Zurück   Trojaner-Board > Malware entfernen > Plagegeister aller Art und deren Bekämpfung

Plagegeister aller Art und deren Bekämpfung: firefox-addon VIS 1.01 - trojaner eingefangen ?

Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen.

 
Alt 09.03.2014, 09:35   #5
elagtric
 
firefox-addon VIS 1.01 - trojaner eingefangen ? - Standard

firefox-addon VIS 1.01 - trojaner eingefangen ?



hi schrauber ! erstmal grosses dankeschön für deine hilfe. hab die anweisung abgearbeitet. alle 3 tools haben nix gefunden. ausser dem aktuellen FRST-log spare ich also den platz, da ich durch das ganze wooling auf diverse logs etc. gestossen bin, die vom tag des "einfangens" stammen. wenn die frischen <sauberen> logs dennoch wichtig sein sollten, kann ich sie morgen nochmal neu anpinnen, muss leider gleich auf nachtschicht. vom prinzip her scheint mein rechner jetzt sauber zu sein, ich versteh nur nicht, wie ich mir scheinbar das zeux durch blosses anschauen eines videos einfangen konnte. ist alles noch unter quarantäne, falls das hier im board jemand näher interessiert.

hier erstmal einige logs vom 05.03.14 :

Code:
ATTFilter
# AdwCleaner v3.020 - Bericht erstellt am 05/03/2014 um 23:20:55
# Aktualisiert 27/02/2014 von Xplode
# Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits)
# Benutzername : chef - WOPR
# Gestartet von : C:\Users\chef\AppData\Local\Temp\OCS\Downloads\fc14996dfa99adfc7baae624196888c5\f8b34e3b5e6e337aa6491ee3f713f8f5\adwcleaner_3.0.2.0.exe
# Option : Löschen

***** [ Dienste ] *****


***** [ Dateien / Ordner ] *****

Ordner Gelöscht : C:\ProgramData\Conduit
Ordner Gelöscht : C:\Program Files\Conduit
Ordner Gelöscht : C:\Users\chef\AppData\Local\Conduit
Ordner Gelöscht : C:\Users\chef\AppData\Local\DownloadGuide
Ordner Gelöscht : C:\Users\chef\AppData\Local\Mobogenie
Ordner Gelöscht : C:\Users\chef\AppData\Local\NativeMessaging
Ordner Gelöscht : C:\Users\chef\AppData\Local\Temp\OCS
Ordner Gelöscht : C:\Users\chef\AppData\LocalLow\Conduit
Ordner Gelöscht : C:\Users\chef\AppData\LocalLow\PriceGong
Ordner Gelöscht : C:\Users\chef\Documents\Mobogenie
Datei Gelöscht : C:\END

***** [ Verknüpfungen ] *****


***** [ Registrierungsdatenbank ] *****

[#] Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{59CFDD71-A257-451D-9C3A-05C098F93D30}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\d
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\MobogenieAdd
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Toolbar.CT3317892
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Schlüssel Gelöscht : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Schlüssel Gelöscht : HKCU\Software\Conduit
Schlüssel Gelöscht : HKCU\Software\OCS
Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\Conduit
Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\ConduitSearchScopes
Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\SmartBar
Schlüssel Gelöscht : HKLM\Software\Conduit
Schlüssel Gelöscht : HKLM\Software\Speedchecker Limited

***** [ Browser ] *****

-\\ Internet Explorer v9.0.8112.16526


-\\ Mozilla Firefox v27.0.1 (de)

[ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ]

Zeile gelöscht : user_pref("CT3317892.FF19Solved", "true");
Zeile gelöscht : user_pref("CT3317892.UserID", "UN15427285281092272");
Zeile gelöscht : user_pref("CT3317892.fullUserID", "UN15427285281092272.IN.20131230162214");
Zeile gelöscht : user_pref("CT3317892.installDate", "30/12/2013 16:22:20");
Zeile gelöscht : user_pref("CT3317892.installSessionId", "{3F2FECE7-8944-4827-B5C9-1F921DFE9CA4}");
Zeile gelöscht : user_pref("CT3317892.installSp", "false");
Zeile gelöscht : user_pref("CT3317892.installerVersion", "1.8.1.4");
Zeile gelöscht : user_pref("CT3317892.searchRevert", "false");
Zeile gelöscht : user_pref("CT3317892.searchUninstallUserMode", "2");
Zeile gelöscht : user_pref("CT3317892.searchUserMode", "2");
Zeile gelöscht : user_pref("CT3317892.toolbarInstallDate", "30-12-2013 16:22:14");
Zeile gelöscht : user_pref("CT3317892.versionFromInstaller", "10.23.0.722");
Zeile gelöscht : user_pref("CT3317892.xpeMode", "0");
Zeile gelöscht : user_pref("smartbar.machineId", "GKNWL5QRYFD9ITJH/SFACTCRQC1+DJO6AX7VLVWCJBOGHCYMYV5QXKZM8RXUCYFSW6UP2X/W5/UYKMY+OUHYDQ");

[ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ]


[ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ]


*************************

AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35]
AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39]
AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21]
AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30]
AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35]
AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33]
AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14]
AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33]
AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06]
AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54]
AdwCleaner[S4].txt - [4172 octets] - [05/03/2014 23:20:55]

########## EOF - C:\AdwCleaner\AdwCleaner[S4].txt - [4232 octets] ##########
         
von heute :

Code:
ATTFilter
# AdwCleaner v3.020 - Bericht erstellt am 08/03/2014 um 20:12:00
# Aktualisiert 27/02/2014 von Xplode
# Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits)
# Benutzername : chef - WOPR
# Gestartet von : C:\Users\chef\Downloads\adwcleaner.exe
# Option : Suchen

***** [ Dienste ] *****


***** [ Dateien / Ordner ] *****


***** [ Verknüpfungen ] *****


***** [ Registrierungsdatenbank ] *****


***** [ Browser ] *****

-\\ Internet Explorer v9.0.8112.16526


-\\ Mozilla Firefox v27.0.1 (de)

[ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ]


[ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ]


[ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ]


*************************

AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35]
AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39]
AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21]
AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30]
AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35]
AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33]
AdwCleaner[R6].txt - [1233 octets] - [08/03/2014 20:12:00]
AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14]
AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33]
AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06]
AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54]
AdwCleaner[S4].txt - [4312 octets] - [05/03/2014 23:20:55]

########## EOF - C:\AdwCleaner\AdwCleaner[R6].txt - [1594 octets] ##########
         
Code:
ATTFilter
Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Datenbank Version: v2014.03.05.11

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
chef :: WOPR [Administrator]

05.03.2014 22:55:30
mbam-log-2014-03-05 (22-55-30).txt

Art des Suchlaufs: Quick-Scan
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 254173
Laufzeit: 9 Minute(n), 9 Sekunde(n)

Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel: 3
HKCU\Software\AppDataLow\Software\PriceGong (PUP.Optional.PriceGong.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
HKCU\Software\Conduit\FF (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
HKLM\SOFTWARE\Speedchecker Limited\PC Speed Up (PUP.Optional.PCSpeedUp.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.

Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse: 1
C:\ProgramData\Conduit\IE (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.

Infizierte Dateien: 5
C:\Users\chef\Downloads\bs_WireShark.exe (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
C:\Users\chef\Downloads\ca_setup.exe (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
C:\Users\chef\Downloads\ca_setup1.exe (PUP.PasswordTool) -> Erfolgreich gelöscht und in Quarantäne gestellt.
C:\Users\chef\Downloads\wirelessnetview_setup.exe (PUP.WirelessNetworkTool) -> Erfolgreich gelöscht und in Quarantäne gestellt.
C:\Users\chef\AppData\Local\DownloadGuide\Offers\mconduitinstaller.exe (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.

(Ende)
         
auszüge aus dem log von MS security essentials :

[CODE]Trojan:Win32/Klevate

file:C\Users\chef\AppData\Local\DownloadGuide\Offers\dprotect_setup.exe

(05.03.14 von microsoft security es
Code:
ATTFilter
sentials in quarantäne gestellt)
         
das log vom JRT :

Code:
ATTFilter
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.2 (02.20.2014:1)
OS: Windows Vista (TM) Home Basic x86
Ran by chef on 08.03.2014 at 20:35:12,04
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-1461220110-1976370169-1414792120-1000\Software\sweetim
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{2419B2B9-996E-419A-B79B-6600D820B370}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{3081A9B6-8DEB-4423-96A2-2177723580C0}



~~~ Files



~~~ Folders

Successfully deleted: [Folder] "C:\ProgramData\big fish"
Successfully deleted: [Folder] "C:\Users\chef\appdata\local\big fish"
Successfully deleted: [Folder] "C:\Users\chef\appdata\local\cre"
Successfully deleted: [Folder] "C:\bigfishcache"



~~~ FireFox

Successfully deleted the following from C:\Users\chef\AppData\Roaming\mozilla\firefox\profiles\vf5q4mw4.default\prefs.js

user_pref("extensions.toolbar@ask.com.install-event-fired", true);
Emptied folder: C:\Users\chef\AppData\Roaming\mozilla\firefox\profiles\vf5q4mw4.default\minidumps [125 files]



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 08.03.2014 at 20:37:42,64
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         
und noch FRST :


FRST Logfile:

FRST Logfile:
Code:
ATTFilter
Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 07-03-2014
Ran by chef (administrator) on WOPR on 08-03-2014 20:42:46
Running from C:\Users\chef\Downloads
Microsoft® Windows Vista™ Home Basic  Service Pack 2 (X86) OS Language: German Standard
Internet Explorer Version 9
Boot Mode: Normal


==================== Processes (Whitelisted) =================

(Microsoft Corporation) c:\Program Files\Microsoft Security Client\MsMpEng.exe
(AMD) C:\Windows\system32\atiesrxx.exe
(Microsoft Corporation) C:\Windows\system32\SLsvc.exe
(AMD) C:\Windows\system32\atieclxx.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\sched.exe
(Advanced Micro Devices, Inc.) C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avguard.exe
(Nitro PDF Software) C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe
(Realtek) C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe
(Realtek Semiconductor Corp.) C:\Program Files\oem\11n USB Wireless LAN Utility\RtWlan.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdate.exe
(Microsoft Corporation) C:\Windows\system32\wuauclt.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe
(Microsoft Corporation) C:\Windows\system32\conime.exe
(Microsoft Corporation) C:\Program Files\Windows Defender\MSASCui.exe
(Mozilla Corporation) C:\Program Files\Mozilla Firefox\firefox.exe


==================== Registry (Whitelisted) ==================

HKLM\...\Run: [Windows Defender] - C:\Program Files\Windows Defender\MSASCui.exe [1008184 2008-01-18] (Microsoft Corporation)
HKLM\...\Run: [MSC] - c:\Program Files\Microsoft Security Client\msseces.exe [948440 2013-10-23] (Microsoft Corporation)
HKLM\...\Run: [avgnt] - C:\Program Files\Avira\AntiVir Desktop\avgnt.exe [689744 2014-02-20] (Avira Operations GmbH & Co. KG)
HKLM\...\Run: [SDTray] - C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe [3825176 2012-11-13] (Safer-Networking Ltd.)
HKLM\...\RunOnce: [ Malwarebytes Anti-Malware ] - C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent [532040 2013-04-04] (Malwarebytes Corporation)
Winlogon\Notify\SDWinLogon: SDWinLogon.dll [X]
HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [ccleaner] - C:\Program Files\CCleaner\CCleaner.exe [4324120 2013-11-22] (Piriform Ltd)
HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [Spybot-S&D Cleaning] - C:\Program Files\Spybot - Search & Destroy 2\SDCleaner.exe [3713032 2012-11-13] (Safer-Networking Ltd.)

==================== Internet (Whitelisted) ====================

URLSearchHook: HKCU - (No Name) - {00000000-6E41-4FD3-8538-502F5495E5FC} -  No File
SearchScopes: HKLM - DefaultScope value is missing.
SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D267372633D49452D536561726368426F7826464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0
SearchScopes: HKCU - {2C93367C-BA9A-4CA2-B582-4B61404C765D} URL = hxxp://www.myvideo.de.anonymize-me.de/?to=6D79766964656F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {411EA882-929B-449F-9C65-7CEDED8DEDFE} URL = hxxp://de.wikipedia.org.anonymize-me.de/?to=64652E77696B6970656469612E6F7267&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D26464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0
SearchScopes: HKCU - {6BF147B5-7A30-4782-B5B9-8C0AA3632EC8} URL = hxxp://search.ebay.de.anonymize-me.de/?to=656261792E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {80E424A2-185B-4FAE-BA5E-37FBF8B2D48B} URL = hxxp://www.otto.de.anonymize-me.de/?to=6F74746F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {97132A2A-367E-4E5A-9D73-CB11EA3ECCD8} URL = hxxp://www.pricerunner.de.anonymize-me.de/?to=707269636572756E6E65722E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {CC2AE24D-3E94-4B16-8A85-7B52A831737B} URL = hxxp://www.amazon.de.anonymize-me.de/?to=616D617A6F6E2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy 2\SDHelper.dll (Safer-Networking Ltd.)
BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1

FireFox:
========
FF ProfilePath: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default
FF SearchEngineOrder.1: Ask.com
FF Homepage: hxxp://metager.de
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF32_12_0_0_70.dll ()
FF Plugin: @java.com/DTPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @microsoft.com/WPF,version=3.5 - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF Plugin: @nitropdf.com/NitroPDF - C:\Program Files\Nitro\Reader 3\npnitromozilla.dll (Nitro PDF)
FF Plugin: @videolan.org/vlc,version=2.0.3 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin: @videolan.org/vlc,version=2.1.1 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{4737AE6A-7279-4159-9A93-1D68EF07A0AB}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{5E0C8B97-41A7-45AC-99A0-63C13108F0C4}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{7DE05CB2-21C3-4827-A5AB-E6EA049CFEC5}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{9B94CAF1-8947-4C10-9426-D9779C1AD6D4}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{BF7F8644-95BE-42CD-98C8-46AF33DA8E0E}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{CFA5FBE2-63F6-4659-AE63-213807DE553A}.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF Extension: NetVideoHunter - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\netvideohunter@netvideohunter.com [2013-12-02]
FF Extension: YouTube Unblocker - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\youtubeunblocker@unblocker.yt [2014-01-24]
FF Extension: DownloadHelper - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d} [2013-08-27]
FF Extension: Ghostery - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\firefox@ghostery.com.xpi [2013-12-30]
FF Extension: TrackMeNot - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\trackmenot@mrl.nyu.edu.xpi [2012-03-30]
FF Extension: NoScript - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi [2012-03-30]
FF Extension: {a3c7fdeb-4acc-4154-b848-8b21ce7dfdee} - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{a3c7fdeb-4acc-4154-b848-8b21ce7dfdee}.xpi [2013-11-02]
FF Extension: Adblock Plus - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2012-04-19]
FF Extension: BetterPrivacy - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi [2012-04-02]
FF HKLM\...\Firefox\Extensions: [{20a82645-c095-46ed-80e3-08825760534b}] - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
FF Extension: Microsoft .NET Framework Assistant - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ []

========================== Services (Whitelisted) =================

R2 AMD FUEL Service; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [291840 2012-12-19] (Advanced Micro Devices, Inc.)
R2 AntiVirSchedulerService; C:\Program Files\Avira\AntiVir Desktop\sched.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG)
R2 AntiVirService; C:\Program Files\Avira\AntiVir Desktop\avguard.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG)
R2 MBAMScheduler; C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation)
R2 MBAMService; C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation)
R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [22208 2013-10-23] (Microsoft Corporation)
S3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [280288 2013-10-23] (Microsoft Corporation)
R2 NitroReaderDriverReadSpool3; C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe [196624 2013-03-26] (Nitro PDF Software)
R2 RealtekCU; C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe [36864 2010-04-16] (Realtek)
S3 SandraAgentSrv; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\RpcAgentSrv.exe [95896 2009-03-28] (SiSoftware)
R2 SDScannerService; C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe [1103392 2012-11-13] (Safer-Networking Ltd.)
R2 SDUpdateService; C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe [1369624 2012-11-13] (Safer-Networking Ltd.)
R2 SDWSCService; C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe [168384 2012-11-13] (Safer-Networking Ltd.)
S3 rpcapd; "%ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini" [X]

==================== Drivers (Whitelisted) ====================

R2 AODDriver4.2; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\i386\AODDriver2.sys [48256 2012-04-09] (Advanced Micro Devices)
S3 AtiHDAudioService; C:\Windows\System32\drivers\AtihdLH3.sys [83984 2012-02-23] (Advanced Micro Devices)
R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [90400 2013-12-17] (Avira Operations GmbH & Co. KG)
R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [135648 2013-12-17] (Avira Operations GmbH & Co. KG)
R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [37352 2013-11-25] (Avira Operations GmbH & Co. KG)
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [22856 2013-04-04] (Malwarebytes Corporation)
R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [214696 2013-09-27] (Microsoft Corporation)
R3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [5810 2004-08-13] ()
S3 NANMp50; C:\Windows\System32\Drivers\NANMp50.sys [36408 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA))
S3 NANSp50; C:\Windows\System32\Drivers\NANSp50.sys [35384 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA))
R2 NPF; C:\Windows\System32\drivers\npf.sys [35088 2010-06-25] (CACE Technologies, Inc.)
R3 RTL8192cu; C:\Windows\System32\DRIVERS\rtwlanu.sys [864360 2011-09-06] (Realtek Semiconductor Corporation                           )
S3 SANDRA; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\WNt500x86\Sandra.sys [23112 2009-08-07] (SiSoftware)
R1 ssmdrv; C:\Windows\System32\DRIVERS\ssmdrv.sys [28520 2013-05-03] (Avira GmbH)
S4 blbdrive; \SystemRoot\system32\drivers\blbdrive.sys [X]
S1 gfjnxobt; \??\C:\Windows\system32\drivers\gfjnxobt.sys [X]
S3 IpInIp; system32\DRIVERS\ipinip.sys [X]
S3 netr28u; system32\DRIVERS\netr28u.sys [X]
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [X]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [X]
S3 RTL8192su; system32\DRIVERS\RTL8192su.sys [X]

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Documents\JRT.txt
2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Desktop\JRT.txt
2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT
2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt
2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt
2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt
2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe
2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe
2014-03-08 19:40 - 2014-03-08 19:41 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe
2014-03-08 19:29 - 2014-03-08 20:42 - 00043277 _____ () C:\Windows\WindowsUpdate.log
2014-03-07 12:59 - 2014-03-08 20:42 - 00014335 _____ () C:\Users\chef\Downloads\FRST.txt
2014-03-07 12:59 - 2014-03-07 13:00 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt
2014-03-07 12:58 - 2014-03-08 20:42 - 00000000 ____D () C:\FRST
2014-03-07 12:56 - 2014-03-07 12:57 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe
2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe
2014-03-05 22:54 - 2014-03-08 19:48 - 00000906 _____ () C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk
2014-03-05 22:53 - 2014-03-08 19:49 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware
2014-03-05 22:53 - 2013-04-04 14:50 - 00022856 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-05 22:50 - 2014-03-05 22:51 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe
2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe
2014-02-28 20:09 - 2013-12-05 03:12 - 01248768 _____ (Microsoft Corporation) C:\Windows\system32\msxml3.dll
2014-02-20 18:06 - 2014-02-20 18:07 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip
2014-02-16 21:44 - 2014-02-16 21:45 - 00000000 ____D () C:\Program Files\Mozilla Firefox
2014-02-16 14:40 - 2014-02-17 16:16 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi
2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk
2014-02-16 14:37 - 2014-02-16 14:40 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi
2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi
2014-02-16 14:35 - 2014-02-16 14:36 - 13251567 _____ () C:\Users\chef\Downloads\install.exe
2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt
2014-02-09 06:31 - 2014-02-20 17:43 - 00000000 ____D () C:\Program Files\isohero
2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun
2014-02-07 19:32 - 2013-12-18 21:10 - 00094632 _____ (Oracle Corporation) C:\Windows\system32\WindowsAccessBridge.dll
2014-02-07 19:32 - 2013-12-18 21:04 - 00264616 _____ (Oracle Corporation) C:\Windows\system32\javaws.exe
2014-02-07 19:32 - 2013-12-18 21:04 - 00175016 _____ (Oracle Corporation) C:\Windows\system32\javaw.exe
2014-02-07 19:32 - 2013-12-18 21:03 - 00174504 _____ (Oracle Corporation) C:\Windows\system32\java.exe
2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe
2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe
2014-02-07 18:30 - 2014-02-07 18:33 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR
2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe
2014-02-07 14:57 - 2014-02-07 14:58 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar
2014-02-06 23:25 - 2014-02-06 23:26 - 00000000 ____D () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001
2014-02-06 23:23 - 2014-02-06 23:24 - 06860196 _____ () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001.zip
2014-02-06 23:10 - 2014-02-07 15:02 - 00000000 ____D () C:\DOS
2014-02-06 22:56 - 2014-02-06 22:56 - 00032934 _____ () C:\Users\chef\Downloads\DOSBox-german-lang-0.74.zip
2014-02-06 22:55 - 2014-02-06 23:08 - 00005330 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox.dosbox
2014-02-06 22:53 - 2014-02-06 22:53 - 00005316 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox
2014-02-06 22:50 - 2014-02-06 22:50 - 01846392 _____ () C:\Users\chef\Downloads\Roby03.zip
2014-02-06 22:50 - 2014-02-06 22:50 - 00000000 ____D () C:\Windows\Downloaded Installations
2014-02-06 22:41 - 2014-02-06 22:41 - 00001703 _____ () C:\Users\Public\Desktop\DOSBox 0.74.lnk
2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Users\chef\AppData\Local\DOSBox
2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Program Files\DOSBox
2014-02-06 22:40 - 2014-02-06 22:41 - 01448809 _____ (DOSBox Team) C:\Users\chef\Downloads\DOSBox0.74-win32-installer.exe
2014-02-06 22:34 - 2014-02-06 22:34 - 00000000 ____D () C:\Users\chef\Downloads\hquest2
2014-02-06 22:33 - 2014-02-06 22:34 - 01826500 _____ () C:\Users\chef\Downloads\hquest2.zip
2014-02-06 22:27 - 2014-02-06 22:27 - 00596689 _____ () C:\Users\chef\Downloads\Hero Quest.zip

==================== One Month Modified Files and Folders =======

2014-03-08 20:42 - 2014-03-08 19:29 - 00043277 _____ () C:\Windows\WindowsUpdate.log
2014-03-08 20:42 - 2014-03-07 12:59 - 00014335 _____ () C:\Users\chef\Downloads\FRST.txt
2014-03-08 20:42 - 2014-03-07 12:58 - 00000000 ____D () C:\FRST
2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Documents\JRT.txt
2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Desktop\JRT.txt
2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT
2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt
2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt
2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt
2014-03-08 20:12 - 2013-09-08 22:24 - 00000000 ____D () C:\AdwCleaner
2014-03-08 19:49 - 2014-03-05 22:53 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware
2014-03-08 19:48 - 2014-03-05 22:54 - 00000906 _____ () C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk
2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe
2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe
2014-03-08 19:41 - 2014-03-08 19:40 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe
2014-03-08 19:29 - 2013-05-13 21:31 - 00000620 _____ () C:\Windows\Tasks\Check for updates (Spybot - Search & Destroy).job
2014-03-08 19:25 - 2006-11-02 13:58 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-03-08 19:25 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2014-03-08 19:25 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2014-03-08 11:37 - 2006-11-02 13:58 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-03-07 13:00 - 2014-03-07 12:59 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt
2014-03-07 12:57 - 2014-03-07 12:56 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe
2014-03-06 22:38 - 2012-04-21 21:40 - 00002509 _____ () C:\Users\chef\Desktop\inSSIDer.lnk
2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe
2014-03-05 22:51 - 2014-03-05 22:50 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe
2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe
2014-03-05 22:35 - 2013-12-11 17:36 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-03-01 19:05 - 2006-11-02 12:18 - 00000000 ____D () C:\Windows\Microsoft.NET
2014-02-28 20:23 - 2006-11-02 11:33 - 01582262 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-02-28 20:21 - 2013-10-18 12:02 - 00000000 ____D () C:\Windows\system32\MRT
2014-02-21 16:37 - 2012-03-31 16:39 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2014-02-21 16:37 - 2012-03-31 16:39 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2014-02-20 18:07 - 2014-02-20 18:06 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip
2014-02-20 17:43 - 2014-02-09 06:31 - 00000000 ____D () C:\Program Files\isohero
2014-02-17 16:16 - 2014-02-16 14:40 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi
2014-02-16 22:37 - 2012-04-26 07:31 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service
2014-02-16 21:45 - 2014-02-16 21:44 - 00000000 ____D () C:\Program Files\Mozilla Firefox
2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk
2014-02-16 14:40 - 2014-02-16 14:37 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi
2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi
2014-02-16 14:36 - 2014-02-16 14:35 - 13251567 _____ () C:\Users\chef\Downloads\install.exe
2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt
2014-02-07 22:35 - 2012-04-16 11:19 - 00000000 ____D () C:\Users\alle anderen\AppData\Local\VirtualStore
2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun
2014-02-07 19:32 - 2013-12-09 16:45 - 00000000 ____D () C:\ProgramData\Oracle
2014-02-07 19:32 - 2013-07-04 15:10 - 00000000 ____D () C:\Program Files\Java
2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe
2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe
2014-02-07 19:25 - 2013-12-22 19:49 - 00000000 ____D () C:\Users\chef\AppData\Roaming\UFOAI
2014-02-07 18:33 - 2014-02-07 18:30 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip
2014-02-07 15:02 - 2014-02-06 23:10 - 00000000 ____D () C:\DOS
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR
2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe
2014-02-07 14:58 - 2014-02-07 14:57 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar
2014-02-06 23:26 - 2014-02-06 23:25 - 00000000 ____D () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001
2014-02-06 23:24 - 2014-02-06 23:23 - 06860196 _____ () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001.zip
2014-02-06 23:08 - 2014-02-06 22:55 - 00005330 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox.dosbox
2014-02-06 22:56 - 2014-02-06 22:56 - 00032934 _____ () C:\Users\chef\Downloads\DOSBox-german-lang-0.74.zip
2014-02-06 22:53 - 2014-02-06 22:53 - 00005316 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox
2014-02-06 22:50 - 2014-02-06 22:50 - 01846392 _____ () C:\Users\chef\Downloads\Roby03.zip
2014-02-06 22:50 - 2014-02-06 22:50 - 00000000 ____D () C:\Windows\Downloaded Installations
2014-02-06 22:41 - 2014-02-06 22:41 - 00001703 _____ () C:\Users\Public\Desktop\DOSBox 0.74.lnk
2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Users\chef\AppData\Local\DOSBox
2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Program Files\DOSBox
2014-02-06 22:41 - 2014-02-06 22:40 - 01448809 _____ (DOSBox Team) C:\Users\chef\Downloads\DOSBox0.74-win32-installer.exe
2014-02-06 22:34 - 2014-02-06 22:34 - 00000000 ____D () C:\Users\chef\Downloads\hquest2
2014-02-06 22:34 - 2014-02-06 22:33 - 01826500 _____ () C:\Users\chef\Downloads\hquest2.zip
2014-02-06 22:27 - 2014-02-06 22:27 - 00596689 _____ () C:\Users\chef\Downloads\Hero Quest.zip

Some content of TEMP:
====================
C:\Users\alle anderen\AppData\Local\Temp\avgnt.exe
C:\Users\chef\AppData\Local\Temp\avgnt.exe
C:\Users\Sven\AppData\Local\Temp\avgnt.exe


==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\system32\winlogon.exe => MD5 is legit
C:\Windows\system32\wininit.exe => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\services.exe => MD5 is legit
C:\Windows\system32\User32.dll => MD5 is legit
C:\Windows\system32\userinit.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit
C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit


LastRegBack: 2014-03-08 19:34

==================== End Of Log ============================
         
--- --- ---

--- --- ---


moin schrauber, hier nochmal alle logfiles ofenfrisch :

Code:
ATTFilter
Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Datenbank Version: v2014.03.08.07

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
chef :: WOPR [Administrator]

09.03.2014 08:47:11
mbam-log-2014-03-09 (08-47-11).txt

Art des Suchlaufs: Quick-Scan
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 254750
Laufzeit: 8 Minute(n), 4 Sekunde(n)

Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateien: 0
(Keine bösartigen Objekte gefunden)

(Ende)
         
Code:
ATTFilter
# AdwCleaner v3.020 - Bericht erstellt am 09/03/2014 um 08:58:21
# Aktualisiert 27/02/2014 von Xplode
# Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits)
# Benutzername : chef - WOPR
# Gestartet von : C:\Users\chef\Downloads\adwcleaner.exe
# Option : Suchen

***** [ Dienste ] *****


***** [ Dateien / Ordner ] *****


***** [ Verknüpfungen ] *****


***** [ Registrierungsdatenbank ] *****


***** [ Browser ] *****

-\\ Internet Explorer v9.0.8112.16526


-\\ Mozilla Firefox v27.0.1 (de)

[ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ]


[ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ]


[ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ]


*************************

AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35]
AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39]
AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21]
AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30]
AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35]
AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33]
AdwCleaner[R6].txt - [1674 octets] - [08/03/2014 20:12:00]
AdwCleaner[R7].txt - [1293 octets] - [09/03/2014 08:58:21]
AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14]
AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33]
AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06]
AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54]
AdwCleaner[S4].txt - [4312 octets] - [05/03/2014 23:20:55]

########## EOF - C:\AdwCleaner\AdwCleaner[R7].txt - [1654 octets] ##########
         
Code:
ATTFilter
# AdwCleaner v3.020 - Bericht erstellt am 09/03/2014 um 08:58:21
# Aktualisiert 27/02/2014 von Xplode
# Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits)
# Benutzername : chef - WOPR
# Gestartet von : C:\Users\chef\Downloads\adwcleaner.exe
# Option : Suchen

***** [ Dienste ] *****


***** [ Dateien / Ordner ] *****


***** [ Verknüpfungen ] *****


***** [ Registrierungsdatenbank ] *****


***** [ Browser ] *****

-\\ Internet Explorer v9.0.8112.16526


-\\ Mozilla Firefox v27.0.1 (de)

[ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ]


[ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ]


[ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ]


*************************

AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35]
AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39]
AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21]
AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30]
AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35]
AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33]
AdwCleaner[R6].txt - [1674 octets] - [08/03/2014 20:12:00]
AdwCleaner[R7].txt - [1293 octets] - [09/03/2014 08:58:21]
AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14]
AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33]
AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06]
AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54]
AdwCleaner[S4].txt - [4312 octets] - [05/03/2014 23:20:55]

########## EOF - C:\AdwCleaner\AdwCleaner[R7].txt - [1654 octets] ##########
         

FRST Logfile:

FRST Logfile:
Code:
ATTFilter
Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 07-03-2014
Ran by chef (administrator) on WOPR on 09-03-2014 09:15:58
Running from C:\Users\chef\Downloads
Microsoft® Windows Vista™ Home Basic  Service Pack 2 (X86) OS Language: German Standard
Internet Explorer Version 9
Boot Mode: Normal


==================== Processes (Whitelisted) =================

(Microsoft Corporation) c:\Program Files\Microsoft Security Client\MsMpEng.exe
(AMD) C:\Windows\system32\atiesrxx.exe
(Microsoft Corporation) C:\Windows\system32\SLsvc.exe
(AMD) C:\Windows\system32\atieclxx.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\sched.exe
(Advanced Micro Devices, Inc.) C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avguard.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
(Nitro PDF Software) C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe
(Realtek) C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
(Microsoft Corporation) C:\Program Files\Windows Defender\MSASCui.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdate.exe
(Realtek Semiconductor Corp.) C:\Program Files\oem\11n USB Wireless LAN Utility\RtWlan.exe
(Microsoft Corporation) C:\Windows\system32\wuauclt.exe


==================== Registry (Whitelisted) ==================

HKLM\...\Run: [Windows Defender] - C:\Program Files\Windows Defender\MSASCui.exe [1008184 2008-01-18] (Microsoft Corporation)
HKLM\...\Run: [MSC] - c:\Program Files\Microsoft Security Client\msseces.exe [948440 2013-10-23] (Microsoft Corporation)
HKLM\...\Run: [avgnt] - C:\Program Files\Avira\AntiVir Desktop\avgnt.exe [689744 2014-02-20] (Avira Operations GmbH & Co. KG)
HKLM\...\Run: [SDTray] - C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe [3825176 2012-11-13] (Safer-Networking Ltd.)
Winlogon\Notify\SDWinLogon: SDWinLogon.dll [X]
HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [ccleaner] - C:\Program Files\CCleaner\CCleaner.exe [4324120 2013-11-22] (Piriform Ltd)
HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [Spybot-S&D Cleaning] - C:\Program Files\Spybot - Search & Destroy 2\SDCleaner.exe [3713032 2012-11-13] (Safer-Networking Ltd.)

==================== Internet (Whitelisted) ====================

URLSearchHook: HKCU - (No Name) - {00000000-6E41-4FD3-8538-502F5495E5FC} -  No File
SearchScopes: HKLM - DefaultScope value is missing.
SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D267372633D49452D536561726368426F7826464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0
SearchScopes: HKCU - {2C93367C-BA9A-4CA2-B582-4B61404C765D} URL = hxxp://www.myvideo.de.anonymize-me.de/?to=6D79766964656F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {411EA882-929B-449F-9C65-7CEDED8DEDFE} URL = hxxp://de.wikipedia.org.anonymize-me.de/?to=64652E77696B6970656469612E6F7267&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D26464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0
SearchScopes: HKCU - {6BF147B5-7A30-4782-B5B9-8C0AA3632EC8} URL = hxxp://search.ebay.de.anonymize-me.de/?to=656261792E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {80E424A2-185B-4FAE-BA5E-37FBF8B2D48B} URL = hxxp://www.otto.de.anonymize-me.de/?to=6F74746F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {97132A2A-367E-4E5A-9D73-CB11EA3ECCD8} URL = hxxp://www.pricerunner.de.anonymize-me.de/?to=707269636572756E6E65722E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {CC2AE24D-3E94-4B16-8A85-7B52A831737B} URL = hxxp://www.amazon.de.anonymize-me.de/?to=616D617A6F6E2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy 2\SDHelper.dll (Safer-Networking Ltd.)
BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1

FireFox:
========
FF ProfilePath: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default
FF SearchEngineOrder.1: Ask.com
FF Homepage: hxxp://metager.de
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF32_12_0_0_70.dll ()
FF Plugin: @java.com/DTPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @microsoft.com/WPF,version=3.5 - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF Plugin: @nitropdf.com/NitroPDF - C:\Program Files\Nitro\Reader 3\npnitromozilla.dll (Nitro PDF)
FF Plugin: @videolan.org/vlc,version=2.0.3 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin: @videolan.org/vlc,version=2.1.1 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{4737AE6A-7279-4159-9A93-1D68EF07A0AB}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{5E0C8B97-41A7-45AC-99A0-63C13108F0C4}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{7DE05CB2-21C3-4827-A5AB-E6EA049CFEC5}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{9B94CAF1-8947-4C10-9426-D9779C1AD6D4}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{BF7F8644-95BE-42CD-98C8-46AF33DA8E0E}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{CFA5FBE2-63F6-4659-AE63-213807DE553A}.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF Extension: NetVideoHunter - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\netvideohunter@netvideohunter.com [2013-12-02]
FF Extension: YouTube Unblocker - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\youtubeunblocker@unblocker.yt [2014-01-24]
FF Extension: DownloadHelper - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d} [2013-08-27]
FF Extension: Ghostery - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\firefox@ghostery.com.xpi [2013-12-30]
FF Extension: TrackMeNot - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\trackmenot@mrl.nyu.edu.xpi [2012-03-30]
FF Extension: NoScript - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi [2012-03-30]
FF Extension: {a3c7fdeb-4acc-4154-b848-8b21ce7dfdee} - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{a3c7fdeb-4acc-4154-b848-8b21ce7dfdee}.xpi [2013-11-02]
FF Extension: Adblock Plus - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2012-04-19]
FF Extension: BetterPrivacy - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi [2012-04-02]
FF HKLM\...\Firefox\Extensions: [{20a82645-c095-46ed-80e3-08825760534b}] - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
FF Extension: Microsoft .NET Framework Assistant - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ []

========================== Services (Whitelisted) =================

R2 AMD FUEL Service; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [291840 2012-12-19] (Advanced Micro Devices, Inc.)
R2 AntiVirSchedulerService; C:\Program Files\Avira\AntiVir Desktop\sched.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG)
R2 AntiVirService; C:\Program Files\Avira\AntiVir Desktop\avguard.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG)
R2 MBAMScheduler; C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation)
R2 MBAMService; C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation)
R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [22208 2013-10-23] (Microsoft Corporation)
S3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [280288 2013-10-23] (Microsoft Corporation)
R2 NitroReaderDriverReadSpool3; C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe [196624 2013-03-26] (Nitro PDF Software)
R2 RealtekCU; C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe [36864 2010-04-16] (Realtek)
S3 SandraAgentSrv; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\RpcAgentSrv.exe [95896 2009-03-28] (SiSoftware)
R2 SDScannerService; C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe [1103392 2012-11-13] (Safer-Networking Ltd.)
R2 SDUpdateService; C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe [1369624 2012-11-13] (Safer-Networking Ltd.)
R2 SDWSCService; C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe [168384 2012-11-13] (Safer-Networking Ltd.)
S3 rpcapd; "%ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini" [X]

==================== Drivers (Whitelisted) ====================

R2 AODDriver4.2; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\i386\AODDriver2.sys [48256 2012-04-09] (Advanced Micro Devices)
S3 AtiHDAudioService; C:\Windows\System32\drivers\AtihdLH3.sys [83984 2012-02-23] (Advanced Micro Devices)
R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [90400 2013-12-17] (Avira Operations GmbH & Co. KG)
R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [135648 2013-12-17] (Avira Operations GmbH & Co. KG)
R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [37352 2013-11-25] (Avira Operations GmbH & Co. KG)
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [22856 2013-04-04] (Malwarebytes Corporation)
R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [214696 2013-09-27] (Microsoft Corporation)
R3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [5810 2004-08-13] ()
S3 NANMp50; C:\Windows\System32\Drivers\NANMp50.sys [36408 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA))
S3 NANSp50; C:\Windows\System32\Drivers\NANSp50.sys [35384 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA))
R2 NPF; C:\Windows\System32\drivers\npf.sys [35088 2010-06-25] (CACE Technologies, Inc.)
R3 RTL8192cu; C:\Windows\System32\DRIVERS\rtwlanu.sys [864360 2011-09-06] (Realtek Semiconductor Corporation                           )
S3 SANDRA; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\WNt500x86\Sandra.sys [23112 2009-08-07] (SiSoftware)
R1 ssmdrv; C:\Windows\System32\DRIVERS\ssmdrv.sys [28520 2013-05-03] (Avira GmbH)
S4 blbdrive; \SystemRoot\system32\drivers\blbdrive.sys [X]
S1 gfjnxobt; \??\C:\Windows\system32\drivers\gfjnxobt.sys [X]
S3 IpInIp; system32\DRIVERS\ipinip.sys [X]
S3 netr28u; system32\DRIVERS\netr28u.sys [X]
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [X]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [X]
S3 RTL8192su; system32\DRIVERS\RTL8192su.sys [X]

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-03-09 09:10 - 2014-03-09 09:14 - 00022835 _____ () C:\Windows\WindowsUpdate.log
2014-03-09 09:05 - 2014-03-09 09:05 - 00000631 _____ () C:\Users\chef\Desktop\JRT.txt
2014-03-09 08:59 - 2014-03-09 08:59 - 00001734 _____ () C:\Users\chef\Documents\AdwCleaner[R7].txt
2014-03-08 20:37 - 2014-03-09 09:05 - 00000631 _____ () C:\Users\chef\Documents\JRT.txt
2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT
2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt
2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt
2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt
2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe
2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe
2014-03-08 19:40 - 2014-03-08 19:41 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe
2014-03-07 12:59 - 2014-03-09 09:15 - 00014042 _____ () C:\Users\chef\Downloads\FRST.txt
2014-03-07 12:59 - 2014-03-07 13:00 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt
2014-03-07 12:58 - 2014-03-09 09:15 - 00000000 ____D () C:\FRST
2014-03-07 12:56 - 2014-03-07 12:57 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe
2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe
2014-03-05 22:54 - 2014-03-08 19:48 - 00000906 _____ () C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk
2014-03-05 22:53 - 2014-03-08 19:49 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware
2014-03-05 22:53 - 2013-04-04 14:50 - 00022856 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-05 22:50 - 2014-03-05 22:51 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe
2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe
2014-02-28 20:09 - 2013-12-05 03:12 - 01248768 _____ (Microsoft Corporation) C:\Windows\system32\msxml3.dll
2014-02-20 18:06 - 2014-02-20 18:07 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip
2014-02-16 21:44 - 2014-02-16 21:45 - 00000000 ____D () C:\Program Files\Mozilla Firefox
2014-02-16 14:40 - 2014-02-17 16:16 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi
2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk
2014-02-16 14:37 - 2014-02-16 14:40 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi
2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi
2014-02-16 14:35 - 2014-02-16 14:36 - 13251567 _____ () C:\Users\chef\Downloads\install.exe
2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt
2014-02-09 06:31 - 2014-02-20 17:43 - 00000000 ____D () C:\Program Files\isohero
2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun
2014-02-07 19:32 - 2013-12-18 21:10 - 00094632 _____ (Oracle Corporation) C:\Windows\system32\WindowsAccessBridge.dll
2014-02-07 19:32 - 2013-12-18 21:04 - 00264616 _____ (Oracle Corporation) C:\Windows\system32\javaws.exe
2014-02-07 19:32 - 2013-12-18 21:04 - 00175016 _____ (Oracle Corporation) C:\Windows\system32\javaw.exe
2014-02-07 19:32 - 2013-12-18 21:03 - 00174504 _____ (Oracle Corporation) C:\Windows\system32\java.exe
2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe
2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe
2014-02-07 18:30 - 2014-02-07 18:33 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR
2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe
2014-02-07 14:57 - 2014-02-07 14:58 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar

==================== One Month Modified Files and Folders =======

2014-03-09 09:16 - 2014-03-07 12:59 - 00014042 _____ () C:\Users\chef\Downloads\FRST.txt
2014-03-09 09:15 - 2014-03-09 09:10 - 00022835 _____ () C:\Windows\WindowsUpdate.log
2014-03-09 09:15 - 2014-03-07 12:58 - 00000000 ____D () C:\FRST
2014-03-09 09:10 - 2013-05-13 21:31 - 00000620 _____ () C:\Windows\Tasks\Check for updates (Spybot - Search & Destroy).job
2014-03-09 09:09 - 2006-11-02 13:58 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-03-09 09:09 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2014-03-09 09:09 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2014-03-09 09:08 - 2006-11-02 13:58 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-03-09 09:05 - 2014-03-09 09:05 - 00000631 _____ () C:\Users\chef\Desktop\JRT.txt
2014-03-09 09:05 - 2014-03-08 20:37 - 00000631 _____ () C:\Users\chef\Documents\JRT.txt
2014-03-09 08:59 - 2014-03-09 08:59 - 00001734 _____ () C:\Users\chef\Documents\AdwCleaner[R7].txt
2014-03-09 08:58 - 2013-09-08 22:24 - 00000000 ____D () C:\AdwCleaner
2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT
2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt
2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt
2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt
2014-03-08 19:49 - 2014-03-05 22:53 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware
2014-03-08 19:48 - 2014-03-05 22:54 - 00000906 _____ () C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk
2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe
2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe
2014-03-08 19:41 - 2014-03-08 19:40 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe
2014-03-07 13:00 - 2014-03-07 12:59 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt
2014-03-07 12:57 - 2014-03-07 12:56 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe
2014-03-06 22:38 - 2012-04-21 21:40 - 00002509 _____ () C:\Users\chef\Desktop\inSSIDer.lnk
2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe
2014-03-05 22:51 - 2014-03-05 22:50 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe
2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe
2014-03-05 22:35 - 2013-12-11 17:36 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-03-01 19:05 - 2006-11-02 12:18 - 00000000 ____D () C:\Windows\Microsoft.NET
2014-02-28 20:23 - 2006-11-02 11:33 - 01582262 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-02-28 20:21 - 2013-10-18 12:02 - 00000000 ____D () C:\Windows\system32\MRT
2014-02-21 16:37 - 2012-03-31 16:39 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2014-02-21 16:37 - 2012-03-31 16:39 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2014-02-20 18:07 - 2014-02-20 18:06 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip
2014-02-20 17:43 - 2014-02-09 06:31 - 00000000 ____D () C:\Program Files\isohero
2014-02-17 16:16 - 2014-02-16 14:40 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi
2014-02-16 22:37 - 2012-04-26 07:31 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service
2014-02-16 21:45 - 2014-02-16 21:44 - 00000000 ____D () C:\Program Files\Mozilla Firefox
2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk
2014-02-16 14:40 - 2014-02-16 14:37 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi
2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi
2014-02-16 14:36 - 2014-02-16 14:35 - 13251567 _____ () C:\Users\chef\Downloads\install.exe
2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt
2014-02-07 22:35 - 2012-04-16 11:19 - 00000000 ____D () C:\Users\alle anderen\AppData\Local\VirtualStore
2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun
2014-02-07 19:32 - 2013-12-09 16:45 - 00000000 ____D () C:\ProgramData\Oracle
2014-02-07 19:32 - 2013-07-04 15:10 - 00000000 ____D () C:\Program Files\Java
2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe
2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe
2014-02-07 19:25 - 2013-12-22 19:49 - 00000000 ____D () C:\Users\chef\AppData\Roaming\UFOAI
2014-02-07 18:33 - 2014-02-07 18:30 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip
2014-02-07 15:02 - 2014-02-06 23:10 - 00000000 ____D () C:\DOS
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR
2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe
2014-02-07 14:58 - 2014-02-07 14:57 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar

Some content of TEMP:
====================
C:\Users\alle anderen\AppData\Local\Temp\avgnt.exe
C:\Users\chef\AppData\Local\Temp\avgnt.exe
C:\Users\Sven\AppData\Local\Temp\avgnt.exe


==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\system32\winlogon.exe => MD5 is legit
C:\Windows\system32\wininit.exe => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\services.exe => MD5 is legit
C:\Windows\system32\User32.dll => MD5 is legit
C:\Windows\system32\userinit.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit
C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit


LastRegBack: 2014-03-09 09:16

==================== End Of Log ============================
         
--- --- ---

--- --- ---



mit dem klevante schein ich mir ja ein relativ junges ding eingehandelt zu haben, allzuviel gibt es im web noch nicht darüber. so richtig kann ich auch noch keine verbindung zum VIS 1.01-plugin herstellen. den rest der viechter scheine ich mir bei meinen ersten gehversuchen eingehandelt zu haben, das wlan meiner nachbarn "etwas unter die lupe zu nehmen". muss den ganzen sinnlosmist mal wieder deinstallieren, hab mit 5 kindern und rollende schicht kaum wirkliche zeit, meinen rechner halbwegs sauber zu halten. inwiefern meine frau vielleicht sich infiziert hat, kann ich nicht beurteilen, aber sie hat unter vista zumindest keine administrator-rechte ... keine ahnung, ob das wirklicher schutz ist. dank dir erstmal, vielleicht sollte ich öfters mal die logfiles meiner schutztruppen durchforsten. ms-security-essentials hat am 05.03.14 ja einen ziemlichen brocken "aussortiert", ohne dass ich davon eine meldung bekam. war wirklich nur der firefox, welcher dieses VIS dingsda-plugin aus sicherheitsgrüden deaktivierte ....

spende an euch kommt, wenn meine frau mal nicht gar so sehr auf die finanzen achtet, versprochen !


 

Themen zu firefox-addon VIS 1.01 - trojaner eingefangen ?
ccc, firefox, google, malwarebytes, malwarebytes antimalware, mobogenie, mobogenie entfernen, offen, programme, pup.optional.conduit.a, pup.optional.pcspeedup.a, pup.optional.pricegong.a, pup.passwordtool, pup.wirelessnetworktool, spanisch, video




Ähnliche Themen: firefox-addon VIS 1.01 - trojaner eingefangen ?


  1. Ads by VLC Addon entfernen
    Anleitungen, FAQs & Links - 09.08.2015 (2)
  2. Ich habe mir ein Addon (7769domain) eingefangen
    Plagegeister aller Art und deren Bekämpfung - 18.06.2015 (21)
  3. OkayFreedom VPN - Firefox Addon = Keylogger?
    Diskussionsforum - 24.11.2014 (1)
  4. Addon Control entfernen
    Anleitungen, FAQs & Links - 28.09.2014 (2)
  5. Firefox Addon: AVIRA SafeSearch sinnvoll?
    Antiviren-, Firewall- und andere Schutzprogramme - 16.08.2014 (14)
  6. Download Protect 2.2.4 Addon kann nicht aus dem Firefox entfernt werden
    Plagegeister aller Art und deren Bekämpfung - 18.07.2014 (6)
  7. Win7: Firefox Addon HDStreamer vollständig löschen
    Log-Analyse und Auswertung - 08.05.2014 (7)
  8. Bundestrojaner Firefox Browser - Ist der Trojaner noch da ?/ Hab ich Ihnmir überhaupt eingefangen ?
    Plagegeister aller Art und deren Bekämpfung - 24.12.2013 (2)
  9. Habe ich mir einen Bundespolizei-Trojaner eingefangen? Windows 7, Firefox
    Plagegeister aller Art und deren Bekämpfung - 26.11.2013 (9)
  10. Loadtbs-2.1 in Systemsteuerung und als IE9 Addon
    Plagegeister aller Art und deren Bekämpfung - 09.10.2012 (21)
  11. Trojaner eingefangen, Firefox öffnet sich nur mit searchqu
    Plagegeister aller Art und deren Bekämpfung - 03.08.2011 (22)
  12. Thunderbird - Bounce Addon?
    Alles rund um Windows - 18.12.2009 (8)
  13. Videos downloaden per Firefox-addon
    Diskussionsforum - 30.11.2009 (0)
  14. Mehrfache Trojaner eingefangen, über Firefox.
    Plagegeister aller Art und deren Bekämpfung - 05.11.2009 (13)
  15. Video Addon und IE Probleme
    Plagegeister aller Art und deren Bekämpfung - 19.11.2007 (5)
  16. Video addon
    Plagegeister aller Art und deren Bekämpfung - 16.10.2007 (2)
  17. Trojaner durch Nicci.scr eingefangen der sich firefox.exe nennt?
    Plagegeister aller Art und deren Bekämpfung - 17.04.2007 (1)

Zum Thema firefox-addon VIS 1.01 - trojaner eingefangen ? - hi schrauber ! erstmal grosses dankeschön für deine hilfe. hab die anweisung abgearbeitet. alle 3 tools haben nix gefunden. ausser dem aktuellen FRST-log spare ich also den platz, da ich - firefox-addon VIS 1.01 - trojaner eingefangen ?...
Archiv
Du betrachtest: firefox-addon VIS 1.01 - trojaner eingefangen ? auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.