![]() |
|
Plagegeister aller Art und deren Bekämpfung: firefox-addon VIS 1.01 - trojaner eingefangen ?Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
![]() | #5 |
![]() ![]() ![]() | ![]() firefox-addon VIS 1.01 - trojaner eingefangen ? hi schrauber ! erstmal grosses dankeschön für deine hilfe. hab die anweisung abgearbeitet. alle 3 tools haben nix gefunden. ausser dem aktuellen FRST-log spare ich also den platz, da ich durch das ganze wooling auf diverse logs etc. gestossen bin, die vom tag des "einfangens" stammen. wenn die frischen <sauberen> logs dennoch wichtig sein sollten, kann ich sie morgen nochmal neu anpinnen, muss leider gleich auf nachtschicht. vom prinzip her scheint mein rechner jetzt sauber zu sein, ich versteh nur nicht, wie ich mir scheinbar das zeux durch blosses anschauen eines videos einfangen konnte. ist alles noch unter quarantäne, falls das hier im board jemand näher interessiert. hier erstmal einige logs vom 05.03.14 : Code:
ATTFilter # AdwCleaner v3.020 - Bericht erstellt am 05/03/2014 um 23:20:55 # Aktualisiert 27/02/2014 von Xplode # Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits) # Benutzername : chef - WOPR # Gestartet von : C:\Users\chef\AppData\Local\Temp\OCS\Downloads\fc14996dfa99adfc7baae624196888c5\f8b34e3b5e6e337aa6491ee3f713f8f5\adwcleaner_3.0.2.0.exe # Option : Löschen ***** [ Dienste ] ***** ***** [ Dateien / Ordner ] ***** Ordner Gelöscht : C:\ProgramData\Conduit Ordner Gelöscht : C:\Program Files\Conduit Ordner Gelöscht : C:\Users\chef\AppData\Local\Conduit Ordner Gelöscht : C:\Users\chef\AppData\Local\DownloadGuide Ordner Gelöscht : C:\Users\chef\AppData\Local\Mobogenie Ordner Gelöscht : C:\Users\chef\AppData\Local\NativeMessaging Ordner Gelöscht : C:\Users\chef\AppData\Local\Temp\OCS Ordner Gelöscht : C:\Users\chef\AppData\LocalLow\Conduit Ordner Gelöscht : C:\Users\chef\AppData\LocalLow\PriceGong Ordner Gelöscht : C:\Users\chef\Documents\Mobogenie Datei Gelöscht : C:\END ***** [ Verknüpfungen ] ***** ***** [ Registrierungsdatenbank ] ***** [#] Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{59CFDD71-A257-451D-9C3A-05C098F93D30} Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\d Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\MobogenieAdd Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Toolbar.CT3317892 Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1} Schlüssel Gelöscht : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B} Schlüssel Gelöscht : HKCU\Software\Conduit Schlüssel Gelöscht : HKCU\Software\OCS Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\Conduit Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\ConduitSearchScopes Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\SmartBar Schlüssel Gelöscht : HKLM\Software\Conduit Schlüssel Gelöscht : HKLM\Software\Speedchecker Limited ***** [ Browser ] ***** -\\ Internet Explorer v9.0.8112.16526 -\\ Mozilla Firefox v27.0.1 (de) [ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ] Zeile gelöscht : user_pref("CT3317892.FF19Solved", "true"); Zeile gelöscht : user_pref("CT3317892.UserID", "UN15427285281092272"); Zeile gelöscht : user_pref("CT3317892.fullUserID", "UN15427285281092272.IN.20131230162214"); Zeile gelöscht : user_pref("CT3317892.installDate", "30/12/2013 16:22:20"); Zeile gelöscht : user_pref("CT3317892.installSessionId", "{3F2FECE7-8944-4827-B5C9-1F921DFE9CA4}"); Zeile gelöscht : user_pref("CT3317892.installSp", "false"); Zeile gelöscht : user_pref("CT3317892.installerVersion", "1.8.1.4"); Zeile gelöscht : user_pref("CT3317892.searchRevert", "false"); Zeile gelöscht : user_pref("CT3317892.searchUninstallUserMode", "2"); Zeile gelöscht : user_pref("CT3317892.searchUserMode", "2"); Zeile gelöscht : user_pref("CT3317892.toolbarInstallDate", "30-12-2013 16:22:14"); Zeile gelöscht : user_pref("CT3317892.versionFromInstaller", "10.23.0.722"); Zeile gelöscht : user_pref("CT3317892.xpeMode", "0"); Zeile gelöscht : user_pref("smartbar.machineId", "GKNWL5QRYFD9ITJH/SFACTCRQC1+DJO6AX7VLVWCJBOGHCYMYV5QXKZM8RXUCYFSW6UP2X/W5/UYKMY+OUHYDQ"); [ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ] [ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ] ************************* AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35] AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39] AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21] AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30] AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35] AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33] AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14] AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33] AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06] AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54] AdwCleaner[S4].txt - [4172 octets] - [05/03/2014 23:20:55] ########## EOF - C:\AdwCleaner\AdwCleaner[S4].txt - [4232 octets] ########## Code:
ATTFilter # AdwCleaner v3.020 - Bericht erstellt am 08/03/2014 um 20:12:00 # Aktualisiert 27/02/2014 von Xplode # Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits) # Benutzername : chef - WOPR # Gestartet von : C:\Users\chef\Downloads\adwcleaner.exe # Option : Suchen ***** [ Dienste ] ***** ***** [ Dateien / Ordner ] ***** ***** [ Verknüpfungen ] ***** ***** [ Registrierungsdatenbank ] ***** ***** [ Browser ] ***** -\\ Internet Explorer v9.0.8112.16526 -\\ Mozilla Firefox v27.0.1 (de) [ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ] [ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ] [ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ] ************************* AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35] AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39] AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21] AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30] AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35] AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33] AdwCleaner[R6].txt - [1233 octets] - [08/03/2014 20:12:00] AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14] AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33] AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06] AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54] AdwCleaner[S4].txt - [4312 octets] - [05/03/2014 23:20:55] ########## EOF - C:\AdwCleaner\AdwCleaner[R6].txt - [1594 octets] ########## Code:
ATTFilter Malwarebytes Anti-Malware 1.75.0.1300 www.malwarebytes.org Datenbank Version: v2014.03.05.11 Windows Vista Service Pack 2 x86 NTFS Internet Explorer 9.0.8112.16421 chef :: WOPR [Administrator] 05.03.2014 22:55:30 mbam-log-2014-03-05 (22-55-30).txt Art des Suchlaufs: Quick-Scan Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 254173 Laufzeit: 9 Minute(n), 9 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 3 HKCU\Software\AppDataLow\Software\PriceGong (PUP.Optional.PriceGong.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. HKCU\Software\Conduit\FF (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. HKLM\SOFTWARE\Speedchecker Limited\PC Speed Up (PUP.Optional.PCSpeedUp.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 1 C:\ProgramData\Conduit\IE (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Dateien: 5 C:\Users\chef\Downloads\bs_WireShark.exe (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\chef\Downloads\ca_setup.exe (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\chef\Downloads\ca_setup1.exe (PUP.PasswordTool) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\chef\Downloads\wirelessnetview_setup.exe (PUP.WirelessNetworkTool) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\chef\AppData\Local\DownloadGuide\Offers\mconduitinstaller.exe (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. (Ende) [CODE]Trojan:Win32/Klevate file:C\Users\chef\AppData\Local\DownloadGuide\Offers\dprotect_setup.exe (05.03.14 von microsoft security es Code:
ATTFilter sentials in quarantäne gestellt) Code:
ATTFilter ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Junkware Removal Tool (JRT) by Thisisu Version: 6.1.2 (02.20.2014:1) OS: Windows Vista (TM) Home Basic x86 Ran by chef on 08.03.2014 at 20:35:12,04 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Services ~~~ Registry Values ~~~ Registry Keys Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-1461220110-1976370169-1414792120-1000\Software\sweetim Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{2419B2B9-996E-419A-B79B-6600D820B370} Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{3081A9B6-8DEB-4423-96A2-2177723580C0} ~~~ Files ~~~ Folders Successfully deleted: [Folder] "C:\ProgramData\big fish" Successfully deleted: [Folder] "C:\Users\chef\appdata\local\big fish" Successfully deleted: [Folder] "C:\Users\chef\appdata\local\cre" Successfully deleted: [Folder] "C:\bigfishcache" ~~~ FireFox Successfully deleted the following from C:\Users\chef\AppData\Roaming\mozilla\firefox\profiles\vf5q4mw4.default\prefs.js user_pref("extensions.toolbar@ask.com.install-event-fired", true); Emptied folder: C:\Users\chef\AppData\Roaming\mozilla\firefox\profiles\vf5q4mw4.default\minidumps [125 files] ~~~ Event Viewer Logs were cleared ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Scan was completed on 08.03.2014 at 20:37:42,64 End of JRT log ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ FRST Logfile: FRST Logfile: Code:
ATTFilter Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 07-03-2014 Ran by chef (administrator) on WOPR on 08-03-2014 20:42:46 Running from C:\Users\chef\Downloads Microsoft® Windows Vista™ Home Basic Service Pack 2 (X86) OS Language: German Standard Internet Explorer Version 9 Boot Mode: Normal ==================== Processes (Whitelisted) ================= (Microsoft Corporation) c:\Program Files\Microsoft Security Client\MsMpEng.exe (AMD) C:\Windows\system32\atiesrxx.exe (Microsoft Corporation) C:\Windows\system32\SLsvc.exe (AMD) C:\Windows\system32\atieclxx.exe (Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\sched.exe (Advanced Micro Devices, Inc.) C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe (Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avguard.exe (Nitro PDF Software) C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe (Realtek) C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe (Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avshadow.exe (Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe (Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avgnt.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe (Realtek Semiconductor Corp.) C:\Program Files\oem\11n USB Wireless LAN Utility\RtWlan.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdate.exe (Microsoft Corporation) C:\Windows\system32\wuauclt.exe (Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe (Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe (Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe (Microsoft Corporation) C:\Windows\system32\conime.exe (Microsoft Corporation) C:\Program Files\Windows Defender\MSASCui.exe (Mozilla Corporation) C:\Program Files\Mozilla Firefox\firefox.exe ==================== Registry (Whitelisted) ================== HKLM\...\Run: [Windows Defender] - C:\Program Files\Windows Defender\MSASCui.exe [1008184 2008-01-18] (Microsoft Corporation) HKLM\...\Run: [MSC] - c:\Program Files\Microsoft Security Client\msseces.exe [948440 2013-10-23] (Microsoft Corporation) HKLM\...\Run: [avgnt] - C:\Program Files\Avira\AntiVir Desktop\avgnt.exe [689744 2014-02-20] (Avira Operations GmbH & Co. KG) HKLM\...\Run: [SDTray] - C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe [3825176 2012-11-13] (Safer-Networking Ltd.) HKLM\...\RunOnce: [ Malwarebytes Anti-Malware ] - C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent [532040 2013-04-04] (Malwarebytes Corporation) Winlogon\Notify\SDWinLogon: SDWinLogon.dll [X] HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [ccleaner] - C:\Program Files\CCleaner\CCleaner.exe [4324120 2013-11-22] (Piriform Ltd) HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [Spybot-S&D Cleaning] - C:\Program Files\Spybot - Search & Destroy 2\SDCleaner.exe [3713032 2012-11-13] (Safer-Networking Ltd.) ==================== Internet (Whitelisted) ==================== URLSearchHook: HKCU - (No Name) - {00000000-6E41-4FD3-8538-502F5495E5FC} - No File SearchScopes: HKLM - DefaultScope value is missing. SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D267372633D49452D536561726368426F7826464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0 SearchScopes: HKCU - {2C93367C-BA9A-4CA2-B582-4B61404C765D} URL = hxxp://www.myvideo.de.anonymize-me.de/?to=6D79766964656F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {411EA882-929B-449F-9C65-7CEDED8DEDFE} URL = hxxp://de.wikipedia.org.anonymize-me.de/?to=64652E77696B6970656469612E6F7267&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D26464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0 SearchScopes: HKCU - {6BF147B5-7A30-4782-B5B9-8C0AA3632EC8} URL = hxxp://search.ebay.de.anonymize-me.de/?to=656261792E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {80E424A2-185B-4FAE-BA5E-37FBF8B2D48B} URL = hxxp://www.otto.de.anonymize-me.de/?to=6F74746F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {97132A2A-367E-4E5A-9D73-CB11EA3ECCD8} URL = hxxp://www.pricerunner.de.anonymize-me.de/?to=707269636572756E6E65722E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {CC2AE24D-3E94-4B16-8A85-7B52A831737B} URL = hxxp://www.amazon.de.anonymize-me.de/?to=616D617A6F6E2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy 2\SDHelper.dll (Safer-Networking Ltd.) BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation) BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation) Tcpip\Parameters: [DhcpNameServer] 192.168.1.1 FireFox: ======== FF ProfilePath: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default FF SearchEngineOrder.1: Ask.com FF Homepage: hxxp://metager.de FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF32_12_0_0_70.dll () FF Plugin: @java.com/DTPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation) FF Plugin: @java.com/JavaPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation) FF Plugin: @microsoft.com/WPF,version=3.5 - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation) FF Plugin: @nitropdf.com/NitroPDF - C:\Program Files\Nitro\Reader 3\npnitromozilla.dll (Nitro PDF) FF Plugin: @videolan.org/vlc,version=2.0.3 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN) FF Plugin: @videolan.org/vlc,version=2.1.1 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN) FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{4737AE6A-7279-4159-9A93-1D68EF07A0AB}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{5E0C8B97-41A7-45AC-99A0-63C13108F0C4}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{7DE05CB2-21C3-4827-A5AB-E6EA049CFEC5}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{9B94CAF1-8947-4C10-9426-D9779C1AD6D4}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{BF7F8644-95BE-42CD-98C8-46AF33DA8E0E}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{CFA5FBE2-63F6-4659-AE63-213807DE553A}.xml FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\amazondotcom-de.xml FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\eBay-de.xml FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\leo_ende_de.xml FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\yahoo-de.xml FF Extension: NetVideoHunter - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\netvideohunter@netvideohunter.com [2013-12-02] FF Extension: YouTube Unblocker - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\youtubeunblocker@unblocker.yt [2014-01-24] FF Extension: DownloadHelper - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d} [2013-08-27] FF Extension: Ghostery - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\firefox@ghostery.com.xpi [2013-12-30] FF Extension: TrackMeNot - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\trackmenot@mrl.nyu.edu.xpi [2012-03-30] FF Extension: NoScript - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi [2012-03-30] FF Extension: {a3c7fdeb-4acc-4154-b848-8b21ce7dfdee} - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{a3c7fdeb-4acc-4154-b848-8b21ce7dfdee}.xpi [2013-11-02] FF Extension: Adblock Plus - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2012-04-19] FF Extension: BetterPrivacy - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi [2012-04-02] FF HKLM\...\Firefox\Extensions: [{20a82645-c095-46ed-80e3-08825760534b}] - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ FF Extension: Microsoft .NET Framework Assistant - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ [] ========================== Services (Whitelisted) ================= R2 AMD FUEL Service; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [291840 2012-12-19] (Advanced Micro Devices, Inc.) R2 AntiVirSchedulerService; C:\Program Files\Avira\AntiVir Desktop\sched.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG) R2 AntiVirService; C:\Program Files\Avira\AntiVir Desktop\avguard.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG) R2 MBAMScheduler; C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation) R2 MBAMService; C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation) R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [22208 2013-10-23] (Microsoft Corporation) S3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [280288 2013-10-23] (Microsoft Corporation) R2 NitroReaderDriverReadSpool3; C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe [196624 2013-03-26] (Nitro PDF Software) R2 RealtekCU; C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe [36864 2010-04-16] (Realtek) S3 SandraAgentSrv; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\RpcAgentSrv.exe [95896 2009-03-28] (SiSoftware) R2 SDScannerService; C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe [1103392 2012-11-13] (Safer-Networking Ltd.) R2 SDUpdateService; C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe [1369624 2012-11-13] (Safer-Networking Ltd.) R2 SDWSCService; C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe [168384 2012-11-13] (Safer-Networking Ltd.) S3 rpcapd; "%ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini" [X] ==================== Drivers (Whitelisted) ==================== R2 AODDriver4.2; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\i386\AODDriver2.sys [48256 2012-04-09] (Advanced Micro Devices) S3 AtiHDAudioService; C:\Windows\System32\drivers\AtihdLH3.sys [83984 2012-02-23] (Advanced Micro Devices) R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [90400 2013-12-17] (Avira Operations GmbH & Co. KG) R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [135648 2013-12-17] (Avira Operations GmbH & Co. KG) R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [37352 2013-11-25] (Avira Operations GmbH & Co. KG) R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [22856 2013-04-04] (Malwarebytes Corporation) R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [214696 2013-09-27] (Microsoft Corporation) R3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [5810 2004-08-13] () S3 NANMp50; C:\Windows\System32\Drivers\NANMp50.sys [36408 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA)) S3 NANSp50; C:\Windows\System32\Drivers\NANSp50.sys [35384 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA)) R2 NPF; C:\Windows\System32\drivers\npf.sys [35088 2010-06-25] (CACE Technologies, Inc.) R3 RTL8192cu; C:\Windows\System32\DRIVERS\rtwlanu.sys [864360 2011-09-06] (Realtek Semiconductor Corporation ) S3 SANDRA; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\WNt500x86\Sandra.sys [23112 2009-08-07] (SiSoftware) R1 ssmdrv; C:\Windows\System32\DRIVERS\ssmdrv.sys [28520 2013-05-03] (Avira GmbH) S4 blbdrive; \SystemRoot\system32\drivers\blbdrive.sys [X] S1 gfjnxobt; \??\C:\Windows\system32\drivers\gfjnxobt.sys [X] S3 IpInIp; system32\DRIVERS\ipinip.sys [X] S3 netr28u; system32\DRIVERS\netr28u.sys [X] S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [X] S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [X] S3 RTL8192su; system32\DRIVERS\RTL8192su.sys [X] ==================== NetSvcs (Whitelisted) =================== ==================== One Month Created Files and Folders ======== 2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Documents\JRT.txt 2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Desktop\JRT.txt 2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT 2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt 2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt 2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt 2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe 2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe 2014-03-08 19:40 - 2014-03-08 19:41 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe 2014-03-08 19:29 - 2014-03-08 20:42 - 00043277 _____ () C:\Windows\WindowsUpdate.log 2014-03-07 12:59 - 2014-03-08 20:42 - 00014335 _____ () C:\Users\chef\Downloads\FRST.txt 2014-03-07 12:59 - 2014-03-07 13:00 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt 2014-03-07 12:58 - 2014-03-08 20:42 - 00000000 ____D () C:\FRST 2014-03-07 12:56 - 2014-03-07 12:57 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe 2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe 2014-03-05 22:54 - 2014-03-08 19:48 - 00000906 _____ () C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk 2014-03-05 22:53 - 2014-03-08 19:49 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware 2014-03-05 22:53 - 2013-04-04 14:50 - 00022856 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys 2014-03-05 22:50 - 2014-03-05 22:51 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe 2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe 2014-02-28 20:09 - 2013-12-05 03:12 - 01248768 _____ (Microsoft Corporation) C:\Windows\system32\msxml3.dll 2014-02-20 18:06 - 2014-02-20 18:07 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip 2014-02-16 21:44 - 2014-02-16 21:45 - 00000000 ____D () C:\Program Files\Mozilla Firefox 2014-02-16 14:40 - 2014-02-17 16:16 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi 2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk 2014-02-16 14:37 - 2014-02-16 14:40 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi 2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi 2014-02-16 14:35 - 2014-02-16 14:36 - 13251567 _____ () C:\Users\chef\Downloads\install.exe 2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt 2014-02-09 06:31 - 2014-02-20 17:43 - 00000000 ____D () C:\Program Files\isohero 2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun 2014-02-07 19:32 - 2013-12-18 21:10 - 00094632 _____ (Oracle Corporation) C:\Windows\system32\WindowsAccessBridge.dll 2014-02-07 19:32 - 2013-12-18 21:04 - 00264616 _____ (Oracle Corporation) C:\Windows\system32\javaws.exe 2014-02-07 19:32 - 2013-12-18 21:04 - 00175016 _____ (Oracle Corporation) C:\Windows\system32\javaw.exe 2014-02-07 19:32 - 2013-12-18 21:03 - 00174504 _____ (Oracle Corporation) C:\Windows\system32\java.exe 2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe 2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe 2014-02-07 18:30 - 2014-02-07 18:33 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR 2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe 2014-02-07 14:57 - 2014-02-07 14:58 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar 2014-02-06 23:25 - 2014-02-06 23:26 - 00000000 ____D () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001 2014-02-06 23:23 - 2014-02-06 23:24 - 06860196 _____ () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001.zip 2014-02-06 23:10 - 2014-02-07 15:02 - 00000000 ____D () C:\DOS 2014-02-06 22:56 - 2014-02-06 22:56 - 00032934 _____ () C:\Users\chef\Downloads\DOSBox-german-lang-0.74.zip 2014-02-06 22:55 - 2014-02-06 23:08 - 00005330 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox.dosbox 2014-02-06 22:53 - 2014-02-06 22:53 - 00005316 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox 2014-02-06 22:50 - 2014-02-06 22:50 - 01846392 _____ () C:\Users\chef\Downloads\Roby03.zip 2014-02-06 22:50 - 2014-02-06 22:50 - 00000000 ____D () C:\Windows\Downloaded Installations 2014-02-06 22:41 - 2014-02-06 22:41 - 00001703 _____ () C:\Users\Public\Desktop\DOSBox 0.74.lnk 2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Users\chef\AppData\Local\DOSBox 2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Program Files\DOSBox 2014-02-06 22:40 - 2014-02-06 22:41 - 01448809 _____ (DOSBox Team) C:\Users\chef\Downloads\DOSBox0.74-win32-installer.exe 2014-02-06 22:34 - 2014-02-06 22:34 - 00000000 ____D () C:\Users\chef\Downloads\hquest2 2014-02-06 22:33 - 2014-02-06 22:34 - 01826500 _____ () C:\Users\chef\Downloads\hquest2.zip 2014-02-06 22:27 - 2014-02-06 22:27 - 00596689 _____ () C:\Users\chef\Downloads\Hero Quest.zip ==================== One Month Modified Files and Folders ======= 2014-03-08 20:42 - 2014-03-08 19:29 - 00043277 _____ () C:\Windows\WindowsUpdate.log 2014-03-08 20:42 - 2014-03-07 12:59 - 00014335 _____ () C:\Users\chef\Downloads\FRST.txt 2014-03-08 20:42 - 2014-03-07 12:58 - 00000000 ____D () C:\FRST 2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Documents\JRT.txt 2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Desktop\JRT.txt 2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT 2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt 2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt 2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt 2014-03-08 20:12 - 2013-09-08 22:24 - 00000000 ____D () C:\AdwCleaner 2014-03-08 19:49 - 2014-03-05 22:53 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware 2014-03-08 19:48 - 2014-03-05 22:54 - 00000906 _____ () C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk 2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe 2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe 2014-03-08 19:41 - 2014-03-08 19:40 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe 2014-03-08 19:29 - 2013-05-13 21:31 - 00000620 _____ () C:\Windows\Tasks\Check for updates (Spybot - Search & Destroy).job 2014-03-08 19:25 - 2006-11-02 13:58 - 00000006 ____H () C:\Windows\Tasks\SA.DAT 2014-03-08 19:25 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0 2014-03-08 19:25 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0 2014-03-08 11:37 - 2006-11-02 13:58 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT 2014-03-07 13:00 - 2014-03-07 12:59 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt 2014-03-07 12:57 - 2014-03-07 12:56 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe 2014-03-06 22:38 - 2012-04-21 21:40 - 00002509 _____ () C:\Users\chef\Desktop\inSSIDer.lnk 2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe 2014-03-05 22:51 - 2014-03-05 22:50 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe 2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe 2014-03-05 22:35 - 2013-12-11 17:36 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job 2014-03-01 19:05 - 2006-11-02 12:18 - 00000000 ____D () C:\Windows\Microsoft.NET 2014-02-28 20:23 - 2006-11-02 11:33 - 01582262 _____ () C:\Windows\system32\PerfStringBackup.INI 2014-02-28 20:21 - 2013-10-18 12:02 - 00000000 ____D () C:\Windows\system32\MRT 2014-02-21 16:37 - 2012-03-31 16:39 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe 2014-02-21 16:37 - 2012-03-31 16:39 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl 2014-02-20 18:07 - 2014-02-20 18:06 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip 2014-02-20 17:43 - 2014-02-09 06:31 - 00000000 ____D () C:\Program Files\isohero 2014-02-17 16:16 - 2014-02-16 14:40 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi 2014-02-16 22:37 - 2012-04-26 07:31 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service 2014-02-16 21:45 - 2014-02-16 21:44 - 00000000 ____D () C:\Program Files\Mozilla Firefox 2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk 2014-02-16 14:40 - 2014-02-16 14:37 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi 2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi 2014-02-16 14:36 - 2014-02-16 14:35 - 13251567 _____ () C:\Users\chef\Downloads\install.exe 2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt 2014-02-07 22:35 - 2012-04-16 11:19 - 00000000 ____D () C:\Users\alle anderen\AppData\Local\VirtualStore 2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun 2014-02-07 19:32 - 2013-12-09 16:45 - 00000000 ____D () C:\ProgramData\Oracle 2014-02-07 19:32 - 2013-07-04 15:10 - 00000000 ____D () C:\Program Files\Java 2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe 2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe 2014-02-07 19:25 - 2013-12-22 19:49 - 00000000 ____D () C:\Users\chef\AppData\Roaming\UFOAI 2014-02-07 18:33 - 2014-02-07 18:30 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip 2014-02-07 15:02 - 2014-02-06 23:10 - 00000000 ____D () C:\DOS 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR 2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe 2014-02-07 14:58 - 2014-02-07 14:57 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar 2014-02-06 23:26 - 2014-02-06 23:25 - 00000000 ____D () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001 2014-02-06 23:24 - 2014-02-06 23:23 - 06860196 _____ () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001.zip 2014-02-06 23:08 - 2014-02-06 22:55 - 00005330 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox.dosbox 2014-02-06 22:56 - 2014-02-06 22:56 - 00032934 _____ () C:\Users\chef\Downloads\DOSBox-german-lang-0.74.zip 2014-02-06 22:53 - 2014-02-06 22:53 - 00005316 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox 2014-02-06 22:50 - 2014-02-06 22:50 - 01846392 _____ () C:\Users\chef\Downloads\Roby03.zip 2014-02-06 22:50 - 2014-02-06 22:50 - 00000000 ____D () C:\Windows\Downloaded Installations 2014-02-06 22:41 - 2014-02-06 22:41 - 00001703 _____ () C:\Users\Public\Desktop\DOSBox 0.74.lnk 2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Users\chef\AppData\Local\DOSBox 2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Program Files\DOSBox 2014-02-06 22:41 - 2014-02-06 22:40 - 01448809 _____ (DOSBox Team) C:\Users\chef\Downloads\DOSBox0.74-win32-installer.exe 2014-02-06 22:34 - 2014-02-06 22:34 - 00000000 ____D () C:\Users\chef\Downloads\hquest2 2014-02-06 22:34 - 2014-02-06 22:33 - 01826500 _____ () C:\Users\chef\Downloads\hquest2.zip 2014-02-06 22:27 - 2014-02-06 22:27 - 00596689 _____ () C:\Users\chef\Downloads\Hero Quest.zip Some content of TEMP: ==================== C:\Users\alle anderen\AppData\Local\Temp\avgnt.exe C:\Users\chef\AppData\Local\Temp\avgnt.exe C:\Users\Sven\AppData\Local\Temp\avgnt.exe ==================== Bamital & volsnap Check ================= C:\Windows\explorer.exe => MD5 is legit C:\Windows\system32\winlogon.exe => MD5 is legit C:\Windows\system32\wininit.exe => MD5 is legit C:\Windows\system32\svchost.exe => MD5 is legit C:\Windows\system32\services.exe => MD5 is legit C:\Windows\system32\User32.dll => MD5 is legit C:\Windows\system32\userinit.exe => MD5 is legit C:\Windows\system32\rpcss.dll => MD5 is legit C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit LastRegBack: 2014-03-08 19:34 ==================== End Of Log ============================ --- --- --- moin schrauber, hier nochmal alle logfiles ofenfrisch : Code:
ATTFilter Malwarebytes Anti-Malware 1.75.0.1300 www.malwarebytes.org Datenbank Version: v2014.03.08.07 Windows Vista Service Pack 2 x86 NTFS Internet Explorer 9.0.8112.16421 chef :: WOPR [Administrator] 09.03.2014 08:47:11 mbam-log-2014-03-09 (08-47-11).txt Art des Suchlaufs: Quick-Scan Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 254750 Laufzeit: 8 Minute(n), 4 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 0 (Keine bösartigen Objekte gefunden) (Ende) Code:
ATTFilter # AdwCleaner v3.020 - Bericht erstellt am 09/03/2014 um 08:58:21 # Aktualisiert 27/02/2014 von Xplode # Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits) # Benutzername : chef - WOPR # Gestartet von : C:\Users\chef\Downloads\adwcleaner.exe # Option : Suchen ***** [ Dienste ] ***** ***** [ Dateien / Ordner ] ***** ***** [ Verknüpfungen ] ***** ***** [ Registrierungsdatenbank ] ***** ***** [ Browser ] ***** -\\ Internet Explorer v9.0.8112.16526 -\\ Mozilla Firefox v27.0.1 (de) [ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ] [ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ] [ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ] ************************* AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35] AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39] AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21] AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30] AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35] AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33] AdwCleaner[R6].txt - [1674 octets] - [08/03/2014 20:12:00] AdwCleaner[R7].txt - [1293 octets] - [09/03/2014 08:58:21] AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14] AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33] AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06] AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54] AdwCleaner[S4].txt - [4312 octets] - [05/03/2014 23:20:55] ########## EOF - C:\AdwCleaner\AdwCleaner[R7].txt - [1654 octets] ########## Code:
ATTFilter # AdwCleaner v3.020 - Bericht erstellt am 09/03/2014 um 08:58:21 # Aktualisiert 27/02/2014 von Xplode # Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits) # Benutzername : chef - WOPR # Gestartet von : C:\Users\chef\Downloads\adwcleaner.exe # Option : Suchen ***** [ Dienste ] ***** ***** [ Dateien / Ordner ] ***** ***** [ Verknüpfungen ] ***** ***** [ Registrierungsdatenbank ] ***** ***** [ Browser ] ***** -\\ Internet Explorer v9.0.8112.16526 -\\ Mozilla Firefox v27.0.1 (de) [ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ] [ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ] [ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ] ************************* AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35] AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39] AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21] AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30] AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35] AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33] AdwCleaner[R6].txt - [1674 octets] - [08/03/2014 20:12:00] AdwCleaner[R7].txt - [1293 octets] - [09/03/2014 08:58:21] AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14] AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33] AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06] AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54] AdwCleaner[S4].txt - [4312 octets] - [05/03/2014 23:20:55] ########## EOF - C:\AdwCleaner\AdwCleaner[R7].txt - [1654 octets] ########## FRST Logfile: FRST Logfile: Code:
ATTFilter Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 07-03-2014 Ran by chef (administrator) on WOPR on 09-03-2014 09:15:58 Running from C:\Users\chef\Downloads Microsoft® Windows Vista™ Home Basic Service Pack 2 (X86) OS Language: German Standard Internet Explorer Version 9 Boot Mode: Normal ==================== Processes (Whitelisted) ================= (Microsoft Corporation) c:\Program Files\Microsoft Security Client\MsMpEng.exe (AMD) C:\Windows\system32\atiesrxx.exe (Microsoft Corporation) C:\Windows\system32\SLsvc.exe (AMD) C:\Windows\system32\atieclxx.exe (Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\sched.exe (Advanced Micro Devices, Inc.) C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe (Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avguard.exe (Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe (Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe (Nitro PDF Software) C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe (Realtek) C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe (Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe (Microsoft Corporation) C:\Program Files\Windows Defender\MSASCui.exe (Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe (Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avgnt.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe (Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avshadow.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe (Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdate.exe (Realtek Semiconductor Corp.) C:\Program Files\oem\11n USB Wireless LAN Utility\RtWlan.exe (Microsoft Corporation) C:\Windows\system32\wuauclt.exe ==================== Registry (Whitelisted) ================== HKLM\...\Run: [Windows Defender] - C:\Program Files\Windows Defender\MSASCui.exe [1008184 2008-01-18] (Microsoft Corporation) HKLM\...\Run: [MSC] - c:\Program Files\Microsoft Security Client\msseces.exe [948440 2013-10-23] (Microsoft Corporation) HKLM\...\Run: [avgnt] - C:\Program Files\Avira\AntiVir Desktop\avgnt.exe [689744 2014-02-20] (Avira Operations GmbH & Co. KG) HKLM\...\Run: [SDTray] - C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe [3825176 2012-11-13] (Safer-Networking Ltd.) Winlogon\Notify\SDWinLogon: SDWinLogon.dll [X] HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [ccleaner] - C:\Program Files\CCleaner\CCleaner.exe [4324120 2013-11-22] (Piriform Ltd) HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [Spybot-S&D Cleaning] - C:\Program Files\Spybot - Search & Destroy 2\SDCleaner.exe [3713032 2012-11-13] (Safer-Networking Ltd.) ==================== Internet (Whitelisted) ==================== URLSearchHook: HKCU - (No Name) - {00000000-6E41-4FD3-8538-502F5495E5FC} - No File SearchScopes: HKLM - DefaultScope value is missing. SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D267372633D49452D536561726368426F7826464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0 SearchScopes: HKCU - {2C93367C-BA9A-4CA2-B582-4B61404C765D} URL = hxxp://www.myvideo.de.anonymize-me.de/?to=6D79766964656F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {411EA882-929B-449F-9C65-7CEDED8DEDFE} URL = hxxp://de.wikipedia.org.anonymize-me.de/?to=64652E77696B6970656469612E6F7267&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D26464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0 SearchScopes: HKCU - {6BF147B5-7A30-4782-B5B9-8C0AA3632EC8} URL = hxxp://search.ebay.de.anonymize-me.de/?to=656261792E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {80E424A2-185B-4FAE-BA5E-37FBF8B2D48B} URL = hxxp://www.otto.de.anonymize-me.de/?to=6F74746F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {97132A2A-367E-4E5A-9D73-CB11EA3ECCD8} URL = hxxp://www.pricerunner.de.anonymize-me.de/?to=707269636572756E6E65722E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 SearchScopes: HKCU - {CC2AE24D-3E94-4B16-8A85-7B52A831737B} URL = hxxp://www.amazon.de.anonymize-me.de/?to=616D617A6F6E2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0 BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy 2\SDHelper.dll (Safer-Networking Ltd.) BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation) BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation) Tcpip\Parameters: [DhcpNameServer] 192.168.1.1 FireFox: ======== FF ProfilePath: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default FF SearchEngineOrder.1: Ask.com FF Homepage: hxxp://metager.de FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF32_12_0_0_70.dll () FF Plugin: @java.com/DTPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation) FF Plugin: @java.com/JavaPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation) FF Plugin: @microsoft.com/WPF,version=3.5 - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation) FF Plugin: @nitropdf.com/NitroPDF - C:\Program Files\Nitro\Reader 3\npnitromozilla.dll (Nitro PDF) FF Plugin: @videolan.org/vlc,version=2.0.3 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN) FF Plugin: @videolan.org/vlc,version=2.1.1 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN) FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{4737AE6A-7279-4159-9A93-1D68EF07A0AB}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{5E0C8B97-41A7-45AC-99A0-63C13108F0C4}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{7DE05CB2-21C3-4827-A5AB-E6EA049CFEC5}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{9B94CAF1-8947-4C10-9426-D9779C1AD6D4}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{BF7F8644-95BE-42CD-98C8-46AF33DA8E0E}.xml FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{CFA5FBE2-63F6-4659-AE63-213807DE553A}.xml FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\amazondotcom-de.xml FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\eBay-de.xml FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\leo_ende_de.xml FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\yahoo-de.xml FF Extension: NetVideoHunter - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\netvideohunter@netvideohunter.com [2013-12-02] FF Extension: YouTube Unblocker - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\youtubeunblocker@unblocker.yt [2014-01-24] FF Extension: DownloadHelper - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d} [2013-08-27] FF Extension: Ghostery - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\firefox@ghostery.com.xpi [2013-12-30] FF Extension: TrackMeNot - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\trackmenot@mrl.nyu.edu.xpi [2012-03-30] FF Extension: NoScript - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi [2012-03-30] FF Extension: {a3c7fdeb-4acc-4154-b848-8b21ce7dfdee} - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{a3c7fdeb-4acc-4154-b848-8b21ce7dfdee}.xpi [2013-11-02] FF Extension: Adblock Plus - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2012-04-19] FF Extension: BetterPrivacy - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi [2012-04-02] FF HKLM\...\Firefox\Extensions: [{20a82645-c095-46ed-80e3-08825760534b}] - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ FF Extension: Microsoft .NET Framework Assistant - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ [] ========================== Services (Whitelisted) ================= R2 AMD FUEL Service; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [291840 2012-12-19] (Advanced Micro Devices, Inc.) R2 AntiVirSchedulerService; C:\Program Files\Avira\AntiVir Desktop\sched.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG) R2 AntiVirService; C:\Program Files\Avira\AntiVir Desktop\avguard.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG) R2 MBAMScheduler; C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation) R2 MBAMService; C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation) R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [22208 2013-10-23] (Microsoft Corporation) S3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [280288 2013-10-23] (Microsoft Corporation) R2 NitroReaderDriverReadSpool3; C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe [196624 2013-03-26] (Nitro PDF Software) R2 RealtekCU; C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe [36864 2010-04-16] (Realtek) S3 SandraAgentSrv; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\RpcAgentSrv.exe [95896 2009-03-28] (SiSoftware) R2 SDScannerService; C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe [1103392 2012-11-13] (Safer-Networking Ltd.) R2 SDUpdateService; C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe [1369624 2012-11-13] (Safer-Networking Ltd.) R2 SDWSCService; C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe [168384 2012-11-13] (Safer-Networking Ltd.) S3 rpcapd; "%ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini" [X] ==================== Drivers (Whitelisted) ==================== R2 AODDriver4.2; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\i386\AODDriver2.sys [48256 2012-04-09] (Advanced Micro Devices) S3 AtiHDAudioService; C:\Windows\System32\drivers\AtihdLH3.sys [83984 2012-02-23] (Advanced Micro Devices) R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [90400 2013-12-17] (Avira Operations GmbH & Co. KG) R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [135648 2013-12-17] (Avira Operations GmbH & Co. KG) R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [37352 2013-11-25] (Avira Operations GmbH & Co. KG) R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [22856 2013-04-04] (Malwarebytes Corporation) R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [214696 2013-09-27] (Microsoft Corporation) R3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [5810 2004-08-13] () S3 NANMp50; C:\Windows\System32\Drivers\NANMp50.sys [36408 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA)) S3 NANSp50; C:\Windows\System32\Drivers\NANSp50.sys [35384 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA)) R2 NPF; C:\Windows\System32\drivers\npf.sys [35088 2010-06-25] (CACE Technologies, Inc.) R3 RTL8192cu; C:\Windows\System32\DRIVERS\rtwlanu.sys [864360 2011-09-06] (Realtek Semiconductor Corporation ) S3 SANDRA; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\WNt500x86\Sandra.sys [23112 2009-08-07] (SiSoftware) R1 ssmdrv; C:\Windows\System32\DRIVERS\ssmdrv.sys [28520 2013-05-03] (Avira GmbH) S4 blbdrive; \SystemRoot\system32\drivers\blbdrive.sys [X] S1 gfjnxobt; \??\C:\Windows\system32\drivers\gfjnxobt.sys [X] S3 IpInIp; system32\DRIVERS\ipinip.sys [X] S3 netr28u; system32\DRIVERS\netr28u.sys [X] S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [X] S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [X] S3 RTL8192su; system32\DRIVERS\RTL8192su.sys [X] ==================== NetSvcs (Whitelisted) =================== ==================== One Month Created Files and Folders ======== 2014-03-09 09:10 - 2014-03-09 09:14 - 00022835 _____ () C:\Windows\WindowsUpdate.log 2014-03-09 09:05 - 2014-03-09 09:05 - 00000631 _____ () C:\Users\chef\Desktop\JRT.txt 2014-03-09 08:59 - 2014-03-09 08:59 - 00001734 _____ () C:\Users\chef\Documents\AdwCleaner[R7].txt 2014-03-08 20:37 - 2014-03-09 09:05 - 00000631 _____ () C:\Users\chef\Documents\JRT.txt 2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT 2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt 2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt 2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt 2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe 2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe 2014-03-08 19:40 - 2014-03-08 19:41 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe 2014-03-07 12:59 - 2014-03-09 09:15 - 00014042 _____ () C:\Users\chef\Downloads\FRST.txt 2014-03-07 12:59 - 2014-03-07 13:00 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt 2014-03-07 12:58 - 2014-03-09 09:15 - 00000000 ____D () C:\FRST 2014-03-07 12:56 - 2014-03-07 12:57 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe 2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe 2014-03-05 22:54 - 2014-03-08 19:48 - 00000906 _____ () C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk 2014-03-05 22:53 - 2014-03-08 19:49 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware 2014-03-05 22:53 - 2013-04-04 14:50 - 00022856 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys 2014-03-05 22:50 - 2014-03-05 22:51 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe 2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe 2014-02-28 20:09 - 2013-12-05 03:12 - 01248768 _____ (Microsoft Corporation) C:\Windows\system32\msxml3.dll 2014-02-20 18:06 - 2014-02-20 18:07 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip 2014-02-16 21:44 - 2014-02-16 21:45 - 00000000 ____D () C:\Program Files\Mozilla Firefox 2014-02-16 14:40 - 2014-02-17 16:16 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi 2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk 2014-02-16 14:37 - 2014-02-16 14:40 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi 2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi 2014-02-16 14:35 - 2014-02-16 14:36 - 13251567 _____ () C:\Users\chef\Downloads\install.exe 2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt 2014-02-09 06:31 - 2014-02-20 17:43 - 00000000 ____D () C:\Program Files\isohero 2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun 2014-02-07 19:32 - 2013-12-18 21:10 - 00094632 _____ (Oracle Corporation) C:\Windows\system32\WindowsAccessBridge.dll 2014-02-07 19:32 - 2013-12-18 21:04 - 00264616 _____ (Oracle Corporation) C:\Windows\system32\javaws.exe 2014-02-07 19:32 - 2013-12-18 21:04 - 00175016 _____ (Oracle Corporation) C:\Windows\system32\javaw.exe 2014-02-07 19:32 - 2013-12-18 21:03 - 00174504 _____ (Oracle Corporation) C:\Windows\system32\java.exe 2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe 2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe 2014-02-07 18:30 - 2014-02-07 18:33 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR 2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe 2014-02-07 14:57 - 2014-02-07 14:58 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar ==================== One Month Modified Files and Folders ======= 2014-03-09 09:16 - 2014-03-07 12:59 - 00014042 _____ () C:\Users\chef\Downloads\FRST.txt 2014-03-09 09:15 - 2014-03-09 09:10 - 00022835 _____ () C:\Windows\WindowsUpdate.log 2014-03-09 09:15 - 2014-03-07 12:58 - 00000000 ____D () C:\FRST 2014-03-09 09:10 - 2013-05-13 21:31 - 00000620 _____ () C:\Windows\Tasks\Check for updates (Spybot - Search & Destroy).job 2014-03-09 09:09 - 2006-11-02 13:58 - 00000006 ____H () C:\Windows\Tasks\SA.DAT 2014-03-09 09:09 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0 2014-03-09 09:09 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0 2014-03-09 09:08 - 2006-11-02 13:58 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT 2014-03-09 09:05 - 2014-03-09 09:05 - 00000631 _____ () C:\Users\chef\Desktop\JRT.txt 2014-03-09 09:05 - 2014-03-08 20:37 - 00000631 _____ () C:\Users\chef\Documents\JRT.txt 2014-03-09 08:59 - 2014-03-09 08:59 - 00001734 _____ () C:\Users\chef\Documents\AdwCleaner[R7].txt 2014-03-09 08:58 - 2013-09-08 22:24 - 00000000 ____D () C:\AdwCleaner 2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT 2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt 2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt 2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt 2014-03-08 19:49 - 2014-03-05 22:53 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware 2014-03-08 19:48 - 2014-03-05 22:54 - 00000906 _____ () C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk 2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe 2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe 2014-03-08 19:41 - 2014-03-08 19:40 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe 2014-03-07 13:00 - 2014-03-07 12:59 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt 2014-03-07 12:57 - 2014-03-07 12:56 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe 2014-03-06 22:38 - 2012-04-21 21:40 - 00002509 _____ () C:\Users\chef\Desktop\inSSIDer.lnk 2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe 2014-03-05 22:51 - 2014-03-05 22:50 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe 2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe 2014-03-05 22:35 - 2013-12-11 17:36 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job 2014-03-01 19:05 - 2006-11-02 12:18 - 00000000 ____D () C:\Windows\Microsoft.NET 2014-02-28 20:23 - 2006-11-02 11:33 - 01582262 _____ () C:\Windows\system32\PerfStringBackup.INI 2014-02-28 20:21 - 2013-10-18 12:02 - 00000000 ____D () C:\Windows\system32\MRT 2014-02-21 16:37 - 2012-03-31 16:39 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe 2014-02-21 16:37 - 2012-03-31 16:39 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl 2014-02-20 18:07 - 2014-02-20 18:06 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip 2014-02-20 17:43 - 2014-02-09 06:31 - 00000000 ____D () C:\Program Files\isohero 2014-02-17 16:16 - 2014-02-16 14:40 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi 2014-02-16 22:37 - 2012-04-26 07:31 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service 2014-02-16 21:45 - 2014-02-16 21:44 - 00000000 ____D () C:\Program Files\Mozilla Firefox 2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk 2014-02-16 14:40 - 2014-02-16 14:37 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi 2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi 2014-02-16 14:36 - 2014-02-16 14:35 - 13251567 _____ () C:\Users\chef\Downloads\install.exe 2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt 2014-02-07 22:35 - 2012-04-16 11:19 - 00000000 ____D () C:\Users\alle anderen\AppData\Local\VirtualStore 2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun 2014-02-07 19:32 - 2013-12-09 16:45 - 00000000 ____D () C:\ProgramData\Oracle 2014-02-07 19:32 - 2013-07-04 15:10 - 00000000 ____D () C:\Program Files\Java 2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe 2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe 2014-02-07 19:25 - 2013-12-22 19:49 - 00000000 ____D () C:\Users\chef\AppData\Roaming\UFOAI 2014-02-07 18:33 - 2014-02-07 18:30 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip 2014-02-07 15:02 - 2014-02-06 23:10 - 00000000 ____D () C:\DOS 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR 2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR 2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe 2014-02-07 14:58 - 2014-02-07 14:57 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar Some content of TEMP: ==================== C:\Users\alle anderen\AppData\Local\Temp\avgnt.exe C:\Users\chef\AppData\Local\Temp\avgnt.exe C:\Users\Sven\AppData\Local\Temp\avgnt.exe ==================== Bamital & volsnap Check ================= C:\Windows\explorer.exe => MD5 is legit C:\Windows\system32\winlogon.exe => MD5 is legit C:\Windows\system32\wininit.exe => MD5 is legit C:\Windows\system32\svchost.exe => MD5 is legit C:\Windows\system32\services.exe => MD5 is legit C:\Windows\system32\User32.dll => MD5 is legit C:\Windows\system32\userinit.exe => MD5 is legit C:\Windows\system32\rpcss.dll => MD5 is legit C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit LastRegBack: 2014-03-09 09:16 ==================== End Of Log ============================ --- --- --- mit dem klevante schein ich mir ja ein relativ junges ding eingehandelt zu haben, allzuviel gibt es im web noch nicht darüber. so richtig kann ich auch noch keine verbindung zum VIS 1.01-plugin herstellen. den rest der viechter scheine ich mir bei meinen ersten gehversuchen eingehandelt zu haben, das wlan meiner nachbarn "etwas unter die lupe zu nehmen". muss den ganzen sinnlosmist mal wieder deinstallieren, hab mit 5 kindern und rollende schicht kaum wirkliche zeit, meinen rechner halbwegs sauber zu halten. inwiefern meine frau vielleicht sich infiziert hat, kann ich nicht beurteilen, aber sie hat unter vista zumindest keine administrator-rechte ... keine ahnung, ob das wirklicher schutz ist. dank dir erstmal, vielleicht sollte ich öfters mal die logfiles meiner schutztruppen durchforsten. ms-security-essentials hat am 05.03.14 ja einen ziemlichen brocken "aussortiert", ohne dass ich davon eine meldung bekam. war wirklich nur der firefox, welcher dieses VIS dingsda-plugin aus sicherheitsgrüden deaktivierte .... spende an euch kommt, wenn meine frau mal nicht gar so sehr auf die finanzen achtet, versprochen ! |
Themen zu firefox-addon VIS 1.01 - trojaner eingefangen ? |
ccc, firefox, google, malwarebytes, malwarebytes antimalware, mobogenie, mobogenie entfernen, offen, programme, pup.optional.conduit.a, pup.optional.pcspeedup.a, pup.optional.pricegong.a, pup.passwordtool, pup.wirelessnetworktool, spanisch, video |