvc; C:\Program Files (x86)\LogMeIn Hamachi\LMIGuardianSvc.exe [377104 2013-10-11] (LogMeIn, Inc.) R2 MSSQL$JTLWAWI; C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [29178224 2007-02-10] (Microsoft Corporation) R2 PnkBstrA; C:\Windows\SysWow64\PnkBstrA.exe [75064 2013-10-25] () R2 PnkBstrB; C:\Windows\SysWow64\PnkBstrB.exe [189248 2013-10-25] () ==================== Drivers (Whitelisted) ==================== S3 AbilisT; C:\Windows\System32\DRIVERS\AbilisBdaTuner.sys [131144 2010-04-12] (ABILIS Systems) S2 atksgt; C:\Windows\System32\DRIVERS\atksgt.sys [310984 2013-07-28] () R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [105344 2013-09-02] (Avira Operations GmbH & Co. KG) R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [132088 2013-09-02] (Avira Operations GmbH & Co. KG) R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [28600 2013-04-01] (Avira Operations GmbH & Co. KG) R1 dtsoftbus01; C:\Windows\System32\DRIVERS\dtsoftbus01.sys [283200 2013-06-30] (DT Soft Ltd) R3 ikbevent; C:\Windows\System32\DRIVERS\ikbevent.sys [20968 2012-07-24] () R3 imsevent; C:\Windows\System32\DRIVERS\imsevent.sys [19944 2012-07-24] () R3 ISCT; C:\Windows\System32\DRIVERS\ISCTD64.sys [46016 2012-07-24] () R3 LGPBTDD; C:\Windows\System32\Drivers\LGPBTDD.sys [30728 2009-07-01] (Logitech Inc.) R2 lirsgt; C:\Windows\System32\DRIVERS\lirsgt.sys [42696 2013-02-01] () S3 PlantronicsGC; C:\Windows\System32\drivers\PLTGC.sys [1327104 2011-11-05] (C-Media Electronics Inc) R3 WPRO_41_2001; C:\Windows\System32\drivers\WPRO_41_2001.sys [34752 2013-11-17] () S3 cpuz136; \??\C:\Windows\TEMP\cpuz136\cpuz136_x64.sys [x] S3 MSICDSetup; \??\D:\CDriver64.sys [x] S3 NTIOLib_1_0_C; \??\D:\NTIOLib_X64.sys [x] S3 VGPU; System32\drivers\rdvgkmd.sys [x] ==================== NetSvcs (Whitelisted) =================== ==================== One Month Created Files and Folders ======== hxxp://www.amyuni.com) C:\Windows\SysWOW64\cdintf250.dll 2013-11-17 02:12 - 2013-11-17 02:12 - 00000000 ____D C:\Users\******\Desktop\Hilfe 2013-11-17 02:10 - 2013-11-17 02:10 - 00050477 _____ C:\Users\******\Downloads\Defogger.exe 2013-11-17 02:10 - 2013-11-17 02:10 - 00000500 _____ C:\Users\******\Downloads\defogger_disable.log 2013-11-17 02:10 - 2013-11-17 02:10 - 00000000 _____ C:\Users\******\defogger_reenable 2013-11-17 01:41 - 2013-11-17 01:41 - 01071224 _____ (Solid State Networks) C:\Users\******\Downloads\install_flashplayer11x32au_mssd_aaa_aih.exe 2013-11-17 01:23 - 2013-11-17 01:23 - 00013347 _____ C:\Users\******\Desktop\Rechnung1.vlg 2013-11-16 17:22 - 2013-11-16 17:23 - 00056963 _____ C:\Users\*****\Downloads\FRST.txt 2013-11-16 13:36 - 2013-11-16 13:36 - 00000000 ____D C:\Users\Julian\Documents\WB Games 2013-11-16 01:06 - 2013-11-16 01:06 - 104513208 _____ C:\Windows\SysWOW64\耴® 2013-11-15 15:47 - 2013-11-15 15:47 - 00056663 _____ C:\Users\Julian\Downloads\avenged_sevenfold_beast_and_the_harlot.gp4 2013-11-15 14:45 - 2013-11-15 14:45 - 104401821 _____ C:\Windows\SysWOW64\ö륡6 2013-11-14 21:16 - 2013-11-14 21:16 - 104278918 _____ C:\Windows\SysWOW64\肴 2013-11-14 20:26 - 2013-11-14 20:26 - 00000209 _____ C:\Users\Julian\Desktop\Gotham City Impostors Free To Play.url 2013-11-14 19:57 - 2013-11-16 11:10 - 00005072 _____ C:\Windows\System32\Tasks\Microsoft Office 15 Sync Maintenance for ***** 2013-11-14 18:35 - 2013-11-16 17:11 - 00005128 _____ C:\Windows\System32\Tasks\Microsoft Office 15 Sync Maintenance for ***** 2013-11-14 18:33 - 2013-11-14 18:33 - 00000000 ____D C:\Users\*****\AppData\Local\LogMeIn 2013-11-14 15:17 - 2013-11-14 15:17 - 104225154 _____ C:\Windows\SysWOW64\ﺣŠ 2013-11-13 22:37 - 2013-11-13 22:37 - 00000000 ____D C:\Users\Julian\Desktop\Neuer Ordner 2013-11-13 20:08 - 2013-11-13 20:08 - 00000000 ____D C:\Program Files (x86)\LogMeIn Hamachi 2013-11-12 13:59 - 2013-11-12 19:59 - 103974937 _____ C:\Windows\SysWOW64\鳴핡ž 2013-11-11 22:39 - 2013-11-11 22:39 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Doublefine 2013-11-11 14:12 - 2013-11-11 14:12 - 103716811 _____ C:\Windows\SysWOW64\ᑈ狊£ 2013-11-10 22:24 - 2013-11-10 22:24 - 00000209 _____ C:\Users\Julian\Desktop\Brtal Legend.url 2013-11-10 15:16 - 2013-11-10 22:12 - 103551423 _____ C:\Windows\SysWOW64\寗惞– 2013-11-09 21:37 - 2013-11-09 21:37 - 00078979 _____ C:\Users\Julian\Downloads\slipknot_til_we_die.gp5 2013-11-09 21:36 - 2013-11-09 21:36 - 00047441 _____ C:\Users\Julian\Downloads\slipknot_people_shit.gp4 2013-11-09 21:35 - 2013-11-09 21:35 - 00175948 _____ C:\Users\Julian\Downloads\slipknot_dead_memories.gpx 2013-11-09 16:12 - 2013-11-09 16:12 - 103387443 _____ C:\Windows\SysWOW64\惽㷚Ÿ 2013-11-09 16:06 - 2013-11-09 16:06 - 00061746 _____ C:\Users\Julian\Downloads\in_extremo_liam.gp5 2013-11-09 15:35 - 2013-11-09 15:35 - 00001783 _____ C:\Users\Public\Desktop\iTunes.lnk 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\ProgramData\34BE82C4-E596-4e99-A191-52C6199EBF69 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\Program Files\iTunes 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\Program Files\iPod 2013-11-09 10:12 - 2013-11-09 10:12 - 103347145 _____ C:\Windows\SysWOW64\ꠓ 2013-11-08 21:07 - 2013-11-08 21:07 - 103316092 _____ C:\Windows\SysWOW64\퓠�‰ 2013-11-08 16:58 - 2013-11-08 16:58 - 00055959 _____ C:\Users\Julian\Downloads\iron_maiden_the_trooper.gp3 2013-11-08 14:11 - 2013-11-08 14:11 - 103148646 _____ C:\Windows\SysWOW64\㩐쮶 2013-11-07 22:05 - 2013-11-07 22:05 - 05366672 _____ C:\Users\Julian\Downloads\DeponiaPaperFigurines.zip 2013-11-07 22:04 - 2013-11-07 22:04 - 00000209 _____ C:\Users\Julian\Desktop\Edna & Harvey Harvey's New Eyes.url 2013-11-07 21:34 - 2013-11-01 14:32 - 00000000 ____D C:\Users\Julian\Desktop\Daedalic Wallpapers 2013-11-07 21:28 - 2013-11-07 21:29 - 57475151 _____ C:\Users\Julian\Downloads\DaedalicWallpapers.zip 2013-11-07 21:26 - 2013-11-07 21:26 - 103000967 _____ C:\Windows\SysWOW64\ೱ篦‘ 2013-11-07 15:26 - 2013-11-07 15:26 - 102946670 _____ C:\Windows\SysWOW64\㎒ 2013-11-06 20:58 - 2013-11-16 12:04 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox 2013-11-06 20:26 - 2013-11-06 20:26 - 102844835 _____ C:\Windows\SysWOW64\嵧¤ 2013-11-06 14:11 - 2013-11-06 14:11 - 102722523 _____ C:\Windows\SysWOW64\葜炄¤ 2013-11-05 20:19 - 2013-11-14 20:12 - 00001281 _____ C:\Users\Julian\Desktop\KEEEEEYS ! Batman, Fear.txt 2013-11-05 20:14 - 2013-11-05 20:14 - 105085299 _____ C:\Windows\SysWOW64\ꙣడ’ 2013-11-05 14:21 - 2013-11-05 14:21 - 00103191 _____ C:\Users\Julian\Downloads\amon_amarth_deceiver_of_the_gods.gp5 2013-11-05 13:48 - 2013-11-05 13:48 - 00127786 _____ C:\Users\Julian\Downloads\slipknot_psychosocial.gp5 2013-11-05 13:19 - 2013-11-05 13:19 - 105043933 _____ C:\Windows\SysWOW64\䶾⒒˜ 2013-11-04 23:00 - 2013-11-04 23:00 - 00061685 _____ C:\Users\Julian\Downloads\amon_amarth_war_of_the_gods.gp4 2013-11-04 22:55 - 2013-11-04 22:55 - 00080266 _____ C:\Users\Julian\Downloads\amon_amarth_twilight_of_the_thunder_god.gp5 2013-11-04 22:49 - 2013-11-04 22:49 - 00071169 _____ C:\Users\Julian\Downloads\amon_amarth_guardians_of_asgaard.gp5 2013-11-04 22:41 - 2013-11-04 22:41 - 00027402 _____ C:\Users\Julian\Downloads\amon_amarth_pursuit_of_vikings.gp4 2013-11-04 21:55 - 2013-11-04 21:55 - 00050413 _____ C:\Users\Julian\Downloads\nightwish_dark_chest_of_wonders.gp4 2013-11-04 21:53 - 2013-11-04 21:53 - 00142780 _____ C:\Users\Julian\Downloads\nightwish_nemo.gpx 2013-11-04 21:51 - 2013-11-04 21:51 - 00083186 _____ C:\Users\Julian\Downloads\nightwish_amaranth.gp5 2013-11-04 21:21 - 2013-11-04 21:21 - 00053055 _____ C:\Users\Julian\Downloads\all_time_low_damned_if_i_do_ya_damned_if_i_dont.gp5 2013-11-04 21:14 - 2013-11-04 21:14 - 00058488 _____ C:\Users\Julian\Downloads\paramore_still_into_you.gp5 2013-11-04 20:18 - 2013-11-04 20:18 - 104964650 _____ C:\Windows\SysWOW64\渎歍© 2013-11-04 14:13 - 2013-11-04 14:13 - 104867914 _____ C:\Windows\SysWOW64\�濃 2013-11-03 17:54 - 2013-11-03 17:54 - 104814100 _____ C:\Windows\SysWOW64\쀽䄦R 2013-11-03 11:54 - 2013-11-03 11:54 - 104760586 _____ C:\Windows\SysWOW64\킨¦ 2013-11-02 22:25 - 2013-11-02 22:25 - 104684788 _____ C:\Windows\SysWOW64\눮�¦ 2013-11-02 14:07 - 2013-11-02 14:09 - 00011812 _____ C:\Users\Julian\Desktop\RADIO.WAV 2013-11-02 13:14 - 2013-11-02 13:14 - 104620600 _____ C:\Windows\SysWOW64\뜐쳳™ 2013-11-01 22:14 - 2013-11-01 22:14 - 104569497 _____ C:\Windows\SysWOW64\廾㫃‹ 2013-11-01 16:05 - 2013-11-01 16:05 - 00000208 _____ C:\Users\Julian\Desktop\Worms Ultimate Mayhem.url 2013-11-01 12:40 - 2013-11-01 12:40 - 00001456 _____ C:\Users\*****\AppData\Local\Adobe Für Web speichern 13.0 Prefs 2013-11-01 12:22 - 2013-11-01 13:15 - 00000000 ____D C:\Users\*****\Desktop\Hochwasser 2013-11-01 12:17 - 2013-11-01 12:17 - 104500486 _____ C:\Windows\SysWOW64\꜇뺚h 2013-10-31 17:40 - 2013-10-31 17:40 - 00000000 ____D C:\Users\******\AppData\Roaming\Lexware 2013-10-31 17:40 - 2013-10-31 17:40 - 00000000 ____D C:\Users\******\AppData\Local\Lexware 2013-10-31 16:03 - 2013-10-31 16:03 - 104348737 _____ C:\Windows\SysWOW64\甲㧽‰ 2013-10-30 22:20 - 2013-10-30 22:20 - 00084933 _____ C:\Users\Julian\Downloads\system_of_a_down_toxicity.gp5 2013-10-30 22:02 - 2013-10-30 22:02 - 00035113 _____ C:\Users\Julian\Downloads\system_of_a_down_kill_rock_n_roll.gp5 2013-10-30 21:54 - 2013-10-30 21:54 - 00113403 _____ C:\Users\Julian\Downloads\system_of_a_down_lost_in_hollywood.gp5 2013-10-30 13:16 - 2013-10-30 13:16 - 104098187 _____ C:\Windows\SysWOW64\냈뼑X 2013-10-29 21:08 - 2013-10-29 21:08 - 104021456 _____ C:\Windows\SysWOW64\嶐牘œ 2013-10-29 14:10 - 2013-10-29 14:10 - 103932228 _____ C:\Windows\SysWOW64\批⭘J 2013-10-28 21:06 - 2013-10-28 21:06 - 00045483 _____ C:\Users\Julian\Downloads\queen_we_are_the_champions.gp5 2013-10-28 20:18 - 2013-10-28 20:18 - 103792972 _____ C:\Windows\SysWOW64\嶅B 2013-10-28 14:15 - 2013-10-28 14:15 - 103734365 _____ C:\Windows\SysWOW64\著ꤣŒ 2013-10-27 21:08 - 2013-10-27 21:08 - 103533600 _____ C:\Windows\SysWOW64\�Ᏸ 2013-10-27 13:12 - 2013-10-27 13:12 - 103334033 _____ C:\Windows\SysWOW64\咅鲅V 2013-10-26 18:50 - 2013-10-26 18:50 - 103214166 _____ C:\Windows\SysWOW64\㞋嘂* 2013-10-25 23:17 - 2013-10-25 23:17 - 00000682 _____ C:\Users\Public\Desktop\Dead Space 3.lnk 2013-10-25 21:36 - 2013-10-25 21:36 - 00000000 __SHD C:\ProgramData\DSS 2013-10-25 21:35 - 2013-10-25 21:35 - 00000000 ____D C:\Program Files\Electronic Arts 2013-10-25 20:41 - 2010-09-16 18:03 - 02601752 _____ C:\Windows\SysWOW64\pbsvc_moh.exe 2013-10-25 20:40 - 2013-10-25 23:17 - 00037022 _____ C:\Windows\DirectX.log 2013-10-25 19:18 - 2013-10-26 03:02 - 103054676 _____ C:\Windows\SysWOW64\╀‹ 2013-10-25 18:47 - 2013-10-25 18:47 - 08959704 _____ C:\Users\Julian\Downloads\DrakensangOnlineSetup.exe 2013-10-25 18:47 - 2013-10-25 18:47 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Drakensang Online 2013-10-25 18:47 - 2013-10-25 18:47 - 00000000 ____D C:\Program Files (x86)\Drakensang Online 2013-10-24 23:28 - 2013-11-17 00:41 - 00018596 _____ C:\Windows\PFRO.log 2013-10-24 23:28 - 2013-11-17 00:41 - 00004984 _____ C:\Windows\setupact.log 2013-10-24 23:28 - 2013-10-24 23:28 - 00000000 _____ C:\Windows\setuperr.log 2013-10-24 23:18 - 2013-10-24 23:18 - 00000000 ____D C:\Users\Julian\Documents\Free YouTube Download Manager 2013-10-24 23:18 - 2013-10-24 23:18 - 00000000 ____D C:\Users\Julian\AppData\Local\Freetec 2013-10-24 23:17 - 2013-10-24 23:20 - 00000000 ____D C:\Program Files (x86)\Web Check 2013-10-24 23:16 - 2013-10-24 23:16 - 00733192 _____ C:\Users\Julian\Downloads\youtube-dlm_1.0_en-US.exe 2013-10-24 22:00 - 2013-10-24 22:00 - 00915368 _____ (Oracle Corporation) C:\Users\Julian\Downloads\jxpiinstall.exe 2013-10-24 17:49 - 2013-10-24 17:49 - 00000701 _____ C:\Users\Julian\Desktop\Rocksmith 2014 Edition.lnk 2013-10-24 16:36 - 2013-10-24 16:36 - 00021623 _____ C:\Users\Julian\Downloads\alice_cooper_poison.gp3 2013-10-24 12:50 - 2013-11-17 00:41 - 00094656 _____ (CACE Technologies) C:\Windows\system32\WPRO_41_2001woem.tmp 2013-10-24 12:50 - 2013-10-24 18:50 - 102837954 _____ C:\Windows\SysWOW64\ꌬ⟨— 2013-10-23 15:26 - 2013-10-24 02:11 - 102674996 _____ C:\Windows\SysWOW64\贒䓎@ 2013-10-23 09:26 - 2013-10-23 09:26 - 102541796 _____ C:\Windows\SysWOW64\芉漌˜ 2013-10-23 01:09 - 2013-10-23 01:09 - 00098254 _____ C:\Users\Julian\Downloads\andrew_lloyd_webber_phantom_of_the_opera.gp5 2013-10-22 18:44 - 2013-10-23 00:44 - 102486297 _____ C:\Windows\SysWOW64\㘝�“ 2013-10-22 12:44 - 2013-10-22 12:44 - 102327253 _____ C:\Windows\SysWOW64\— 2013-10-21 23:59 - 2013-10-21 23:59 - 00051831 _____ C:\Users\Julian\Downloads\children_of_bodom_scream_for_silence.gp5 2013-10-21 20:00 - 2013-10-21 20:00 - 01679157 _____ C:\Users\Julian\Downloads\metal_hell_frost_melodic_death_metal_richard_band_roland_the_unguided_1600x1200_wallpaper_Art 2013-10-21 19:33 - 2013-10-22 01:33 - 102278179 _____ C:\Windows\SysWOW64\㱰ˆ 2013-10-21 13:22 - 2013-10-21 13:22 - 00004278 _____ C:\Windows\SysWOW64\jupdate-1.7.0_45-b18.log 2013-10-21 12:51 - 2013-10-21 12:51 - 102130367 _____ C:\Windows\SysWOW64\ҫ렞¦ 2013-10-21 12:51 - 2013-10-21 12:51 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Lexware 2013-10-21 12:51 - 2013-10-21 12:51 - 00000000 ____D C:\Users\Julian\AppData\Local\Lexware 2013-10-21 02:02 - 2013-10-21 02:05 - 00000000 ____D C:\Users\*****\AppData\Roaming\Lexware 2013-10-21 02:01 - 2013-10-22 13:24 - 00000000 ____D C:\ProgramData\Lexware 2013-10-21 02:01 - 2013-10-21 02:01 - 00000305 _____ C:\Windows\ODBCINST.INI 2013-10-21 02:01 - 2013-10-21 02:01 - 00000000 ____D C:\Program Files (x86)\Lexware 2013-10-21 02:00 - 2013-03-06 13:02 - 01929216 _____ (Amyuni Technologies 2013-10-21 01:59 - 2013-10-21 02:05 - 00000000 ____D C:\Users\*****\AppData\Local\Lexware 2013-10-20 20:24 - 2013-10-20 20:24 - 27632008 _____ C:\Users\Julian\Desktop\Metal Idee.wav 2013-10-20 11:38 - 2013-10-20 17:38 - 102068998 _____ C:\Windows\SysWOW64\尻殁; 2013-10-19 15:36 - 2013-10-19 15:36 - 101983560 _____ C:\Windows\SysWOW64\叛ᗌF 2013-10-18 18:23 - 2013-10-19 00:22 - 101890677 _____ C:\Windows\SysWOW64\냦膁ˆ 2013-10-18 11:12 - 2013-10-18 11:12 - 101760430 _____ C:\Windows\SysWOW64\ꖘ焤M 2013-10-18 01:18 - 2013-10-18 01:18 - 00077355 _____ C:\Users\Julian\Desktop\kreator_violent_revolution.gpx 2013-10-18 00:45 - 2013-10-18 00:45 - 00048403 _____ C:\Users\Julian\Downloads\kreator_violent_revolution.gp4 ==================== One Month Modified Files and Folders ======= 2013-11-17 02:12 - 2013-11-17 02:12 - 00000000 ____D C:\Users\******\Desktop\Hilfe 2013-11-17 02:10 - 2013-11-17 02:10 - 00050477 _____ C:\Users\******\Downloads\Defogger.exe 2013-11-17 02:10 - 2013-11-17 02:10 - 00000500 _____ C:\Users\******\Downloads\defogger_disable.log 2013-11-17 02:10 - 2013-11-17 02:10 - 00000000 _____ C:\Users\******\defogger_reenable 2013-11-17 02:10 - 2013-01-22 13:39 - 00000000 ____D C:\Users\****** 2013-11-17 02:00 - 2013-01-22 14:54 - 00000000 ____D C:\Users\******\AppData\Local\Adobe 2013-11-17 01:41 - 2013-11-17 01:41 - 01071224 _____ (Solid State Networks) C:\Users\******\Downloads\install_flashplayer11x32au_mssd_aaa_aih.exe 2013-11-17 01:34 - 2013-01-22 14:15 - 00000000 ____D C:\Users\******\AppData\Roaming\Dropbox 2013-11-17 01:34 - 2009-07-14 06:32 - 00000000 ____D C:\Windows\system32\FxsTmp 2013-11-17 01:24 - 2013-07-10 02:04 - 00001110 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job 2013-11-17 01:23 - 2013-11-17 01:23 - 00013347 _____ C:\Users\******\Desktop\Rechnung1.vlg 2013-11-17 01:16 - 2013-01-20 03:16 - 00000884 _____ C:\Windows\Tasks\Adobe Flash Player Updater.job 2013-11-17 00:50 - 2009-07-14 05:45 - 00022176 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 2013-11-17 00:50 - 2009-07-14 05:45 - 00022176 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 2013-11-17 00:46 - 2011-04-12 09:06 - 00758184 _____ C:\Windows\system32\perfh007.dat 2013-11-17 00:46 - 2011-04-12 09:06 - 00172956 _____ C:\Windows\system32\perfc007.dat 2013-11-17 00:46 - 2009-07-14 06:13 - 01772838 _____ C:\Windows\system32\PerfStringBackup.INI 2013-11-17 00:42 - 2013-07-10 02:04 - 00001106 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job 2013-11-17 00:42 - 2013-01-22 13:39 - 00000000 ____D C:\Users\******\AppData\Local\LogMeIn Hamachi 2013-11-17 00:41 - 2013-10-24 23:28 - 00018596 _____ C:\Windows\PFRO.log 2013-11-17 00:41 - 2013-10-24 23:28 - 00004984 _____ C:\Windows\setupact.log 2013-11-17 00:41 - 2013-10-24 12:50 - 00094656 _____ (CACE Technologies) C:\Windows\system32\WPRO_41_2001woem.tmp 2013-11-17 00:41 - 2013-01-20 02:16 - 00034752 _____ C:\Windows\system32\Drivers\WPRO_41_2001.sys 2013-11-17 00:41 - 2009-07-14 06:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT 2013-11-16 17:24 - 2013-01-20 03:15 - 00000000 ____D C:\Users\*****\AppData\Roaming\Spotify 2013-11-16 17:23 - 2013-11-16 17:22 - 00056963 _____ C:\Users\*****\Downloads\FRST.txt 2013-11-16 17:11 - 2013-11-14 18:35 - 00005128 _____ C:\Windows\System32\Tasks\Microsoft Office 15 Sync Maintenance for ***** 2013-11-16 17:11 - 2013-01-20 13:40 - 00000000 ____D C:\Users\*****\AppData\Roaming\Dropbox 2013-11-16 17:10 - 2013-01-27 16:10 - 00000000 ____D C:\Users\*****\AppData\Local\Adobe 2013-11-16 17:10 - 2013-01-21 15:15 - 00000000 ____D C:\Users\*****\AppData\Local\LogMeIn Hamachi 2013-11-16 16:14 - 2013-10-09 21:11 - 00000000 ____D C:\Users\Julian\AppData\Local\Battle.net 2013-11-16 15:55 - 2013-02-13 17:58 - 00000000 ____D C:\Users\Julian\AppData\Local\Deployment 2013-11-16 15:55 - 2013-01-23 17:20 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Skype 2013-11-16 15:13 - 2013-01-23 22:12 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Spotify 2013-11-16 13:43 - 2013-01-20 16:41 - 00000000 ____D C:\Program Files (x86)\JDownloader 2013-11-16 13:36 - 2013-11-16 13:36 - 00000000 ____D C:\Users\Julian\Documents\WB Games 2013-11-16 12:04 - 2013-11-06 20:58 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox 2013-11-16 11:10 - 2013-11-14 19:57 - 00005072 _____ C:\Windows\System32\Tasks\Microsoft Office 15 Sync Maintenance for ***** 2013-11-16 10:58 - 2013-01-23 19:30 - 00000000 ____D C:\Users\Julian\AppData\Local\Adobe 2013-11-16 10:48 - 2013-02-08 22:19 - 00000000 ___RD C:\Users\Julian\Dropbox 2013-11-16 10:48 - 2013-02-08 22:19 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Dropbox 2013-11-16 10:48 - 2013-01-22 14:10 - 00000000 ____D C:\Users\Julian\AppData\Local\LogMeIn Hamachi 2013-11-16 01:06 - 2013-11-16 01:06 - 104513208 _____ C:\Windows\SysWOW64\耴® 2013-11-15 15:47 - 2013-11-15 15:47 - 00056663 _____ C:\Users\Julian\Downloads\avenged_sevenfold_beast_and_the_harlot.gp4 2013-11-15 14:45 - 2013-11-15 14:45 - 104401821 _____ C:\Windows\SysWOW64\ö륡6 2013-11-14 21:16 - 2013-11-14 21:16 - 104278918 _____ C:\Windows\SysWOW64\肴 2013-11-14 20:26 - 2013-11-14 20:26 - 00000209 _____ C:\Users\Julian\Desktop\Gotham City Impostors Free To Play.url 2013-11-14 19:38 - 2013-02-20 15:07 - 00000000 ____D C:\Users\******\AppData\Roaming\FileZilla 2013-11-14 18:35 - 2013-01-20 13:41 - 00001024 _____ C:\Users\*****\Desktop\Dropbox.lnk 2013-11-14 18:35 - 2013-01-20 13:40 - 00000000 ____D C:\Users\*****\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Dropbox 2013-11-14 18:35 - 2013-01-20 01:54 - 00000000 ___RD C:\Users\*****\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 2013-11-14 18:33 - 2013-11-14 18:33 - 00000000 ____D C:\Users\*****\AppData\Local\LogMeIn 2013-11-14 18:33 - 2013-01-20 03:16 - 00000000 ____D C:\Users\*****\AppData\Local\Spotify 2013-11-14 15:25 - 2013-01-23 22:12 - 00000000 ____D C:\Users\Julian\AppData\Local\Spotify 2013-11-14 15:17 - 2013-11-14 15:17 - 104225154 _____ C:\Windows\SysWOW64\ﺣŠ 2013-11-13 22:37 - 2013-11-13 22:37 - 00000000 ____D C:\Users\Julian\Desktop\Neuer Ordner 2013-11-13 20:08 - 2013-11-13 20:08 - 00000000 ____D C:\Program Files (x86)\LogMeIn Hamachi 2013-11-12 19:59 - 2013-11-12 13:59 - 103974937 _____ C:\Windows\SysWOW64\鳴핡ž 2013-11-11 22:39 - 2013-11-11 22:39 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Doublefine 2013-11-11 20:27 - 2013-01-20 15:48 - 00000000 ____D C:\ProgramData\Skype 2013-11-11 14:49 - 2013-01-25 21:56 - 00000000 ____D C:\Users\Julian\AppData\Roaming\vlc 2013-11-11 14:12 - 2013-11-11 14:12 - 103716811 _____ C:\Windows\SysWOW64\ᑈ狊£ 2013-11-10 22:24 - 2013-11-10 22:24 - 00000209 _____ C:\Users\Julian\Desktop\Brtal Legend.url 2013-11-10 22:12 - 2013-11-10 15:16 - 103551423 _____ C:\Windows\SysWOW64\寗惞– 2013-11-09 21:56 - 2009-07-14 03:34 - 00000571 _____ C:\Windows\win.ini 2013-11-09 21:37 - 2013-11-09 21:37 - 00078979 _____ C:\Users\Julian\Downloads\slipknot_til_we_die.gp5 2013-11-09 21:36 - 2013-11-09 21:36 - 00047441 _____ C:\Users\Julian\Downloads\slipknot_people_shit.gp4 2013-11-09 21:35 - 2013-11-09 21:35 - 00175948 _____ C:\Users\Julian\Downloads\slipknot_dead_memories.gpx 2013-11-09 17:34 - 2013-07-10 13:31 - 00000000 ____D C:\Users\Julian\AppData\Roaming\BitTorrent 2013-11-09 17:32 - 2013-02-07 17:01 - 00000000 ____D C:\Program Files\Common Files\Apple 2013-11-09 16:12 - 2013-11-09 16:12 - 103387443 _____ C:\Windows\SysWOW64\惽㷚Ÿ 2013-11-09 16:06 - 2013-11-09 16:06 - 00061746 _____ C:\Users\Julian\Downloads\in_extremo_liam.gp5 2013-11-09 15:35 - 2013-11-09 15:35 - 00001783 _____ C:\Users\Public\Desktop\iTunes.lnk 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\ProgramData\34BE82C4-E596-4e99-A191-52C6199EBF69 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\Program Files\iTunes 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\Program Files\iPod 2013-11-09 15:35 - 2013-03-13 18:12 - 00000000 ____D C:\Program Files (x86)\iTunes 2013-11-09 10:12 - 2013-11-09 10:12 - 103347145 _____ C:\Windows\SysWOW64\ꠓ 2013-11-08 21:07 - 2013-11-08 21:07 - 103316092 _____ C:\Windows\SysWOW64\퓠�‰ 2013-11-08 16:58 - 2013-11-08 16:58 - 00055959 _____ C:\Users\Julian\Downloads\iron_maiden_the_trooper.gp3 2013-11-08 14:11 - 2013-11-08 14:11 - 103148646 _____ C:\Windows\SysWOW64\㩐쮶 2013-11-07 22:05 - 2013-11-07 22:05 - 05366672 _____ C:\Users\Julian\Downloads\DeponiaPaperFigurines.zip 2013-11-07 22:04 - 2013-11-07 22:04 - 00000209 _____ C:\Users\Julian\Desktop\Edna & Harvey Harvey's New Eyes.url 2013-11-07 22:02 - 2013-05-12 21:21 - 00000000 ____D C:\Users\Julian\AppData\Local\Daedalic Entertainment 2013-11-07 21:29 - 2013-11-07 21:28 - 57475151 _____ C:\Users\Julian\Downloads\DaedalicWallpapers.zip 2013-11-07 21:26 - 2013-11-07 21:26 - 103000967 _____ C:\Windows\SysWOW64\ೱ篦‘ 2013-11-07 21:10 - 2013-01-20 02:34 - 00000000 ____D C:\Program Files (x86)\Mozilla Maintenance Service 2013-11-07 15:26 - 2013-11-07 15:26 - 102946670 _____ C:\Windows\SysWOW64\㎒ 2013-11-06 20:26 - 2013-11-06 20:26 - 102844835 _____ C:\Windows\SysWOW64\嵧¤ 2013-11-06 14:11 - 2013-11-06 14:11 - 102722523 _____ C:\Windows\SysWOW64\葜炄¤ 2013-11-05 20:14 - 2013-11-05 20:14 - 105085299 _____ C:\Windows\SysWOW64\ꙣడ’ 2013-11-05 17:30 - 2013-02-23 16:54 - 00000000 ____D C:\Users\Julian\Desktop\GP Dateien 2013-11-05 14:21 - 2013-11-05 14:21 - 00103191 _____ C:\Users\Julian\Downloads\amon_amarth_deceiver_of_the_gods.gp5 2013-11-05 13:48 - 2013-11-05 13:48 - 00127786 _____ C:\Users\Julian\Downloads\slipknot_psychosocial.gp5 2013-11-05 13:19 - 2013-11-05 13:19 - 105043933 _____ C:\Windows\SysWOW64\䶾⒒˜ 2013-11-04 23:00 - 2013-11-04 23:00 - 00061685 _____ C:\Users\Julian\Downloads\amon_amarth_war_of_the_gods.gp4 2013-11-04 22:55 - 2013-11-04 22:55 - 00080266 _____ C:\Users\Julian\Downloads\amon_amarth_twilight_of_the_thunder_god.gp5 2013-11-04 22:49 - 2013-11-04 22:49 - 00071169 _____ C:\Users\Julian\Downloads\amon_amarth_guardians_of_asgaard.gp5 2013-11-04 22:41 - 2013-11-04 22:41 - 00027402 _____ C:\Users\Julian\Downloads\amon_amarth_pursuit_of_vikings.gp4 2013-11-04 21:55 - 2013-11-04 21:55 - 00050413 _____ C:\Users\Julian\Downloads\nightwish_dark_chest_of_wonders.gp4 2013-11-04 21:53 - 2013-11-04 21:53 - 00142780 _____ C:\Users\Julian\Downloads\nightwish_nemo.gpx 2013-11-04 21:51 - 2013-11-04 21:51 - 00083186 _____ C:\Users\Julian\Downloads\nightwish_amaranth.gp5 2013-11-04 21:21 - 2013-11-04 21:21 - 00053055 _____ C:\Users\Julian\Downloads\all_time_low_damned_if_i_do_ya_damned_if_i_dont.gp5 2013-11-04 21:14 - 2013-11-04 21:14 - 00058488 _____ C:\Users\Julian\Downloads\paramore_still_into_you.gp5 2013-11-04 20:18 - 2013-11-04 20:18 - 104964650 _____ C:\Windows\SysWOW64\渎歍© 2013-11-04 14:13 - 2013-11-04 14:13 - 104867914 _____ C:\Windows\SysWOW64\�濃 2013-11-03 17:54 - 2013-11-03 17:54 - 104814100 _____ C:\Windows\SysWOW64\쀽䄦R 2013-11-03 11:54 - 2013-11-03 11:54 - 104760586 _____ C:\Windows\SysWOW64\킨¦ 2013-11-02 22:25 - 2013-11-02 22:25 - 104684788 _____ C:\Windows\SysWOW64\눮�¦ 2013-11-02 14:09 - 2013-11-02 14:07 - 00011812 _____ C:\Users\Julian\Desktop\RADIO.WAV 2013-11-02 13:40 - 2013-07-28 18:46 - 00000000 ____D C:\Users\Julian\Documents\Vegas Movie Studio HD Platinum 11.0 Projekte 2013-11-02 13:14 - 2013-11-02 13:14 - 104620600 _____ C:\Windows\SysWOW64\뜐쳳™ 2013-11-01 22:14 - 2013-11-01 22:14 - 104569497 _____ C:\Windows\SysWOW64\廾㫃‹ 2013-11-01 16:05 - 2013-11-01 16:05 - 00000208 _____ C:\Users\Julian\Desktop\Worms Ultimate Mayhem.url 2013-11-01 14:32 - 2013-11-07 21:34 - 00000000 ____D C:\Users\Julian\Desktop\Daedalic Wallpapers 2013-11-01 13:28 - 2013-01-27 16:20 - 00000000 ____D C:\Program Files\Common Files\Adobe 2013-11-01 13:27 - 2013-01-22 14:49 - 00000000 ____D C:\Program Files (x86)\Adobe 2013-11-01 13:18 - 2013-01-22 15:22 - 00000000 ____D C:\Users\******\AppData\Local\Deployment 2013-11-01 13:15 - 2013-11-01 12:22 - 00000000 ____D C:\Users\*****\Desktop\Hochwasser 2013-11-01 12:52 - 2013-01-26 18:04 - 00000000 ____D C:\Users\******\AppData\Roaming\Spotify 2013-11-01 12:40 - 2013-11-01 12:40 - 00001456 _____ C:\Users\*****\AppData\Local\Adobe Für Web speichern 13.0 Prefs 2013-11-01 12:39 - 2013-01-20 03:17 - 00000000 ____D C:\Users\*****\AppData\Roaming\Adobe 2013-11-01 12:18 - 2013-01-22 15:25 - 00000000 ____D C:\Windows\pss 2013-11-01 12:18 - 2013-01-22 13:39 - 00000000 ___RD C:\Users\******\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 2013-11-01 12:17 - 2013-11-01 12:17 - 104500486 _____ C:\Windows\SysWOW64\꜇뺚h 2013-10-31 17:40 - 2013-10-31 17:40 - 00000000 ____D C:\Users\******\AppData\Roaming\Lexware 2013-10-31 17:40 - 2013-10-31 17:40 - 00000000 ____D C:\Users\******\AppData\Local\Lexware 2013-10-31 17:40 - 2013-01-26 18:04 - 00000000 ____D C:\Users\******\AppData\Local\Spotify 2013-10-31 17:40 - 2013-01-22 13:39 - 00117840 _____ C:\Users\******\AppData\Local\GDIPFONTCACHEV1.DAT 2013-10-31 16:03 - 2013-10-31 16:03 - 104348737 _____ C:\Windows\SysWOW64\甲㧽‰ 2013-10-30 22:20 - 2013-10-30 22:20 - 00084933 _____ C:\Users\Julian\Downloads\system_of_a_down_toxicity.gp5 2013-10-30 22:12 - 2009-07-14 04:20 - 00000000 ____D C:\Windows\system32\NDF 2013-10-30 22:02 - 2013-10-30 22:02 - 00035113 _____ C:\Users\Julian\Downloads\system_of_a_down_kill_rock_n_roll.gp5 2013-10-30 21:54 - 2013-10-30 21:54 - 00113403 _____ C:\Users\Julian\Downloads\system_of_a_down_lost_in_hollywood.gp5 2013-10-30 13:16 - 2013-10-30 13:16 - 104098187 _____ C:\Windows\SysWOW64\냈뼑X 2013-10-29 21:08 - 2013-10-29 21:08 - 104021456 _____ C:\Windows\SysWOW64\嶐牘œ 2013-10-29 14:10 - 2013-10-29 14:10 - 103932228 _____ C:\Windows\SysWOW64\批⭘J 2013-10-28 21:06 - 2013-10-28 21:06 - 00045483 _____ C:\Users\Julian\Downloads\queen_we_are_the_champions.gp5 2013-10-28 20:18 - 2013-10-28 20:18 - 103792972 _____ C:\Windows\SysWOW64\嶅B 2013-10-28 14:15 - 2013-10-28 14:15 - 103734365 _____ C:\Windows\SysWOW64\著ꤣŒ 2013-10-27 21:08 - 2013-10-27 21:08 - 103533600 _____ C:\Windows\SysWOW64\�Ᏸ 2013-10-27 13:12 - 2013-10-27 13:12 - 103334033 _____ C:\Windows\SysWOW64\咅鲅V 2013-10-26 18:50 - 2013-10-26 18:50 - 103214166 _____ C:\Windows\SysWOW64\㞋嘂* 2013-10-26 03:02 - 2013-10-25 19:18 - 103054676 _____ C:\Windows\SysWOW64\╀‹ 2013-10-25 23:17 - 2013-10-25 23:17 - 00000682 _____ C:\Users\Public\Desktop\Dead Space 3.lnk 2013-10-25 23:17 - 2013-10-25 20:40 - 00037022 _____ C:\Windows\DirectX.log 2013-10-25 21:36 - 2013-10-25 21:36 - 00000000 __SHD C:\ProgramData\DSS 2013-10-25 21:36 - 2013-01-30 16:42 - 00000000 ____D C:\Users\Julian\Documents\EA Games 2013-10-25 21:35 - 2013-10-25 21:35 - 00000000 ____D C:\Program Files\Electronic Arts 2013-10-25 21:00 - 2013-01-22 16:14 - 00189248 _____ C:\Windows\SysWOW64\PnkBstrB.exe 2013-10-25 20:41 - 2013-01-22 16:14 - 00075064 _____ C:\Windows\SysWOW64\PnkBstrA.exe 2013-10-25 18:47 - 2013-10-25 18:47 - 08959704 _____ C:\Users\Julian\Downloads\DrakensangOnlineSetup.exe 2013-10-25 18:47 - 2013-10-25 18:47 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Drakensang Online 2013-10-25 18:47 - 2013-10-25 18:47 - 00000000 ____D C:\Program Files (x86)\Drakensang Online 2013-10-24 23:57 - 2013-01-24 16:37 - 00000000 ____D C:\Users\Julian\AppData\Local\CrashDumps 2013-10-24 23:28 - 2013-10-24 23:28 - 00000000 _____ C:\Windows\setuperr.log 2013-10-24 23:27 - 2013-08-14 13:30 - 00000000 ____D C:\AdwCleaner 2013-10-24 23:26 - 2013-09-28 12:24 - 00000000 ____D C:\Users\Julian\Desktop\Programme 2013-10-24 23:23 - 2013-01-22 14:10 - 00000000 ___RD C:\Users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 2013-10-24 23:22 - 2013-06-30 21:39 - 00000000 ____D C:\Users\Julian\AppData\Roaming\DAEMON Tools Lite 2013-10-24 23:20 - 2013-10-24 23:17 - 00000000 ____D C:\Program Files (x86)\Web Check 2013-10-24 23:20 - 2013-01-30 17:44 - 00000000 ____D C:\ProgramData\Package Cache 2013-10-24 23:18 - 2013-10-24 23:18 - 00000000 ____D C:\Users\Julian\Documents\Free YouTube Download Manager 2013-10-24 23:18 - 2013-10-24 23:18 - 00000000 ____D C:\Users\Julian\AppData\Local\Freetec 2013-10-24 23:16 - 2013-10-24 23:16 - 00733192 _____ C:\Users\Julian\Downloads\youtube-dlm_1.0_en-US.exe 2013-10-24 22:00 - 2013-10-24 22:00 - 00915368 _____ (Oracle Corporation) C:\Users\Julian\Downloads\jxpiinstall.exe 2013-10-24 18:50 - 2013-10-24 12:50 - 102837954 _____ C:\Windows\SysWOW64\ꌬ⟨— 2013-10-24 17:49 - 2013-10-24 17:49 - 00000701 _____ C:\Users\Julian\Desktop\Rocksmith 2014 Edition.lnk 2013-10-24 16:36 - 2013-10-24 16:36 - 00021623 _____ C:\Users\Julian\Downloads\alice_cooper_poison.gp3 2013-10-24 13:52 - 2013-02-03 19:31 - 00000000 ____D C:\Users\Julian\AppData\Local\SKIDROW 2013-10-24 13:51 - 2013-10-24 13:51 - 00636059 _____ C:\Users\Julian\Downloads\rock2014crackonly-dlc.rar 2013-10-24 02:11 - 2013-10-23 15:26 - 102674996 _____ C:\Windows\SysWOW64\贒䓎@ 2013-10-23 09:26 - 2013-10-23 09:26 - 102541796 _____ C:\Windows\SysWOW64\芉漌˜ 2013-10-23 01:09 - 2013-10-23 01:09 - 00098254 _____ C:\Users\Julian\Downloads\andrew_lloyd_webber_phantom_of_the_opera.gp5 2013-10-23 00:44 - 2013-10-22 18:44 - 102486297 _____ C:\Windows\SysWOW64\㘝�“ 2013-10-22 13:24 - 2013-10-21 02:01 - 00000000 ____D C:\ProgramData\Lexware 2013-10-22 13:06 - 2013-01-20 15:48 - 00000000 ____D C:\Users\*****\AppData\Roaming\Skype 2013-10-22 12:44 - 2013-10-22 12:44 - 102327253 _____ C:\Windows\SysWOW64\— 2013-10-22 02:52 - 2013-10-16 20:47 - 00000872 _____ C:\Users\Public\Desktop\REAPER (x64).lnk 2013-10-22 01:33 - 2013-10-21 19:33 - 102278179 _____ C:\Windows\SysWOW64\㱰ˆ 2013-10-21 23:59 - 2013-10-21 23:59 - 00051831 _____ C:\Users\Julian\Downloads\children_of_bodom_scream_for_silence.gp5 2013-10-21 20:00 - 2013-10-21 20:00 - 01679157 _____ C:\Users\Julian\Downloads\metal_hell_frost_melodic_death_metal_richard_band_roland_the_unguided_1600x1200_wallpaper_Art 2013-10-21 13:22 - 2013-10-21 13:22 - 00004278 _____ C:\Windows\SysWOW64\jupdate-1.7.0_45-b18.log 2013-10-21 13:22 - 2013-10-06 21:55 - 00000000 ____D C:\ProgramData\Oracle 2013-10-21 13:22 - 2013-01-21 14:30 - 00000000 ____D C:\Program Files (x86)\Java 2013-10-21 12:51 - 2013-10-21 12:51 - 102130367 _____ C:\Windows\SysWOW64\ҫ렞¦ 2013-10-21 12:51 - 2013-10-21 12:51 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Lexware 2013-10-21 12:51 - 2013-10-21 12:51 - 00000000 ____D C:\Users\Julian\AppData\Local\Lexware 2013-10-21 12:51 - 2013-01-22 14:10 - 00117840 _____ C:\Users\Julian\AppData\Local\GDIPFONTCACHEV1.DAT 2013-10-21 12:50 - 2009-07-14 05:45 - 09704592 _____ C:\Windows\system32\FNTCACHE.DAT 2013-10-21 02:11 - 2013-02-17 02:33 - 00000000 ____D C:\Users\*****\AppData\Roaming\FileZilla 2013-10-21 02:05 - 2013-10-21 02:02 - 00000000 ____D C:\Users\*****\AppData\Roaming\Lexware 2013-10-21 02:05 - 2013-10-21 01:59 - 00000000 ____D C:\Users\*****\AppData\Local\Lexware 2013-10-21 02:02 - 2013-01-20 02:05 - 00117840 _____ C:\Users\*****\AppData\Local\GDIPFONTCACHEV1.DAT 2013-10-21 02:01 - 2013-10-21 02:01 - 00000305 _____ C:\Windows\ODBCINST.INI 2013-10-21 02:01 - 2013-10-21 02:01 - 00000000 ____D C:\Program Files (x86)\Lexware 2013-10-20 20:24 - 2013-10-20 20:24 - 27632008 _____ C:\Users\Julian\Desktop\Metal Idee.wav 2013-10-20 17:47 - 2009-07-14 06:09 - 00000000 ____D C:\Windows\System32\Tasks\WPD 2013-10-20 17:38 - 2013-10-20 11:38 - 102068998 _____ C:\Windows\SysWOW64\尻殁; 2013-10-19 15:36 - 2013-10-19 15:36 - 101983560 _____ C:\Windows\SysWOW64\叛ᗌF 2013-10-19 09:34 - 2009-07-14 06:08 - 00032640 _____ C:\Windows\Tasks\SCHEDLGU.TXT 2013-10-19 00:22 - 2013-10-18 18:23 - 101890677 _____ C:\Windows\SysWOW64\냦膁ˆ 2013-10-18 11:12 - 2013-10-18 11:12 - 101760430 _____ C:\Windows\SysWOW64\ꖘ焤M 2013-10-18 01:19 - 2013-07-10 02:04 - 00004106 _____ C:\Windows\System32\Tasks\GoogleUpdateTaskMachineUA 2013-10-18 01:19 - 2013-07-10 02:04 - 00003854 _____ C:\Windows\System32\Tasks\GoogleUpdateTaskMachineCore 2013-10-18 01:18 - 2013-10-18 01:18 - 00077355 _____ C:\Users\Julian\Desktop\kreator_violent_revolution.gpx 2013-10-18 00:45 - 2013-10-18 00:45 - 00048403 _____ C:\Users\Julian\Downloads\kreator_violent_revolution.gp4 ZeroAccess: C:\Windows\assembly\GAC_32\Desktop.ini ZeroAccess: C:\Windows\assembly\GAC_64\Desktop.ini Some content of TEMP: ==================== C:\Users\******\AppData\Local\Temp\JavaIC.dll C:\Users\******\AppData\Local\Temp\msscct32.dll C:\Users\******\AppData\Local\Temp\SkypeSetup.exe C:\Users\Julian\AppData\Local\Temp\Quarantine.exe C:\Users\Julian\AppData\Local\Temp\SkypeSetup.exe C:\Users\*****\AppData\Local\Temp\devcon64.exe C:\Users\*****\AppData\Local\Temp\ose00000.exe ==================== Bamital & volsnap Check ================= C:\Windows\System32\winlogon.exe => MD5 is legit C:\Windows\System32\wininit.exe => MD5 is legit C:\Windows\SysWOW64\wininit.exe => MD5 is legit C:\Windows\explorer.exe => MD5 is legit C:\Windows\SysWOW64\explorer.exe => MD5 is legit C:\Windows\System32\svchost.exe => MD5 is legit C:\Windows\SysWOW64\svchost.exe => MD5 is legit C:\Windows\System32\services.exe [2009-07-14 00:19] - [2009-07-14 02:39] - 0329216 ____N () D41D8CD98F00B204E9800998ECF8427E C:\Windows\System32\services.exe IS INFECTED. <===== ATTENTION! C:\Windows\System32\User32.dll => MD5 is legit C:\Windows\SysWOW64\User32.dll => MD5 is legit C:\Windows\System32\userinit.exe => MD5 is legit C:\Windows\SysWOW64\userinit.exe => MD5 is legit C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit C:\Program Files\Windows Defender\mpsvc.dll => ATTENTION: ZeroAccess. Use DeleteJunctionsIndirectory: C:\Program Files\Windows Defender LastRegBack: 2013-11-10 15:54 ==================== End Of Log ============================ Code:
ATTFilter GMER 2.1.19163 - hxxp://www.gmer.net Rootkit scan 2013-11-17 02:34:05 Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk1\DR1 -> \Device\Ide\IdeDeviceP0T0L0-0 OCZ-AGILITY3 rev.2.24 111,79GB Running: gmer_2.1.19163.exe; Driver: C:\Users\JUGEND~1\AppData\Local\Temp\ugrdypow.sys ---- User code sections - GMER 2.1 ---- .reloc C:\Windows\system32\services.exe [736] section is executable [0x4A8, 0xA0000020] 0000000100052000 .text C:\Program Files\EDP\server\EDPServer.exe[1920] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Program Files\EDP\server\EDPServer.exe[1920] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[1088] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe[1088] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 .text C:\Windows\SysWOW64\PnkBstrA.exe[2092] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 322 0000000074ac1a22 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrA.exe[2092] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 496 0000000074ac1ad0 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrA.exe[2092] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 552 0000000074ac1b08 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrA.exe[2092] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 730 0000000074ac1bba 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrA.exe[2092] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 762 0000000074ac1bda 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrB.exe[2136] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 322 0000000074ac1a22 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrB.exe[2136] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 496 0000000074ac1ad0 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrB.exe[2136] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 552 0000000074ac1b08 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrB.exe[2136] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 730 0000000074ac1bba 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrB.exe[2136] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 762 0000000074ac1bda 2 bytes [AC, 74] .text C:\Windows\SysWOW64\PnkBstrB.exe[2136] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Windows\SysWOW64\PnkBstrB.exe[2136] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 .text C:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe[2204] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe[2204] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 .text C:\Users\*****\AppData\Roaming\Dropbox\bin\Dropbox.exe[3720] C:\Windows\syswow64\Psapi.dll!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Users\*****\AppData\Roaming\Dropbox\bin\Dropbox.exe[3720] C:\Windows\syswow64\Psapi.dll!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 .text C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\AAM Updates Notifier.exe[3784] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\AAM Updates Notifier.exe[3784] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 ? C:\Windows\system32\mssprxy.dll [3784] entry point in ".rdata" section 00000000700b71e6 .text C:\Program Files (x86)\Razer\Synapse\RzSynapse.exe[3940] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Program Files (x86)\Razer\Synapse\RzSynapse.exe[3940] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 .text C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe[4024] C:\Windows\syswow64\PsApi.dll!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe[4024] C:\Windows\syswow64\PsApi.dll!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 .text C:\Program Files\Logitech Gaming Software\Applets\LCDYT.exe[3904] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Program Files\Logitech Gaming Software\Applets\LCDYT.exe[3904] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 .text C:\Program Files\Logitech Gaming Software\Applets\LCDMedia.exe[3160] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Program Files\Logitech Gaming Software\Applets\LCDMedia.exe[3160] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5696] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000766e1465 2 bytes [6E, 76] .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5696] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000766e14bb 2 bytes [6E, 76] .text ... * 2 ---- Threads - GMER 2.1 ---- Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2068] 00000000778e2e25 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2172] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2176] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2180] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2212] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2216] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2268] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2272] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2276] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2280] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2324] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2364] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2368] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2372] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2060] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2112] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2360] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2388] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2396] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:788] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2504] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2508] 00000000778e3e45 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2512] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2712] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2788] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2848] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:3080] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:3088] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:4200] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:4780] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:1840] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:5256] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:4752] 00000000778e3e45 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:2084] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:1676] 0000000074b429e1 Thread C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [1716:5488] 0000000074b429e1 ---- Processes - GMER 2.1 ---- Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Windows\system32\wininit.exe [688] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Windows\system32\lsass.exe [764] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Windows\system32\svchost.exe [1004] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Windows\System32\svchost.exe [872] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Windows\system32\svchost.exe [1096] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Windows\system32\svchost.exe [1380] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Windows\System32\spoolsv.exe [1640] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe [1784] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Program Files\Bonjour\mDNSResponder.exe [1860] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe [1088] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Program Files (x86)\LogMeIn Hamachi\LMIGuardianSvc.exe [1332] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Windows\SysWOW64\PnkBstrA.exe [2092] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Windows\SysWOW64\PnkBstrB.exe [2136] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe [2204] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2.exe [2440] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\AAM Updates Notifier.exe [3784] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Program Files (x86)\Razer\Synapse\RzSynapse.exe [3940] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Program Files (x86)\iTunes\iTunesHelper.exe [4012] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe [4024] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Program Files\Logitech Gaming Software\Applets\LCDRSS.exe [3920] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\syswow64\mswsock.dll (*** suspicious ***) @ C:\Program Files\Logitech Gaming Software\Applets\LCDYT.exe [3904] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:09) 00000000741a0000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Program Files\Windows Media Player\wmpnetwk.exe [6052] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 Library \\.\globalroot\systemroot\system32\mswsock.dll (*** suspicious ***) @ C:\Windows\system32\svchost.exe [6136] (Microsoft Windows Sockets 2.0-Dienstanbieter/Microsoft Corporation SIGNED)(2010-11-21 03:24:00) 000007fefd130000 ---- EOF - GMER 2.1 ---- Code:
ATTFilter defogger_disable by jpshortstuff (23.02.10.1) Log created at 02:10 on 17/11/2013 (*****) Checking for autostart values... HKCU\~\Run values retrieved. HKLM\~\Run values retrieved. Checking for services/drivers... -=E.O.F=- Viele Grüße, der Bahnfahrer |
17.11.2013, 03:08 | #2 |
/// TB-Ausbilder | Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? Hi,
__________________ja der Rechner ist infiziert. Schritt 1 Scan mit Combofix
Schritt 2 Starte noch einmal FRST.
__________________ |
17.11.2013, 15:52 | #3 |
| Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? Hallo Leo,
__________________vielen Dank für deine rasche Antwort. Ich habe die Schritte ausgeführt, anbei die Logfiles: Code:
ATTFilter ComboFix 13-11-16.01 - ****** 17.11.2013 15:39:48.1.4 - x64 Microsoft Windows 7 Enterprise 6.1.7601.1.1252.49.1031.18.8132.6342 [GMT 1:00] ausgeführt von:: c:\users\******\Desktop\ComboFix.exe AV: Avira Desktop *Disabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C} SP: Avira Desktop *Disabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691} SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} . . (((((((((((((((((((((((((((((((((((( Weitere Löschungen )))))))))))))))))))))))))))))))))))))))))))))))) . . c:\users\******\AppData\Local\Microsoft\Windows\Temporary Internet Files\eportoZip c:\users\******\AppData\Local\Microsoft\Windows\Temporary Internet Files\pplCsv.txt c:\users\******\AppData\Local\Microsoft\Windows\Temporary Internet Files\tempCsv.txt c:\users\******\Desktop\Setup.exe c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_ofjgnhihlklpobkaloamkankaaoclfjh_0 c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\databases\chrome-extension_ofjgnhihlklpobkaloamkankaaoclfjh_0\1 c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\background.html c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\crossriderManifest.json c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\manifest.xml c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins.json c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\1_base.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\101_cortica_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\102_dealply_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\103_intext_5_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\104_jollywallet_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\105_corticas_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\108_icm_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\116_ads_only_5_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\117_coupons_intext_ads_5_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\119_similar_web_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\120_luck_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\123_intext_adv_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\124_superfish_no_search_no_coupons_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\125_arcadi2_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\126_revizer_ws_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\127_revizer_p_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\128_superfish_pricora_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\129_widdit_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\13_CrossriderAppUtils.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\135_arcadi3_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\138_getdeal_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\14_CrossriderUtils.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\141_corticas_ru_m.js.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\142_intext_fa_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\155_ibario_pops_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\158_50onred_ads_only_no_fb_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\159_cortica_rollover_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\17_jQuery.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\170_icm1_5_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\171_arcadi2_sourceID_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\174_arcadi_serp_dynamic_id_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\175_coolmirage_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\178_revizer_ws_dynamic_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\179_revizer_p_dynamic_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\19_CHAppAPIWrapper.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\21_debug.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\22_resources.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\28_initializer.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\4_jquery_1_7_1.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\47_resources_background.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\64_appApiMessage.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\7_hooks.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\72_appApiValidation.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\78_CrossriderInfo.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\80_CHPopupAppAPI.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\87_ginyas_wrapper.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\9_search_engine_hook.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\91_monetizationLoader.js.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\92_superfish_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\93_superfish_no_coupons_m.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\plugins\97_resourceApiWrapper.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\userCode\background.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\extensionData\userCode\extension.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\icons\actions\1.png c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\icons\icon128.png c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\icons\icon16.png c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\icons\icon48.png c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\api\chrome.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\api\cookie.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\api\message.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\api\pageAction.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\api\pageActionBG.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\background.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\app_api.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\bg_app_api.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\consts.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\cookie_store.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\crossriderAPI.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\delegate.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\events.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\extensionDataStore.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\installer.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\logFile.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\logging.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\onBGDocumentLoad.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\popupResource\newPopup.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\popupResource\popup.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\reports.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\storageWrapper.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\updateManager.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\util.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\lib\xhr.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\js\main.js c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\manifest.json c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Extensions\ofjgnhihlklpobkaloamkankaaoclfjh\1.25.50_0\popup.html c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ofjgnhihlklpobkaloamkankaaoclfjh c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ofjgnhihlklpobkaloamkankaaoclfjh\000003.log c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ofjgnhihlklpobkaloamkankaaoclfjh\CURRENT c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ofjgnhihlklpobkaloamkankaaoclfjh\LOCK c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ofjgnhihlklpobkaloamkankaaoclfjh\LOG c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ofjgnhihlklpobkaloamkankaaoclfjh\MANIFEST-000002 c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ofjgnhihlklpobkaloamkankaaoclfjh_0.localstorage-journal c:\users\Julian\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_ofjgnhihlklpobkaloamkankaaoclfjh_0.localstorage c:\users\*****\AppData\Local\Microsoft\Windows\Temporary Internet Files\{A2A87F9E-1742-4AE7-9263-51F7CBCC1AE3}.xps c:\users\*****\AppData\Local\Microsoft\Windows\Temporary Internet Files\pplCsv.txt c:\users\*****\AppData\Local\Microsoft\Windows\Temporary Internet Files\tempCsv.txt c:\windows\assembly\GAC_32\Desktop.ini c:\windows\assembly\GAC_64\Desktop.ini c:\windows\msvcr71.dll c:\windows\ST6UNST.000 c:\windows\SysWow64\FlashPlayerApp.exe c:\windows\SysWow64\frapsvid.dll . Infizierte Kopie von c:\windows\system32\Services.exe wurde gefunden und desinfiziert Kopie von - c:\windows\winsxs\amd64_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.1.7600.16385_none_2b54b20ee6fa07b1\services.exe wurde wiederhergestellt . . ((((((((((((((((((((((( Dateien erstellt von 2013-10-17 bis 2013-11-17 )))))))))))))))))))))))))))))) . . 2013-11-17 14:42 . 2013-11-17 14:42 -------- d-----w- c:\users\*****\AppData\Local\temp 2013-11-17 14:42 . 2013-11-17 14:42 -------- d-----w- c:\users\Julian\AppData\Local\temp 2013-11-17 14:42 . 2013-11-17 14:42 -------- d-----w- c:\users\Default\AppData\Local\temp 2013-11-17 14:36 . 2013-11-17 14:36 -------- d-----w- c:\users\******\AppData\Local\ElevatedDiagnostics 2013-11-17 14:35 . 2013-11-17 14:43 94656 ----a-w- c:\windows\system32\WPRO_41_2001woem.tmp 2013-11-14 17:33 . 2013-11-14 17:33 -------- d-----w- c:\users\*****\AppData\Local\LogMeIn 2013-11-13 19:08 . 2013-11-13 19:08 -------- d-----w- c:\program files (x86)\LogMeIn Hamachi 2013-11-11 21:39 . 2013-11-11 21:39 -------- d-----w- c:\users\Julian\AppData\Roaming\Doublefine 2013-11-09 14:35 . 2013-11-09 14:35 -------- d-----w- c:\programdata\34BE82C4-E596-4e99-A191-52C6199EBF69 2013-11-09 14:35 . 2013-11-09 14:35 -------- d-----w- c:\program files\iTunes 2013-11-09 14:35 . 2013-11-09 14:35 -------- d-----w- c:\program files\iPod 2013-10-31 16:40 . 2013-10-31 16:40 -------- d-----w- c:\users\******\AppData\Roaming\Lexware 2013-10-31 16:40 . 2013-10-31 16:40 -------- d-----w- c:\users\******\AppData\Local\Lexware 2013-10-25 20:36 . 2013-10-25 20:36 -------- d-sh--w- c:\programdata\DSS 2013-10-25 20:35 . 2013-10-25 20:35 -------- d-----w- c:\program files\Electronic Arts 2013-10-25 19:41 . 2010-09-16 17:03 2601752 ----a-w- c:\windows\SysWow64\pbsvc_moh.exe 2013-10-25 17:47 . 2013-10-25 17:47 -------- d-----w- c:\program files (x86)\Drakensang Online 2013-10-24 22:18 . 2013-10-24 22:18 -------- d-----w- c:\users\Julian\AppData\Local\Freetec 2013-10-24 22:17 . 2013-10-24 22:20 -------- d-----w- c:\program files (x86)\Web Check 2013-10-21 11:51 . 2013-10-21 11:51 -------- d-----w- c:\users\Julian\AppData\Roaming\Lexware 2013-10-21 11:51 . 2013-10-21 11:51 -------- d-----w- c:\users\Julian\AppData\Local\Lexware 2013-10-21 01:02 . 2013-10-21 01:05 -------- d-----w- c:\users\*****\AppData\Roaming\Lexware 2013-10-21 01:01 . 2013-10-22 12:24 -------- d-----w- c:\programdata\Lexware 2013-10-21 01:01 . 2013-10-21 01:01 -------- d-----w- c:\program files (x86)\Lexware 2013-10-21 01:00 . 2013-03-06 12:02 1929216 ----a-w- c:\windows\SysWow64\cdintf250.dll 2013-10-21 00:59 . 2013-10-21 01:05 -------- d-----w- c:\users\*****\AppData\Local\Lexware 2013-10-21 00:59 . 2013-10-21 01:01 -------- d-----w- c:\program files (x86)\Common Files\Lexware . . . (((((((((((((((((((((((((((((((((((( Find3M Bericht )))))))))))))))))))))))))))))))))))))))))))))))))))))) . 2013-11-17 14:43 . 2013-01-20 01:16 34752 ----a-w- c:\windows\system32\drivers\WPRO_41_2001.sys 2013-10-25 20:00 . 2013-01-22 15:14 189248 ----a-w- c:\windows\SysWow64\PnkBstrB.exe 2013-10-25 19:41 . 2013-01-22 15:14 75064 ----a-w- c:\windows\SysWow64\PnkBstrA.exe 2013-10-09 19:16 . 2013-01-20 02:16 71048 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl 2013-10-08 05:50 . 2013-10-06 20:55 96168 ----a-w- c:\windows\SysWow64\WindowsAccessBridge-32.dll 2013-09-27 11:25 . 2013-09-27 11:25 799744 ----a-w- c:\windows\SysWow64\rzdevicedll.dll 2013-09-19 02:09 . 2013-09-19 02:09 57344 ----a-w- c:\windows\SysWow64\rzdevinfo.dll 2013-09-19 02:09 . 2013-09-19 02:09 154112 ----a-w- c:\windows\SysWow64\rztouchdll.dll 2013-09-19 02:09 . 2013-09-19 02:09 117248 ----a-w- c:\windows\SysWow64\rzdisplaydll.dll 2013-09-19 02:09 . 2013-09-19 02:09 296448 ----a-w- c:\windows\SysWow64\rzaudiodll.dll 2013-09-13 05:49 . 2013-09-13 05:49 142008 ----a-w- c:\windows\system32\drivers\rzudd.sys 2013-09-02 12:43 . 2013-05-06 11:46 81112 ----a-w- c:\windows\system32\drivers\avnetflt.sys 2013-09-02 12:43 . 2013-04-01 12:14 132088 ----a-w- c:\windows\system32\drivers\avipbb.sys 2013-09-02 12:43 . 2013-04-01 12:14 105344 ----a-w- c:\windows\system32\drivers\avgntflt.sys . . (((((((((((((((((((((((((((( Autostartpunkte der Registrierung )))))))))))))))))))))))))))))))))))))))) . . *Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt. REGEDIT4 [HKEY_CLASSES_ROOT\CLSID\{8BA85C75-763B-4103-94EB-9470F12FE0F7}] 2013-05-20 19:00 1725128 ----a-w- c:\progra~2\MICROS~2\Office15\GROOVEEX.DLL [HKEY_CLASSES_ROOT\CLSID\{CD55129A-B1A1-438E-A425-CEBC7DC684EE}] 2013-05-20 19:00 1725128 ----a-w- c:\progra~2\MICROS~2\Office15\GROOVEEX.DLL [HKEY_CLASSES_ROOT\CLSID\{E768CD3B-BDDC-436D-9C13-E1B39CA257B1}] 2013-05-20 19:00 1725128 ----a-w- c:\progra~2\MICROS~2\Office15\GROOVEEX.DLL . [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run] "avgnt"="c:\program files (x86)\Avira\AntiVir Desktop\avgnt.exe" [2013-09-02 347192] "StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2012-12-19 642808] "AdobeCS6ServiceManager"="c:\program files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe" [2013-04-25 1075296] "PDFPrint"="c:\program files (x86)\PDF24\pdf24.exe" [2012-12-12 163000] "Razer Synapse"="c:\program files (x86)\Razer\Synapse\RzSynapse.exe" [2013-09-28 442200] "Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-04-04 958576] "QuickTime Task"="c:\program files (x86)\QuickTime\QTTask.exe" [2013-05-01 421888] "iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2013-11-01 152392] "LogMeIn Hamachi Ui"="c:\program files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe" [2013-11-11 2349392] . c:\users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ CurseClientStartup.ccip [2013-2-13 0] . c:\users\******\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ Dropbox.lnk - c:\users\*****\AppData\Roaming\Dropbox\bin\Dropbox.exe /systemstartup [2013-11-1 29769432] . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system] "ConsentPromptBehaviorAdmin"= 0 (0x0) "ConsentPromptBehaviorUser"= 3 (0x3) "EnableLUA"= 0 (0x0) "EnableUIADesktopToggle"= 0 (0x0) "PromptOnSecureDesktop"= 0 (0x0) . [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows] "LoadAppInit_DLLs"=1 (0x1) . 2;2 EDPSrv;EDP Server;c:\program files\EDP\server\EDPServer.exe;c:\program files\EDP\server\EDPServer.exe [x] R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [x] R2 UNS;Intel(R) Management and Security Application User Notification Service;c:\program files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe;c:\program files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe [x] R3 AbilisT;EyeTV DTT Deluxe (2009) Service;c:\windows\system32\DRIVERS\AbilisBdaTuner.sys;c:\windows\SYSNATIVE\DRIVERS\AbilisBdaTuner.sys [x] R3 cpuz136;cpuz136;c:\windows\TEMP\cpuz136\cpuz136_x64.sys;c:\windows\TEMP\cpuz136\cpuz136_x64.sys [x] R3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys;c:\windows\SYSNATIVE\drivers\dmvsc.sys [x] R3 FirebirdServerDefaultInstance;Firebird Server - DefaultInstance;c:\program files\Firebird\Firebird_2_1\bin\fbserver.exe;c:\program files\Firebird\Firebird_2_1\bin\fbserver.exe [x] R3 Futuremark SystemInfo Service;Futuremark SystemInfo Service;c:\program files (x86)\Futuremark\Futuremark SystemInfo\FMSISvc.exe;c:\program files (x86)\Futuremark\Futuremark SystemInfo\FMSISvc.exe [x] R3 ivusb;Initio Driver for USB Default Controller;c:\windows\system32\DRIVERS\ivusb.sys;c:\windows\SYSNATIVE\DRIVERS\ivusb.sys [x] R3 MSICDSetup;MSICDSetup;d:\cdriver64.sys;d:\CDriver64.sys [x] R3 Netaapl;Apple Mobile Device Ethernet Service;c:\windows\system32\DRIVERS\netaapl64.sys;c:\windows\SYSNATIVE\DRIVERS\netaapl64.sys [x] R3 NTIOLib_1_0_C;NTIOLib_1_0_C;d:\ntiolib_x64.sys;d:\NTIOLib_X64.sys [x] R3 ose64;Office 64 Source Engine;c:\program files\Common Files\Microsoft Shared\Source Engine\OSE.EXE;c:\program files\Common Files\Microsoft Shared\Source Engine\OSE.EXE [x] R3 PlantronicsGC;PLTGC Interface;c:\windows\system32\drivers\PLTGC.sys;c:\windows\SYSNATIVE\drivers\PLTGC.sys [x] R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys;c:\windows\SYSNATIVE\drivers\rdpvideominiport.sys [x] R3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys;c:\windows\SYSNATIVE\DRIVERS\Rt64win7.sys [x] R3 SwitchBoard;SwitchBoard;c:\program files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe;c:\program files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe [x] R3 Synth3dVsc;Synth3dVsc;c:\windows\system32\drivers\synth3dvsc.sys;c:\windows\SYSNATIVE\drivers\synth3dvsc.sys [x] R3 terminpt;Microsoft Remote Desktop Input Driver;c:\windows\system32\drivers\terminpt.sys;c:\windows\SYSNATIVE\drivers\terminpt.sys [x] R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x] R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys;c:\windows\SYSNATIVE\drivers\TsUsbGD.sys [x] R3 tsusbhub;tsusbhub;c:\windows\system32\drivers\tsusbhub.sys;c:\windows\SYSNATIVE\drivers\tsusbhub.sys [x] R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys;c:\windows\SYSNATIVE\Drivers\usbaapl64.sys [x] R3 VGPU;VGPU;c:\windows\system32\drivers\rdvgkmd.sys;c:\windows\SYSNATIVE\drivers\rdvgkmd.sys [x] R3 WPRO_41_2001;WinPcap Packet Driver (WPRO_41_2001);c:\windows\system32\drivers\WPRO_41_2001.sys;c:\windows\SYSNATIVE\drivers\WPRO_41_2001.sys [x] S0 AppleHFS;AppleHFS; [x] S0 AppleMNT;AppleMNT; [x] S0 iusb3hcs;Intel(R) USB 3.0 Hostcontroller-Switchtreiber;c:\windows\system32\DRIVERS\iusb3hcs.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3hcs.sys [x] S1 avkmgr;avkmgr;c:\windows\system32\DRIVERS\avkmgr.sys;c:\windows\SYSNATIVE\DRIVERS\avkmgr.sys [x] S1 dtsoftbus01;DAEMON Tools Virtual Bus Driver;c:\windows\system32\DRIVERS\dtsoftbus01.sys;c:\windows\SYSNATIVE\DRIVERS\dtsoftbus01.sys [x] S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe;c:\windows\SYSNATIVE\atiesrxx.exe [x] S2 AntiVirSchedulerService;Avira Planer;c:\program files (x86)\Avira\AntiVir Desktop\sched.exe;c:\program files (x86)\Avira\AntiVir Desktop\sched.exe [x] S2 FirebirdGuardianDefaultInstance;Firebird Guardian - DefaultInstance;c:\program files\Firebird\Firebird_2_1\bin\fbguard.exe;c:\program files\Firebird\Firebird_2_1\bin\fbguard.exe [x] S2 Hamachi2Svc;LogMeIn Hamachi Tunneling Engine;c:\program files (x86)\LogMeIn Hamachi\hamachi-2.exe;c:\program files (x86)\LogMeIn Hamachi\hamachi-2.exe [x] S2 Intel(R) Capability Licensing Service Interface;Intel(R) Capability Licensing Service Interface;c:\program files\Intel\iCLS Client\HeciServer.exe;c:\program files\Intel\iCLS Client\HeciServer.exe [x] S2 ISCTAgent;ISCT Always Updated Agent;c:\program files\Intel\Intel(R) Smart Connect Technology Agent\iSCTAgent.exe;c:\program files\Intel\Intel(R) Smart Connect Technology Agent\iSCTAgent.exe [x] S2 jhi_service;Intel(R) Dynamic Application Loader Host Interface Service;c:\program files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe;c:\program files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe [x] S2 LMIGuardianSvc;LMIGuardianSvc;c:\program files (x86)\LogMeIn Hamachi\LMIGuardianSvc.exe;c:\program files (x86)\LogMeIn Hamachi\LMIGuardianSvc.exe [x] S2 MSSQL$JTLWAWI;SQL Server (JTLWAWI);c:\program files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe;c:\program files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [x] S2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe;c:\program files (x86)\Skype\Updater\Updater.exe [x] S2 TeamViewer8;TeamViewer 8;c:\program files (x86)\TeamViewer\Version8\TeamViewer_Service.exe;c:\program files (x86)\TeamViewer\Version8\TeamViewer_Service.exe [x] S3 AtiHDAudioService;AMD Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdW76.sys;c:\windows\SYSNATIVE\drivers\AtihdW76.sys [x] S3 ikbevent;Intel Upper keyboard Class Filter Driver;c:\windows\system32\DRIVERS\ikbevent.sys;c:\windows\SYSNATIVE\DRIVERS\ikbevent.sys [x] S3 imsevent;Intel Upper Mouse Class Filter Driver;c:\windows\system32\DRIVERS\imsevent.sys;c:\windows\SYSNATIVE\DRIVERS\imsevent.sys [x] S3 ISCT;Intel(R) Smart Connect Technology Device Driver;c:\windows\system32\DRIVERS\ISCTD64.sys;c:\windows\SYSNATIVE\DRIVERS\ISCTD64.sys [x] S3 iusb3hub;Intel(R) USB 3.0-Hubtreiber;c:\windows\system32\DRIVERS\iusb3hub.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3hub.sys [x] S3 iusb3xhc;Intel(R) USB 3.0 eXtensible-Hostcontrollertreiber;c:\windows\system32\DRIVERS\iusb3xhc.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3xhc.sys [x] S3 LGBusEnum;Logitech GamePanel Virtual Bus Enumerator Driver;c:\windows\system32\drivers\LGBusEnum.sys;c:\windows\SYSNATIVE\drivers\LGBusEnum.sys [x] S3 LGPBTDD;LGPBTDD.sys Display Driver;c:\windows\system32\Drivers\LGPBTDD.sys;c:\windows\SYSNATIVE\Drivers\LGPBTDD.sys [x] S3 LGVirHid;Logitech Gamepanel Virtual HID Device Driver;c:\windows\system32\drivers\LGVirHid.sys;c:\windows\SYSNATIVE\drivers\LGVirHid.sys [x] S3 MBfilt;MBfilt;c:\windows\system32\drivers\MBfilt64.sys;c:\windows\SYSNATIVE\drivers\MBfilt64.sys [x] S3 rzudd;Razer Mouse Driver;c:\windows\system32\DRIVERS\rzudd.sys;c:\windows\SYSNATIVE\DRIVERS\rzudd.sys [x] . . [HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}] 2013-11-15 14:24 1210320 ----a-w- c:\program files (x86)\Google\Chrome\Application\31.0.1650.57\Installer\chrmstp.exe . Inhalt des "geplante Tasks" Ordners . 2013-11-17 c:\windows\Tasks\Adobe Flash Player Updater.job - c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2013-01-20 19:16] . 2013-11-17 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job - c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-07-10 01:04] . 2013-11-17 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job - c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-07-10 01:04] . . --------- X64 Entries ----------- . . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\ SkyDrivePro1 (ErrorConflict)] @="{8BA85C75-763B-4103-94EB-9470F12FE0F7}" [HKEY_CLASSES_ROOT\CLSID\{8BA85C75-763B-4103-94EB-9470F12FE0F7}] 2013-05-20 18:55 2328776 ----a-w- c:\progra~1\MICROS~2\Office15\GROOVEEX.DLL . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\ SkyDrivePro2 (SyncInProgress)] @="{CD55129A-B1A1-438E-A425-CEBC7DC684EE}" [HKEY_CLASSES_ROOT\CLSID\{CD55129A-B1A1-438E-A425-CEBC7DC684EE}] 2013-05-20 18:55 2328776 ----a-w- c:\progra~1\MICROS~2\Office15\GROOVEEX.DLL . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\ SkyDrivePro3 (InSync)] @="{E768CD3B-BDDC-436D-9C13-E1B39CA257B1}" [HKEY_CLASSES_ROOT\CLSID\{E768CD3B-BDDC-436D-9C13-E1B39CA257B1}] 2013-05-20 18:55 2328776 ----a-w- c:\progra~1\MICROS~2\Office15\GROOVEEX.DLL . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1] @="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}] 2013-09-11 02:09 164016 ----a-w- c:\users\*****\AppData\Roaming\Dropbox\bin\DropboxExt64.22.dll . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2] @="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}] 2013-09-11 02:09 164016 ----a-w- c:\users\*****\AppData\Roaming\Dropbox\bin\DropboxExt64.22.dll . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3] @="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}] 2013-09-11 02:09 164016 ----a-w- c:\users\*****\AppData\Roaming\Dropbox\bin\DropboxExt64.22.dll . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt4] @="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}" [HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}] 2013-09-11 02:09 164016 ----a-w- c:\users\*****\AppData\Roaming\Dropbox\bin\DropboxExt64.22.dll . [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "Launch LCore"="c:\program files\Logitech Gaming Software\LCore.exe" [2012-11-29 7406392] "AdobeAAMUpdater-1.0"="c:\program files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe" [2012-09-20 444904] . ------- Zusätzlicher Suchlauf ------- . uLocal Page = c:\windows\system32\blank.htm mDefault_Page_URL = hxxp://www.google.com mStart Page = hxxp://www.google.com mLocal Page = c:\windows\SysWOW64\blank.htm IE: An OneNote s&enden - c:\progra~1\MICROS~2\Office15\ONBttnIE.dll/105 IE: Nach Microsoft E&xcel exportieren - c:\progra~1\MICROS~2\Office15\EXCEL.EXE/3000 Filter: text/xml - {807583E5-5146-11D5-A672-00B0D022E945} - c:\program files (x86)\Common Files\microsoft shared\OFFICE15\MSOXMLMF.DLL DPF: {4FF78044-96B4-4312-A5B7-FDA3CB328095} - FF - ProfilePath - c:\users\******\AppData\Roaming\Mozilla\Firefox\Profiles\lf2hkcfy.default\ . - - - - Entfernte verwaiste Registrierungseinträge - - - - . ShellIconOverlayIdentifiers-{FB314ED9-A251-47B7-93E1-CDD82E34AF8B} - c:\users\*****\AppData\Roaming\Dropbox\bin\DropboxExt.17.dll ShellIconOverlayIdentifiers-{FB314EDA-A251-47B7-93E1-CDD82E34AF8B} - c:\users\*****\AppData\Roaming\Dropbox\bin\DropboxExt.17.dll ShellIconOverlayIdentifiers-{FB314EDB-A251-47B7-93E1-CDD82E34AF8B} - c:\users\*****\AppData\Roaming\Dropbox\bin\DropboxExt.17.dll ShellIconOverlayIdentifiers-{FB314EDC-A251-47B7-93E1-CDD82E34AF8B} - c:\users\*****\AppData\Roaming\Dropbox\bin\DropboxExt.17.dll Wow6432Node-HKCU-Run-AdobeBridge - (no file) Wow6432Node-HKLM-Run-<NO NAME> - (no file) c:\users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk - c:\users\******\AppData\Roaming\Dropbox\bin\Dropbox.exe /systemstartup c:\users\*****\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk - c:\users\******\AppData\Roaming\Dropbox\bin\Dropbox.exe /systemstartup HKLM_Wow6432Node-ActiveSetup-{2D46B6DC-2207-486B-B523-A557E6D54B47} - start AddRemove-Harvey - b:\spiele\Harveys Neue Augen\uninstall.exe AddRemove-PunkBusterSvc - c:\windows\system32\pbsvc_moh.exe AddRemove-RGVhZCBJc2xhbmQgUmlwdGlkZSAoYykgRGVlcCBTaWx2ZXI=_is1 - b:\spiele\Dead Island Riptide\unins000.exe AddRemove-Rocksmith_is1 - b:\spiele\Ubisoft\Rocksmith\unins000.exe AddRemove-Steam App 13540 - c:\program files (x86)\Steam\steam.exe AddRemove-Steam App 35140 - c:\program files (x86)\Steam\steam.exe AddRemove-Steam App 40390 - c:\program files (x86)\Steam\steam.exe AddRemove-Steam App 500 - c:\program files (x86)\Steam\steam.exe AddRemove-Steam App 730 - c:\program files (x86)\Steam\steam.exe AddRemove-Steam App 8190 - c:\program files (x86)\Steam\steam.exe AddRemove-{01D57CF6-B5BC-4D03-AFF5-7960CFBD05A9} - c:\programdata\{A4FF347C-7353-4B5D-B479-1933EFF12E9A}\Guitar Rig 5 Setup PC.exe AddRemove-{0886900B-B2F3-452C-B580-60F1253F7F80} - c:\programdata\{B9F6456A-E0C8-4BD3-A6E8-AFA8859EC4C4}\Controller Editor Setup PC.exe AddRemove-{0B8565BA-BAD5-4732-B122-5FD78EFC50A9} - c:\programdata\{95B4F0ED-951F-4D36-B068-5EC1C4C19C14}\Service Center Setup PC.exe AddRemove-{2930FB47-6452-4476-BF16-D77F748646DB} - c:\programdata\{B0CAD5CC-867E-473E-B55F-339F9635A45D}\Guitar Rig Mobile IO Setup PC.exe AddRemove-{7930FB47-6452-4476-BF16-D77F748646DB} - c:\programdata\{CB28D9D3-6B5D-4AFA-BA37-B4AFAAAF71B9}\Guitar Rig Session IO Setup PC.exe AddRemove-{7F12FECB-1D75-42D7-9074-D6FEA6D91E65}_is1 - c:\program files (x86)\JC2-MP\unins000.exe AddRemove-{B962AD08-335F-46f7-A182-257D37672E5C} - c:\programdata\{5A23829C-A66E-47B0-AD50-21A3FFE6C325}\Rig Kontrol 3 Setup PC.exe . . . --------------------- Gesperrte Registrierungsschluessel --------------------- . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}] @Denied: (A 2) (Everyone) @="FlashBroker" "LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_9_900_117_ActiveX.exe,-101" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation] "Enabled"=dword:00000001 . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32] @="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_9_900_117_ActiveX.exe" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{BEB3C0C7-B648-4257-96D9-B5D024816E27}\Version*Version] "Version"=hex:bb,37,a6,30,48,5b,95,bd,cc,b3,ac,ea,ce,28,a2,0c,ec,f9,96,20,cb, 36,3d,29,a8,13,8c,f3,6a,a1,ba,6f,34,10,fd,88,92,59,3d,ea,06,b9,5c,e5,26,1d,\ . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}] @Denied: (A 2) (Everyone) @="IFlashBroker5" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" "Version"="1.0" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}] @Denied: (A 2) (Everyone) @="FlashBroker" "LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_9_900_117_ActiveX.exe,-101" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation] "Enabled"=dword:00000001 . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_9_900_117_ActiveX.exe" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}] @Denied: (A 2) (Everyone) @="Shockwave Flash Object" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_9_900_117.ocx" "ThreadingModel"="Apartment" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus] @="0" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID] @="ShockwaveFlash.ShockwaveFlash.11" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_9_900_117.ocx, 1" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib] @="{D27CDB6B-AE6D-11cf-96B8-444553540000}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version] @="1.0" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID] @="ShockwaveFlash.ShockwaveFlash" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}] @Denied: (A 2) (Everyone) @="Macromedia Flash Factory Object" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_9_900_117.ocx" "ThreadingModel"="Apartment" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID] @="FlashFactory.FlashFactory.1" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32] @="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_9_900_117.ocx, 1" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib] @="{D27CDB6B-AE6D-11cf-96B8-444553540000}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version] @="1.0" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID] @="FlashFactory.FlashFactory" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}] @Denied: (A 2) (Everyone) @="IFlashBroker5" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32] @="{00020424-0000-0000-C000-000000000046}" . [HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib] @="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}" "Version"="1.0" . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security] @Denied: (Full) (Everyone) . ------------------------ Weitere laufende Prozesse ------------------------ . c:\program files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe c:\program files (x86)\Avira\AntiVir Desktop\avguard.exe c:\program files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe c:\windows\SysWOW64\PnkBstrA.exe c:\windows\SysWOW64\PnkBstrB.exe c:\program files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe c:\users\*****\AppData\Roaming\Dropbox\bin\Dropbox.exe . ************************************************************************** . Zeit der Fertigstellung: 2013-11-17 15:45:09 - PC wurde neu gestartet ComboFix-quarantined-files.txt 2013-11-17 14:45 . Vor Suchlauf: 12 Verzeichnis(se), 18.020.331.520 Bytes frei Nach Suchlauf: 17 Verzeichnis(se), 21.391.368.192 Bytes frei . - - End Of File - - B9F06493C4A1A96ED9F0054D74C7C179 A36C5E4F47E84449FF07ED3517B43A31 FRST Logfile: Code:
ATTFilter Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 17-11-2013 Ran by ****** (administrator) on ***** on 17-11-2013 15:48:13 Running from C:\Users\******\Desktop Windows 7 Enterprise Service Pack 1 (X64) OS Language: German Standard Internet Explorer Version 10 Boot Mode: Normal ==================== Processes (Whitelisted) ================= (AMD) C:\Windows\system32\atiesrxx.exe (AMD) C:\Windows\system32\atieclxx.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe (Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe (Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe (Hendrik Eifert) C:\Program Files\EDP\server\EDPServer.exe (Firebird Project) C:\Program Files\Firebird\Firebird_2_1\bin\fbguard.exe (Intel(R) Corporation) C:\Program Files\Intel\iCLS Client\HeciServer.exe () C:\Program Files\Intel\Intel(R) Smart Connect Technology Agent\iSCTAgent.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe (LogMeIn, Inc.) C:\Program Files (x86)\LogMeIn Hamachi\LMIGuardianSvc.exe (Microsoft Corporation) C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe () C:\Windows\SysWOW64\PnkBstrA.exe () C:\Windows\SysWOW64\PnkBstrB.exe (Microsoft Corporation) C:\Program Files (x86)\Microsoft SQL Server\90\Shared\sqlbrowser.exe (Microsoft Corporation) C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe (TeamViewer GmbH) C:\Program Files (x86)\TeamViewer\Version8\TeamViewer_Service.exe (Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE (LogMeIn Inc.) C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2.exe (Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe (Logitech Inc.) C:\Program Files\Logitech Gaming Software\LCore.exe (Dropbox, Inc.) C:\Users\*****\AppData\Roaming\Dropbox\bin\Dropbox.exe (Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe (Geek Software GmbH) C:\Program Files (x86)\PDF24\pdf24.exe (Razer Inc.) C:\Program Files (x86)\Razer\Synapse\RzSynapse.exe (Apple Inc.) C:\Program Files (x86)\iTunes\iTunesHelper.exe (LogMeIn Inc.) C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe (Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe (Firebird Project) C:\Program Files\Firebird\Firebird_2_1\bin\fbserver.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe (Mozilla Corporation) C:\Program Files (x86)\Mozilla Firefox\firefox.exe ==================== Registry (Whitelisted) ================== HKLM\...\Run: [Launch LCore] - C:\Program Files\Logitech Gaming Software\LCore.exe [7406392 2012-11-29] (Logitech Inc.) HKLM\...\Run: [AdobeAAMUpdater-1.0] - C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\updaterstartuputility.exe [444904 2012-09-20] (Adobe Systems Incorporated) HKLM-x32\...\Run: [avgnt] - C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe [347192 2013-09-02] (Avira Operations GmbH & Co. KG) HKLM-x32\...\Run: [] - [x] HKLM-x32\...\Run: [StartCCC] - C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe [642808 2012-12-19] (Advanced Micro Devices, Inc.) HKLM-x32\...\Run: [AdobeCS6ServiceManager] - C:\Program Files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe [1075296 2013-04-25] (Adobe Systems Incorporated) HKLM-x32\...\Run: [PDFPrint] - C:\Program Files (x86)\PDF24\pdf24.exe [163000 2012-12-12] (Geek Software GmbH) HKLM-x32\...\Run: [Razer Synapse] - C:\Program Files (x86)\Razer\Synapse\RzSynapse.exe [442200 2013-09-28] (Razer Inc.) HKLM-x32\...\Run: [Adobe ARM] - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [958576 2013-04-04] (Adobe Systems Incorporated) HKLM-x32\...\Run: [QuickTime Task] - C:\Program Files (x86)\QuickTime\QTTask.exe [421888 2013-05-01] (Apple Inc.) HKLM-x32\...\Run: [iTunesHelper] - C:\Program Files (x86)\iTunes\iTunesHelper.exe [152392 2013-11-02] (Apple Inc.) HKLM-x32\...\Run: [LogMeIn Hamachi Ui] - C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2-ui.exe [2349392 2013-11-11] (LogMeIn Inc.) HKU\Julian\...\Run: [Spotify Web Helper] - C:\Users\*****\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe [1168896 2013-11-13] (Spotify Ltd) HKU\Julian\...\Run: [Skype] - C:\Program Files (x86)\Skype\Phone\Skype.exe [20551328 2013-10-21] (Skype Technologies S.A.) HKU\Julian\...\Run: [Exetender_148] - "C:\Program Files (x86)\FreeRide Games\GPlayer.exe" /schedule 300000 HKU\Julian\...\Run: [Spotify] - C:\Users\*****\AppData\Roaming\Spotify\spotify.exe [5955072 2013-11-13] (Spotify Ltd) HKU\*****\...\Run: [AdobeBridge] - [x] HKU\*****\...\Run: [Spotify] - C:\Users\*****\AppData\Roaming\Spotify\spotify.exe [5955072 2013-11-13] (Spotify Ltd) HKU\*****\...\Run: [Spotify Web Helper] - C:\Users\*****\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe [1168896 2013-11-13] (Spotify Ltd) Startup: C:\Users\******\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Dropbox.lnk ShortcutTarget: Dropbox.lnk -> C:\Users\*****\AppData\Roaming\Dropbox\bin\Dropbox.exe (Dropbox, Inc.) Startup: C:\Users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CurseClientStartup.ccip () ==================== Internet (Whitelisted) ==================== HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0x0CDCCAFAE7FBCD01 HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de-DE StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe SearchScopes: HKLM - DefaultScope value is missing. BHO: Lync Browser Helper - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files\Microsoft Office\Office15\OCHelper.dll (Microsoft Corporation) BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation) BHO: Office Document Cache Handler - {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\Program Files\Microsoft Office\Office15\URLREDIR.DLL (Microsoft Corporation) BHO: Microsoft SkyDrive Pro Browser Helper - {D0498E0A-45B7-42AE-A9AA-ABA463DBD3BF} - C:\Program Files\Microsoft Office\Office15\GROOVEEX.DLL (Microsoft Corporation) BHO-x32: Lync Browser Helper - {31D09BA0-12F5-4CCE-BE8A-2923E76605DA} - C:\Program Files (x86)\Microsoft Office\Office15\OCHelper.dll (Microsoft Corporation) BHO-x32: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation) BHO-x32: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\microsoft shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corporation) BHO-x32: Office Document Cache Handler - {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\Program Files (x86)\Microsoft Office\Office15\URLREDIR.DLL (Microsoft Corporation) BHO-x32: Microsoft SkyDrive Pro Browser Helper - {D0498E0A-45B7-42AE-A9AA-ABA463DBD3BF} - C:\Program Files (x86)\Microsoft Office\Office15\GROOVEEX.DLL (Microsoft Corporation) BHO-x32: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation) DPF: HKLM-x32 {4FF78044-96B4-4312-A5B7-FDA3CB328095} Handler: osf - {D924BDC6-C83A-4BD5-90D0-095128A113D1} - C:\Program Files\Microsoft Office\Office15\MSOSB.DLL (Microsoft Corporation) Handler-x32: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll (Skype Technologies) Winsock: Catalog5 01 C:\Windows\SysWOW64\mswsock.dll [232448] (Microsoft Corporation) ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll" Winsock: Catalog5-x64 01 %SystemRoot%\System32\mswsock.dll [326144] (Microsoft Corporation) ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll" Tcpip\Parameters: [DhcpNameServer] 192.168.2.1 FireFox: ======== FF ProfilePath: C:\Users\******\AppData\Roaming\Mozilla\Firefox\Profiles\lf2hkcfy.default FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_11_9_900_117.dll () FF Plugin: @Microsoft.com/NpCtrl,version=1.0 - C:\Program Files\Microsoft Silverlight\5.1.20125.0\npctrl.dll ( Microsoft Corporation) FF Plugin: @microsoft.com/SharePoint,version=14.0 - C:\PROGRA~1\MICROS~2\Office15\NPSPWRAP.DLL (Microsoft Corporation) FF Plugin: @videolan.org/vlc,version=2.0.5 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN) FF Plugin: adobe.com/AdobeAAMDetect - C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\CCM\Utilities\npAdobeAAMDetect64.dll (Adobe Systems) FF Plugin: adobe.com/AdobeExManDetect - C:\Program Files (x86)\Adobe\Adobe Extension Manager CS6\Win64Plugin\npAdobeExManDetectX64.dll (Adobe Systems) FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_11_9_900_117.dll () FF Plugin-x32: @Apple.com/iTunes,version=1.0 - C:\Program Files (x86)\iTunes\Mozilla Plugins\npitunes.dll () FF Plugin-x32: @esn.me/esnsonar,version=0.70.4 - C:\Program Files (x86)\Battlelog Web Plugins\Sonar\0.70.4\npesnsonar.dll (ESN Social Software AB) FF Plugin-x32: @esn/esnlaunch,version=2.1.7 - C:\Program Files (x86)\Battlelog Web Plugins\2.1.7\npesnlaunch.dll (ESN Social Software AB) FF Plugin-x32: @intel-webapi.intel.com/Intel WebAPI ipt;version=2.1.42 - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT\npIntelWebAPIIPT.dll (Intel Corporation) FF Plugin-x32: @intel-webapi.intel.com/Intel WebAPI updater - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT\npIntelWebAPIUpdater.dll (Intel Corporation) FF Plugin-x32: @java.com/DTPlugin,version=10.45.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation) FF Plugin-x32: @java.com/JavaPlugin,version=10.45.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation) FF Plugin-x32: @microsoft.com/Lync,version=15.0 - C:\Program Files (x86)\Mozilla Firefox\plugins\npmeetingjoinpluginoc.dll (Microsoft Corporation) FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 - C:\Program Files (x86)\Microsoft Silverlight\5.1.20125.0\npctrl.dll ( Microsoft Corporation) FF Plugin-x32: @microsoft.com/SharePoint,version=14.0 - C:\PROGRA~2\MICROS~2\Office15\NPSPWRAP.DLL (Microsoft Corporation) FF Plugin-x32: @nielsen/FirefoxTracker - C:\Program Files (x86)\NetRatingsNetSight\NetSight\meter2\FirefoxAddOns\npfirefoxtracker.dll No File FF Plugin-x32: @tools.google.com/Google Update;version=3 - C:\Program Files (x86)\Google\Update\1.3.21.165\npGoogleUpdate3.dll (Google Inc.) FF Plugin-x32: @tools.google.com/Google Update;version=9 - C:\Program Files (x86)\Google\Update\1.3.21.165\npGoogleUpdate3.dll (Google Inc.) FF Plugin-x32: Adobe Reader - C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.) FF Plugin-x32: adobe.com/AdobeAAMDetect - C:\Program Files (x86)\Common Files\Adobe\OOBE\PDApp\CCM\Utilities\npAdobeAAMDetect32.dll (Adobe Systems) FF Plugin-x32: adobe.com/AdobeExManDetect - C:\Program Files (x86)\Adobe\Adobe Extension Manager CS6\npAdobeExManDetectX86.dll (Adobe Systems) FF SearchPlugin: C:\Users\******\AppData\Roaming\Mozilla\Firefox\Profiles\lf2hkcfy.default\searchplugins\youtube-videosuche.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml FF Extension: exif_viewer - C:\Users\******\AppData\Roaming\Mozilla\Firefox\Profiles\lf2hkcfy.default\Extensions\exif_viewer@mozilla.doslash.org.xpi FF Extension: firefox-hotfix - C:\Users\******\AppData\Roaming\Mozilla\Firefox\Profiles\lf2hkcfy.default\Extensions\firefox-hotfix@mozilla.org.xpi FF HKLM-x32\...\Firefox\Extensions: [netsight@nielsen.com] - C:\Program Files (x86)\NetRatingsNetSight\NetSight\meter2\FirefoxAddOns\netsight@nielsen.xpi ==================== Services (Whitelisted) ================= R2 AntiVirSchedulerService; C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe [84024 2013-09-02] (Avira Operations GmbH & Co. KG) R2 AntiVirService; C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe [108088 2013-09-02] (Avira Operations GmbH & Co. KG) R2 EDPSrv; C:\Program Files\EDP\server\EDPServer.exe [1964032 2012-11-30] (Hendrik Eifert) R2 FirebirdGuardianDefaultInstance; C:\Program Files\Firebird\Firebird_2_1\bin\fbguard.exe [114688 2011-02-01] (Firebird Project) R3 FirebirdServerDefaultInstance; C:\Program Files\Firebird\Firebird_2_1\bin\fbserver.exe [4000768 2011-02-01] (Firebird Project) R2 ISCTAgent; C:\Program Files\Intel\Intel(R) Smart Connect Technology Agent\iSCTAgent.exe [146984 2012-07-24] () R2 jhi_service; C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe [165760 2012-07-17] (Intel Corporation) R2 LMIGuardianSvc; C:\Program Files (x86)\LogMeIn Hamachi\LMIGuardianSvc.exe [377104 2013-10-11] (LogMeIn, Inc.) R2 MSSQL$JTLWAWI; C:\Program Files (x86)\Microsoft SQL Server\MSSQL.1\MSSQL\Binn\sqlservr.exe [29178224 2007-02-10] (Microsoft Corporation) R2 PnkBstrA; C:\Windows\SysWow64\PnkBstrA.exe [75064 2013-10-25] () R2 PnkBstrB; C:\Windows\SysWow64\PnkBstrB.exe [189248 2013-10-25] () ==================== Drivers (Whitelisted) ==================== S3 AbilisT; C:\Windows\System32\DRIVERS\AbilisBdaTuner.sys [131144 2010-04-12] (ABILIS Systems) S2 atksgt; C:\Windows\System32\DRIVERS\atksgt.sys [310984 2013-07-28] () R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [105344 2013-09-02] (Avira Operations GmbH & Co. KG) R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [132088 2013-09-02] (Avira Operations GmbH & Co. KG) R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [28600 2013-04-01] (Avira Operations GmbH & Co. KG) R1 dtsoftbus01; C:\Windows\System32\DRIVERS\dtsoftbus01.sys [283200 2013-06-30] (DT Soft Ltd) R3 ikbevent; C:\Windows\System32\DRIVERS\ikbevent.sys [20968 2012-07-24] () R3 imsevent; C:\Windows\System32\DRIVERS\imsevent.sys [19944 2012-07-24] () R3 ISCT; C:\Windows\System32\DRIVERS\ISCTD64.sys [46016 2012-07-24] () R3 LGPBTDD; C:\Windows\System32\Drivers\LGPBTDD.sys [30728 2009-07-01] (Logitech Inc.) R2 lirsgt; C:\Windows\System32\DRIVERS\lirsgt.sys [42696 2013-02-01] () S3 PlantronicsGC; C:\Windows\System32\drivers\PLTGC.sys [1327104 2011-11-05] (C-Media Electronics Inc) R3 WPRO_41_2001; C:\Windows\System32\drivers\WPRO_41_2001.sys [34752 2013-11-17] () S3 catchme; \??\C:\ComboFix\catchme.sys [x] S3 cpuz136; \??\C:\Windows\TEMP\cpuz136\cpuz136_x64.sys [x] S3 MSICDSetup; \??\D:\CDriver64.sys [x] S3 NTIOLib_1_0_C; \??\D:\NTIOLib_X64.sys [x] S3 VGPU; System32\drivers\rdvgkmd.sys [x] ==================== NetSvcs (Whitelisted) =================== ==================== One Month Created Files and Folders ======== hxxp://www.amyuni.com) C:\Windows\SysWOW64\cdintf250.dll 2013-11-17 15:48 - 2013-11-17 15:48 - 00015789 _____ C:\Users\******\Desktop\FRST.txt 2013-11-17 15:47 - 2013-11-17 15:48 - 01958236 _____ (Farbar) C:\Users\******\Desktop\FRST64.exe 2013-11-17 15:45 - 2013-11-17 15:45 - 00043107 _____ C:\ComboFix.txt 2013-11-17 15:38 - 2013-11-17 15:42 - 00028866 _____ C:\Windows\WindowsUpdate.log 2013-11-17 15:38 - 2011-06-26 07:45 - 00256000 _____ C:\Windows\PEV.exe 2013-11-17 15:38 - 2010-11-07 18:20 - 00208896 _____ C:\Windows\MBR.exe 2013-11-17 15:38 - 2009-04-20 05:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe 2013-11-17 15:38 - 2000-08-31 01:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe 2013-11-17 15:38 - 2000-08-31 01:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe 2013-11-17 15:38 - 2000-08-31 01:00 - 00098816 _____ C:\Windows\sed.exe 2013-11-17 15:38 - 2000-08-31 01:00 - 00080412 _____ C:\Windows\grep.exe 2013-11-17 15:38 - 2000-08-31 01:00 - 00068096 _____ C:\Windows\zip.exe 2013-11-17 15:35 - 2013-11-17 15:43 - 00094656 _____ (CACE Technologies) C:\Windows\system32\WPRO_41_2001woem.tmp 2013-11-17 15:32 - 2013-11-17 15:45 - 00000000 ____D C:\Qoobox 2013-11-17 15:32 - 2013-11-17 15:44 - 00000000 ____D C:\Windows\erdnt 2013-11-17 15:31 - 2013-11-17 15:31 - 05146587 ____R (Swearware) C:\Users\******\Desktop\ComboFix.exe 2013-11-17 02:18 - 2013-11-17 02:18 - 00377856 _____ C:\Users\******\Downloads\gmer_2.1.19163.exe 2013-11-17 02:12 - 2013-11-17 02:34 - 00000000 ____D C:\Users\******\Desktop\Hilfe 2013-11-17 02:10 - 2013-11-17 02:10 - 00050477 _____ C:\Users\******\Downloads\Defogger.exe 2013-11-17 02:10 - 2013-11-17 02:10 - 00000000 _____ C:\Users\******\defogger_reenable 2013-11-17 01:41 - 2013-11-17 01:41 - 01071224 _____ (Solid State Networks) C:\Users\******\Downloads\install_flashplayer11x32au_mssd_aaa_aih.exe 2013-11-17 01:23 - 2013-11-17 01:23 - 00013347 _____ C:\Users\******\Desktop\Rechnung1.vlg 2013-11-16 17:22 - 2013-11-16 17:23 - 00056963 _____ C:\Users\*****\Downloads\FRST.txt 2013-11-16 13:36 - 2013-11-16 13:36 - 00000000 ____D C:\Users\Julian\Documents\WB Games 2013-11-16 01:06 - 2013-11-16 01:06 - 104513208 _____ C:\Windows\SysWOW64\耴® 2013-11-15 15:47 - 2013-11-15 15:47 - 00056663 _____ C:\Users\Julian\Downloads\avenged_sevenfold_beast_and_the_harlot.gp4 2013-11-15 14:45 - 2013-11-15 14:45 - 104401821 _____ C:\Windows\SysWOW64\ö륡6 2013-11-14 21:16 - 2013-11-14 21:16 - 104278918 _____ C:\Windows\SysWOW64\肴 2013-11-14 20:26 - 2013-11-14 20:26 - 00000209 _____ C:\Users\Julian\Desktop\Gotham City Impostors Free To Play.url 2013-11-14 19:57 - 2013-11-16 11:10 - 00005072 _____ C:\Windows\System32\Tasks\Microsoft Office 15 Sync Maintenance for *****-Julian ***** 2013-11-14 18:35 - 2013-11-16 17:11 - 00005128 _____ C:\Windows\System32\Tasks\Microsoft Office 15 Sync Maintenance for *****-***** ***** 2013-11-14 18:33 - 2013-11-14 18:33 - 00000000 ____D C:\Users\*****\AppData\Local\LogMeIn 2013-11-14 15:17 - 2013-11-14 15:17 - 104225154 _____ C:\Windows\SysWOW64\ﺣ 2013-11-13 22:37 - 2013-11-13 22:37 - 00000000 ____D C:\Users\Julian\Desktop\Neuer Ordner 2013-11-13 20:08 - 2013-11-13 20:08 - 00000000 ____D C:\Program Files (x86)\LogMeIn Hamachi 2013-11-12 13:59 - 2013-11-12 19:59 - 103974937 _____ C:\Windows\SysWOW64\鳴핡 2013-11-11 22:39 - 2013-11-11 22:39 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Doublefine 2013-11-11 14:12 - 2013-11-11 14:12 - 103716811 _____ C:\Windows\SysWOW64\ᑈ狊£ 2013-11-10 22:24 - 2013-11-10 22:24 - 00000209 _____ C:\Users\Julian\Desktop\Brtal Legend.url 2013-11-10 15:16 - 2013-11-10 22:12 - 103551423 _____ C:\Windows\SysWOW64\寗惞 2013-11-09 21:37 - 2013-11-09 21:37 - 00078979 _____ C:\Users\Julian\Downloads\slipknot_til_we_die.gp5 2013-11-09 21:36 - 2013-11-09 21:36 - 00047441 _____ C:\Users\Julian\Downloads\slipknot_people_shit.gp4 2013-11-09 21:35 - 2013-11-09 21:35 - 00175948 _____ C:\Users\Julian\Downloads\slipknot_dead_memories.gpx 2013-11-09 16:12 - 2013-11-09 16:12 - 103387443 _____ C:\Windows\SysWOW64\惽㷚 2013-11-09 16:06 - 2013-11-09 16:06 - 00061746 _____ C:\Users\Julian\Downloads\in_extremo_liam.gp5 2013-11-09 15:35 - 2013-11-09 15:35 - 00001783 _____ C:\Users\Public\Desktop\iTunes.lnk 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\ProgramData\34BE82C4-E596-4e99-A191-52C6199EBF69 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\Program Files\iTunes 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\Program Files\iPod 2013-11-09 10:12 - 2013-11-09 10:12 - 103347145 _____ C:\Windows\SysWOW64\ꠓ 2013-11-08 21:07 - 2013-11-08 21:07 - 103316092 _____ C:\Windows\SysWOW64\퓠� 2013-11-08 16:58 - 2013-11-08 16:58 - 00055959 _____ C:\Users\Julian\Downloads\iron_maiden_the_trooper.gp3 2013-11-08 14:11 - 2013-11-08 14:11 - 103148646 _____ C:\Windows\SysWOW64\㩐쮶 2013-11-07 22:05 - 2013-11-07 22:05 - 05366672 _____ C:\Users\Julian\Downloads\DeponiaPaperFigurines.zip 2013-11-07 22:04 - 2013-11-07 22:04 - 00000209 _____ C:\Users\Julian\Desktop\Edna & Harvey Harvey's New Eyes.url 2013-11-07 21:34 - 2013-11-01 14:32 - 00000000 ____D C:\Users\Julian\Desktop\Daedalic Wallpapers 2013-11-07 21:28 - 2013-11-07 21:29 - 57475151 _____ C:\Users\Julian\Downloads\DaedalicWallpapers.zip 2013-11-07 21:26 - 2013-11-07 21:26 - 103000967 _____ C:\Windows\SysWOW64\ೱ篦 2013-11-07 15:26 - 2013-11-07 15:26 - 102946670 _____ C:\Windows\SysWOW64\㎒ 2013-11-06 20:58 - 2013-11-16 12:04 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox 2013-11-06 20:26 - 2013-11-06 20:26 - 102844835 _____ C:\Windows\SysWOW64\嵧¤ 2013-11-06 14:11 - 2013-11-06 14:11 - 102722523 _____ C:\Windows\SysWOW64\葜炄¤ 2013-11-05 20:19 - 2013-11-14 20:12 - 00001281 _____ C:\Users\Julian\Desktop\KEEEEEYS ! Batman, Fear.txt 2013-11-05 20:14 - 2013-11-05 20:14 - 105085299 _____ C:\Windows\SysWOW64\ꙣడ 2013-11-05 14:21 - 2013-11-05 14:21 - 00103191 _____ C:\Users\Julian\Downloads\amon_amarth_deceiver_of_the_gods.gp5 2013-11-05 13:48 - 2013-11-05 13:48 - 00127786 _____ C:\Users\Julian\Downloads\slipknot_psychosocial.gp5 2013-11-05 13:19 - 2013-11-05 13:19 - 105043933 _____ C:\Windows\SysWOW64\䶾⒒ 2013-11-04 23:00 - 2013-11-04 23:00 - 00061685 _____ C:\Users\Julian\Downloads\amon_amarth_war_of_the_gods.gp4 2013-11-04 22:55 - 2013-11-04 22:55 - 00080266 _____ C:\Users\Julian\Downloads\amon_amarth_twilight_of_the_thunder_god.gp5 2013-11-04 22:49 - 2013-11-04 22:49 - 00071169 _____ C:\Users\Julian\Downloads\amon_amarth_guardians_of_asgaard.gp5 2013-11-04 22:41 - 2013-11-04 22:41 - 00027402 _____ C:\Users\Julian\Downloads\amon_amarth_pursuit_of_vikings.gp4 2013-11-04 21:55 - 2013-11-04 21:55 - 00050413 _____ C:\Users\Julian\Downloads\nightwish_dark_chest_of_wonders.gp4 2013-11-04 21:53 - 2013-11-04 21:53 - 00142780 _____ C:\Users\Julian\Downloads\nightwish_nemo.gpx 2013-11-04 21:51 - 2013-11-04 21:51 - 00083186 _____ C:\Users\Julian\Downloads\nightwish_amaranth.gp5 2013-11-04 21:21 - 2013-11-04 21:21 - 00053055 _____ C:\Users\Julian\Downloads\all_time_low_damned_if_i_do_ya_damned_if_i_dont.gp5 2013-11-04 21:14 - 2013-11-04 21:14 - 00058488 _____ C:\Users\Julian\Downloads\paramore_still_into_you.gp5 2013-11-04 20:18 - 2013-11-04 20:18 - 104964650 _____ C:\Windows\SysWOW64\渎歍© 2013-11-04 14:13 - 2013-11-04 14:13 - 104867914 _____ C:\Windows\SysWOW64\�濃 2013-11-03 17:54 - 2013-11-03 17:54 - 104814100 _____ C:\Windows\SysWOW64\쀽䄦R 2013-11-03 11:54 - 2013-11-03 11:54 - 104760586 _____ C:\Windows\SysWOW64\킨¦ 2013-11-02 22:25 - 2013-11-02 22:25 - 104684788 _____ C:\Windows\SysWOW64\눮�¦ 2013-11-02 14:07 - 2013-11-02 14:09 - 00011812 _____ C:\Users\Julian\Desktop\RADIO.WAV 2013-11-02 13:14 - 2013-11-02 13:14 - 104620600 _____ C:\Windows\SysWOW64\뜐쳳 2013-11-01 22:14 - 2013-11-01 22:14 - 104569497 _____ C:\Windows\SysWOW64\廾㫃 2013-11-01 16:05 - 2013-11-01 16:05 - 00000208 _____ C:\Users\Julian\Desktop\Worms Ultimate Mayhem.url 2013-11-01 12:40 - 2013-11-01 12:40 - 00001456 _____ C:\Users\*****\AppData\Local\Adobe Für Web speichern 13.0 Prefs 2013-11-01 12:22 - 2013-11-01 13:15 - 00000000 ____D C:\Users\*****\Desktop\Hochwasser 2013-11-01 12:17 - 2013-11-01 12:17 - 104500486 _____ C:\Windows\SysWOW64\꜇뺚h 2013-10-31 17:40 - 2013-10-31 17:40 - 00000000 ____D C:\Users\******\AppData\Roaming\Lexware 2013-10-31 17:40 - 2013-10-31 17:40 - 00000000 ____D C:\Users\******\AppData\Local\Lexware 2013-10-31 16:03 - 2013-10-31 16:03 - 104348737 _____ C:\Windows\SysWOW64\甲㧽 2013-10-30 22:20 - 2013-10-30 22:20 - 00084933 _____ C:\Users\Julian\Downloads\system_of_a_down_toxicity.gp5 2013-10-30 22:02 - 2013-10-30 22:02 - 00035113 _____ C:\Users\Julian\Downloads\system_of_a_down_kill_rock_n_roll.gp5 2013-10-30 21:54 - 2013-10-30 21:54 - 00113403 _____ C:\Users\Julian\Downloads\system_of_a_down_lost_in_hollywood.gp5 2013-10-30 13:16 - 2013-10-30 13:16 - 104098187 _____ C:\Windows\SysWOW64\냈뼑X 2013-10-29 21:08 - 2013-10-29 21:08 - 104021456 _____ C:\Windows\SysWOW64\嶐牘 2013-10-29 14:10 - 2013-10-29 14:10 - 103932228 _____ C:\Windows\SysWOW64\批⭘J 2013-10-28 21:06 - 2013-10-28 21:06 - 00045483 _____ C:\Users\Julian\Downloads\queen_we_are_the_champions.gp5 2013-10-28 20:18 - 2013-10-28 20:18 - 103792972 _____ C:\Windows\SysWOW64\嶅B 2013-10-28 14:15 - 2013-10-28 14:15 - 103734365 _____ C:\Windows\SysWOW64\著ꤣ 2013-10-27 21:08 - 2013-10-27 21:08 - 103533600 _____ C:\Windows\SysWOW64\�Ᏸ 2013-10-27 13:12 - 2013-10-27 13:12 - 103334033 _____ C:\Windows\SysWOW64\咅鲅V 2013-10-26 18:50 - 2013-10-26 18:50 - 103214166 _____ C:\Windows\SysWOW64\㞋嘂* 2013-10-25 23:17 - 2013-10-25 23:17 - 00000682 _____ C:\Users\Public\Desktop\Dead Space 3.lnk 2013-10-25 21:36 - 2013-10-25 21:36 - 00000000 __SHD C:\ProgramData\DSS 2013-10-25 21:35 - 2013-10-25 21:35 - 00000000 ____D C:\Program Files\Electronic Arts 2013-10-25 20:41 - 2010-09-16 18:03 - 02601752 _____ C:\Windows\SysWOW64\pbsvc_moh.exe 2013-10-25 20:40 - 2013-10-25 23:17 - 00037022 _____ C:\Windows\DirectX.log 2013-10-25 19:18 - 2013-10-26 03:02 - 103054676 _____ C:\Windows\SysWOW64\╀ 2013-10-25 18:47 - 2013-10-25 18:47 - 08959704 _____ C:\Users\Julian\Downloads\DrakensangOnlineSetup.exe 2013-10-25 18:47 - 2013-10-25 18:47 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Drakensang Online 2013-10-25 18:47 - 2013-10-25 18:47 - 00000000 ____D C:\Program Files (x86)\Drakensang Online 2013-10-24 23:28 - 2013-11-17 15:43 - 00020242 _____ C:\Windows\PFRO.log 2013-10-24 23:28 - 2013-11-17 15:43 - 00005208 _____ C:\Windows\setupact.log 2013-10-24 23:28 - 2013-10-24 23:28 - 00000000 _____ C:\Windows\setuperr.log 2013-10-24 23:18 - 2013-10-24 23:18 - 00000000 ____D C:\Users\Julian\Documents\Free YouTube Download Manager 2013-10-24 23:18 - 2013-10-24 23:18 - 00000000 ____D C:\Users\Julian\AppData\Local\Freetec 2013-10-24 23:17 - 2013-10-24 23:20 - 00000000 ____D C:\Program Files (x86)\Web Check 2013-10-24 23:16 - 2013-10-24 23:16 - 00733192 _____ C:\Users\Julian\Downloads\youtube-dlm_1.0_en-US.exe 2013-10-24 22:00 - 2013-10-24 22:00 - 00915368 _____ (Oracle Corporation) C:\Users\Julian\Downloads\jxpiinstall.exe 2013-10-24 17:49 - 2013-10-24 17:49 - 00000701 _____ C:\Users\Julian\Desktop\Rocksmith 2014 Edition.lnk 2013-10-24 16:36 - 2013-10-24 16:36 - 00021623 _____ C:\Users\Julian\Downloads\alice_cooper_poison.gp3 2013-10-24 12:50 - 2013-10-24 18:50 - 102837954 _____ C:\Windows\SysWOW64\ꌬ⟨ 2013-10-23 15:26 - 2013-10-24 02:11 - 102674996 _____ C:\Windows\SysWOW64\贒䓎@ 2013-10-23 09:26 - 2013-10-23 09:26 - 102541796 _____ C:\Windows\SysWOW64\芉漌 2013-10-23 01:09 - 2013-10-23 01:09 - 00098254 _____ C:\Users\Julian\Downloads\andrew_lloyd_webber_phantom_of_the_opera.gp5 2013-10-22 18:44 - 2013-10-23 00:44 - 102486297 _____ C:\Windows\SysWOW64\㘝� 2013-10-22 12:44 - 2013-10-22 12:44 - 102327253 _____ C:\Windows\SysWOW64\ 2013-10-21 23:59 - 2013-10-21 23:59 - 00051831 _____ C:\Users\Julian\Downloads\children_of_bodom_scream_for_silence.gp5 2013-10-21 20:00 - 2013-10-21 20:00 - 01679157 _____ C:\Users\Julian\Downloads\metal_hell_frost_melodic_death_metal_richard_band_roland_the_unguided_1600x1200_wallpaper_Art 2013-10-21 19:33 - 2013-10-22 01:33 - 102278179 _____ C:\Windows\SysWOW64\㱰 2013-10-21 13:22 - 2013-10-21 13:22 - 00004278 _____ C:\Windows\SysWOW64\jupdate-1.7.0_45-b18.log 2013-10-21 12:51 - 2013-10-21 12:51 - 102130367 _____ C:\Windows\SysWOW64\ҫ렞¦ 2013-10-21 12:51 - 2013-10-21 12:51 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Lexware 2013-10-21 12:51 - 2013-10-21 12:51 - 00000000 ____D C:\Users\Julian\AppData\Local\Lexware 2013-10-21 02:02 - 2013-10-21 02:05 - 00000000 ____D C:\Users\*****\AppData\Roaming\Lexware 2013-10-21 02:01 - 2013-10-22 13:24 - 00000000 ____D C:\ProgramData\Lexware 2013-10-21 02:01 - 2013-10-21 02:01 - 00000305 _____ C:\Windows\ODBCINST.INI 2013-10-21 02:01 - 2013-10-21 02:01 - 00000000 ____D C:\Program Files (x86)\Lexware 2013-10-21 02:00 - 2013-03-06 13:02 - 01929216 _____ (Amyuni Technologies 2013-10-21 01:59 - 2013-10-21 02:05 - 00000000 ____D C:\Users\*****\AppData\Local\Lexware 2013-10-20 20:24 - 2013-10-20 20:24 - 27632008 _____ C:\Users\Julian\Desktop\Metal Idee.wav 2013-10-20 11:38 - 2013-10-20 17:38 - 102068998 _____ C:\Windows\SysWOW64\尻殁; 2013-10-19 15:36 - 2013-10-19 15:36 - 101983560 _____ C:\Windows\SysWOW64\叛ᗌF 2013-10-18 18:23 - 2013-10-19 00:22 - 101890677 _____ C:\Windows\SysWOW64\냦膁 2013-10-18 11:12 - 2013-10-18 11:12 - 101760430 _____ C:\Windows\SysWOW64\ꖘ焤M 2013-10-18 01:18 - 2013-10-18 01:18 - 00077355 _____ C:\Users\Julian\Desktop\kreator_violent_revolution.gpx 2013-10-18 00:45 - 2013-10-18 00:45 - 00048403 _____ C:\Users\Julian\Downloads\kreator_violent_revolution.gp4 ==================== One Month Modified Files and Folders ======= 2013-11-17 15:48 - 2013-11-17 15:48 - 00015789 _____ C:\Users\******\Desktop\FRST.txt 2013-11-17 15:48 - 2013-11-17 15:47 - 01958236 _____ (Farbar) C:\Users\******\Desktop\FRST64.exe 2013-11-17 15:47 - 2013-11-17 15:38 - 00028866 _____ C:\Windows\WindowsUpdate.log 2013-11-17 15:47 - 2011-04-12 09:06 - 00758184 _____ C:\Windows\system32\perfh007.dat 2013-11-17 15:47 - 2011-04-12 09:06 - 00172956 _____ C:\Windows\system32\perfc007.dat 2013-11-17 15:47 - 2009-07-14 06:13 - 01772838 _____ C:\Windows\system32\PerfStringBackup.INI 2013-11-17 15:45 - 2013-11-17 15:45 - 00043107 _____ C:\ComboFix.txt 2013-11-17 15:45 - 2013-11-17 15:32 - 00000000 ____D C:\Qoobox 2013-11-17 15:45 - 2013-01-22 15:22 - 00000000 ____D C:\Users\******\AppData\Local\Apps\2.0 2013-11-17 15:45 - 2009-07-14 04:20 - 00000000 __RHD C:\Users\Default 2013-11-17 15:44 - 2013-11-17 15:32 - 00000000 ____D C:\Windows\erdnt 2013-11-17 15:44 - 2013-01-22 14:15 - 00000000 ____D C:\Users\******\AppData\Roaming\Dropbox 2013-11-17 15:44 - 2013-01-22 14:10 - 00000000 ___RD C:\Users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 2013-11-17 15:44 - 2013-01-20 01:54 - 00000000 ___RD C:\Users\*****\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 2013-11-17 15:43 - 2013-11-17 15:35 - 00094656 _____ (CACE Technologies) C:\Windows\system32\WPRO_41_2001woem.tmp 2013-11-17 15:43 - 2013-10-24 23:28 - 00020242 _____ C:\Windows\PFRO.log 2013-11-17 15:43 - 2013-10-24 23:28 - 00005208 _____ C:\Windows\setupact.log 2013-11-17 15:43 - 2013-07-10 02:04 - 00001106 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job 2013-11-17 15:43 - 2013-01-22 13:39 - 00000000 ____D C:\Users\******\AppData\Local\LogMeIn Hamachi 2013-11-17 15:43 - 2013-01-20 02:16 - 00034752 _____ C:\Windows\system32\Drivers\WPRO_41_2001.sys 2013-11-17 15:43 - 2009-07-14 06:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT 2013-11-17 15:43 - 2009-07-14 03:34 - 00000215 _____ C:\Windows\system.ini 2013-11-17 15:42 - 2009-07-14 05:45 - 00022176 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 2013-11-17 15:42 - 2009-07-14 05:45 - 00022176 ____H C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 2013-11-17 15:36 - 2009-07-14 04:20 - 00000000 ____D C:\Windows\system32\NDF 2013-11-17 15:31 - 2013-11-17 15:31 - 05146587 ____R (Swearware) C:\Users\******\Desktop\ComboFix.exe 2013-11-17 02:34 - 2013-11-17 02:12 - 00000000 ____D C:\Users\******\Desktop\Hilfe 2013-11-17 02:24 - 2013-07-10 02:04 - 00001110 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job 2013-11-17 02:18 - 2013-11-17 02:18 - 00377856 _____ C:\Users\******\Downloads\gmer_2.1.19163.exe 2013-11-17 02:16 - 2013-01-20 03:16 - 00000884 _____ C:\Windows\Tasks\Adobe Flash Player Updater.job 2013-11-17 02:10 - 2013-11-17 02:10 - 00050477 _____ C:\Users\******\Downloads\Defogger.exe 2013-11-17 02:10 - 2013-11-17 02:10 - 00000000 _____ C:\Users\******\defogger_reenable 2013-11-17 02:10 - 2013-01-22 13:39 - 00000000 ____D C:\Users\****** 2013-11-17 02:00 - 2013-01-22 14:54 - 00000000 ____D C:\Users\******\AppData\Local\Adobe 2013-11-17 01:41 - 2013-11-17 01:41 - 01071224 _____ (Solid State Networks) C:\Users\******\Downloads\install_flashplayer11x32au_mssd_aaa_aih.exe 2013-11-17 01:34 - 2009-07-14 06:32 - 00000000 ____D C:\Windows\system32\FxsTmp 2013-11-17 01:23 - 2013-11-17 01:23 - 00013347 _____ C:\Users\******\Desktop\Rechnung1.vlg 2013-11-16 17:24 - 2013-01-20 03:15 - 00000000 ____D C:\Users\*****\AppData\Roaming\Spotify 2013-11-16 17:23 - 2013-11-16 17:22 - 00056963 _____ C:\Users\*****\Downloads\FRST.txt 2013-11-16 17:11 - 2013-11-14 18:35 - 00005128 _____ C:\Windows\System32\Tasks\Microsoft Office 15 Sync Maintenance for *****-***** ***** 2013-11-16 17:11 - 2013-01-20 13:40 - 00000000 ____D C:\Users\*****\AppData\Roaming\Dropbox 2013-11-16 17:10 - 2013-01-27 16:10 - 00000000 ____D C:\Users\*****\AppData\Local\Adobe 2013-11-16 17:10 - 2013-01-21 15:15 - 00000000 ____D C:\Users\*****\AppData\Local\LogMeIn Hamachi 2013-11-16 16:14 - 2013-10-09 21:11 - 00000000 ____D C:\Users\Julian\AppData\Local\Battle.net 2013-11-16 15:55 - 2013-02-13 17:58 - 00000000 ____D C:\Users\Julian\AppData\Local\Deployment 2013-11-16 15:55 - 2013-01-23 17:20 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Skype 2013-11-16 15:13 - 2013-01-23 22:12 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Spotify 2013-11-16 13:43 - 2013-01-20 16:41 - 00000000 ____D C:\Program Files (x86)\JDownloader 2013-11-16 13:36 - 2013-11-16 13:36 - 00000000 ____D C:\Users\Julian\Documents\WB Games 2013-11-16 12:04 - 2013-11-06 20:58 - 00000000 ____D C:\Program Files (x86)\Mozilla Firefox 2013-11-16 11:10 - 2013-11-14 19:57 - 00005072 _____ C:\Windows\System32\Tasks\Microsoft Office 15 Sync Maintenance for *****-Julian ***** 2013-11-16 10:58 - 2013-01-23 19:30 - 00000000 ____D C:\Users\Julian\AppData\Local\Adobe 2013-11-16 10:48 - 2013-02-08 22:19 - 00000000 ___RD C:\Users\Julian\Dropbox 2013-11-16 10:48 - 2013-02-08 22:19 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Dropbox 2013-11-16 10:48 - 2013-01-22 14:10 - 00000000 ____D C:\Users\Julian\AppData\Local\LogMeIn Hamachi 2013-11-16 01:06 - 2013-11-16 01:06 - 104513208 _____ C:\Windows\SysWOW64\耴® 2013-11-15 15:47 - 2013-11-15 15:47 - 00056663 _____ C:\Users\Julian\Downloads\avenged_sevenfold_beast_and_the_harlot.gp4 2013-11-15 14:45 - 2013-11-15 14:45 - 104401821 _____ C:\Windows\SysWOW64\ö륡6 2013-11-14 21:16 - 2013-11-14 21:16 - 104278918 _____ C:\Windows\SysWOW64\肴 2013-11-14 20:26 - 2013-11-14 20:26 - 00000209 _____ C:\Users\Julian\Desktop\Gotham City Impostors Free To Play.url 2013-11-14 20:12 - 2013-11-05 20:19 - 00001281 _____ C:\Users\Julian\Desktop\KEEEEEYS ! Batman, Fear.txt 2013-11-14 19:38 - 2013-02-20 15:07 - 00000000 ____D C:\Users\******\AppData\Roaming\FileZilla 2013-11-14 18:35 - 2013-01-20 13:41 - 00001024 _____ C:\Users\*****\Desktop\Dropbox.lnk 2013-11-14 18:35 - 2013-01-20 13:40 - 00000000 ____D C:\Users\*****\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Dropbox 2013-11-14 18:33 - 2013-11-14 18:33 - 00000000 ____D C:\Users\*****\AppData\Local\LogMeIn 2013-11-14 18:33 - 2013-01-20 03:16 - 00000000 ____D C:\Users\*****\AppData\Local\Spotify 2013-11-14 15:25 - 2013-01-23 22:12 - 00000000 ____D C:\Users\Julian\AppData\Local\Spotify 2013-11-14 15:17 - 2013-11-14 15:17 - 104225154 _____ C:\Windows\SysWOW64\ﺣ 2013-11-13 22:37 - 2013-11-13 22:37 - 00000000 ____D C:\Users\Julian\Desktop\Neuer Ordner 2013-11-13 20:08 - 2013-11-13 20:08 - 00000000 ____D C:\Program Files (x86)\LogMeIn Hamachi 2013-11-12 19:59 - 2013-11-12 13:59 - 103974937 _____ C:\Windows\SysWOW64\鳴핡 2013-11-11 22:39 - 2013-11-11 22:39 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Doublefine 2013-11-11 20:27 - 2013-01-20 15:48 - 00000000 ____D C:\ProgramData\Skype 2013-11-11 14:49 - 2013-01-25 21:56 - 00000000 ____D C:\Users\Julian\AppData\Roaming\vlc 2013-11-11 14:12 - 2013-11-11 14:12 - 103716811 _____ C:\Windows\SysWOW64\ᑈ狊£ 2013-11-10 22:24 - 2013-11-10 22:24 - 00000209 _____ C:\Users\Julian\Desktop\Brtal Legend.url 2013-11-10 22:12 - 2013-11-10 15:16 - 103551423 _____ C:\Windows\SysWOW64\寗惞 2013-11-09 21:56 - 2009-07-14 03:34 - 00000571 _____ C:\Windows\win.ini 2013-11-09 21:37 - 2013-11-09 21:37 - 00078979 _____ C:\Users\Julian\Downloads\slipknot_til_we_die.gp5 2013-11-09 21:36 - 2013-11-09 21:36 - 00047441 _____ C:\Users\Julian\Downloads\slipknot_people_shit.gp4 2013-11-09 21:35 - 2013-11-09 21:35 - 00175948 _____ C:\Users\Julian\Downloads\slipknot_dead_memories.gpx 2013-11-09 17:34 - 2013-07-10 13:31 - 00000000 ____D C:\Users\Julian\AppData\Roaming\BitTorrent 2013-11-09 17:32 - 2013-02-07 17:01 - 00000000 ____D C:\Program Files\Common Files\Apple 2013-11-09 16:12 - 2013-11-09 16:12 - 103387443 _____ C:\Windows\SysWOW64\惽㷚 2013-11-09 16:06 - 2013-11-09 16:06 - 00061746 _____ C:\Users\Julian\Downloads\in_extremo_liam.gp5 2013-11-09 15:35 - 2013-11-09 15:35 - 00001783 _____ C:\Users\Public\Desktop\iTunes.lnk 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\ProgramData\34BE82C4-E596-4e99-A191-52C6199EBF69 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\Program Files\iTunes 2013-11-09 15:35 - 2013-11-09 15:35 - 00000000 ____D C:\Program Files\iPod 2013-11-09 15:35 - 2013-03-13 18:12 - 00000000 ____D C:\Program Files (x86)\iTunes 2013-11-09 10:12 - 2013-11-09 10:12 - 103347145 _____ C:\Windows\SysWOW64\ꠓ 2013-11-08 21:07 - 2013-11-08 21:07 - 103316092 _____ C:\Windows\SysWOW64\퓠� 2013-11-08 16:58 - 2013-11-08 16:58 - 00055959 _____ C:\Users\Julian\Downloads\iron_maiden_the_trooper.gp3 2013-11-08 14:11 - 2013-11-08 14:11 - 103148646 _____ C:\Windows\SysWOW64\㩐쮶 2013-11-07 22:05 - 2013-11-07 22:05 - 05366672 _____ C:\Users\Julian\Downloads\DeponiaPaperFigurines.zip 2013-11-07 22:04 - 2013-11-07 22:04 - 00000209 _____ C:\Users\Julian\Desktop\Edna & Harvey Harvey's New Eyes.url 2013-11-07 22:02 - 2013-05-12 21:21 - 00000000 ____D C:\Users\Julian\AppData\Local\Daedalic Entertainment 2013-11-07 21:29 - 2013-11-07 21:28 - 57475151 _____ C:\Users\Julian\Downloads\DaedalicWallpapers.zip 2013-11-07 21:26 - 2013-11-07 21:26 - 103000967 _____ C:\Windows\SysWOW64\ೱ篦 2013-11-07 21:10 - 2013-01-20 02:34 - 00000000 ____D C:\Program Files (x86)\Mozilla Maintenance Service 2013-11-07 15:26 - 2013-11-07 15:26 - 102946670 _____ C:\Windows\SysWOW64\㎒ 2013-11-06 20:26 - 2013-11-06 20:26 - 102844835 _____ C:\Windows\SysWOW64\嵧¤ 2013-11-06 14:11 - 2013-11-06 14:11 - 102722523 _____ C:\Windows\SysWOW64\葜炄¤ 2013-11-05 20:14 - 2013-11-05 20:14 - 105085299 _____ C:\Windows\SysWOW64\ꙣడ 2013-11-05 17:30 - 2013-02-23 16:54 - 00000000 ____D C:\Users\Julian\Desktop\GP Dateien 2013-11-05 14:21 - 2013-11-05 14:21 - 00103191 _____ C:\Users\Julian\Downloads\amon_amarth_deceiver_of_the_gods.gp5 2013-11-05 13:48 - 2013-11-05 13:48 - 00127786 _____ C:\Users\Julian\Downloads\slipknot_psychosocial.gp5 2013-11-05 13:19 - 2013-11-05 13:19 - 105043933 _____ C:\Windows\SysWOW64\䶾⒒ 2013-11-04 23:00 - 2013-11-04 23:00 - 00061685 _____ C:\Users\Julian\Downloads\amon_amarth_war_of_the_gods.gp4 2013-11-04 22:55 - 2013-11-04 22:55 - 00080266 _____ C:\Users\Julian\Downloads\amon_amarth_twilight_of_the_thunder_god.gp5 2013-11-04 22:49 - 2013-11-04 22:49 - 00071169 _____ C:\Users\Julian\Downloads\amon_amarth_guardians_of_asgaard.gp5 2013-11-04 22:41 - 2013-11-04 22:41 - 00027402 _____ C:\Users\Julian\Downloads\amon_amarth_pursuit_of_vikings.gp4 2013-11-04 21:55 - 2013-11-04 21:55 - 00050413 _____ C:\Users\Julian\Downloads\nightwish_dark_chest_of_wonders.gp4 2013-11-04 21:53 - 2013-11-04 21:53 - 00142780 _____ C:\Users\Julian\Downloads\nightwish_nemo.gpx 2013-11-04 21:51 - 2013-11-04 21:51 - 00083186 _____ C:\Users\Julian\Downloads\nightwish_amaranth.gp5 2013-11-04 21:21 - 2013-11-04 21:21 - 00053055 _____ C:\Users\Julian\Downloads\all_time_low_damned_if_i_do_ya_damned_if_i_dont.gp5 2013-11-04 21:14 - 2013-11-04 21:14 - 00058488 _____ C:\Users\Julian\Downloads\paramore_still_into_you.gp5 2013-11-04 20:18 - 2013-11-04 20:18 - 104964650 _____ C:\Windows\SysWOW64\渎歍© 2013-11-04 14:13 - 2013-11-04 14:13 - 104867914 _____ C:\Windows\SysWOW64\�濃 2013-11-03 17:54 - 2013-11-03 17:54 - 104814100 _____ C:\Windows\SysWOW64\쀽䄦R 2013-11-03 11:54 - 2013-11-03 11:54 - 104760586 _____ C:\Windows\SysWOW64\킨¦ 2013-11-02 22:25 - 2013-11-02 22:25 - 104684788 _____ C:\Windows\SysWOW64\눮�¦ 2013-11-02 14:09 - 2013-11-02 14:07 - 00011812 _____ C:\Users\Julian\Desktop\RADIO.WAV 2013-11-02 13:40 - 2013-07-28 18:46 - 00000000 ____D C:\Users\Julian\Documents\Vegas Movie Studio HD Platinum 11.0 Projekte 2013-11-02 13:14 - 2013-11-02 13:14 - 104620600 _____ C:\Windows\SysWOW64\뜐쳳 2013-11-01 22:14 - 2013-11-01 22:14 - 104569497 _____ C:\Windows\SysWOW64\廾㫃 2013-11-01 16:05 - 2013-11-01 16:05 - 00000208 _____ C:\Users\Julian\Desktop\Worms Ultimate Mayhem.url 2013-11-01 14:32 - 2013-11-07 21:34 - 00000000 ____D C:\Users\Julian\Desktop\Daedalic Wallpapers 2013-11-01 13:28 - 2013-01-27 16:20 - 00000000 ____D C:\Program Files\Common Files\Adobe 2013-11-01 13:27 - 2013-01-22 14:49 - 00000000 ____D C:\Program Files (x86)\Adobe 2013-11-01 13:18 - 2013-01-22 15:22 - 00000000 ____D C:\Users\******\AppData\Local\Deployment 2013-11-01 13:15 - 2013-11-01 12:22 - 00000000 ____D C:\Users\*****\Desktop\Hochwasser 2013-11-01 12:52 - 2013-01-26 18:04 - 00000000 ____D C:\Users\******\AppData\Roaming\Spotify 2013-11-01 12:40 - 2013-11-01 12:40 - 00001456 _____ C:\Users\*****\AppData\Local\Adobe Für Web speichern 13.0 Prefs 2013-11-01 12:39 - 2013-01-20 03:17 - 00000000 ____D C:\Users\*****\AppData\Roaming\Adobe 2013-11-01 12:18 - 2013-01-22 15:25 - 00000000 ____D C:\Windows\pss 2013-11-01 12:18 - 2013-01-22 13:39 - 00000000 ___RD C:\Users\******\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup 2013-11-01 12:17 - 2013-11-01 12:17 - 104500486 _____ C:\Windows\SysWOW64\꜇뺚h 2013-10-31 17:40 - 2013-10-31 17:40 - 00000000 ____D C:\Users\******\AppData\Roaming\Lexware 2013-10-31 17:40 - 2013-10-31 17:40 - 00000000 ____D C:\Users\******\AppData\Local\Lexware 2013-10-31 17:40 - 2013-01-26 18:04 - 00000000 ____D C:\Users\******\AppData\Local\Spotify 2013-10-31 17:40 - 2013-01-22 13:39 - 00117840 _____ C:\Users\******\AppData\Local\GDIPFONTCACHEV1.DAT 2013-10-31 16:03 - 2013-10-31 16:03 - 104348737 _____ C:\Windows\SysWOW64\甲㧽 2013-10-30 22:20 - 2013-10-30 22:20 - 00084933 _____ C:\Users\Julian\Downloads\system_of_a_down_toxicity.gp5 2013-10-30 22:02 - 2013-10-30 22:02 - 00035113 _____ C:\Users\Julian\Downloads\system_of_a_down_kill_rock_n_roll.gp5 2013-10-30 21:54 - 2013-10-30 21:54 - 00113403 _____ C:\Users\Julian\Downloads\system_of_a_down_lost_in_hollywood.gp5 2013-10-30 13:16 - 2013-10-30 13:16 - 104098187 _____ C:\Windows\SysWOW64\냈뼑X 2013-10-29 21:08 - 2013-10-29 21:08 - 104021456 _____ C:\Windows\SysWOW64\嶐牘 2013-10-29 14:10 - 2013-10-29 14:10 - 103932228 _____ C:\Windows\SysWOW64\批⭘J 2013-10-28 21:06 - 2013-10-28 21:06 - 00045483 _____ C:\Users\Julian\Downloads\queen_we_are_the_champions.gp5 2013-10-28 20:18 - 2013-10-28 20:18 - 103792972 _____ C:\Windows\SysWOW64\嶅B 2013-10-28 14:15 - 2013-10-28 14:15 - 103734365 _____ C:\Windows\SysWOW64\著ꤣ 2013-10-27 21:08 - 2013-10-27 21:08 - 103533600 _____ C:\Windows\SysWOW64\�Ᏸ 2013-10-27 13:12 - 2013-10-27 13:12 - 103334033 _____ C:\Windows\SysWOW64\咅鲅V 2013-10-26 18:50 - 2013-10-26 18:50 - 103214166 _____ C:\Windows\SysWOW64\㞋嘂* 2013-10-26 03:02 - 2013-10-25 19:18 - 103054676 _____ C:\Windows\SysWOW64\╀ 2013-10-25 23:17 - 2013-10-25 23:17 - 00000682 _____ C:\Users\Public\Desktop\Dead Space 3.lnk 2013-10-25 23:17 - 2013-10-25 20:40 - 00037022 _____ C:\Windows\DirectX.log 2013-10-25 21:36 - 2013-10-25 21:36 - 00000000 __SHD C:\ProgramData\DSS 2013-10-25 21:36 - 2013-01-30 16:42 - 00000000 ____D C:\Users\Julian\Documents\EA Games 2013-10-25 21:35 - 2013-10-25 21:35 - 00000000 ____D C:\Program Files\Electronic Arts 2013-10-25 21:00 - 2013-01-22 16:14 - 00189248 _____ C:\Windows\SysWOW64\PnkBstrB.exe 2013-10-25 20:41 - 2013-01-22 16:14 - 00075064 _____ C:\Windows\SysWOW64\PnkBstrA.exe 2013-10-25 18:47 - 2013-10-25 18:47 - 08959704 _____ C:\Users\Julian\Downloads\DrakensangOnlineSetup.exe 2013-10-25 18:47 - 2013-10-25 18:47 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Drakensang Online 2013-10-25 18:47 - 2013-10-25 18:47 - 00000000 ____D C:\Program Files (x86)\Drakensang Online 2013-10-24 23:57 - 2013-01-24 16:37 - 00000000 ____D C:\Users\Julian\AppData\Local\CrashDumps 2013-10-24 23:28 - 2013-10-24 23:28 - 00000000 _____ C:\Windows\setuperr.log 2013-10-24 23:27 - 2013-08-14 13:30 - 00000000 ____D C:\AdwCleaner 2013-10-24 23:26 - 2013-09-28 12:24 - 00000000 ____D C:\Users\Julian\Desktop\Programme 2013-10-24 23:22 - 2013-06-30 21:39 - 00000000 ____D C:\Users\Julian\AppData\Roaming\DAEMON Tools Lite 2013-10-24 23:20 - 2013-10-24 23:17 - 00000000 ____D C:\Program Files (x86)\Web Check 2013-10-24 23:20 - 2013-01-30 17:44 - 00000000 ____D C:\ProgramData\Package Cache 2013-10-24 23:18 - 2013-10-24 23:18 - 00000000 ____D C:\Users\Julian\Documents\Free YouTube Download Manager 2013-10-24 23:18 - 2013-10-24 23:18 - 00000000 ____D C:\Users\Julian\AppData\Local\Freetec 2013-10-24 23:16 - 2013-10-24 23:16 - 00733192 _____ C:\Users\Julian\Downloads\youtube-dlm_1.0_en-US.exe 2013-10-24 22:00 - 2013-10-24 22:00 - 00915368 _____ (Oracle Corporation) C:\Users\Julian\Downloads\jxpiinstall.exe 2013-10-24 18:50 - 2013-10-24 12:50 - 102837954 _____ C:\Windows\SysWOW64\ꌬ⟨ 2013-10-24 17:49 - 2013-10-24 17:49 - 00000701 _____ C:\Users\Julian\Desktop\Rocksmith 2014 Edition.lnk 2013-10-24 16:36 - 2013-10-24 16:36 - 00021623 _____ C:\Users\Julian\Downloads\alice_cooper_poison.gp3 2013-10-24 13:52 - 2013-02-03 19:31 - 00000000 ____D C:\Users\Julian\AppData\Local\SKIDROW 2013-10-24 13:51 - 2013-10-24 13:51 - 00636059 _____ C:\Users\Julian\Downloads\rock2014crackonly-dlc.rar 2013-10-24 02:11 - 2013-10-23 15:26 - 102674996 _____ C:\Windows\SysWOW64\贒䓎@ 2013-10-23 09:26 - 2013-10-23 09:26 - 102541796 _____ C:\Windows\SysWOW64\芉漌 2013-10-23 01:09 - 2013-10-23 01:09 - 00098254 _____ C:\Users\Julian\Downloads\andrew_lloyd_webber_phantom_of_the_opera.gp5 2013-10-23 00:44 - 2013-10-22 18:44 - 102486297 _____ C:\Windows\SysWOW64\㘝� 2013-10-22 13:24 - 2013-10-21 02:01 - 00000000 ____D C:\ProgramData\Lexware 2013-10-22 13:06 - 2013-01-20 15:48 - 00000000 ____D C:\Users\*****\AppData\Roaming\Skype 2013-10-22 12:44 - 2013-10-22 12:44 - 102327253 _____ C:\Windows\SysWOW64\ 2013-10-22 02:52 - 2013-10-16 20:47 - 00000872 _____ C:\Users\Public\Desktop\REAPER (x64).lnk 2013-10-22 01:33 - 2013-10-21 19:33 - 102278179 _____ C:\Windows\SysWOW64\㱰 2013-10-21 23:59 - 2013-10-21 23:59 - 00051831 _____ C:\Users\Julian\Downloads\children_of_bodom_scream_for_silence.gp5 2013-10-21 20:00 - 2013-10-21 20:00 - 01679157 _____ C:\Users\Julian\Downloads\metal_hell_frost_melodic_death_metal_richard_band_roland_the_unguided_1600x1200_wallpaper_Art 2013-10-21 13:22 - 2013-10-21 13:22 - 00004278 _____ C:\Windows\SysWOW64\jupdate-1.7.0_45-b18.log 2013-10-21 13:22 - 2013-10-06 21:55 - 00000000 ____D C:\ProgramData\Oracle 2013-10-21 13:22 - 2013-01-21 14:30 - 00000000 ____D C:\Program Files (x86)\Java 2013-10-21 12:51 - 2013-10-21 12:51 - 102130367 _____ C:\Windows\SysWOW64\ҫ렞¦ 2013-10-21 12:51 - 2013-10-21 12:51 - 00000000 ____D C:\Users\Julian\AppData\Roaming\Lexware 2013-10-21 12:51 - 2013-10-21 12:51 - 00000000 ____D C:\Users\Julian\AppData\Local\Lexware 2013-10-21 12:51 - 2013-01-22 14:10 - 00117840 _____ C:\Users\Julian\AppData\Local\GDIPFONTCACHEV1.DAT 2013-10-21 12:50 - 2009-07-14 05:45 - 09704592 _____ C:\Windows\system32\FNTCACHE.DAT 2013-10-21 02:11 - 2013-02-17 02:33 - 00000000 ____D C:\Users\*****\AppData\Roaming\FileZilla 2013-10-21 02:05 - 2013-10-21 02:02 - 00000000 ____D C:\Users\*****\AppData\Roaming\Lexware 2013-10-21 02:05 - 2013-10-21 01:59 - 00000000 ____D C:\Users\*****\AppData\Local\Lexware 2013-10-21 02:02 - 2013-01-20 02:05 - 00117840 _____ C:\Users\*****\AppData\Local\GDIPFONTCACHEV1.DAT 2013-10-21 02:01 - 2013-10-21 02:01 - 00000305 _____ C:\Windows\ODBCINST.INI 2013-10-21 02:01 - 2013-10-21 02:01 - 00000000 ____D C:\Program Files (x86)\Lexware 2013-10-20 20:24 - 2013-10-20 20:24 - 27632008 _____ C:\Users\Julian\Desktop\Metal Idee.wav 2013-10-20 17:47 - 2009-07-14 06:09 - 00000000 ____D C:\Windows\System32\Tasks\WPD 2013-10-20 17:38 - 2013-10-20 11:38 - 102068998 _____ C:\Windows\SysWOW64\尻殁; 2013-10-19 15:36 - 2013-10-19 15:36 - 101983560 _____ C:\Windows\SysWOW64\叛ᗌF 2013-10-19 09:34 - 2009-07-14 06:08 - 00032640 _____ C:\Windows\Tasks\SCHEDLGU.TXT 2013-10-19 00:22 - 2013-10-18 18:23 - 101890677 _____ C:\Windows\SysWOW64\냦膁 2013-10-18 11:12 - 2013-10-18 11:12 - 101760430 _____ C:\Windows\SysWOW64\ꖘ焤M 2013-10-18 01:19 - 2013-07-10 02:04 - 00004106 _____ C:\Windows\System32\Tasks\GoogleUpdateTaskMachineUA 2013-10-18 01:19 - 2013-07-10 02:04 - 00003854 _____ C:\Windows\System32\Tasks\GoogleUpdateTaskMachineCore 2013-10-18 01:18 - 2013-10-18 01:18 - 00077355 _____ C:\Users\Julian\Desktop\kreator_violent_revolution.gpx 2013-10-18 00:45 - 2013-10-18 00:45 - 00048403 _____ C:\Users\Julian\Downloads\kreator_violent_revolution.gp4 ==================== Bamital & volsnap Check ================= C:\Windows\System32\winlogon.exe => MD5 is legit C:\Windows\System32\wininit.exe => MD5 is legit C:\Windows\SysWOW64\wininit.exe => MD5 is legit C:\Windows\explorer.exe => MD5 is legit C:\Windows\SysWOW64\explorer.exe => MD5 is legit C:\Windows\System32\svchost.exe => MD5 is legit C:\Windows\SysWOW64\svchost.exe => MD5 is legit C:\Windows\System32\services.exe => MD5 is legit C:\Windows\System32\User32.dll => MD5 is legit C:\Windows\SysWOW64\User32.dll => MD5 is legit C:\Windows\System32\userinit.exe => MD5 is legit C:\Windows\SysWOW64\userinit.exe => MD5 is legit C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit LastRegBack: 2013-11-10 15:54 ==================== End Of Log ============================ |
17.11.2013, 16:32 | #4 |
/// TB-Ausbilder | Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? Wie läuft der Rechner jetzt? Schritt 1 Downloade Dir bitte Malwarebytes Anti-Malware
Schritt 2 ESET Online Scanner
__________________ cheers, Leo |
17.11.2013, 18:41 | #5 |
| Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? Hallo Leo, wirklich gravierende Veränderungen hat es am Rechner (augenscheinlich) nicht gegeben. Der Rechner ist genauso schnell wie vorher. Allerdings hat er sich gerade Windows Updates für fünf Monate am Stück heruntergeladen. Der Malwarebytes-Scan sieht wie folgt aus: Code:
ATTFilter Malwarebytes Anti-Malware 1.75.0.1300 www.malwarebytes.org Datenbank Version: v2013.11.17.03 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 10.0.9200.16618 ***** :: ****** [Administrator] 17.11.2013 17:15:04 mbam-log-2013-11-17 (17-15-04).txt Art des Suchlaufs: Quick-Scan Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 264798 Laufzeit: 2 Minute(n), 48 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 1 HKLM\SOFTWARE\SWEETIM (PUP.Optional.SweetIM.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Registrierungswerte: 1 HKLM\Software\SweetIM|simapp_id (PUP.Optional.SweetIM.A) -> Daten: {3FF5A600-DB2A-11E2-A920-D43D7E49EA98} -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 1 C:\Users\******\AppData\Roaming\PowerISO\Upgrade\PowerISO5.exe (PUP.Optional.OpenCandy) -> Erfolgreich gelöscht und in Quarantäne gestellt. (Ende) Code:
ATTFilter ESETSmartInstaller@High as downloader log: all ok # version=8 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6920 # api_version=3.0.2 # EOSSerial=7425b51d98c6b14f8d4dbd08dbedad12 # engine=15916 # end=finished # remove_checked=false # archives_checked=true # unwanted_checked=false # unsafe_checked=false # antistealth_checked=true # utc_time=2013-11-17 05:39:17 # local_time=2013-11-17 06:39:17 (+0100, Mitteleuropäische Zeit) # country="Germany" # lang=1033 # osver=6.1.7601 NT Service Pack 1 # compatibility_mode=771 16777214 16 1 7623084 7623084 0 0 # compatibility_mode=1799 16775165 100 96 15213 250133247 8003 0 # compatibility_mode=5893 16776574 100 94 7776 136339807 0 0 # scanned=262493 # found=570 # cleaned=0 # scan_time=2747 sh=775CEB1BD0D24DF850773B5B57EA588983AA18D2 ft=1 fh=2251fd2697041a5b vn="a variant of MSIL/Adware.StrongVault.A application" ac=I fn="C:\AdwCleaner\Quarantine\C\Users\Julian\AppData\Local\DownloadGuide\swa1_23.exe.vir" sh=A065922E48E274F827BC8A04091A44632D498373 ft=1 fh=f3684398a5f5cf1b vn="Win64/Conedex.I trojan" ac=I fn="C:\FRST\Quarantine\00000008.@" sh=A0E57BAC8B2A6FF64937D45029FF31FA0F873B30 ft=1 fh=bbc320f44d9ef8bc vn="Win64/Sirefef.W trojan" ac=I fn="C:\FRST\Quarantine\Desktop.ini" sh=46C1319EE38510C365A4226621DE30BDF7E462FF ft=1 fh=662930a683ab766b vn="Win64/Conedex.C trojan" ac=I fn="C:\FRST\Quarantine\trz3224.tmp" sh=810E28D4E7B28D658DC48A82F0C65B46149AAE89 ft=1 fh=120d32a29875bbd8 vn="Win64/Conedex.B trojan" ac=I fn="C:\FRST\Quarantine\trz3A40.tmp" sh=061A3739739904F13A5B9ADCBF4AC2E8A3157B18 ft=1 fh=3f70b78fb0084ee4 vn="Win64/Sirefef.AW trojan" ac=I fn="C:\FRST\Quarantine\trz3A51.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3A61.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3A72.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3A73.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3A93.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3AA4.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3AC4.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3AD4.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3AE5.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3AF6.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3B06.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3B17.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3B37.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3B48.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3B68.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3B78.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3B99.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3BA9.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3BC9.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3BDA.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3BEB.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3BFB.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3C1B.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3C2C.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3C4C.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3C5D.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3C6D.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3C7E.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3C8F.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3CAF.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3CBF.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3CD0.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3CE1.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3D01.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3D11.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3D32.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3D52.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3D72.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3D83.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3DA3.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3DB3.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3DC4.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3DE4.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3E04.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3E25.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3E45.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3E55.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3E66.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3E86.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3EA6.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3EC7.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3ED7.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3EF7.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3F08.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3F19.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3F29.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3F49.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3F5A.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3F6B.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3F8B.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz3F9B.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3FAC.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3FCC.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz3FDD.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz3FED.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz400E.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz401E.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz403E.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz404F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz406F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4080.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4090.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz40B1.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz40C1.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz40E1.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz40F2.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4103.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4123.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4133.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4134.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4155.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4165.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4185.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4196.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz41B6.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz41B7.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz41D7.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz41E8.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4208.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4219.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4229.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz424A.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz425A.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz426B.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz427B.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz429C.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz42AC.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz42CC.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz42DD.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz42EE.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz42FE.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz431E.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz432F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz434F.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4360.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4370.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4391.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz43A1.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz43B2.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz43D2.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz43E3.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz43F3.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4414.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4435.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4445.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4465.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4466.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4477.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4488.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4498.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz44B8.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz44C9.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz44E9.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz44FA.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz450A.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz452B.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz453B.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz455B.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz456C.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz458C.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz458D.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz459E.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz45BE.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz45CF.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz45EF.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz45FF.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4620.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4630.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4641.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4651.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4672.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4682.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz46A2.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz46B3.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz46C4.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz46E4.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz46F4.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4705.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4725.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4726.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4746.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4757.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4768.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4778.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4789.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz47A9.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz47BA.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz47DA.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz47EA.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz47FB.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz481B.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz482C.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz484C.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz485D.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz487D.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz488D.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz489E.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz48BE.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz48CF.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz48DF.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4900.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4901.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4921.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4931.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4942.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4953.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4973.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4983.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz49A4.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz49B4.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz49C5.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz49E5.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz49F6.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4A16.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4A26.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4A37.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4A48.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4A68.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4A69.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4A89.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4A9A.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4AAA.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4ABB.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4ADB.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4AEC.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4B0C.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4B1C.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4B3D.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4B4D.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4B5E.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4B7E.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4B8F.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4BAF.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4BBF.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4BD0.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4BE1.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4BF1.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4C02.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4C22.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4C33.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4C53.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4C63.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4C84.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4CA4.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4CB4.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4CC5.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4CD6.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4CE6.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4D06.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4D17.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4D28.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4D48.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4D49.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4D59.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4D7A.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4D7B.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4D9B.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4DBB.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4DCC.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4DDC.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4DFC.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4E0D.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4E2D.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4E3E.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4E5E.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4E5F.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4E70.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4E80.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4EA0.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4EB1.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4ED1.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4EE2.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4EF2.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4F13.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4F23.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4F43.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4F54.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4F74.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4F85.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4F95.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4FA6.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz4FC6.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4FC7.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz4FD8.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz4FF8.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5009.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5019.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5039.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz504A.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz506A.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz507B.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz508B.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz50AC.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz50BC.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz50DC.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz50DD.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz50FE.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz510E.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz511F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz512F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5150.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5160.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5180.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5191.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz51B1.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz51C2.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz51D2.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz51E3.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5203.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5214.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5234.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5245.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5255.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5275.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5276.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5287.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz52A7.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz52B8.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz52D8.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz52D9.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz52F9.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz530A.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz530B.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz531B.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz532C.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz534C.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz535D.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz537D.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz538E.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz53AE.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz53BE.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz53CF.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz53D0.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz53E1.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5401.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5411.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5422.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5433.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5453.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5463.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5474.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5485.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz54A5.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz54B5.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz54D6.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz54E6.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5506.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5517.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5537.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5548.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5568.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5579.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5589.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz559A.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz55BA.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz55BB.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz55CC.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz55DC.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz55FC.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz560D.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz562D.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz563E.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz565E.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz566F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz568F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz569F.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz56B0.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz56C1.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz56E1.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz56E2.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5702.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5713.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5723.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5734.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5754.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5765.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5785.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5795.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz57A6.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz57C6.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz57D7.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz57E7.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5808.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5818.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5838.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5849.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5869.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz587A.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz588A.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz589B.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz58AC.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz58CC.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz58DC.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz58ED.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz58FE.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz590E.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz591F.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz593F.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5950.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5960.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5971.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5981.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz59A2.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz59B2.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz59C3.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz59E3.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz59F4.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5A04.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5A24.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5A35.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5A46.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5A47.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5A67.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5A77.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5A98.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5AA8.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5AB9.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5AC9.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5ADA.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5AFA.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5AFB.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5B1B.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5B2C.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5B4C.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5B5D.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5B7D.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5B7E.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5B9E.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5BAF.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5BBF.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5BE0.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5BF0.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5C01.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5C11.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5C32.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5C42.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5C53.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5C63.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5C84.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5C94.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5CB4.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5CB5.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5CD6.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5CE6.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5D06.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5D17.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5D37.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5D48.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5D58.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5D79.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5D89.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5D9A.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5DAA.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5DBB.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5DDB.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5DDC.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5DFC.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5E0D.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5E1E.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5E3E.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5E4E.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5E5F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5E70.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5E90.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5EA0.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5EC1.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5ED1.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5EE2.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5F02.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5F13.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5F23.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5F43.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5F54.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5F65.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5F75.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5F95.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz5FA6.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5FB7.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5FC7.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz5FE7.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz5FF8.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6009.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6029.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6039.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz605A.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz606A.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz607B.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz608B.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz609C.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz60BC.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz60CD.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz60DD.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz60FE.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz610E.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz612E.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz613F.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6150.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6160.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6180.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6191.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz61B1.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz61D1.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz61F2.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz6202.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6213.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6223.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz6244.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6254.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6265.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6275.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6296.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz62B6.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz62C6.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz62E7.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz62F7.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6317.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6328.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6348.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz6359.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6369.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz637A.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz639A.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz63AB.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz63CB.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz63DC.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz63FC.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz63FD.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz641D.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz642E.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz644E.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz644F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz646F.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6480.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz64A0.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz64A1.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz64C1.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz64E1.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz64F2.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz6502.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz6513.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6524.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6544.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6554.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6565.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz6585.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6596.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz65A6.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz65C7.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz65D7.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz65F7.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6608.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6619.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6639.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6649.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz666A.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz667A.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz668B.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz669B.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz66AC.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz66BD.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz66DD.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz66ED.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz66FE.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz671E.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz672F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz674F.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6760.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6770.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6790.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz67A1.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz67C1.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz67D2.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz67F2.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6803.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz6823.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6833.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz6844.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6855.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6865.tmp" sh=48C3E4403B2099D7CE9BBB89FF0F0CCBF77981F4 ft=1 fh=1d52409ede4e2f84 vn="Win64/Sirefef.AN trojan" ac=I fn="C:\FRST\Quarantine\trz6885.tmp" sh=B13BD8868B583578C5146AFB237DC55B85512158 ft=1 fh=cc5cb84c7733d7f0 vn="Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6886.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz68A7.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz68B7.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz68D7.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz68E8.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz6908.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6919.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz6939.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz694A.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz695A.tmp" sh=F11C7F4C953398061C4BD6A996E1A52D9D63E44C ft=1 fh=d6394307011a05c7 vn="a variant of Win32/Sirefef.FV trojan" ac=I fn="C:\FRST\Quarantine\trz697A.tmp" sh=16BD4AB7C86044CC9FC7E15440864ED26C21115A ft=1 fh=4b6d211d532b91cf vn="Win64/Sirefef.AZ trojan" ac=I fn="C:\FRST\Quarantine\trz69AA.tmp" sh=1728444F6D66A543C4E38B92A9CC1D2D332B72F0 ft=1 fh=6bf8034f6983546b vn="Win32/Sirefef.EZ trojan" ac=I fn="C:\Qoobox\Quarantine\C\Windows\assembly\GAC_32\Desktop.ini.vir" sh=A0E57BAC8B2A6FF64937D45029FF31FA0F873B30 ft=1 fh=bbc320f44d9ef8bc vn="Win64/Sirefef.W trojan" ac=I fn="C:\Qoobox\Quarantine\C\Windows\assembly\GAC_64\Desktop.ini.vir" sh=CCB938D9BEA1626D4786D96ED26A96EE392E314B ft=1 fh=0c5d2e9df5c5a0a5 vn="Win64/Sirefef.AX trojan" ac=I fn="C:\Qoobox\Quarantine\C\Windows\System32\Services.exe.vir" Viele Grüße, Bahnfahrer |
17.11.2013, 18:58 | #6 |
/// TB-Ausbilder | Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? Hallo, die vielen ESET-Funde sehen schlimmer aus, als sie sind. Noch eine abschliessende Kontrolle: Schritt 1 Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code:
ATTFilter DeleteQuarantine: Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
Schritt 2 Starte noch einmal FRST.
__________________ --> Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? |
17.11.2013, 19:10 | #7 |
| Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? Hallo, anbei die Fixlist.txt: Code:
ATTFilter Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 17-11-2013 02 Ran by ***** at 2013-11-17 19:01:01 Run:2 Running from C:\Users\*****\Desktop\Hilfe Boot Mode: Normal ============================================== Content of fixlist: ***************** DeleteQuarantine: ***************** C:\FRST\Quarantine => Removed successfully. ==== End of Fixlog ==== Was mir spontan noch auffällt: Nach einiger Zeit im Betrieb verschwindet plötzlich die eingebaute Festplatte mit ihren 2 Partitionen und kommt erst nach einem Neustart wieder zum Vorschein. Hängt das möglicherweise zusammen? Viele Grüße, Bahnfahrer //EDIT: Kommando zurück mit der Festplatte, da scheint augenscheinlich ein physischer Wackelkontakt am Strom vorzuliegen. Geändert von Bahnfahrer (17.11.2013 um 19:20 Uhr) |
17.11.2013, 20:00 | #8 |
/// TB-Ausbilder | Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? Ok. Cleanup Zum Schluss werden wir jetzt noch unsere Tools (inklusive der Quarantäne-Ordner) wegräumen, die verseuchten Systemwiederherstellungspunkte löschen und alle Einstellungen wieder herrichten. Auch diese Schritte sind noch wichtig und sollten in der angegebenen Reihenfolge ausgeführt werden.
>> OK << Wir sind durch, deine Logs sehen für mich im Moment sauber aus. Ich habe dir nachfolgend ein paar Hinweise und Tipps zusammengestellt, die dazu beitragen sollen, dass du in Zukunft unsere Hilfe nicht mehr brauchen wirst. Bitte gib mir danach noch eine kurze Rückmeldung, wenn auch von deiner Seite keine Probleme oder Fragen mehr offen sind, damit ich dieses Thema als erledigt betrachten kann. Epilog: Tipps, Dos & Don'ts Aktualität von System und Software Das Betriebsystem Windows muss zwingend immer auf dem neusten Stand sein. Stelle sicher, dass die automatischen Updates aktiviert sind:
Auch die installierte Software sollte immer in der aktuellsten Version vorliegen. Speziell gilt das für den Browser, Java, Flash-Player und PDF-Reader, denn bekannte Sicherheitslücken in deren alten Versionen werden dazu ausgenutzt, um beim blossen Besuch einer präparierten Website per Drive-by Download Malware zu installieren. Das kann sogar auf normalerweise legitimen Websites geschehen, wenn es einem Angreifer gelungen ist, seinen Code in die Seite einzuschleusen, und ist deshalb relativ unberechenbar.
Sicherheits-Software Eine Bemerkung vorneweg: Jede Softwarelösung hat ihre Schwächen. Die gesamte Verantwortung für die Sicherheit auf Software zu übertragen und einen Rundum-Schutz zu erwarten, wäre eine gefährliche Illusion. Bei unbedachtem oder bewusst risikoreichem Verhalten wird auch das beste Programm früher oder später seinen Dienst versagen (z.B. ein Virenscanner, der eine verseuchte Datei nicht erkennt). Trotzdem ist entsprechende Software natürlich wichtig und hilft dir in Kombination mit einem gut gewarteten (up-to-date) System und durchdachtem Verhalten, deinen Rechner sauber zu halten.
Es liegt in der Natur der Sache, dass die am weitesten verbreitete Anwendungs-Software auch am häufigsten von Malware-Autoren attackiert wird. Es kann daher bereits einen kleinen Sicherheitsgewinn darstellen, wenn man alternative Software (z.B. einen alternativen PDF Reader) benutzt. Anstelle des Internet Explorers kann man beispielsweise den Mozilla Firefox einsetzen, für welchen es zwei nützliche Addons zur Empfehlung gibt:
(Un-)Sicheres Verhalten im Internet Nebst unbemerkten Drive-by Installationen wird Malware aber auch oft mehr oder weniger aktiv vom Benutzer selbst installiert. Der Besuch zwielichtiger Websites kann bereits Risiken bergen. Und Downloads aus dubiosen Quellen sind immer russisches Roulette. Auch wenn der Virenscanner im Moment darin keine Bedrohung erkennt, muss das nichts bedeuten.
Oft wird auch versucht, den Benutzer mit mehr oder weniger trickreichen Methoden dazu zu bringen, eine für ihn verhängnisvolle Handlung selbst auszuführen (Überbegriff Social Engineering).
Nervige Adware (Werbung) und unnötige Toolbars werden auch meist durch den Benutzer selbst mitinstalliert.
Allgemeine Hinweise Abschliessend noch ein paar grundsätzliche Bemerkungen:
Wenn du möchtest, kannst du das Forum mit einer kleinen Spende unterstützen. Es bleibt mir nur noch, dir unbeschwertes und sicheres Surfen zu wünschen und dass wir uns hier so bald nicht wiedersehen.
__________________ cheers, Leo |
07.01.2014, 15:49 | #9 |
/// TB-Ausbilder | Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? Dieses Thema scheint erledigt und wird aus meinen Abos gelöscht. Ich bekomme somit keine Benachrichtigung mehr über neue Antworten. Solltest du das Thema erneut brauchen, schicke mir bitte eine PM und wir machen hier weiter. Jeder andere bitte diese Anleitung lesen und einen eigenen Thread erstellen.
__________________ cheers, Leo |
Themen zu Windows 7: Windows-Sicherheitscenter und Windows Defender funktionieren nicht mehr, Services.exe verseucht? |
administrator, adobe, adobe flash player, bonjour, farbar recovery scan tool, flash player, launch, msil/adware.strongvault.a, plug-in, pup.optional.opencandy, pup.optional.sweetim.a, services.exe, spotify web helper, svchost.exe, win32/sirefef.ez, win32/sirefef.fv, win64/conedex.b, win64/conedex.c, win64/conedex.i, win64/sirefef.an, win64/sirefef.aw, win64/sirefef.ax, win64/sirefef.az, win64/sirefef.w, windows, winlogon.exe |