elagtric | 09.03.2014 09:44 | Zitat:
Zitat von elagtric
(Beitrag 1265085)
hi schrauber ! erstmal grosses dankeschön für deine hilfe. hab die anweisung abgearbeitet. alle 3 tools haben nix gefunden. ausser dem aktuellen FRST-log spare ich also den platz, da ich durch das ganze wooling auf diverse logs etc. gestossen bin, die vom tag des "einfangens" stammen. wenn die frischen <sauberen> logs dennoch wichtig sein sollten, kann ich sie morgen nochmal neu anpinnen, muss leider gleich auf nachtschicht. vom prinzip her scheint mein rechner jetzt sauber zu sein, ich versteh nur nicht, wie ich mir scheinbar das zeux durch blosses anschauen eines videos einfangen konnte. ist alles noch unter quarantäne, falls das hier im board jemand näher interessiert.
hier erstmal einige logs vom 05.03.14 : Code:
# AdwCleaner v3.020 - Bericht erstellt am 05/03/2014 um 23:20:55
# Aktualisiert 27/02/2014 von Xplode
# Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits)
# Benutzername : chef - WOPR
# Gestartet von : C:\Users\chef\AppData\Local\Temp\OCS\Downloads\fc14996dfa99adfc7baae624196888c5\f8b34e3b5e6e337aa6491ee3f713f8f5\adwcleaner_3.0.2.0.exe
# Option : Löschen
***** [ Dienste ] *****
***** [ Dateien / Ordner ] *****
Ordner Gelöscht : C:\ProgramData\Conduit
Ordner Gelöscht : C:\Program Files\Conduit
Ordner Gelöscht : C:\Users\chef\AppData\Local\Conduit
Ordner Gelöscht : C:\Users\chef\AppData\Local\DownloadGuide
Ordner Gelöscht : C:\Users\chef\AppData\Local\Mobogenie
Ordner Gelöscht : C:\Users\chef\AppData\Local\NativeMessaging
Ordner Gelöscht : C:\Users\chef\AppData\Local\Temp\OCS
Ordner Gelöscht : C:\Users\chef\AppData\LocalLow\Conduit
Ordner Gelöscht : C:\Users\chef\AppData\LocalLow\PriceGong
Ordner Gelöscht : C:\Users\chef\Documents\Mobogenie
Datei Gelöscht : C:\END
***** [ Verknüpfungen ] *****
***** [ Registrierungsdatenbank ] *****
[#] Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{59CFDD71-A257-451D-9C3A-05C098F93D30}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\d
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\MobogenieAdd
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Toolbar.CT3317892
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Schlüssel Gelöscht : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Schlüssel Gelöscht : HKCU\Software\Conduit
Schlüssel Gelöscht : HKCU\Software\OCS
Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\Conduit
Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\ConduitSearchScopes
Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\SmartBar
Schlüssel Gelöscht : HKLM\Software\Conduit
Schlüssel Gelöscht : HKLM\Software\Speedchecker Limited
***** [ Browser ] *****
-\\ Internet Explorer v9.0.8112.16526
-\\ Mozilla Firefox v27.0.1 (de)
[ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ]
Zeile gelöscht : user_pref("CT3317892.FF19Solved", "true");
Zeile gelöscht : user_pref("CT3317892.UserID", "UN15427285281092272");
Zeile gelöscht : user_pref("CT3317892.fullUserID", "UN15427285281092272.IN.20131230162214");
Zeile gelöscht : user_pref("CT3317892.installDate", "30/12/2013 16:22:20");
Zeile gelöscht : user_pref("CT3317892.installSessionId", "{3F2FECE7-8944-4827-B5C9-1F921DFE9CA4}");
Zeile gelöscht : user_pref("CT3317892.installSp", "false");
Zeile gelöscht : user_pref("CT3317892.installerVersion", "1.8.1.4");
Zeile gelöscht : user_pref("CT3317892.searchRevert", "false");
Zeile gelöscht : user_pref("CT3317892.searchUninstallUserMode", "2");
Zeile gelöscht : user_pref("CT3317892.searchUserMode", "2");
Zeile gelöscht : user_pref("CT3317892.toolbarInstallDate", "30-12-2013 16:22:14");
Zeile gelöscht : user_pref("CT3317892.versionFromInstaller", "10.23.0.722");
Zeile gelöscht : user_pref("CT3317892.xpeMode", "0");
Zeile gelöscht : user_pref("smartbar.machineId", "GKNWL5QRYFD9ITJH/SFACTCRQC1+DJO6AX7VLVWCJBOGHCYMYV5QXKZM8RXUCYFSW6UP2X/W5/UYKMY+OUHYDQ");
[ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ]
[ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ]
*************************
AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35]
AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39]
AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21]
AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30]
AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35]
AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33]
AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14]
AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33]
AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06]
AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54]
AdwCleaner[S4].txt - [4172 octets] - [05/03/2014 23:20:55]
########## EOF - C:\AdwCleaner\AdwCleaner[S4].txt - [4232 octets] ########## von heute : Code:
# AdwCleaner v3.020 - Bericht erstellt am 08/03/2014 um 20:12:00
# Aktualisiert 27/02/2014 von Xplode
# Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits)
# Benutzername : chef - WOPR
# Gestartet von : C:\Users\chef\Downloads\adwcleaner.exe
# Option : Suchen
***** [ Dienste ] *****
***** [ Dateien / Ordner ] *****
***** [ Verknüpfungen ] *****
***** [ Registrierungsdatenbank ] *****
***** [ Browser ] *****
-\\ Internet Explorer v9.0.8112.16526
-\\ Mozilla Firefox v27.0.1 (de)
[ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ]
[ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ]
[ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ]
*************************
AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35]
AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39]
AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21]
AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30]
AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35]
AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33]
AdwCleaner[R6].txt - [1233 octets] - [08/03/2014 20:12:00]
AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14]
AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33]
AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06]
AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54]
AdwCleaner[S4].txt - [4312 octets] - [05/03/2014 23:20:55]
########## EOF - C:\AdwCleaner\AdwCleaner[R6].txt - [1594 octets] ########## Code:
Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org
Datenbank Version: v2014.03.05.11
Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
chef :: WOPR [Administrator]
05.03.2014 22:55:30
mbam-log-2014-03-05 (22-55-30).txt
Art des Suchlaufs: Quick-Scan
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 254173
Laufzeit: 9 Minute(n), 9 Sekunde(n)
Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)
Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)
Infizierte Registrierungsschlüssel: 3
HKCU\Software\AppDataLow\Software\PriceGong (PUP.Optional.PriceGong.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
HKCU\Software\Conduit\FF (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
HKLM\SOFTWARE\Speedchecker Limited\PC Speed Up (PUP.Optional.PCSpeedUp.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)
Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)
Infizierte Verzeichnisse: 1
C:\ProgramData\Conduit\IE (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
Infizierte Dateien: 5
C:\Users\chef\Downloads\bs_WireShark.exe (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
C:\Users\chef\Downloads\ca_setup.exe (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
C:\Users\chef\Downloads\ca_setup1.exe (PUP.PasswordTool) -> Erfolgreich gelöscht und in Quarantäne gestellt.
C:\Users\chef\Downloads\wirelessnetview_setup.exe (PUP.WirelessNetworkTool) -> Erfolgreich gelöscht und in Quarantäne gestellt.
C:\Users\chef\AppData\Local\DownloadGuide\Offers\mconduitinstaller.exe (PUP.Optional.Conduit.A) -> Erfolgreich gelöscht und in Quarantäne gestellt.
(Ende) auszüge aus dem log von MS security essentials :
[CODE]Trojan:Win32/Klevate
file:C\Users\chef\AppData\Local\DownloadGuide\Offers\dprotect_setup.exe
(05.03.14 von microsoft security es Code:
sentials in quarantäne gestellt) das log vom JRT : Code:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.2 (02.20.2014:1)
OS: Windows Vista (TM) Home Basic x86
Ran by chef on 08.03.2014 at 20:35:12,04
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-1461220110-1976370169-1414792120-1000\Software\sweetim
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{2419B2B9-996E-419A-B79B-6600D820B370}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{3081A9B6-8DEB-4423-96A2-2177723580C0}
~~~ Files
~~~ Folders
Successfully deleted: [Folder] "C:\ProgramData\big fish"
Successfully deleted: [Folder] "C:\Users\chef\appdata\local\big fish"
Successfully deleted: [Folder] "C:\Users\chef\appdata\local\cre"
Successfully deleted: [Folder] "C:\bigfishcache"
~~~ FireFox
Successfully deleted the following from C:\Users\chef\AppData\Roaming\mozilla\firefox\profiles\vf5q4mw4.default\prefs.js
user_pref("extensions.toolbar@ask.com.install-event-fired", true);
Emptied folder: C:\Users\chef\AppData\Roaming\mozilla\firefox\profiles\vf5q4mw4.default\minidumps [125 files]
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 08.03.2014 at 20:37:42,64
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ und noch FRST :
FRST Logfile:
FRST Logfile:
FRST Logfile: Code:
Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 07-03-2014
Ran by chef (administrator) on WOPR on 08-03-2014 20:42:46
Running from C:\Users\chef\Downloads
Microsoft® Windows Vista™ Home Basic Service Pack 2 (X86) OS Language: German Standard
Internet Explorer Version 9
Boot Mode: Normal
==================== Processes (Whitelisted) =================
(Microsoft Corporation) c:\Program Files\Microsoft Security Client\MsMpEng.exe
(AMD) C:\Windows\system32\atiesrxx.exe
(Microsoft Corporation) C:\Windows\system32\SLsvc.exe
(AMD) C:\Windows\system32\atieclxx.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\sched.exe
(Advanced Micro Devices, Inc.) C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avguard.exe
(Nitro PDF Software) C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe
(Realtek) C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe
(Realtek Semiconductor Corp.) C:\Program Files\oem\11n USB Wireless LAN Utility\RtWlan.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdate.exe
(Microsoft Corporation) C:\Windows\system32\wuauclt.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe
(Microsoft Corporation) C:\Windows\system32\conime.exe
(Microsoft Corporation) C:\Program Files\Windows Defender\MSASCui.exe
(Mozilla Corporation) C:\Program Files\Mozilla Firefox\firefox.exe
==================== Registry (Whitelisted) ==================
HKLM\...\Run: [Windows Defender] - C:\Program Files\Windows Defender\MSASCui.exe [1008184 2008-01-18] (Microsoft Corporation)
HKLM\...\Run: [MSC] - c:\Program Files\Microsoft Security Client\msseces.exe [948440 2013-10-23] (Microsoft Corporation)
HKLM\...\Run: [avgnt] - C:\Program Files\Avira\AntiVir Desktop\avgnt.exe [689744 2014-02-20] (Avira Operations GmbH & Co. KG)
HKLM\...\Run: [SDTray] - C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe [3825176 2012-11-13] (Safer-Networking Ltd.)
HKLM\...\RunOnce: [Malwarebytes Anti-Malware] - C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe /install /silent [532040 2013-04-04] (Malwarebytes Corporation)
Winlogon\Notify\SDWinLogon: SDWinLogon.dll [X]
HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [ccleaner] - C:\Program Files\CCleaner\CCleaner.exe [4324120 2013-11-22] (Piriform Ltd)
HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [Spybot-S&D Cleaning] - C:\Program Files\Spybot - Search & Destroy 2\SDCleaner.exe [3713032 2012-11-13] (Safer-Networking Ltd.)
==================== Internet (Whitelisted) ====================
URLSearchHook: HKCU - (No Name) - {00000000-6E41-4FD3-8538-502F5495E5FC} - No File
SearchScopes: HKLM - DefaultScope value is missing.
SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D267372633D49452D536561726368426F7826464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0
SearchScopes: HKCU - {2C93367C-BA9A-4CA2-B582-4B61404C765D} URL = hxxp://www.myvideo.de.anonymize-me.de/?to=6D79766964656F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {411EA882-929B-449F-9C65-7CEDED8DEDFE} URL = hxxp://de.wikipedia.org.anonymize-me.de/?to=64652E77696B6970656469612E6F7267&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D26464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0
SearchScopes: HKCU - {6BF147B5-7A30-4782-B5B9-8C0AA3632EC8} URL = hxxp://search.ebay.de.anonymize-me.de/?to=656261792E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {80E424A2-185B-4FAE-BA5E-37FBF8B2D48B} URL = hxxp://www.otto.de.anonymize-me.de/?to=6F74746F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {97132A2A-367E-4E5A-9D73-CB11EA3ECCD8} URL = hxxp://www.pricerunner.de.anonymize-me.de/?to=707269636572756E6E65722E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {CC2AE24D-3E94-4B16-8A85-7B52A831737B} URL = hxxp://www.amazon.de.anonymize-me.de/?to=616D617A6F6E2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy 2\SDHelper.dll (Safer-Networking Ltd.)
BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1
FireFox:
========
FF ProfilePath: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default
FF SearchEngineOrder.1: Ask.com
FF Homepage: hxxp://metager.de
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF32_12_0_0_70.dll ()
FF Plugin: @java.com/DTPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @microsoft.com/WPF,version=3.5 - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF Plugin: @nitropdf.com/NitroPDF - C:\Program Files\Nitro\Reader 3\npnitromozilla.dll (Nitro PDF)
FF Plugin: @videolan.org/vlc,version=2.0.3 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin: @videolan.org/vlc,version=2.1.1 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{4737AE6A-7279-4159-9A93-1D68EF07A0AB}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{5E0C8B97-41A7-45AC-99A0-63C13108F0C4}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{7DE05CB2-21C3-4827-A5AB-E6EA049CFEC5}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{9B94CAF1-8947-4C10-9426-D9779C1AD6D4}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{BF7F8644-95BE-42CD-98C8-46AF33DA8E0E}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{CFA5FBE2-63F6-4659-AE63-213807DE553A}.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF Extension: NetVideoHunter - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\netvideohunter@netvideohunter.com [2013-12-02]
FF Extension: YouTube Unblocker - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\youtubeunblocker@unblocker.yt [2014-01-24]
FF Extension: DownloadHelper - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d} [2013-08-27]
FF Extension: Ghostery - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\firefox@ghostery.com.xpi [2013-12-30]
FF Extension: TrackMeNot - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\trackmenot@mrl.nyu.edu.xpi [2012-03-30]
FF Extension: NoScript - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi [2012-03-30]
FF Extension: {a3c7fdeb-4acc-4154-b848-8b21ce7dfdee} - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{a3c7fdeb-4acc-4154-b848-8b21ce7dfdee}.xpi [2013-11-02]
FF Extension: Adblock Plus - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2012-04-19]
FF Extension: BetterPrivacy - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi [2012-04-02]
FF HKLM\...\Firefox\Extensions: [{20a82645-c095-46ed-80e3-08825760534b}] - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
FF Extension: Microsoft .NET Framework Assistant - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ []
========================== Services (Whitelisted) =================
R2 AMD FUEL Service; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [291840 2012-12-19] (Advanced Micro Devices, Inc.)
R2 AntiVirSchedulerService; C:\Program Files\Avira\AntiVir Desktop\sched.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG)
R2 AntiVirService; C:\Program Files\Avira\AntiVir Desktop\avguard.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG)
R2 MBAMScheduler; C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation)
R2 MBAMService; C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation)
R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [22208 2013-10-23] (Microsoft Corporation)
S3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [280288 2013-10-23] (Microsoft Corporation)
R2 NitroReaderDriverReadSpool3; C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe [196624 2013-03-26] (Nitro PDF Software)
R2 RealtekCU; C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe [36864 2010-04-16] (Realtek)
S3 SandraAgentSrv; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\RpcAgentSrv.exe [95896 2009-03-28] (SiSoftware)
R2 SDScannerService; C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe [1103392 2012-11-13] (Safer-Networking Ltd.)
R2 SDUpdateService; C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe [1369624 2012-11-13] (Safer-Networking Ltd.)
R2 SDWSCService; C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe [168384 2012-11-13] (Safer-Networking Ltd.)
S3 rpcapd; "%ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini" [X]
==================== Drivers (Whitelisted) ====================
R2 AODDriver4.2; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\i386\AODDriver2.sys [48256 2012-04-09] (Advanced Micro Devices)
S3 AtiHDAudioService; C:\Windows\System32\drivers\AtihdLH3.sys [83984 2012-02-23] (Advanced Micro Devices)
R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [90400 2013-12-17] (Avira Operations GmbH & Co. KG)
R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [135648 2013-12-17] (Avira Operations GmbH & Co. KG)
R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [37352 2013-11-25] (Avira Operations GmbH & Co. KG)
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [22856 2013-04-04] (Malwarebytes Corporation)
R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [214696 2013-09-27] (Microsoft Corporation)
R3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [5810 2004-08-13] ()
S3 NANMp50; C:\Windows\System32\Drivers\NANMp50.sys [36408 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA))
S3 NANSp50; C:\Windows\System32\Drivers\NANSp50.sys [35384 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA))
R2 NPF; C:\Windows\System32\drivers\npf.sys [35088 2010-06-25] (CACE Technologies, Inc.)
R3 RTL8192cu; C:\Windows\System32\DRIVERS\rtwlanu.sys [864360 2011-09-06] (Realtek Semiconductor Corporation )
S3 SANDRA; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\WNt500x86\Sandra.sys [23112 2009-08-07] (SiSoftware)
R1 ssmdrv; C:\Windows\System32\DRIVERS\ssmdrv.sys [28520 2013-05-03] (Avira GmbH)
S4 blbdrive; \SystemRoot\system32\drivers\blbdrive.sys [X]
S1 gfjnxobt; \??\C:\Windows\system32\drivers\gfjnxobt.sys [X]
S3 IpInIp; system32\DRIVERS\ipinip.sys [X]
S3 netr28u; system32\DRIVERS\netr28u.sys [X]
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [X]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [X]
S3 RTL8192su; system32\DRIVERS\RTL8192su.sys [X]
==================== NetSvcs (Whitelisted) ===================
==================== One Month Created Files and Folders ========
2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Documents\JRT.txt
2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Desktop\JRT.txt
2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT
2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt
2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt
2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt
2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe
2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe
2014-03-08 19:40 - 2014-03-08 19:41 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe
2014-03-08 19:29 - 2014-03-08 20:42 - 00043277 _____ () C:\Windows\WindowsUpdate.log
2014-03-07 12:59 - 2014-03-08 20:42 - 00014335 _____ () C:\Users\chef\Downloads\FRST.txt
2014-03-07 12:59 - 2014-03-07 13:00 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt
2014-03-07 12:58 - 2014-03-08 20:42 - 00000000 ____D () C:\FRST
2014-03-07 12:56 - 2014-03-07 12:57 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe
2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe
2014-03-05 22:54 - 2014-03-08 19:48 - 00000906 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-05 22:53 - 2014-03-08 19:49 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware
2014-03-05 22:53 - 2013-04-04 14:50 - 00022856 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-05 22:50 - 2014-03-05 22:51 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe
2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe
2014-02-28 20:09 - 2013-12-05 03:12 - 01248768 _____ (Microsoft Corporation) C:\Windows\system32\msxml3.dll
2014-02-20 18:06 - 2014-02-20 18:07 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip
2014-02-16 21:44 - 2014-02-16 21:45 - 00000000 ____D () C:\Program Files\Mozilla Firefox
2014-02-16 14:40 - 2014-02-17 16:16 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi
2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk
2014-02-16 14:37 - 2014-02-16 14:40 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi
2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi
2014-02-16 14:35 - 2014-02-16 14:36 - 13251567 _____ () C:\Users\chef\Downloads\install.exe
2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt
2014-02-09 06:31 - 2014-02-20 17:43 - 00000000 ____D () C:\Program Files\isohero
2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun
2014-02-07 19:32 - 2013-12-18 21:10 - 00094632 _____ (Oracle Corporation) C:\Windows\system32\WindowsAccessBridge.dll
2014-02-07 19:32 - 2013-12-18 21:04 - 00264616 _____ (Oracle Corporation) C:\Windows\system32\javaws.exe
2014-02-07 19:32 - 2013-12-18 21:04 - 00175016 _____ (Oracle Corporation) C:\Windows\system32\javaw.exe
2014-02-07 19:32 - 2013-12-18 21:03 - 00174504 _____ (Oracle Corporation) C:\Windows\system32\java.exe
2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe
2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe
2014-02-07 18:30 - 2014-02-07 18:33 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR
2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe
2014-02-07 14:57 - 2014-02-07 14:58 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar
2014-02-06 23:25 - 2014-02-06 23:26 - 00000000 ____D () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001
2014-02-06 23:23 - 2014-02-06 23:24 - 06860196 _____ () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001.zip
2014-02-06 23:10 - 2014-02-07 15:02 - 00000000 ____D () C:\DOS
2014-02-06 22:56 - 2014-02-06 22:56 - 00032934 _____ () C:\Users\chef\Downloads\DOSBox-german-lang-0.74.zip
2014-02-06 22:55 - 2014-02-06 23:08 - 00005330 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox.dosbox
2014-02-06 22:53 - 2014-02-06 22:53 - 00005316 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox
2014-02-06 22:50 - 2014-02-06 22:50 - 01846392 _____ () C:\Users\chef\Downloads\Roby03.zip
2014-02-06 22:50 - 2014-02-06 22:50 - 00000000 ____D () C:\Windows\Downloaded Installations
2014-02-06 22:41 - 2014-02-06 22:41 - 00001703 _____ () C:\Users\Public\Desktop\DOSBox 0.74.lnk
2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Users\chef\AppData\Local\DOSBox
2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Program Files\DOSBox
2014-02-06 22:40 - 2014-02-06 22:41 - 01448809 _____ (DOSBox Team) C:\Users\chef\Downloads\DOSBox0.74-win32-installer.exe
2014-02-06 22:34 - 2014-02-06 22:34 - 00000000 ____D () C:\Users\chef\Downloads\hquest2
2014-02-06 22:33 - 2014-02-06 22:34 - 01826500 _____ () C:\Users\chef\Downloads\hquest2.zip
2014-02-06 22:27 - 2014-02-06 22:27 - 00596689 _____ () C:\Users\chef\Downloads\Hero Quest.zip
==================== One Month Modified Files and Folders =======
2014-03-08 20:42 - 2014-03-08 19:29 - 00043277 _____ () C:\Windows\WindowsUpdate.log
2014-03-08 20:42 - 2014-03-07 12:59 - 00014335 _____ () C:\Users\chef\Downloads\FRST.txt
2014-03-08 20:42 - 2014-03-07 12:58 - 00000000 ____D () C:\FRST
2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Documents\JRT.txt
2014-03-08 20:37 - 2014-03-08 20:37 - 00001682 _____ () C:\Users\chef\Desktop\JRT.txt
2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT
2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt
2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt
2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt
2014-03-08 20:12 - 2013-09-08 22:24 - 00000000 ____D () C:\AdwCleaner
2014-03-08 19:49 - 2014-03-05 22:53 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware
2014-03-08 19:48 - 2014-03-05 22:54 - 00000906 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe
2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe
2014-03-08 19:41 - 2014-03-08 19:40 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe
2014-03-08 19:29 - 2013-05-13 21:31 - 00000620 _____ () C:\Windows\Tasks\Check for updates (Spybot - Search & Destroy).job
2014-03-08 19:25 - 2006-11-02 13:58 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-03-08 19:25 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2014-03-08 19:25 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2014-03-08 11:37 - 2006-11-02 13:58 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-03-07 13:00 - 2014-03-07 12:59 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt
2014-03-07 12:57 - 2014-03-07 12:56 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe
2014-03-06 22:38 - 2012-04-21 21:40 - 00002509 _____ () C:\Users\chef\Desktop\inSSIDer.lnk
2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe
2014-03-05 22:51 - 2014-03-05 22:50 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe
2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe
2014-03-05 22:35 - 2013-12-11 17:36 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-03-01 19:05 - 2006-11-02 12:18 - 00000000 ____D () C:\Windows\Microsoft.NET
2014-02-28 20:23 - 2006-11-02 11:33 - 01582262 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-02-28 20:21 - 2013-10-18 12:02 - 00000000 ____D () C:\Windows\system32\MRT
2014-02-21 16:37 - 2012-03-31 16:39 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2014-02-21 16:37 - 2012-03-31 16:39 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2014-02-20 18:07 - 2014-02-20 18:06 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip
2014-02-20 17:43 - 2014-02-09 06:31 - 00000000 ____D () C:\Program Files\isohero
2014-02-17 16:16 - 2014-02-16 14:40 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi
2014-02-16 22:37 - 2012-04-26 07:31 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service
2014-02-16 21:45 - 2014-02-16 21:44 - 00000000 ____D () C:\Program Files\Mozilla Firefox
2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk
2014-02-16 14:40 - 2014-02-16 14:37 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi
2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi
2014-02-16 14:36 - 2014-02-16 14:35 - 13251567 _____ () C:\Users\chef\Downloads\install.exe
2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt
2014-02-07 22:35 - 2012-04-16 11:19 - 00000000 ____D () C:\Users\alle anderen\AppData\Local\VirtualStore
2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun
2014-02-07 19:32 - 2013-12-09 16:45 - 00000000 ____D () C:\ProgramData\Oracle
2014-02-07 19:32 - 2013-07-04 15:10 - 00000000 ____D () C:\Program Files\Java
2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe
2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe
2014-02-07 19:25 - 2013-12-22 19:49 - 00000000 ____D () C:\Users\chef\AppData\Roaming\UFOAI
2014-02-07 18:33 - 2014-02-07 18:30 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip
2014-02-07 15:02 - 2014-02-06 23:10 - 00000000 ____D () C:\DOS
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR
2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe
2014-02-07 14:58 - 2014-02-07 14:57 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar
2014-02-06 23:26 - 2014-02-06 23:25 - 00000000 ____D () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001
2014-02-06 23:24 - 2014-02-06 23:23 - 06860196 _____ () C:\Users\chef\Downloads\dosbox-game-launcher-dbgl_23001.zip
2014-02-06 23:08 - 2014-02-06 22:55 - 00005330 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox.dosbox
2014-02-06 22:56 - 2014-02-06 22:56 - 00032934 _____ () C:\Users\chef\Downloads\DOSBox-german-lang-0.74.zip
2014-02-06 22:53 - 2014-02-06 22:53 - 00005316 _____ () C:\Users\chef\Documents\HEROGERMAN.dosbox
2014-02-06 22:50 - 2014-02-06 22:50 - 01846392 _____ () C:\Users\chef\Downloads\Roby03.zip
2014-02-06 22:50 - 2014-02-06 22:50 - 00000000 ____D () C:\Windows\Downloaded Installations
2014-02-06 22:41 - 2014-02-06 22:41 - 00001703 _____ () C:\Users\Public\Desktop\DOSBox 0.74.lnk
2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Users\chef\AppData\Local\DOSBox
2014-02-06 22:41 - 2014-02-06 22:41 - 00000000 ____D () C:\Program Files\DOSBox
2014-02-06 22:41 - 2014-02-06 22:40 - 01448809 _____ (DOSBox Team) C:\Users\chef\Downloads\DOSBox0.74-win32-installer.exe
2014-02-06 22:34 - 2014-02-06 22:34 - 00000000 ____D () C:\Users\chef\Downloads\hquest2
2014-02-06 22:34 - 2014-02-06 22:33 - 01826500 _____ () C:\Users\chef\Downloads\hquest2.zip
2014-02-06 22:27 - 2014-02-06 22:27 - 00596689 _____ () C:\Users\chef\Downloads\Hero Quest.zip
Some content of TEMP:
====================
C:\Users\alle anderen\AppData\Local\Temp\avgnt.exe
C:\Users\chef\AppData\Local\Temp\avgnt.exe
C:\Users\Sven\AppData\Local\Temp\avgnt.exe
==================== Bamital & volsnap Check =================
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\system32\winlogon.exe => MD5 is legit
C:\Windows\system32\wininit.exe => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\services.exe => MD5 is legit
C:\Windows\system32\User32.dll => MD5 is legit
C:\Windows\system32\userinit.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit
C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit
LastRegBack: 2014-03-08 19:34
==================== End Of Log ============================ --- --- ---
--- --- ---
--- --- ---
moin schrauber, hier nochmal alle logfiles ofenfrisch : Code:
Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org
Datenbank Version: v2014.03.08.07
Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
chef :: WOPR [Administrator]
09.03.2014 08:47:11
mbam-log-2014-03-09 (08-47-11).txt
Art des Suchlaufs: Quick-Scan
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 254750
Laufzeit: 8 Minute(n), 4 Sekunde(n)
Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)
Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)
Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)
Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)
Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)
Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)
Infizierte Dateien: 0
(Keine bösartigen Objekte gefunden)
(Ende) Code:
# AdwCleaner v3.020 - Bericht erstellt am 09/03/2014 um 08:58:21
# Aktualisiert 27/02/2014 von Xplode
# Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits)
# Benutzername : chef - WOPR
# Gestartet von : C:\Users\chef\Downloads\adwcleaner.exe
# Option : Suchen
***** [ Dienste ] *****
***** [ Dateien / Ordner ] *****
***** [ Verknüpfungen ] *****
***** [ Registrierungsdatenbank ] *****
***** [ Browser ] *****
-\\ Internet Explorer v9.0.8112.16526
-\\ Mozilla Firefox v27.0.1 (de)
[ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ]
[ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ]
[ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ]
*************************
AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35]
AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39]
AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21]
AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30]
AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35]
AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33]
AdwCleaner[R6].txt - [1674 octets] - [08/03/2014 20:12:00]
AdwCleaner[R7].txt - [1293 octets] - [09/03/2014 08:58:21]
AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14]
AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33]
AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06]
AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54]
AdwCleaner[S4].txt - [4312 octets] - [05/03/2014 23:20:55]
########## EOF - C:\AdwCleaner\AdwCleaner[R7].txt - [1654 octets] ########## Code:
# AdwCleaner v3.020 - Bericht erstellt am 09/03/2014 um 08:58:21
# Aktualisiert 27/02/2014 von Xplode
# Betriebssystem : Windows Vista (TM) Home Basic Service Pack 2 (32 bits)
# Benutzername : chef - WOPR
# Gestartet von : C:\Users\chef\Downloads\adwcleaner.exe
# Option : Suchen
***** [ Dienste ] *****
***** [ Dateien / Ordner ] *****
***** [ Verknüpfungen ] *****
***** [ Registrierungsdatenbank ] *****
***** [ Browser ] *****
-\\ Internet Explorer v9.0.8112.16526
-\\ Mozilla Firefox v27.0.1 (de)
[ Datei : C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\prefs.js ]
[ Datei : C:\Users\alle anderen\AppData\Roaming\Mozilla\Firefox\Profiles\9c6m2ycm.default\prefs.js ]
[ Datei : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\ugxwy39g.default\prefs.js ]
*************************
AdwCleaner[R0].txt - [10959 octets] - [08/09/2013 22:25:35]
AdwCleaner[R1].txt - [1252 octets] - [08/09/2013 22:33:39]
AdwCleaner[R2].txt - [2732 octets] - [10/11/2013 18:23:21]
AdwCleaner[R3].txt - [2761 octets] - [13/11/2013 20:14:30]
AdwCleaner[R4].txt - [1444 octets] - [28/11/2013 07:45:35]
AdwCleaner[R5].txt - [4227 octets] - [05/03/2014 23:18:33]
AdwCleaner[R6].txt - [1674 octets] - [08/03/2014 20:12:00]
AdwCleaner[R7].txt - [1293 octets] - [09/03/2014 08:58:21]
AdwCleaner[S0].txt - [10791 octets] - [08/09/2013 22:26:14]
AdwCleaner[S1].txt - [2665 octets] - [10/11/2013 18:24:33]
AdwCleaner[S2].txt - [2683 octets] - [13/11/2013 20:15:06]
AdwCleaner[S3].txt - [1505 octets] - [28/11/2013 07:46:54]
AdwCleaner[S4].txt - [4312 octets] - [05/03/2014 23:20:55]
########## EOF - C:\AdwCleaner\AdwCleaner[R7].txt - [1654 octets] ##########
FRST Logfile:
FRST Logfile:
FRST Logfile: Code:
Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 07-03-2014
Ran by chef (administrator) on WOPR on 09-03-2014 09:15:58
Running from C:\Users\chef\Downloads
Microsoft® Windows Vista™ Home Basic Service Pack 2 (X86) OS Language: German Standard
Internet Explorer Version 9
Boot Mode: Normal
==================== Processes (Whitelisted) =================
(Microsoft Corporation) c:\Program Files\Microsoft Security Client\MsMpEng.exe
(AMD) C:\Windows\system32\atiesrxx.exe
(Microsoft Corporation) C:\Windows\system32\SLsvc.exe
(AMD) C:\Windows\system32\atieclxx.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\sched.exe
(Advanced Micro Devices, Inc.) C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avguard.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
(Nitro PDF Software) C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe
(Realtek) C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe
(Malwarebytes Corporation) C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
(Microsoft Corporation) C:\Program Files\Windows Defender\MSASCui.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe
(Avira Operations GmbH & Co. KG) C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe
(Safer-Networking Ltd.) C:\Program Files\Spybot - Search & Destroy 2\SDUpdate.exe
(Realtek Semiconductor Corp.) C:\Program Files\oem\11n USB Wireless LAN Utility\RtWlan.exe
(Microsoft Corporation) C:\Windows\system32\wuauclt.exe
==================== Registry (Whitelisted) ==================
HKLM\...\Run: [Windows Defender] - C:\Program Files\Windows Defender\MSASCui.exe [1008184 2008-01-18] (Microsoft Corporation)
HKLM\...\Run: [MSC] - c:\Program Files\Microsoft Security Client\msseces.exe [948440 2013-10-23] (Microsoft Corporation)
HKLM\...\Run: [avgnt] - C:\Program Files\Avira\AntiVir Desktop\avgnt.exe [689744 2014-02-20] (Avira Operations GmbH & Co. KG)
HKLM\...\Run: [SDTray] - C:\Program Files\Spybot - Search & Destroy 2\SDTray.exe [3825176 2012-11-13] (Safer-Networking Ltd.)
Winlogon\Notify\SDWinLogon: SDWinLogon.dll [X]
HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [ccleaner] - C:\Program Files\CCleaner\CCleaner.exe [4324120 2013-11-22] (Piriform Ltd)
HKU\S-1-5-21-1461220110-1976370169-1414792120-1000\...\Run: [Spybot-S&D Cleaning] - C:\Program Files\Spybot - Search & Destroy 2\SDCleaner.exe [3713032 2012-11-13] (Safer-Networking Ltd.)
==================== Internet (Whitelisted) ====================
URLSearchHook: HKCU - (No Name) - {00000000-6E41-4FD3-8538-502F5495E5FC} - No File
SearchScopes: HKLM - DefaultScope value is missing.
SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D267372633D49452D536561726368426F7826464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0
SearchScopes: HKCU - {2C93367C-BA9A-4CA2-B582-4B61404C765D} URL = hxxp://www.myvideo.de.anonymize-me.de/?to=6D79766964656F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {411EA882-929B-449F-9C65-7CEDED8DEDFE} URL = hxxp://de.wikipedia.org.anonymize-me.de/?to=64652E77696B6970656469612E6F7267&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {6A1806CD-94D4-4689-BA73-E35EA1EA9990} URL = hxxp://www.bing.com.anonymize-me.de/?anonymto=687474703A2F2F7777772E62696E672E636F6D2F7365617263683F713D7B7365617263685465726D737D26464F524D3D494538535243&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&k=0
SearchScopes: HKCU - {6BF147B5-7A30-4782-B5B9-8C0AA3632EC8} URL = hxxp://search.ebay.de.anonymize-me.de/?to=656261792E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {80E424A2-185B-4FAE-BA5E-37FBF8B2D48B} URL = hxxp://www.otto.de.anonymize-me.de/?to=6F74746F2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {97132A2A-367E-4E5A-9D73-CB11EA3ECCD8} URL = hxxp://www.pricerunner.de.anonymize-me.de/?to=707269636572756E6E65722E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
SearchScopes: HKCU - {CC2AE24D-3E94-4B16-8A85-7B52A831737B} URL = hxxp://www.amazon.de.anonymize-me.de/?to=616D617A6F6E2E6465&st={searchTerms}&clid=0f8a6cfe-902a-4c11-8265-9538cb8a19a4&pid=proxtubede&mode=bounce&k=0
BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy 2\SDHelper.dll (Safer-Networking Ltd.)
BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1
FireFox:
========
FF ProfilePath: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default
FF SearchEngineOrder.1: Ask.com
FF Homepage: hxxp://metager.de
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF32_12_0_0_70.dll ()
FF Plugin: @java.com/DTPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.51.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @microsoft.com/WPF,version=3.5 - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF Plugin: @nitropdf.com/NitroPDF - C:\Program Files\Nitro\Reader 3\npnitromozilla.dll (Nitro PDF)
FF Plugin: @videolan.org/vlc,version=2.0.3 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin: @videolan.org/vlc,version=2.1.1 - C:\Program Files\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{4737AE6A-7279-4159-9A93-1D68EF07A0AB}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{5E0C8B97-41A7-45AC-99A0-63C13108F0C4}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{7DE05CB2-21C3-4827-A5AB-E6EA049CFEC5}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{9B94CAF1-8947-4C10-9426-D9779C1AD6D4}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{BF7F8644-95BE-42CD-98C8-46AF33DA8E0E}.xml
FF SearchPlugin: C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\searchplugins\{CFA5FBE2-63F6-4659-AE63-213807DE553A}.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF Extension: NetVideoHunter - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\netvideohunter@netvideohunter.com [2013-12-02]
FF Extension: YouTube Unblocker - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\youtubeunblocker@unblocker.yt [2014-01-24]
FF Extension: DownloadHelper - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d} [2013-08-27]
FF Extension: Ghostery - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\firefox@ghostery.com.xpi [2013-12-30]
FF Extension: TrackMeNot - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\trackmenot@mrl.nyu.edu.xpi [2012-03-30]
FF Extension: NoScript - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi [2012-03-30]
FF Extension: {a3c7fdeb-4acc-4154-b848-8b21ce7dfdee} - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{a3c7fdeb-4acc-4154-b848-8b21ce7dfdee}.xpi [2013-11-02]
FF Extension: Adblock Plus - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2012-04-19]
FF Extension: BetterPrivacy - C:\Users\chef\AppData\Roaming\Mozilla\Firefox\Profiles\vf5q4mw4.default\Extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi [2012-04-02]
FF HKLM\...\Firefox\Extensions: [{20a82645-c095-46ed-80e3-08825760534b}] - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
FF Extension: Microsoft .NET Framework Assistant - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ []
========================== Services (Whitelisted) =================
R2 AMD FUEL Service; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [291840 2012-12-19] (Advanced Micro Devices, Inc.)
R2 AntiVirSchedulerService; C:\Program Files\Avira\AntiVir Desktop\sched.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG)
R2 AntiVirService; C:\Program Files\Avira\AntiVir Desktop\avguard.exe [440400 2014-02-20] (Avira Operations GmbH & Co. KG)
R2 MBAMScheduler; C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation)
R2 MBAMService; C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation)
R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [22208 2013-10-23] (Microsoft Corporation)
S3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [280288 2013-10-23] (Microsoft Corporation)
R2 NitroReaderDriverReadSpool3; C:\Program Files\Nitro\Reader 3\NitroPDFReaderDriverService3.exe [196624 2013-03-26] (Nitro PDF Software)
R2 RealtekCU; C:\Program Files\oem\11n USB Wireless LAN Utility\RtlService.exe [36864 2010-04-16] (Realtek)
S3 SandraAgentSrv; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\RpcAgentSrv.exe [95896 2009-03-28] (SiSoftware)
R2 SDScannerService; C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe [1103392 2012-11-13] (Safer-Networking Ltd.)
R2 SDUpdateService; C:\Program Files\Spybot - Search & Destroy 2\SDUpdSvc.exe [1369624 2012-11-13] (Safer-Networking Ltd.)
R2 SDWSCService; C:\Program Files\Spybot - Search & Destroy 2\SDWSCSvc.exe [168384 2012-11-13] (Safer-Networking Ltd.)
S3 rpcapd; "%ProgramFiles%\WinPcap\rpcapd.exe" -d -f "%ProgramFiles%\WinPcap\rpcapd.ini" [X]
==================== Drivers (Whitelisted) ====================
R2 AODDriver4.2; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\i386\AODDriver2.sys [48256 2012-04-09] (Advanced Micro Devices)
S3 AtiHDAudioService; C:\Windows\System32\drivers\AtihdLH3.sys [83984 2012-02-23] (Advanced Micro Devices)
R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [90400 2013-12-17] (Avira Operations GmbH & Co. KG)
R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [135648 2013-12-17] (Avira Operations GmbH & Co. KG)
R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [37352 2013-11-25] (Avira Operations GmbH & Co. KG)
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [22856 2013-04-04] (Malwarebytes Corporation)
R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [214696 2013-09-27] (Microsoft Corporation)
R3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [5810 2004-08-13] ()
S3 NANMp50; C:\Windows\System32\Drivers\NANMp50.sys [36408 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA))
S3 NANSp50; C:\Windows\System32\Drivers\NANSp50.sys [35384 2010-03-25] (Printing Communications Assoc., Inc. (PCAUSA))
R2 NPF; C:\Windows\System32\drivers\npf.sys [35088 2010-06-25] (CACE Technologies, Inc.)
R3 RTL8192cu; C:\Windows\System32\DRIVERS\rtwlanu.sys [864360 2011-09-06] (Realtek Semiconductor Corporation )
S3 SANDRA; C:\Program Files\SiSoftware\SiSoftware Sandra Lite 2012.SP3\WNt500x86\Sandra.sys [23112 2009-08-07] (SiSoftware)
R1 ssmdrv; C:\Windows\System32\DRIVERS\ssmdrv.sys [28520 2013-05-03] (Avira GmbH)
S4 blbdrive; \SystemRoot\system32\drivers\blbdrive.sys [X]
S1 gfjnxobt; \??\C:\Windows\system32\drivers\gfjnxobt.sys [X]
S3 IpInIp; system32\DRIVERS\ipinip.sys [X]
S3 netr28u; system32\DRIVERS\netr28u.sys [X]
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [X]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [X]
S3 RTL8192su; system32\DRIVERS\RTL8192su.sys [X]
==================== NetSvcs (Whitelisted) ===================
==================== One Month Created Files and Folders ========
2014-03-09 09:10 - 2014-03-09 09:14 - 00022835 _____ () C:\Windows\WindowsUpdate.log
2014-03-09 09:05 - 2014-03-09 09:05 - 00000631 _____ () C:\Users\chef\Desktop\JRT.txt
2014-03-09 08:59 - 2014-03-09 08:59 - 00001734 _____ () C:\Users\chef\Documents\AdwCleaner[R7].txt
2014-03-08 20:37 - 2014-03-09 09:05 - 00000631 _____ () C:\Users\chef\Documents\JRT.txt
2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT
2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt
2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt
2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt
2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe
2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe
2014-03-08 19:40 - 2014-03-08 19:41 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe
2014-03-07 12:59 - 2014-03-09 09:15 - 00014042 _____ () C:\Users\chef\Downloads\FRST.txt
2014-03-07 12:59 - 2014-03-07 13:00 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt
2014-03-07 12:58 - 2014-03-09 09:15 - 00000000 ____D () C:\FRST
2014-03-07 12:56 - 2014-03-07 12:57 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe
2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe
2014-03-05 22:54 - 2014-03-08 19:48 - 00000906 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-05 22:53 - 2014-03-08 19:49 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware
2014-03-05 22:53 - 2013-04-04 14:50 - 00022856 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-05 22:50 - 2014-03-05 22:51 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe
2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe
2014-02-28 20:09 - 2013-12-05 03:12 - 01248768 _____ (Microsoft Corporation) C:\Windows\system32\msxml3.dll
2014-02-20 18:06 - 2014-02-20 18:07 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip
2014-02-16 21:44 - 2014-02-16 21:45 - 00000000 ____D () C:\Program Files\Mozilla Firefox
2014-02-16 14:40 - 2014-02-17 16:16 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi
2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk
2014-02-16 14:37 - 2014-02-16 14:40 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi
2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi
2014-02-16 14:35 - 2014-02-16 14:36 - 13251567 _____ () C:\Users\chef\Downloads\install.exe
2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt
2014-02-09 06:31 - 2014-02-20 17:43 - 00000000 ____D () C:\Program Files\isohero
2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun
2014-02-07 19:32 - 2013-12-18 21:10 - 00094632 _____ (Oracle Corporation) C:\Windows\system32\WindowsAccessBridge.dll
2014-02-07 19:32 - 2013-12-18 21:04 - 00264616 _____ (Oracle Corporation) C:\Windows\system32\javaws.exe
2014-02-07 19:32 - 2013-12-18 21:04 - 00175016 _____ (Oracle Corporation) C:\Windows\system32\javaw.exe
2014-02-07 19:32 - 2013-12-18 21:03 - 00174504 _____ (Oracle Corporation) C:\Windows\system32\java.exe
2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe
2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe
2014-02-07 18:30 - 2014-02-07 18:33 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR
2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe
2014-02-07 14:57 - 2014-02-07 14:58 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar
==================== One Month Modified Files and Folders =======
2014-03-09 09:16 - 2014-03-07 12:59 - 00014042 _____ () C:\Users\chef\Downloads\FRST.txt
2014-03-09 09:15 - 2014-03-09 09:10 - 00022835 _____ () C:\Windows\WindowsUpdate.log
2014-03-09 09:15 - 2014-03-07 12:58 - 00000000 ____D () C:\FRST
2014-03-09 09:10 - 2013-05-13 21:31 - 00000620 _____ () C:\Windows\Tasks\Check for updates (Spybot - Search & Destroy).job
2014-03-09 09:09 - 2006-11-02 13:58 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-03-09 09:09 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2014-03-09 09:09 - 2006-11-02 13:45 - 00003648 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2014-03-09 09:08 - 2006-11-02 13:58 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-03-09 09:05 - 2014-03-09 09:05 - 00000631 _____ () C:\Users\chef\Desktop\JRT.txt
2014-03-09 09:05 - 2014-03-08 20:37 - 00000631 _____ () C:\Users\chef\Documents\JRT.txt
2014-03-09 08:59 - 2014-03-09 08:59 - 00001734 _____ () C:\Users\chef\Documents\AdwCleaner[R7].txt
2014-03-09 08:58 - 2013-09-08 22:24 - 00000000 ____D () C:\AdwCleaner
2014-03-08 20:35 - 2014-03-08 20:35 - 00000000 ____D () C:\Windows\ERUNT
2014-03-08 20:29 - 2014-03-08 20:29 - 00000159 _____ () C:\Users\chef\Documents\ms-sec.txt
2014-03-08 20:19 - 2014-03-08 20:19 - 00004312 _____ () C:\Users\chef\Documents\AdwCleaner[S4].txt
2014-03-08 20:16 - 2014-03-08 20:16 - 00001674 _____ () C:\Users\chef\Documents\AdwCleaner[R6].txt
2014-03-08 19:49 - 2014-03-05 22:53 - 00000000 ____D () C:\Program Files\Malwarebytes' Anti-Malware
2014-03-08 19:48 - 2014-03-05 22:54 - 00000906 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-08 19:43 - 2014-03-08 19:43 - 01037734 _____ (Thisisu) C:\Users\chef\Downloads\JRT.exe
2014-03-08 19:42 - 2014-03-08 19:42 - 01244192 _____ () C:\Users\chef\Downloads\adwcleaner.exe
2014-03-08 19:41 - 2014-03-08 19:40 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300(1).exe
2014-03-07 13:00 - 2014-03-07 12:59 - 00023028 _____ () C:\Users\chef\Downloads\Addition.txt
2014-03-07 12:57 - 2014-03-07 12:56 - 01145344 _____ (Farbar) C:\Users\chef\Downloads\FRST.exe
2014-03-06 22:38 - 2012-04-21 21:40 - 00002509 _____ () C:\Users\chef\Desktop\inSSIDer.lnk
2014-03-05 23:16 - 2014-03-05 23:16 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\AdwCleaner - CHIP-Downloader.exe
2014-03-05 22:51 - 2014-03-05 22:50 - 10285040 _____ (Malwarebytes Corporation ) C:\Users\chef\Downloads\mbam-setup-1.75.0.1300.exe
2014-03-05 22:48 - 2014-03-05 22:48 - 00613200 _____ (Chip Digital GmbH) C:\Users\chef\Downloads\Malwarebytes Anti Malware - CHIP-Downloader.exe
2014-03-05 22:35 - 2013-12-11 17:36 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-03-01 19:05 - 2006-11-02 12:18 - 00000000 ____D () C:\Windows\Microsoft.NET
2014-02-28 20:23 - 2006-11-02 11:33 - 01582262 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-02-28 20:21 - 2013-10-18 12:02 - 00000000 ____D () C:\Windows\system32\MRT
2014-02-21 16:37 - 2012-03-31 16:39 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2014-02-21 16:37 - 2012-03-31 16:39 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2014-02-20 18:07 - 2014-02-20 18:06 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win(1).zip
2014-02-20 17:43 - 2014-02-09 06:31 - 00000000 ____D () C:\Program Files\isohero
2014-02-17 16:16 - 2014-02-16 14:40 - 00000000 ____D () C:\Users\chef\AppData\Roaming\RavensburgerTipToi
2014-02-16 22:37 - 2012-04-26 07:31 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service
2014-02-16 21:45 - 2014-02-16 21:44 - 00000000 ____D () C:\Program Files\Mozilla Firefox
2014-02-16 14:40 - 2014-02-16 14:40 - 00000869 _____ () C:\Users\chef\Desktop\tiptoi - Verknüpfung.lnk
2014-02-16 14:40 - 2014-02-16 14:37 - 00000000 ____D () C:\ProgramData\RavensburgerTipToi
2014-02-16 14:37 - 2014-02-16 14:37 - 00000000 ____D () C:\Program Files\Ravensburger tiptoi
2014-02-16 14:36 - 2014-02-16 14:35 - 13251567 _____ () C:\Users\chef\Downloads\install.exe
2014-02-09 06:36 - 2014-02-09 06:36 - 00000000 _____ () C:\Users\chef\Downloads\savegame.txt
2014-02-07 22:35 - 2012-04-16 11:19 - 00000000 ____D () C:\Users\alle anderen\AppData\Local\VirtualStore
2014-02-07 19:33 - 2014-02-07 19:33 - 00000000 ____D () C:\Windows\Sun
2014-02-07 19:32 - 2013-12-09 16:45 - 00000000 ____D () C:\ProgramData\Oracle
2014-02-07 19:32 - 2013-07-04 15:10 - 00000000 ____D () C:\Program Files\Java
2014-02-07 19:30 - 2014-02-07 19:30 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(5).exe
2014-02-07 19:28 - 2014-02-07 19:28 - 00921000 _____ (Oracle Corporation) C:\Users\chef\Downloads\jxpiinstall(4).exe
2014-02-07 19:25 - 2013-12-22 19:49 - 00000000 ____D () C:\Users\chef\AppData\Roaming\UFOAI
2014-02-07 18:33 - 2014-02-07 18:30 - 15446935 _____ () C:\Users\chef\Downloads\isometric-heroquest-en-win.zip
2014-02-07 15:02 - 2014-02-06 23:10 - 00000000 ____D () C:\DOS
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Users\chef\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WinRAR
2014-02-07 15:01 - 2014-02-07 15:01 - 00000000 ____D () C:\Program Files\WinRAR
2014-02-07 15:00 - 2014-02-07 15:00 - 01867568 _____ () C:\Users\chef\Downloads\wrar501d.exe
2014-02-07 14:58 - 2014-02-07 14:57 - 02325339 _____ () C:\Users\chef\Downloads\heroquest.rar
Some content of TEMP:
====================
C:\Users\alle anderen\AppData\Local\Temp\avgnt.exe
C:\Users\chef\AppData\Local\Temp\avgnt.exe
C:\Users\Sven\AppData\Local\Temp\avgnt.exe
==================== Bamital & volsnap Check =================
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\system32\winlogon.exe => MD5 is legit
C:\Windows\system32\wininit.exe => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\services.exe => MD5 is legit
C:\Windows\system32\User32.dll => MD5 is legit
C:\Windows\system32\userinit.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit
C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit
LastRegBack: 2014-03-09 09:16
==================== End Of Log ============================ --- --- ---
--- --- ---
--- --- ---
mit dem klevante schein ich mir ja ein relativ junges ding eingehandelt zu haben, allzuviel gibt es im web noch nicht darüber. so richtig kann ich auch noch keine verbindung zum VIS 1.01-plugin herstellen. den rest der viechter scheine ich mir bei meinen ersten gehversuchen eingehandelt zu haben, das wlan meiner nachbarn "etwas unter die lupe zu nehmen". muss den ganzen sinnlosmist mal wieder deinstallieren, hab mit 5 kindern und rollende schicht kaum wirkliche zeit, meinen rechner halbwegs sauber zu halten. inwiefern meine frau vielleicht sich infiziert hat, kann ich nicht beurteilen, aber sie hat unter vista zumindest keine administrator-rechte ... keine ahnung, ob das wirklicher schutz ist. dank dir erstmal, vielleicht sollte ich öfters mal die logfiles meiner schutztruppen durchforsten. ms-security-essentials hat am 05.03.14 ja einen ziemlichen brocken "aussortiert", ohne dass ich davon eine meldung bekam. war wirklich nur der firefox, welcher dieses VIS dingsda-plugin aus sicherheitsgrüden deaktivierte ....
spende an euch kommt, wenn meine frau mal nicht gar so sehr auf die finanzen achtet, versprochen ! | hab wohl den adwcleaner doppelt und den JRT unterschlagen : Code:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.2 (02.20.2014:1)
OS: Windows Vista (TM) Home Basic x86
Ran by chef on 09.03.2014 at 9:03:05,13
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
~~~ Files
~~~ Folders
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 09.03.2014 at 9:05:34,18
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |