![]() |
|
Plagegeister aller Art und deren Bekämpfung: Viele Funde mit MBAMWindows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
![]() | #1 |
![]() ![]() | ![]() Viele Funde mit MBAM Hallo, ich hatte mir vor Kurzem den Audiograbber heruntergeladen und im Anschluss auch das mp3plugin von deren Homepage. Bei der Installation wurde wohl jede Menge Müll mitinstalliert. Einiges habe ich mittlerweile wieder deinstalliert, wollte aber heute doch mal MBAM über mein System laufen lassen, da in Firefox einige Einstellungen geändert wurden (Startseite, Aussehen der Seite bei Start eines neuen Tabs). Dabei hat MBAM recht viel gefunden. Ich hänge das LOG mal an. Bis auf die Probleme im Browser konnte ich bislang keine Beinträchtigungen im System feststellen, die die letzten Tage aufgetreten wäre. Es dauert lediglich lange, bis nach einem Neustart oder nach dem Ruhemodus etwas mit dem Rechner angefangen werden kann. Windows ist zwar hochgefahren, Anwendungen können aber erst nach einer gewissen Zeit gestartet werden. Danke schon einmal für das Überprüfen der Logfiles. Muss diese leider aufgrund der Größe in mehreren Schritten posten. GMER Code:
ATTFilter GMER 2.1.19357 - hxxp://www.gmer.net Rootkit scan 2015-11-07 18:48:08 Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 SAMSUNG_ rev.2AK1 596,17GB Running: Gmer-19357.exe; Driver: C:\Users\Holgi\AppData\Local\Temp\pgloipod.sys ---- User code sections - GMER 2.1 ---- .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 76f1b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 76f1b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 76f98fd1 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 76ef489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 76f988c4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 76f98aa0 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 76f987ba C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 76f98b8a C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 76f0fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 76f168ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 76f99089 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 76f98bea C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 76f9877e C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 76f0fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 76f1b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 76f98f4c C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Dell DataSafe Local Backup\sftservice.EXE[2752] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 76f98713 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 76f1b21b C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 76f1b346 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 76f98fd1 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 76ef489d C:\Windows\syswow64\KERNEL32.dll .text ... * 9 .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 76f988c4 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 76f98aa0 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 76f987ba C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 76f98b8a C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 76f0fca8 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 76f168ef C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 76f99089 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 76f98bea C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 76f9877e C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 76f0fd41 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 76f1b2dc C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 76f98f4c C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Samsung\Kies\Kies.exe[4760] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 76f98713 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 76f1b21b C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 76f1b346 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 76f98fd1 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 76ef489d C:\Windows\syswow64\KERNEL32.dll .text ... * 9 .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 76f988c4 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 76f98aa0 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 76f987ba C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 76f98b8a C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 76f0fca8 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 76f168ef C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 76f99089 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 76f98bea C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 76f9877e C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 76f0fd41 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 76f1b2dc C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 76f98f4c C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell DataSafe Online\DataSafeOnline.exe[3052] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 76f98713 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files\AVAST Software\Avast\avastui.exe[5824] C:\Windows\syswow64\kernel32.dll!SetUnhandledExceptionFilter 0000000076ef8781 8 bytes [31, C0, C2, 04, 00, 90, 90, ...] .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 76f1b21b C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 76f1b346 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 76f98fd1 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 76ef489d C:\Windows\syswow64\KERNEL32.dll .text ... * 9 .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 76f988c4 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 76f98aa0 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 76f987ba C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 76f98b8a C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 76f0fca8 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 76f168ef C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 76f99089 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 76f98bea C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 76f9877e C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 76f0fd41 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 76f1b2dc C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 76f98f4c C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpService.exe[5800] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 76f98713 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 76f1b21b C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 76f1b346 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 76f98fd1 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 76ef489d C:\Windows\syswow64\KERNEL32.dll .text ... * 9 .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 76f988c4 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 76f98aa0 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 76f987ba C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 76f98b8a C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 76f0fca8 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 76f168ef C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 76f99089 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 76f98bea C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 76f9877e C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 76f0fd41 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 76f1b2dc C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 76f98f4c C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Dell Update\DellUpTray.exe[1652] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 76f98713 C:\Windows\syswow64\KERNEL32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000076ae1401 2 bytes JMP 76f1b21b C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000076ae1419 2 bytes JMP 76f1b346 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000076ae1431 2 bytes JMP 76f98fd1 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 0000000076ae144a 2 bytes CALL 76ef489d C:\Windows\syswow64\kernel32.dll .text ... * 9 .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 0000000076ae14dd 2 bytes JMP 76f988c4 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 0000000076ae14f5 2 bytes JMP 76f98aa0 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 0000000076ae150d 2 bytes JMP 76f987ba C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000076ae1525 2 bytes JMP 76f98b8a C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 0000000076ae153d 2 bytes JMP 76f0fca8 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000076ae1555 2 bytes JMP 76f168ef C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 0000000076ae156d 2 bytes JMP 76f99089 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000076ae1585 2 bytes JMP 76f98bea C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 0000000076ae159d 2 bytes JMP 76f9877e C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 0000000076ae15b5 2 bytes JMP 76f0fd41 C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 0000000076ae15cd 2 bytes JMP 76f1b2dc C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 0000000076ae16b2 2 bytes JMP 76f98f4c C:\Windows\syswow64\kernel32.dll .text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[6308] C:\Windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 0000000076ae16bd 2 bytes JMP 76f98713 C:\Windows\syswow64\kernel32.dll ---- Processes - GMER 2.1 ---- Process C:\ProgramData\DatacardService\DCService.exe (*** suspicious ***) @ C:\ProgramData\DatacardService\DCService.exe [2060](2010-08-19 08:52:04) 0000000000400000 Process C:\ProgramData\DatacardService\DCSHelper.exe (*** suspicious ***) @ C:\ProgramData\DatacardService\DCSHelper.exe [4412] (DataCardMonitor MFC Application/Huawei Technologies Co., Ltd.)(2010-08-19 08:52:14) 0000000000400000 ---- Registry - GMER 2.1 ---- Reg HKLM\SYSTEM\CurrentControlSet\services\ngvss\Parameters@asserts ????????????????????s9????X??????????t??swenum???????????????7?.1????????1???????????d??Compbatt????\??\C:\ProgramData\Malwarebytes\ Malwarebytes Anti-Malware \cleanup.old??\??\C:\ProgramData\Malwarebytes\ Malwarebytes Anti-Malware ??\??\C:\ProgramData\Malwarebytes\ Malwarebytes Anti-Malware \mbamdor.old????????????????????r?????>?>?>?>?>?>?>?>?????????8?8?8?9?9?9?8?9?9?9?9?9?9?9?9?C?_??????? ???????????????????_?*????????????&???????????????????????? ?????????????????????*????????????&???????????????????????@battery.inf,%acpi\acpi0003.devicedesc%;Microsoft-Netzteil??????@oem65.inf,%synmfg%;Synaptics????7??????????????????????????????? ?????????????????????*????????????&????????????????????d??@oem65.inf,%ps2.syndevicedesc%;Synaptics PS/2 Port TouchPad??????9?:?D?D?A?M?M?A?A?B?M?W?????7??????????????????????????????????? ?????????????????????*????????????&????????????????????????v?v?????????????Y?????????????????????????s?????????C???-???????.?????????????????s{5??????{4d36e97d-e325-11ce-bfc1-08002be10318}\0063???? Reg HKLM\SYSTEM\ControlSet002\services\ngvss\Parameters@asserts ????20????????????????????`????????????e????????????????????@%systemroot%\system32\rascfg.dll,-32002??????????????????????????`????????????n????????????????t???????????????????PNP Filter??????@%SystemRoot%\system32\drivers\nsiproxy.sys,-2??????????????????????????????????t?????????????????????????????????:???????????h?????System32\DRIVERS\netbt.sys????????f????????????e??????????????????:???????????h?????NetBIOSGroup??????$????????????n?????????????????????e??Tdx?tcpip????????????????????????s???a??????????????t????????????_?g5f???9????????????????????????????R????????????n?????? ??X??????p?????\????????????n????system32\DRIVERS\qicflt.sys???????????????????????\??????2?????e-9??PNP Filter??????????????????t????????????????????????:????????6????????????e????@%SystemRoot%\System32\drivers\pacer.sys,-101???????????????t??????????????????????????????????????????????????????????????g?????????????9?g90??????????????p????????????????????e???????????????i??ft??????????????????????ft????????????????????R???????????? ---- EOF - GMER 2.1 ---- Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Suchlaufdatum: 07.11.2015 Suchlaufzeit: 17:48 Protokolldatei: mbam.txt Administrator: Ja Version: 2.2.0.1024 Malware-Datenbank: v2015.11.07.03 Rootkit-Datenbank: v2015.11.04.02 Lizenz: Kostenlose Version Malware-Schutz: Deaktiviert Schutz vor bösartigen Websites: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 7 Service Pack 1 CPU: x64 Dateisystem: NTFS Benutzer: Holgi Suchlauftyp: Bedrohungssuchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 366665 Abgelaufene Zeit: 29 Min., 56 Sek. Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Aktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 0 (keine bösartigen Elemente erkannt) Module: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 14 PUP.Optional.WinManger, HKLM\SOFTWARE\CLASSES\APPID\{85198F55-85AC-498A-BFE4-BBC33840F4AB}, In Quarantäne, [f43bd4a75e2d3ff7336d979bbf43bb45], PUP.Optional.WinManger, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{85198F55-85AC-498A-BFE4-BBC33840F4AB}, In Quarantäne, [f43bd4a75e2d3ff7336d979bbf43bb45], PUP.Optional.WinManger, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{85198F55-85AC-498A-BFE4-BBC33840F4AB}, In Quarantäne, [f43bd4a75e2d3ff7336d979bbf43bb45], PUP.Optional.Elex, HKLM\SOFTWARE\CLASSES\TYPELIB\{8DD92279-9B04-4C6F-A862-EF3C24603804}, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{8DD92279-9B04-4C6F-A862-EF3C24603804}, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{8DD92279-9B04-4C6F-A862-EF3C24603804}, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ihpmServer, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}, In Quarantäne, [8fa0c7b40883d462a2bc81cb946f33cd], PUP.Optional.Elex, HKLM\SOFTWARE\WOW6432NODE\ihpmserver, In Quarantäne, [7ab5d1aa276459dd1151732e6f94d42c], PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\mystartsearchSoftware, In Quarantäne, [f83738430289ea4c8b3882069d6523dd], PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}, In Quarantäne, [f936d1aa7e0dd95d6bf350fc4eb5a25e], PUP.Optional.Elex, HKLM\SOFTWARE\WOW6432NODE\RAYDLD, In Quarantäne, [53dcec8f92f946f04515790609f96a96], PUP.Optional.MyStartSearch.ShrtCln, HKU\S-1-5-21-3276667617-2959320208-3705288580-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}, In Quarantäne, [e847ea91ff8cae88b3aaf656d3308e72], PUP.Optional.DeskCut, HKU\S-1-5-21-3276667617-2959320208-3705288580-1000\SOFTWARE\MOZILLA\EXTENDS, In Quarantäne, [2906c7b4becdf2442cf7b2b428db2dd3], Registrierungswerte: 9 PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|DisplayName, mystartsearch, In Quarantäne, [8fa0c7b40883d462a2bc81cb946f33cd] PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|URL, hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}, In Quarantäne, [4be4d6a53457ae8860fb6e138280a65a] PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|DisplayName, mystartsearch, In Quarantäne, [f936d1aa7e0dd95d6bf350fc4eb5a25e] PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|URL, hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}, In Quarantäne, [50dfd5a62764b0864f0c4b36976b0af6] PUP.Optional.DeskCut, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|deskCutv2@gmail.com, C:\Users\Holgi\AppData\Roaming\Mozilla\Firefox\Profiles\6skugad3.default-1437192079831\extensions\deskCutv2@gmail.com, In Quarantäne, [d05ff388f09bd2641b09cc9a50b3da26] PUP.Optional.Elex, HKLM\SOFTWARE\WOW6432NODE\RAYDLD|dir, C:\Program Files (x86)\RayDld, In Quarantäne, [53dcec8f92f946f04515790609f96a96] PUP.Optional.MyStartSearch.ShrtCln, HKU\S-1-5-21-3276667617-2959320208-3705288580-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|DisplayName, mystartsearch, In Quarantäne, [e847ea91ff8cae88b3aaf656d3308e72] PUP.Optional.MyStartSearch.ShrtCln, HKU\S-1-5-21-3276667617-2959320208-3705288580-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|URL, hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}, In Quarantäne, [3df2a2d9e9a25cda90ca641d689aca36] PUP.Optional.DeskCut, HKU\S-1-5-21-3276667617-2959320208-3705288580-1000\SOFTWARE\MOZILLA\EXTENDS|appid, deskCutv2@gmail.com, In Quarantäne, [2906c7b4becdf2442cf7b2b428db2dd3] Registrierungsdaten: 7 PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Default_Search_URL, hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}),Ersetzt,[d45b24573f4c76c01ca4241baf55ef11] PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Default_Page_URL, hxxp://www.mystartsearch.com/?type=hp&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118, Gut: (www.google.com), Schlecht: (hxxp://www.mystartsearch.com/?type=hp&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118),Ersetzt,[f03f611accbf85b1dfe1300fab5924dc] PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Search Page, hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}),Ersetzt,[959abbc0b3d8ae88e3dddd624aba2ed2] PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Start Page, hxxp://www.mystartsearch.com/?type=hp&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118, Gut: (www.google.com), Schlecht: (hxxp://www.mystartsearch.com/?type=hp&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118),Ersetzt,[49e6e5968803d165764aba85e3219967] PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCH|CustomizeSearch, hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}),Ersetzt,[9b94f883d7b43afcf5cd1b24e4208f71] PUP.Optional.MyStartSearch.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCH|SearchAssistant, hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://www.mystartsearch.com/web/?type=ds&ts=1446793264&z=65ba5896cdfdd8f206f479dg2zbzfqam8t7cfocqaz&from=cvs&uid=samsungxhm640jj_s2aqjdrzb55118b55118&q={searchTerms}),Ersetzt,[67c8bebddcaf72c4269c53ec7193867a] PUP.Optional.Qone8, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Gut: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Schlecht: ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Ersetzt,[ed4208738dfe092d9ce0df67758fe818] Ordner: 2 PUP.Optional.Elex, C:\Program Files (x86)\RayDld, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin, In Quarantäne, [1f1042396724d75ff8691091a3607a86], Dateien: 51 PUP.Optional.Freemium, C:\$RECYCLE.BIN\S-1-5-21-3276667617-2959320208-3705288580-1000\$RVJ3ICL\download-audiograbber-mp3plugin.exe, In Quarantäne, [d65993e891fab58117903d2d56aeb848], Heuristics.Shuriken, C:\Users\Holgi\AppData\Local\Temp\_@7403.tmp, In Quarantäne, [ffffffffffffffffffffffffffffffff], PUP.Optional.MyStartSearch.ShrtCln, C:\Users\Holgi\AppData\Roaming\Mozilla\Firefox\Profiles\6skugad3.default-1437192079831\searchplugins\mystartsearch.xml, In Quarantäne, [a58a502bd9b2dd59cbf77513966cae52], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\uninstall.exe, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\ihpmServer.exe, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\ihpmServer.ini, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\Raydld.exe, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\MessageBox.xml, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\About.xml, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\about_banner.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\animate_history.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\animate_portal.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\animate_recent.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\big_button_down.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\bk_shadow.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\bottom_toolbar_bk.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\brower_back.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\brower_refresh.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\btn.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\btn_browser_dir.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\min.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\open_position.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\pause.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\progress_bk.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\progress_fore.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\scrollbar.bmp, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\Start.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\sysmenu.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\TaskListItem.xml, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\TaskListItemHistory.xml, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\TaskNew.xml, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\task_completed.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\task_failed.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\task_pause.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\toolbar_separator.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\WebPortal.xml, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\ck_box.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\ck_check.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\close.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\create.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\delete.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\drag_flag.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\exclamation.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\list_header_bk.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\logo_16.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\logo_small.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\main.xml, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\Menu.xml, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\MenuItem.xml, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\menu_bk.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], PUP.Optional.Elex, C:\Program Files (x86)\RayDld\skin\menu_bk_seperator.png, In Quarantäne, [1f1042396724d75ff8691091a3607a86], Physische Sektoren: 0 (keine bösartigen Elemente erkannt) (end) |
Themen zu Viele Funde mit MBAM |
anschluss, audiograbber, avast, bot, browser, einstellungen, explorer, firefox, harddisk, ics, install.exe, installation, internet, internet explorer, log, malwarebytes, mozilla, neue, neustart, port, registry, scan, service.exe, software, system, temp, windows |