Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Fake Java-Umleitung

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML

Antwort
Alt 19.04.2014, 13:05   #1
racer
 
Fake Java-Umleitung - Standard

Fake Java-Umleitung



Hallo,

ich habe auch das Problem wie viele andere im Forum, dass wenn ich manche Seiten öffnen, eine Umleitung zu einem vermeintlichem java-update passiert. Dies passiert sowohl, wenn ich mit Firefox als auch mit dem Internet Explorer arbeite.
Kaspersky hat nichts angezeigt.


Vielen Dank eure Hilfe!

Defogger

Code:
ATTFilter
defogger_disable by jpshortstuff (23.02.10.1)
Log created at 11:55 on 19/04/2014 (Dekir)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...


-=E.O.F=-
         
Systemscan mit FRST

Code:
ATTFilter
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 17-04-2014 01
Ran by Dekir (administrator) on DEKIR-PC on 19-04-2014 11:59:13
Running from C:\Users\Dekir\Downloads
Windows 7 Professional Service Pack 1 (X64) OS Language: German Standard
Internet Explorer Version 11
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: hxxp://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/ 
Download link for 64-Bit Version: hxxp://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/ 
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(Kaspersky Lab ZAO) C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(The Eraser Project) C:\Program Files\Eraser\Eraser.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
(Adobe Systems Incorporated) C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
(Oracle Corporation) C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
(Kaspersky Lab ZAO) C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avpui.exe
(Mozilla Corporation) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
(Adobe Systems, Inc.) C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_13_0_0_182.exe
(Adobe Systems, Inc.) C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerPlugin_13_0_0_182.exe


==================== Registry (Whitelisted) ==================

HKLM\...\Run: [Eraser] => C:\Program Files\Eraser\Eraser.exe [980920 2012-05-22] (The Eraser Project)
HKLM-x32\...\Run: [USB3MON] => C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291608 2012-02-27] (Intel Corporation)
HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [958576 2013-04-04] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [SunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [254336 2013-07-02] (Oracle Corporation)
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)
HKU\.DEFAULT\...\RunOnce: [SPReview] - C:\Windows\System32\SPReview\SPReview.exe [301568 2013-03-26] (Microsoft Corporation)
HKU\S-1-5-21-1805316989-1779920652-1483943465-1000\...\MountPoints2: {5bb6b748-34f1-11e2-b89b-806e6f6e6963} - D:\setup.exe /autorun
HKU\S-1-5-21-1805316989-1779920652-1483943465-1000\...\MountPoints2: {620cc658-d357-11e2-a13e-b888e371e0fe} - E:\LaunchU3.exe -a
HKU\S-1-5-21-1805316989-1779920652-1483943465-1000\...\MountPoints2: {d68c546c-452a-11e2-9178-74e543b0fe98} - F:\pushinst.exe

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://de.msn.com/?ocid=iehp
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0x9C71A2A17AFCCD01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de-DE
BHO: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO)
BHO: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO)
BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
BHO-x32: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO)
BHO-x32: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
BHO-x32: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO-x32: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO)
BHO-x32: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO-x32: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
Toolbar: HKCU - No Name - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} -  No File
Tcpip\Parameters: [DhcpNameServer] 192.168.178.1

FireFox:
========
FF ProfilePath: C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_13_0_0_182.dll ()
FF Plugin: @java.com/DTPlugin,version=10.45.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.45.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_13_0_0_182.dll ()
FF Plugin-x32: @java.com/DTPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files (x86)\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @videolan.org/vlc,version=2.0.4 - C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin-x32: @videolan.org/vlc,version=2.1.3 - C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin-x32: Adobe Reader - C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF HKLM-x32\...\Firefox\Extensions:  - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com
FF Extension: Kaspersky URL Advisor - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [virtual_keyboard@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com
FF Extension: Virtual Keyboard - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [content_blocker@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com
FF Extension: Dangerous Websites Blocker - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [anti_banner@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com
FF Extension: Anti-Banner - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [online_banking@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com
FF Extension: Safe Money - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com [2013-11-02]

Chrome: 
=======
CHR HomePage: hxxp://www.google.com/
CHR RestoreOnStartup: "hxxp://www.google.com/"
CHR HKLM-x32\...\Chrome\Extension: [blbkdnmdcafmfhinpmnlhhddbepgkeaa] - https://chrome.google.com/webstore/detail/blbkdnmdcafmfhinpmnlhhddbepgkeaa []
CHR HKLM-x32\...\Chrome\Extension: [dchlnpcodkpfdpacogkljefecpegganj] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\urladvisor.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [hakdifolhalapjijoafobooafbilfakh] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\online_banking_chrome.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [hghkgaeecgjhjkannahfamoehjmkjail] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\content_blocker_chrome.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [jagncdcchgajhfhijbbhecadmaiegcmh] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\virtkbd.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [pjldcfjmnllhmgjclecdnfampinooman] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\ab.crx [2013-10-17]

==================== Services (Whitelisted) =================

R2 AVP; C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe [214512 2013-10-17] (Kaspersky Lab ZAO)
S3 SXDS10; C:\Program Files (x86)\Common Files\soft Xpansion\sxds10.exe [234096 2013-08-02] (soft Xpansion)
S3 aspnet_state; %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe [X]

==================== Drivers (Whitelisted) ====================

R0 kl1; C:\Windows\System32\DRIVERS\kl1.sys [458336 2013-11-07] (Kaspersky Lab ZAO)
S4 klflt; C:\Windows\System32\DRIVERS\klflt.sys [115296 2014-03-24] (Kaspersky Lab ZAO)
R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [625248 2014-03-24] (Kaspersky Lab ZAO)
R1 KLIM6; C:\Windows\System32\DRIVERS\klim6.sys [29792 2013-10-17] (Kaspersky Lab ZAO)
R3 klkbdflt; C:\Windows\System32\DRIVERS\klkbdflt.sys [29280 2014-02-18] (Kaspersky Lab ZAO)
R3 klmouflt; C:\Windows\System32\DRIVERS\klmouflt.sys [29280 2013-10-17] (Kaspersky Lab ZAO)
R1 klpd; C:\Windows\System32\DRIVERS\klpd.sys [15456 2013-04-12] (Kaspersky Lab ZAO)
R1 kltdi; C:\Windows\System32\DRIVERS\kltdi.sys [55904 2013-05-14] (Kaspersky Lab ZAO)
R1 kneps; C:\Windows\System32\DRIVERS\kneps.sys [178272 2013-12-19] (Kaspersky Lab ZAO)
R3 L1C; C:\Windows\System32\DRIVERS\L1C60x64.sys [106096 2011-11-15] (Atheros Communications, Inc.)

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-04-19 11:59 - 2014-04-19 12:00 - 00011915 _____ () C:\Users\Dekir\Downloads\FRST.txt
2014-04-19 11:58 - 2014-04-19 11:59 - 00000000 ____D () C:\FRST
2014-04-19 11:58 - 2014-04-19 11:58 - 02158592 _____ (Farbar) C:\Users\Dekir\Downloads\FRST64.exe
2014-04-19 11:56 - 2014-04-19 11:56 - 01146880 _____ (Farbar) C:\Users\Dekir\Downloads\FRST.exe
2014-04-19 11:55 - 2014-04-19 11:55 - 00000472 _____ () C:\Users\Dekir\Downloads\defogger_disable.log
2014-04-19 11:55 - 2014-04-19 11:55 - 00000000 _____ () C:\Users\Dekir\defogger_reenable
2014-04-19 11:54 - 2014-04-19 11:54 - 00050477 _____ () C:\Users\Dekir\Downloads\Defogger.exe
2014-04-19 11:09 - 2014-04-19 11:33 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\Program Files (x86)\ Malwarebytes Anti-Malware 
2014-04-19 11:09 - 2014-04-03 09:51 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-19 11:09 - 2014-04-03 09:51 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-19 11:09 - 2014-04-03 09:50 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-04-19 11:06 - 2014-04-19 11:07 - 17305616 _____ (Malwarebytes Corporation ) C:\Users\Dekir\Downloads\mbam-setup-2.0.1.1004.exe
2014-04-19 10:59 - 2014-04-19 10:59 - 00001337 _____ () C:\Users\Dekir\Documents\JRT.txt
2014-04-19 10:59 - 2014-04-19 10:59 - 00001337 _____ () C:\Users\Dekir\Desktop\JRT.txt
2014-04-19 10:46 - 2014-04-19 10:46 - 00000000 ____D () C:\Windows\ERUNT
2014-04-19 10:44 - 2014-04-19 10:44 - 01016261 _____ (Thisisu) C:\Users\Dekir\Downloads\JRT.exe
2014-04-19 10:37 - 2014-04-19 11:40 - 00000000 ____D () C:\AdwCleaner
2014-04-19 10:36 - 2014-04-19 10:36 - 01258805 _____ () C:\Users\Dekir\Downloads\adwcleaner.exe
2014-04-19 10:34 - 2014-04-19 10:34 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-04-17 08:59 - 2014-04-17 08:58 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-17 08:59 - 2014-04-17 08:58 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-17 08:59 - 2014-04-17 08:58 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-17 08:59 - 2014-04-17 08:58 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-17 08:58 - 2014-04-17 08:58 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-17 08:56 - 2014-04-17 08:57 - 29164456 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jre-7u55-windows-i586.exe
2014-04-17 08:54 - 2014-04-17 08:54 - 24677393 _____ () C:\Users\Dekir\Downloads\vlc-2.1.3-win32.exe
2014-04-12 14:38 - 2014-04-12 14:38 - 00000000 ____D () C:\ProgramData\Sun
2014-04-12 14:32 - 2014-04-12 14:32 - 00921000 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jxpiinstall.exe
2014-04-12 12:15 - 2014-04-12 12:15 - 00000000 ____D () C:\Users\Dekir\Desktop\Fotos
2014-04-09 12:35 - 2014-03-31 03:16 - 23134208 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-04-09 12:35 - 2014-03-31 03:13 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-04-09 12:35 - 2014-03-31 02:13 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-04-09 12:35 - 2014-03-31 01:57 - 17073152 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 01163264 _____ (Microsoft Corporation) C:\Windows\system32\kernel32.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00362496 _____ (Microsoft Corporation) C:\Windows\system32\wow64win.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00243712 _____ (Microsoft Corporation) C:\Windows\system32\wow64.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00016384 _____ (Microsoft Corporation) C:\Windows\system32\ntvdm64.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00013312 _____ (Microsoft Corporation) C:\Windows\system32\wow64cpu.dll
2014-04-09 12:34 - 2014-03-04 11:17 - 00014336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntvdm64.dll
2014-04-09 12:34 - 2014-03-04 11:16 - 01114112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kernel32.dll
2014-04-09 12:34 - 2014-03-04 11:16 - 00025600 _____ (Microsoft Corporation) C:\Windows\SysWOW64\setup16.exe
2014-04-09 12:34 - 2014-03-04 11:16 - 00005120 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wow32.dll
2014-04-09 12:34 - 2014-03-04 10:09 - 00007680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\instnm.exe
2014-04-09 12:34 - 2014-03-04 10:09 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\user.exe
2014-03-29 14:50 - 2014-03-29 14:50 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox

==================== One Month Modified Files and Folders =======

2014-04-19 12:00 - 2014-04-19 11:59 - 00011915 _____ () C:\Users\Dekir\Downloads\FRST.txt
2014-04-19 11:59 - 2014-04-19 11:58 - 00000000 ____D () C:\FRST
2014-04-19 11:58 - 2014-04-19 11:58 - 02158592 _____ (Farbar) C:\Users\Dekir\Downloads\FRST64.exe
2014-04-19 11:56 - 2014-04-19 11:56 - 01146880 _____ (Farbar) C:\Users\Dekir\Downloads\FRST.exe
2014-04-19 11:55 - 2014-04-19 11:55 - 00000472 _____ () C:\Users\Dekir\Downloads\defogger_disable.log
2014-04-19 11:55 - 2014-04-19 11:55 - 00000000 _____ () C:\Users\Dekir\defogger_reenable
2014-04-19 11:55 - 2012-11-23 00:20 - 00000000 ____D () C:\Users\Dekir
2014-04-19 11:54 - 2014-04-19 11:54 - 00050477 _____ () C:\Users\Dekir\Downloads\Defogger.exe
2014-04-19 11:48 - 2009-07-14 06:45 - 00016240 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-04-19 11:48 - 2009-07-14 06:45 - 00016240 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-04-19 11:47 - 2009-07-14 19:58 - 04169144 _____ () C:\Windows\system32\perfh007.dat
2014-04-19 11:47 - 2009-07-14 19:58 - 01256008 _____ () C:\Windows\system32\perfc007.dat
2014-04-19 11:47 - 2009-07-14 07:13 - 00005582 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-19 11:46 - 2012-11-23 00:13 - 01969031 _____ () C:\Windows\WindowsUpdate.log
2014-04-19 11:42 - 2013-11-02 14:31 - 00000000 ____D () C:\ProgramData\Kaspersky Lab
2014-04-19 11:41 - 2012-11-23 10:56 - 00479260 _____ () C:\Windows\PFRO.log
2014-04-19 11:41 - 2009-07-14 07:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-19 11:41 - 2009-07-14 06:51 - 00101780 _____ () C:\Windows\setupact.log
2014-04-19 11:41 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\Help
2014-04-19 11:40 - 2014-04-19 10:37 - 00000000 ____D () C:\AdwCleaner
2014-04-19 11:33 - 2014-04-19 11:09 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\Program Files (x86)\ Malwarebytes Anti-Malware 
2014-04-19 11:07 - 2014-04-19 11:06 - 17305616 _____ (Malwarebytes Corporation ) C:\Users\Dekir\Downloads\mbam-setup-2.0.1.1004.exe
2014-04-19 10:59 - 2014-04-19 10:59 - 00001337 _____ () C:\Users\Dekir\Documents\JRT.txt
2014-04-19 10:59 - 2014-04-19 10:59 - 00001337 _____ () C:\Users\Dekir\Desktop\JRT.txt
2014-04-19 10:46 - 2014-04-19 10:46 - 00000000 ____D () C:\Windows\ERUNT
2014-04-19 10:44 - 2014-04-19 10:44 - 01016261 _____ (Thisisu) C:\Users\Dekir\Downloads\JRT.exe
2014-04-19 10:36 - 2014-04-19 10:36 - 01258805 _____ () C:\Users\Dekir\Downloads\adwcleaner.exe
2014-04-19 10:34 - 2014-04-19 10:34 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-04-18 15:22 - 2014-03-15 13:01 - 00017118 _____ () C:\Users\Dekir\deutsche Medailliengewinner.xlsx
2014-04-17 08:59 - 2014-01-06 12:33 - 00000000 ____D () C:\ProgramData\Oracle
2014-04-17 08:58 - 2014-04-17 08:59 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-17 08:58 - 2014-04-17 08:59 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-17 08:58 - 2014-04-17 08:59 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-17 08:58 - 2014-04-17 08:59 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-17 08:58 - 2014-04-17 08:58 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-17 08:57 - 2014-04-17 08:56 - 29164456 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jre-7u55-windows-i586.exe
2014-04-17 08:55 - 2012-11-23 10:10 - 00001070 _____ () C:\Users\Public\Desktop\VLC media player.lnk
2014-04-17 08:54 - 2014-04-17 08:54 - 24677393 _____ () C:\Users\Dekir\Downloads\vlc-2.1.3-win32.exe
2014-04-13 14:54 - 2014-03-14 17:13 - 00012725 _____ () C:\Users\Dekir\Desktop\olympia wintersport-1.xlsx
2014-04-12 14:38 - 2014-04-12 14:38 - 00000000 ____D () C:\ProgramData\Sun
2014-04-12 14:32 - 2014-04-12 14:32 - 00921000 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jxpiinstall.exe
2014-04-12 12:15 - 2014-04-12 12:15 - 00000000 ____D () C:\Users\Dekir\Desktop\Fotos
2014-04-12 10:12 - 2013-11-09 16:16 - 00012265 _____ () C:\Users\Dekir\dynamo.xlsx
2014-04-09 13:17 - 2013-07-16 06:39 - 00000000 ____D () C:\Windows\system32\MRT
2014-04-09 13:17 - 2012-11-23 09:55 - 00000000 ____D () C:\ProgramData\Microsoft Help
2014-04-09 13:16 - 2012-11-23 15:55 - 90655440 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-04-08 21:16 - 2012-11-23 15:51 - 00692400 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-04-08 21:16 - 2012-11-23 15:51 - 00070832 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-04-08 21:14 - 2012-11-25 11:17 - 00000000 ____D () C:\Users\Dekir\AppData\Local\Adobe
2014-04-07 20:01 - 2013-05-06 10:52 - 00000000 ____D () C:\Users\Dekir\AppData\Local\CrashDumps
2014-04-03 09:51 - 2014-04-19 11:09 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-03 09:51 - 2014-04-19 11:09 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-03 09:50 - 2014-04-19 11:09 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-31 09:35 - 2013-02-26 10:11 - 00270496 ____N (Microsoft Corporation) C:\Windows\system32\MpSigStub.exe
2014-03-31 03:16 - 2014-04-09 12:35 - 23134208 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-03-31 03:13 - 2014-04-09 12:35 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-03-31 02:13 - 2014-04-09 12:35 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-03-31 01:57 - 2014-04-09 12:35 - 17073152 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-03-29 15:16 - 2012-11-23 10:04 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service
2014-03-29 14:50 - 2014-03-29 14:50 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-03-29 10:49 - 2009-07-14 07:08 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-03-24 11:32 - 2013-11-02 14:31 - 00625248 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klif.sys
2014-03-24 11:32 - 2013-11-02 14:31 - 00115296 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klflt.sys

Some content of TEMP:
====================
C:\Users\Dekir\AppData\Local\Temp\AskSLib.dll
C:\Users\Dekir\AppData\Local\Temp\drm_dyndata_7400009.dll
C:\Users\Dekir\AppData\Local\Temp\ose00000.exe
C:\Users\Dekir\AppData\Local\Temp\Quarantine.exe
C:\Users\Dekir\AppData\Local\Temp\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}_NIS_10356.exe


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit


LastRegBack: 2014-04-18 15:59

==================== End Of Log ============================
         
Additional Scan

Code:
ATTFilter
Additional scan result of Farbar Recovery Scan Tool (x64) Version: 17-04-2014 01
Ran by Dekir at 2014-04-19 12:00:27
Running from C:\Users\Dekir\Downloads
Boot Mode: Normal
==========================================================


==================== Security Center ========================

AV: Kaspersky Internet Security (Enabled - Up to date) {179979E8-273D-D14E-0543-2861940E4886}
AS: Kaspersky Internet Security (Enabled - Up to date) {ACF8980C-0107-DEC0-3FF3-1313EF89023B}
AS: Windows Defender (Enabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
FW: Kaspersky Internet Security (Enabled) {2FA2F8CD-6D52-D016-2E1C-81546ADD0FFD}

==================== Installed Programs ======================

7-Zip 9.20 (x64 edition) (HKLM\...\{23170F69-40C1-2702-0920-000001000000}) (Version: 9.20.00.0 - Igor Pavlov)
Adobe Flash Player 12 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 12.0.0.77 - Adobe Systems Incorporated)
Adobe Flash Player 13 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 13.0.0.182 - Adobe Systems Incorporated)
Adobe Reader XI (11.0.05) - Deutsch (HKLM-x32\...\{AC76BA86-7AD7-1031-7B44-AB0000000001}) (Version: 11.0.05 - Adobe Systems Incorporated)
ANNO 1404 - Königsedition (HKLM-x32\...\{3D9CF3CA-3AB0-4A82-9853-D7C43FD1D775}) (Version: 3.10.0000 - Ubisoft)
ArcGIS 10.1 for Desktop (HKLM-x32\...\ArcGIS 10.1 for Desktop) (Version: 10.1.3035 - Environmental Systems Research Institute, Inc.)
ArcGIS 10.1 for Desktop (x32 Version: 10.1.3035 - Environmental Systems Research Institute, Inc.) Hidden
ArtMoney SE v7.40.5 (HKLM-x32\...\ArtMoney SE_is1) (Version: 7.40.5 - System SoftLab)
CDBurnerXP (HKLM-x32\...\{7E265513-8CDA-4631-B696-F40D983F3B07}_is1) (Version: 4.5.2.4291 - CDBurnerXP)
Eraser 6.0.10.2620 (HKLM\...\{6E5159B4-A519-41EF-80EF-AD58371515DF}) (Version: 6.0.2620 - The Eraser Project)
Free Pdf Perfect Prereq (HKLM-x32\...\{dc0b7acb-e3f1-4bdb-8672-340890b4891b}) (Version: 1.1.0.70 - Covus Freemium GmbH)
Free Pdf Perfect Prereq (x32 Version: 1.1.0.70 - Covus Freemium GmbH) Hidden
Freemium Free PDF Perfect (HKLM-x32\...\{88265079-D6F4-4292-86BE-D2053E80BFE4}) (Version: 1.0 - Freemium)
FUSSBALL MANAGER 13 (HKLM-x32\...\{80AF0300-866F-400F-A350-D53E3C3E34E0}) (Version: 1.0.3.0 - Electronic Arts)
gretl version 1.9.12 (HKLM-x32\...\gretl_is1) (Version: 1.9.12 - The gretl team)
HP Deskjet 2050 J510 series - Grundlegende Software für das Gerät (HKLM\...\{54B0845F-5540-4492-9939-CD8880ABABF0}) (Version: 22.50.231.0 - Hewlett-Packard Co.)
HP Deskjet 2050 J510 series Hilfe (HKLM-x32\...\{7A3DF2E2-CF13-44FB-A93E-F71D5381DB3F}) (Version: 140.0.61.61 - Hewlett Packard)
IBM SPSS Statistics 20 (HKLM-x32\...\{2AF8017B-E503-408F-AACE-8A335452CAD2}) (Version: 20.0.0.0 - IBM Corp)
inSSIDer Home (HKLM-x32\...\{9E54E4AE-B67A-4925-8E92-0E1F9817FD73}) (Version: 3.1.2.1 - MetaGeek, LLC)
Intel(R) OpenCL CPU Runtime (HKLM-x32\...\{FCB3772C-B7D0-4933-B1A9-3707EBACC573}) (Version:  - Intel Corporation)
Intel(R) Processor Graphics (HKLM-x32\...\{F0E3AD40-2BBD-4360-9C76-B9AC9A5886EA}) (Version: 8.15.10.2656 - Intel Corporation)
Intel(R) USB 3.0 eXtensible Host Controller Driver (HKLM-x32\...\{240C3DDD-C5E9-4029-9DF7-95650D040CF2}) (Version: 1.0.4.220 - Intel Corporation)
Java 7 Update 45 (64-bit) (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F86417045FF}) (Version: 7.0.450 - Oracle)
Java 7 Update 55 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83217055FF}) (Version: 7.0.550 - Oracle)
Java Auto Updater (x32 Version: 2.1.9.8 - Sun Microsystems, Inc.) Hidden
Kaspersky Internet Security (HKLM-x32\...\InstallWIX_{6F6873E3-5C92-4049-B511-231A138DD090}) (Version: 14.0.0.4651 - Kaspersky Lab)
Kaspersky Internet Security (x32 Version: 14.0.0.4651 - Kaspersky Lab) Hidden
Malwarebytes Anti-Malware Version 2.0.1.1004 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.0.1.1004 - Malwarebytes Corporation)
Microsoft .NET Framework 1.1 (HKLM-x32\...\{CB2F7EDD-9D1F-43C1-90FC-4F52EAE172A1}) (Version: 1.1.4322 - Microsoft)
Microsoft .NET Framework 4 Client Profile (HKLM\...\Microsoft .NET Framework 4 Client Profile) (Version: 4.0.30319 - Microsoft Corporation)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319 - Microsoft Corporation) Hidden
Microsoft Office 2007 Service Pack 3 (SP3) (HKLM-x32\...\{91120000-002F-0000-0000-0000000FF1CE}_HOMESTUDENTR_{6E107EB7-8B55-48BF-ACCB-199F86A2CD93}) (Version:  - Microsoft)
Microsoft Office 2007 Service Pack 3 (SP3) (x32 Version:  - Microsoft) Hidden
Microsoft Office Excel MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Home and Student 2007 (HKLM-x32\...\HOMESTUDENTR) (Version: 12.0.6612.1000 - Microsoft Corporation)
Microsoft Office Home and Student 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Office 64-bit Components 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office OneNote MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office PowerPoint MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (English) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (French) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proof (Italian) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Proofing (German) 2007 (x32 Version: 12.0.4518.1014 - Microsoft Corporation) Hidden
Microsoft Office Proofing Tools 2007 Service Pack 3 (SP3) (x32 Version:  - Microsoft) Hidden
Microsoft Office Shared 64-bit MUI (German) 2007 (Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Shared MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Office Word MUI (German) 2007 (x32 Version: 12.0.6612.1000 - Microsoft Corporation) Hidden
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30214.0 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Mozilla Firefox 28.0 (x86 de) (HKLM-x32\...\Mozilla Firefox 28.0 (x86 de)) (Version: 28.0 - Mozilla)
Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 28.0 - Mozilla)
MSXML 4.0 SP2 (KB954430) (HKLM-x32\...\{86493ADD-824D-4B8E-BD72-8C5DCDC52A71}) (Version: 4.20.9870.0 - Microsoft Corporation)
MSXML 4.0 SP2 (KB973688) (HKLM-x32\...\{F662A8E6-F4DC-41A2-901E-8C11F044BDEC}) (Version: 4.20.9876.0 - Microsoft Corporation)
NBA 2K10 (HKLM-x32\...\{0A9C9BD5-8588-40D4-8A1A-860E3D2ED6EE}) (Version: 1.0.0 - 2K Sports)
Origin (HKLM-x32\...\Origin) (Version: 9.2.1.4399 - Electronic Arts, Inc.)
PDF Split And Merge Basic (HKLM\...\{C91B24F6-1629-11E2-B696-21676188709B}) (Version: 2.2.2 - Andrea Vacondio)
PhotoFiltre 7 (HKCU\...\PhotoFiltre 7) (Version:  - )
R for Windows 2.14.2 (HKLM\...\R for Windows 2.14.2_is1) (Version: 2.14.2 - R Development Core Team)
Secure Download Manager (HKLM-x32\...\{C58626D6-7EBD-460D-8B6C-75B3C3464879}) (Version: 3.1.60 - Kivuto Solutions Inc.)
Update for 2007 Microsoft Office System (KB967642) (HKLM-x32\...\{91120000-002F-0000-0000-0000000FF1CE}_HOMESTUDENTR_{C444285D-5E4F-48A4-91DD-47AAAA68E92D}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2596620) 32-Bit Edition (HKLM-x32\...\{91120000-002F-0000-0000-0000000FF1CE}_HOMESTUDENTR_{A024FC7B-77DE-45DE-A058-1C049A17BFB3}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2767849) 32-Bit Edition (HKLM-x32\...\{90120000-002A-0000-1000-0000000FF1CE}_HOMESTUDENTR_{CB68A5B0-3508-4193-AEB9-AF636DAECE0F}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2767849) 32-Bit Edition (HKLM-x32\...\{91120000-002F-0000-0000-0000000FF1CE}_HOMESTUDENTR_{CB68A5B0-3508-4193-AEB9-AF636DAECE0F}) (Version:  - Microsoft)
Update for Microsoft Office 2007 suites (KB2767916) 32-Bit Edition (HKLM-x32\...\{91120000-002F-0000-0000-0000000FF1CE}_HOMESTUDENTR_{E9A82945-BA29-4EE8-8F2A-2F49545E9CF2}) (Version:  - Microsoft)
Visual Studio 2012 x64 Redistributables (HKLM\...\{8C775E70-A791-4DA8-BCC3-6AB7136F4484}) (Version: 14.0.0.1 - AVG Technologies)
Visual Studio 2012 x86 Redistributables (HKLM-x32\...\{98EFF19A-30AB-4E4B-B943-F06B1C63EBF8}) (Version: 14.0.0.1 - AVG Technologies CZ, s.r.o.)
VLC media player 2.1.3 (HKLM-x32\...\VLC media player) (Version: 2.1.3 - VideoLAN)

==================== Restore Points  =========================

11-03-2014 08:37:36 Windows Update
12-03-2014 09:13:42 Windows Update
18-03-2014 07:51:11 Windows Update
19-03-2014 07:47:25 Windows Update
25-03-2014 07:50:56 Windows Update
28-03-2014 13:41:32 Windows Update
01-04-2014 06:58:02 Windows Update
08-04-2014 06:47:28 Windows Update
09-04-2014 11:15:18 Windows Update
12-04-2014 12:36:49 Installed Java 7 Update 51
15-04-2014 06:45:43 Windows Update
17-04-2014 06:57:56 Installed Java 7 Update 55
18-04-2014 08:55:45 Windows Update

==================== Hosts content: ==========================

2009-07-14 04:34 - 2009-06-10 23:00 - 00000824 ____N C:\Windows\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

Task: {01AC897D-F57A-44F4-82D1-C263C042ECB3} - System32\Tasks\Norton Internet Security CBE\Norton Error Analyzer => C:\Program Files (x86)\Norton Internet Security CBE\Engine\20.4.0.40\SymErr.exe
Task: {8BC152C4-1EE5-4D52-B09C-CBC7D39BC388} - System32\Tasks\Norton Internet Security CBE\Norton Error Processor => C:\Program Files (x86)\Norton Internet Security CBE\Engine\20.4.0.40\SymErr.exe

==================== Loaded Modules (whitelisted) =============

2012-11-23 11:08 - 2012-02-17 18:21 - 00094208 _____ () C:\Windows\System32\IccLibDll_x64.dll
2013-06-17 13:35 - 2013-06-17 13:35 - 00478400 _____ () C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\dblite.dll
2013-05-08 15:52 - 2013-05-08 15:52 - 01270464 _____ () C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\kpcengine.2.3.dll
2014-03-29 14:50 - 2014-03-29 14:50 - 03642480 _____ () C:\Program Files (x86)\Mozilla Firefox\mozjs.dll
2014-04-08 21:16 - 2014-04-08 21:16 - 16351920 _____ () C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_13_0_0_182.dll

==================== Alternate Data Streams (whitelisted) =========


==================== Safe Mode (whitelisted) ===================


==================== Disabled items from MSCONFIG ==============


==================== Faulty Device Manager Devices =============

Name: 
Description: 
Class Guid: 
Manufacturer: 
Service: 
Problem: : The drivers for this device are not installed. (Code 28)
Resolution: To install the drivers for this device, click "Update Driver", which starts the Hardware Update wizard.

Name: Generic Bluetooth Adapter
Description: Generic Bluetooth Adapter
Class Guid: {e0cbf06c-cd8b-4647-bb8a-263b43f0f974}
Manufacturer: GenericAdapter
Service: BTHUSB
Problem: : Windows has stopped this device because it has reported problems. (Code 43)
Resolution: One of the drivers controlling the device notified the operating system that the device failed in some manner. For more information about how to diagnose the problem, see the hardware documentation. 


==================== Event log errors: =========================

Application errors:
==================
Error: (04/19/2014 11:47:37 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Fehler beim Herunterladen der Zeichenfolgen der Leistungsindikatoren für Dienst "WmiApRpl" (WmiApRpl). Der Fehlercode ist das erste DWORD im Datenbereich.

Error: (04/19/2014 11:47:37 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich.

Error: (04/19/2014 11:47:36 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich.


System errors:
=============
Error: (04/19/2014 11:41:25 AM) (Source: BTHUSB) (User: )
Description: Der lokale Bluetooth-Adapter ist aus einem unbekannten Grund fehlgeschlagen und wird nicht verwendet. Der Treiber wurde entladen.


Microsoft Office Sessions:
=========================

CodeIntegrity Errors:
===================================
  Date: 2014-03-03 14:27:39.156
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Windows\ELAMBKUP\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-03-03 14:27:39.156
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Windows\ELAMBKUP\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-03-03 14:27:39.156
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Windows\ELAMBKUP\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-03-03 14:27:39.086
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\KLELAMX64\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-03-03 14:27:39.086
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\KLELAMX64\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-03-03 14:27:39.086
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\KLELAMX64\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2013-12-13 16:05:07.298
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Windows\ELAMBKUP\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2013-12-13 16:05:07.298
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Windows\ELAMBKUP\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2013-12-13 16:05:07.288
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Windows\ELAMBKUP\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2013-12-13 16:05:07.248
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\KLELAMX64\klelam.sys" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.


==================== Memory info =========================== 

Percentage of memory in use: 23%
Total physical RAM: 8094.36 MB
Available physical RAM: 6188.5 MB
Total Pagefile: 16186.89 MB
Available Pagefile: 14042.33 MB
Total Virtual: 8192 MB
Available Virtual: 8191.82 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:464.58 GB) (Free:371.46 GB) NTFS
Drive d: (NBA_2K10) (CDROM) (Total:6.65 GB) (Free:0 GB) CDFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 466 GB) (Disk ID: C3FFC3FF)
Partition 1: (Active) - (Size=100 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=465 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=1 GB) - (Type=12)

==================== End Of Log ============================
         
Scan mit GMER

Code:
ATTFilter
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-04-19 12:36:21
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 ST9500325AS rev.0011LVM1 465,76GB
Running: Gmer-19357.exe; Driver: C:\Users\Dekir\AppData\Local\Temp\kgloapod.sys


---- User code sections - GMER 2.1 ----

.text  C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe[1784] C:\Windows\SysWOW64\ntdll.dll!NtQueryValueKey         00000000771bfaa8 5 bytes JMP 00000001736c18dd
.text  C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe[1784] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory  00000000771c0038 5 bytes JMP 00000001736c1ed6
.text  C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe[2596] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                0000000074ff1465 2 bytes [FF, 74]
.text  C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe[2596] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155               0000000074ff14bb 2 bytes [FF, 74]
.text  ...                                                                                                                                         * 2
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5                                                 0000000076fc11f5 8 bytes {JMP 0xd}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416                                               0000000076fc1390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159                                      0000000076fc143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492                                      0000000076fc158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126                                              0000000076fc191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636                                              0000000076fc1b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204                                             0000000076fc1bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373                                0000000076fc1d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691                                0000000076fc1eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31                                                    0000000076fc1edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84                                                   0000000076fc1f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81                                                  0000000076fc1fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7                                          0000000076fc1fd7 8 bytes {JMP 0xb}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658                                      0000000076fc2272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801                                      0000000076fc2301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578                           0000000076fc2792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16                                  0000000076fc27b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18                                0000000076fc27d2 8 bytes {JMP 0x10}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79                 0000000076fc282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176                0000000076fc2890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  ...                                                                                                                                         * 2
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299                        0000000076fc2d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367                        0000000076fc2d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  ...                                                                                                                                         * 3
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483                                0000000076fc3023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523                                    0000000076fc323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912                                    0000000076fc33c0 16 bytes {JMP 0x4e}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318                                                   0000000076fc3a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403                                                   0000000076fc3ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197                       0000000076fc3b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611                       0000000076fc3d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80                                0000000076fc4190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread                                          0000000077011380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread                                        0000000077011500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection                                              0000000077011530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory                                            0000000077011650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread                                                0000000077011700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx                                                0000000077011d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread                                              0000000077011f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread                                              00000000770127e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312                            00000000737913cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471                            000000007379146b 8 bytes {JMP 0xffffffffffffffb0}
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611                                         00000000737916d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3                                           00000000737916e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23                                      00000000737919db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23                                      00000000737919fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23                                0000000073791a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3                                  0000000073791a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23                                0000000073791a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text  C:\Users\Dekir\Downloads\Gmer-19357.exe[3052] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3                                     0000000073791a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]

---- EOF - GMER 2.1 ----
         
Scan mit Malwarebyte Anti-Malware

Code:
ATTFilter
 Malwarebytes Anti-Malware 
www.malwarebytes.org

Suchlauf Datum: 19.04.2014
Suchlauf-Zeit: 11:31:04
Logdatei: Anti-Maleware.txt
Administrator: Ja

Version: 2.00.1.1004
Malware Datenbank: v2014.04.19.05
Rootkit Datenbank: v2014.03.27.01
Lizenz: Kostenlos
Malware Schutz: Deaktiviert
Bösartiger Webseiten Schutz: Deaktiviert
Chameleon: Deaktiviert

Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: Dekir

Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 266975
Verstrichene Zeit: 20 Min, 5 Sek

Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Shuriken: Aktiviert
PUP: Aktiviert
PUM: Aktiviert

Prozesse: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registrierungsschlüssel: 1
PUP.Optional.LyricsSay.A, HKLM\SOFTWARE\WOW6432NODE\LyricsSay-15, In Quarantäne, [b27fcd5f34477cbaff379efc9f6429d7], 

Registrierungswerte: 0
(No malicious items detected)

Registrierungsdaten: 0
(No malicious items detected)

Ordner: 13
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\defaults, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\defaults\preferences, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\userCode, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\locale, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\locale\en-US, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 

Dateien: 117
PUP.Optional.Bundlore, C:\Users\Dekir\AppData\Local\Temp\d0GMYEb3.exe.part, In Quarantäne, [b0811f0da2d9ef47c2020468a35eb54b], 
PUP.Optional.Bundler, C:\Users\Dekir\AppData\Local\Temp\ins7302\LyricsSay_1060-8002_v122.exe, In Quarantäne, [052c9f8d3d3e6dc9cda656dbcc35f709], 
PUP.Optional.CrossRider, C:\Users\Dekir\AppData\Local\Temp\ins7302\plushd_0209_DE-f102d607.exe, In Quarantäne, [a38eec40fb8054e25aaad24b8e73936d], 
PUP.Optional.Firseria, C:\Users\Dekir\Downloads\Stata.exe, In Quarantäne, [240d58d4b2c93501ec5bc38adf2529d7], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome.manifest, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\install.rdf, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\background.html, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\baseObject.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\browser.xul, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\dialog.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\ffCoreFilesIndex.txt, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\main.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\options.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\options.xul, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\platformVersion.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\search_dialog.xul, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\asyncDB.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\background.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\browserAction.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\contextMenu.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\dbManager.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\dom_bg.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\fileManager.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\firefox.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\firefoxNotifications.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\firefoxOmnibox.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\message.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\pageAction.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\request.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\tabs.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\webRequest.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\api\windowsMessagingHandler.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\addressBarChangeObserver.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\console.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\consts.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\delegate.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\extensionDataStore.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\folderIOWrapper.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\httpObserver.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\IDBWrapper.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\installer.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\logFile.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\prefs.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\progressListenerObserver.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\registry.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\reloadObserver.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\reports.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\requestObject.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\searchSettings.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\uninstallObserver.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\updateManager.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\utils.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\chrome\content\core\xhr.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\defaults\preferences\prefs.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\manifest.xml, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins.json, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\21_debug.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\102_dealply_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\103_intext_5_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\104_jollywallet_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\108_icm_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\119_similar_web_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\123_intext_adv_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\13_CrossriderAppUtils.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\14_CrossriderUtils.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\155_ibario_pops_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\16_FFAppAPIWrapper.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\177_crossriderDashboard.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\178_revizer_ws_dynamic_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\179_revizer_p_dynamic_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\17_jQuery.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\180_bpo_serp_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\64_appApiMessage.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\72_appApiValidation.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\78_CrossriderInfo.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\7_hooks.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\87_ginyas_wrapper.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\91_monetizationLoader.js.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\93_superfish_no_coupons_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\98_omniCommands.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\9_search_engine_hook.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\220_icm_base_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\221_icm_downloads_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\223_imonomy_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\226_set_campaign_id_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\22_resources.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\246_setup.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\28_initializer.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\47_resources_background.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\4_jquery_1_7_1.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\182_openUrl.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\183_tabsWrapper.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\184_noproblemppc_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\191_ciuvo_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\194_retargeting_bi_m.js.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\195_icm_convertmedia_m.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\1_base.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\207_dbWrapper.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\plugins\208_gam_manager.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\userCode\background.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\extensionData\userCode\extension.js, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\locale\en-US\translations.dtd, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\button1.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\button2.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\button3.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\button4.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\button5.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\crossrider_statusbar.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\icon128.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\icon16.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\icon24.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\icon48.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\panelarrow-up.png, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\popup.html, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\skin.css, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 
PUP.Optional.CrossRider.A, C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\extensions\6c937ed6-be66-4f72-9a60-ce5789cc7f09@53ba6712-2cae-46e2-b821-95baea44e049.com\skin\update.css, In Quarantäne, [66cb41eb592263d3d591a5bfde2430d0], 

Physische Sektoren: 0
(No malicious items detected)


(end)
         

Alt 19.04.2014, 15:08   #2
schrauber
/// the machine
/// TB-Ausbilder
 

Fake Java-Umleitung - Standard

Fake Java-Umleitung



hi,

Scan mit Combofix
WARNUNG an die MITLESER:
Combofix sollte ausschließlich ausgeführt werden, wenn dies von einem Teammitglied angewiesen wurde!

Downloade dir bitte Combofix vom folgenden Downloadspiegel: Link
  • WICHTIG: Speichere Combofix auf deinem Desktop.
  • Deaktiviere bitte alle deine Antivirensoftware sowie Malware/Spyware Scanner. Diese können Combofix bei der Arbeit stören. Combofix meckert auch manchmal trotzdem noch, das kannst du dann ignorieren, mir aber bitte mitteilen.
  • Starte die Combofix.exe und folge den Anweisungen auf dem Bildschirm.
  • Während Combofix läuft bitte nicht am Computer arbeiten, die Maus bewegen oder ins Combofixfenster klicken!
  • Wenn Combofix fertig ist, wird es ein Logfile erstellen.
  • Bitte poste die C:\Combofix.txt in deiner nächsten Antwort (möglichst in CODE-Tags).
Hinweis: Solltest du nach dem Neustart folgende Fehlermeldung erhalten
Es wurde versucht, einen Registrierungsschlüssel einem ungültigen Vorgang zu unterziehen, der zum Löschen markiert wurde.
starte den Rechner einfach neu. Dies sollte das Problem beheben.

__________________

__________________

Alt 19.04.2014, 15:41   #3
racer
 
Fake Java-Umleitung - Standard

Fake Java-Umleitung



Scan Combofix

Code:
ATTFilter
ComboFix 14-04-17.01 - Dekir 19.04.2014  16:26:58.1.4 - x64
Microsoft Windows 7 Professional   6.1.7601.1.1252.49.1031.18.8094.6763 [GMT 2:00]
ausgeführt von:: c:\users\Dekir\Downloads\ComboFix.exe
AV: Kaspersky Internet Security *Disabled/Updated* {179979E8-273D-D14E-0543-2861940E4886}
FW: Kaspersky Internet Security *Disabled* {2FA2F8CD-6D52-D016-2E1C-81546ADD0FFD}
SP: Kaspersky Internet Security *Disabled/Updated* {ACF8980C-0107-DEC0-3FF3-1313EF89023B}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((   Dateien erstellt von 2014-03-19 bis 2014-04-19  ))))))))))))))))))))))))))))))
.
.
2014-04-19 14:33 . 2014-04-19 14:33	--------	d-----w-	c:\users\Default\AppData\Local\temp
2014-04-19 09:58 . 2014-04-19 10:01	--------	d-----w-	C:\FRST
2014-04-19 09:09 . 2014-04-19 11:37	119512	----a-w-	c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-04-19 09:09 . 2014-04-19 09:09	--------	d-----w-	c:\program files (x86)\ Malwarebytes Anti-Malware 
2014-04-19 09:09 . 2014-04-19 09:09	--------	d-----w-	c:\programdata\Malwarebytes
2014-04-19 09:09 . 2014-04-03 07:51	63192	----a-w-	c:\windows\system32\drivers\mwac.sys
2014-04-19 09:09 . 2014-04-03 07:51	88280	----a-w-	c:\windows\system32\drivers\mbamchameleon.sys
2014-04-19 09:09 . 2014-04-03 07:50	25816	----a-w-	c:\windows\system32\drivers\mbam.sys
2014-04-19 08:46 . 2014-04-19 08:46	--------	d-----w-	c:\windows\ERUNT
2014-04-19 08:37 . 2014-04-19 11:17	--------	d-----w-	C:\AdwCleaner
2014-04-19 08:34 . 2014-04-19 08:34	--------	d-----w-	c:\windows\system32\appmgmt
2014-04-18 08:56 . 2014-04-17 03:31	10651704	----a-w-	c:\programdata\Microsoft\Windows Defender\Definition Updates\{D7460C65-CD4E-4400-9092-34892AB3A094}\mpengine.dll
2014-04-17 06:59 . 2014-04-17 06:58	96168	----a-w-	c:\windows\SysWow64\WindowsAccessBridge-32.dll
2014-04-17 06:58 . 2014-04-17 06:58	--------	d-----w-	c:\program files (x86)\Java
2014-04-12 12:38 . 2014-04-12 12:38	--------	d-----w-	c:\program files (x86)\Common Files\Java
2014-04-09 10:35 . 2014-03-31 01:16	23134208	----a-w-	c:\windows\system32\mshtml.dll
2014-04-09 10:35 . 2014-03-31 01:13	2724864	----a-w-	c:\windows\system32\mshtml.tlb
2014-04-09 10:35 . 2014-03-31 00:13	2724864	----a-w-	c:\windows\SysWow64\mshtml.tlb
2014-04-09 10:34 . 2014-03-04 09:44	362496	----a-w-	c:\windows\system32\wow64win.dll
2014-04-09 10:34 . 2014-03-04 09:44	243712	----a-w-	c:\windows\system32\wow64.dll
2014-04-09 10:34 . 2014-03-04 09:44	13312	----a-w-	c:\windows\system32\wow64cpu.dll
2014-04-09 10:34 . 2014-03-04 09:44	16384	----a-w-	c:\windows\system32\ntvdm64.dll
2014-04-09 10:34 . 2014-03-04 09:44	1163264	----a-w-	c:\windows\system32\kernel32.dll
2014-04-09 10:34 . 2014-03-04 09:17	14336	----a-w-	c:\windows\SysWow64\ntvdm64.dll
2014-04-09 10:34 . 2014-03-04 09:16	25600	----a-w-	c:\windows\SysWow64\setup16.exe
2014-04-09 10:34 . 2014-03-04 09:16	5120	----a-w-	c:\windows\SysWow64\wow32.dll
2014-04-09 10:34 . 2014-03-04 08:09	7680	----a-w-	c:\windows\SysWow64\instnm.exe
2014-04-09 10:34 . 2014-03-04 08:09	2048	----a-w-	c:\windows\SysWow64\user.exe
.
.
.
((((((((((((((((((((((((((((((((((((   Find3M Bericht   ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-04-09 11:16 . 2012-11-23 13:55	90655440	----a-w-	c:\windows\system32\MRT.exe
2014-04-08 19:16 . 2012-11-23 13:51	70832	----a-w-	c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2014-04-08 19:16 . 2012-11-23 13:51	692400	----a-w-	c:\windows\SysWow64\FlashPlayerApp.exe
2014-03-31 07:35 . 2013-02-26 08:11	270496	------w-	c:\windows\system32\MpSigStub.exe
2014-03-24 09:32 . 2013-11-02 12:31	625248	----a-w-	c:\windows\system32\drivers\klif.sys
2014-03-24 09:32 . 2013-11-02 12:31	115296	----a-w-	c:\windows\system32\drivers\klflt.sys
2014-03-04 09:17 . 2014-04-09 10:34	44032	----a-w-	c:\windows\apppatch\acwow64.dll
2014-03-01 05:16 . 2014-03-12 08:00	4096	----a-w-	c:\windows\system32\ieetwcollectorres.dll
2014-03-01 04:58 . 2014-03-12 08:00	2765824	----a-w-	c:\windows\system32\iertutil.dll
2014-03-01 04:52 . 2014-03-12 08:00	66048	----a-w-	c:\windows\system32\iesetup.dll
2014-03-01 04:51 . 2014-03-12 08:00	48640	----a-w-	c:\windows\system32\ieetwproxystub.dll
2014-03-01 04:42 . 2014-03-12 08:00	53760	----a-w-	c:\windows\system32\jsproxy.dll
2014-03-01 04:40 . 2014-03-12 08:00	33792	----a-w-	c:\windows\system32\iernonce.dll
2014-03-01 04:37 . 2014-03-12 08:00	574976	----a-w-	c:\windows\system32\ieui.dll
2014-03-01 04:33 . 2014-03-12 08:00	139264	----a-w-	c:\windows\system32\ieUnatt.exe
2014-03-01 04:33 . 2014-03-12 08:00	111616	----a-w-	c:\windows\system32\ieetwcollector.exe
2014-03-01 04:32 . 2014-03-12 08:00	708608	----a-w-	c:\windows\system32\jscript9diag.dll
2014-03-01 04:23 . 2014-03-12 08:00	940032	----a-w-	c:\windows\system32\MsSpellCheckingFacility.exe
2014-03-01 04:17 . 2014-03-12 08:00	218624	----a-w-	c:\windows\system32\ie4uinit.exe
2014-03-01 04:02 . 2014-03-12 08:00	195584	----a-w-	c:\windows\system32\msrating.dll
2014-03-01 03:54 . 2014-03-12 08:00	5768704	----a-w-	c:\windows\system32\jscript9.dll
2014-03-01 03:52 . 2014-03-12 08:00	61952	----a-w-	c:\windows\SysWow64\iesetup.dll
2014-03-01 03:51 . 2014-03-12 08:00	51200	----a-w-	c:\windows\SysWow64\ieetwproxystub.dll
2014-03-01 03:42 . 2014-03-12 08:00	627200	----a-w-	c:\windows\system32\msfeeds.dll
2014-03-01 03:38 . 2014-03-12 08:00	112128	----a-w-	c:\windows\SysWow64\ieUnatt.exe
2014-03-01 03:37 . 2014-03-12 08:00	553472	----a-w-	c:\windows\SysWow64\jscript9diag.dll
2014-03-01 03:35 . 2014-03-12 08:00	2041856	----a-w-	c:\windows\system32\inetcpl.cpl
2014-03-01 03:18 . 2014-03-12 08:00	13051904	----a-w-	c:\windows\system32\ieframe.dll
2014-03-01 03:14 . 2014-03-12 08:00	4244480	----a-w-	c:\windows\SysWow64\jscript9.dll
2014-03-01 03:10 . 2014-03-12 08:00	2334208	----a-w-	c:\windows\system32\wininet.dll
2014-03-01 03:00 . 2014-03-12 08:00	1964032	----a-w-	c:\windows\SysWow64\inetcpl.cpl
2014-03-01 02:38 . 2014-03-12 08:00	1393664	----a-w-	c:\windows\system32\urlmon.dll
2014-03-01 02:32 . 2014-03-12 08:00	1820160	----a-w-	c:\windows\SysWow64\wininet.dll
2014-03-01 02:25 . 2014-03-12 08:00	817664	----a-w-	c:\windows\system32\ieapfltr.dll
2014-02-18 10:42 . 2013-10-17 14:47	29280	----a-w-	c:\windows\system32\drivers\klkbdflt.sys
2014-02-10 17:04 . 2014-01-03 06:59	430080	----a-w-	c:\windows\mod_frst.exe
2014-02-07 01:23 . 2014-03-12 08:00	3156480	----a-w-	c:\windows\system32\win32k.sys
2014-02-04 02:32 . 2014-03-12 07:59	624128	----a-w-	c:\windows\system32\qedit.dll
2014-02-04 02:04 . 2014-03-12 07:59	509440	----a-w-	c:\windows\SysWow64\qedit.dll
2014-01-29 02:32 . 2014-03-12 08:00	484864	----a-w-	c:\windows\system32\wer.dll
2014-01-29 02:06 . 2014-03-12 08:00	381440	----a-w-	c:\windows\SysWow64\wer.dll
.
.
((((((((((((((((((((((((((((   Autostartpunkte der Registrierung   ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt. 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"USB3MON"="c:\program files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe" [2012-02-27 291608]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-04-04 958576]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\KasperskyAntiVirus]
"DisableMonitoring"=dword:00000001
.
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [x]
R3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\IEEtwCollector.exe;c:\windows\SYSNATIVE\IEEtwCollector.exe [x]
R3 RSUSBVSTOR;RtsUVStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUVStor.sys;c:\windows\SYSNATIVE\Drivers\RtsUVStor.sys [x]
R3 SXDS10;soft Xpansion Dispatch Service;c:\program files (x86)\Common Files\soft Xpansion\sxds10.exe \Service;c:\program files (x86)\Common Files\soft Xpansion\sxds10.exe \Service [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
R4 klflt;klflt;c:\windows\system32\DRIVERS\klflt.sys;c:\windows\SYSNATIVE\DRIVERS\klflt.sys [x]
S0 iusb3hcs;Intel(R) USB 3.0 Hostcontroller-Switchtreiber;c:\windows\system32\DRIVERS\iusb3hcs.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3hcs.sys [x]
S1 KLIM6;Kaspersky Anti-Virus NDIS 6 Filter;c:\windows\system32\DRIVERS\klim6.sys;c:\windows\SYSNATIVE\DRIVERS\klim6.sys [x]
S1 klpd;klpd;c:\windows\system32\DRIVERS\klpd.sys;c:\windows\SYSNATIVE\DRIVERS\klpd.sys [x]
S1 kltdi;kltdi;c:\windows\system32\DRIVERS\kltdi.sys;c:\windows\SYSNATIVE\DRIVERS\kltdi.sys [x]
S1 kneps;kneps;c:\windows\system32\DRIVERS\kneps.sys;c:\windows\SYSNATIVE\DRIVERS\kneps.sys [x]
S3 IntcDAud;Intel(R) Display-Audio;c:\windows\system32\DRIVERS\IntcDAud.sys;c:\windows\SYSNATIVE\DRIVERS\IntcDAud.sys [x]
S3 iusb3hub;Intel(R) USB 3.0-Hubtreiber;c:\windows\system32\DRIVERS\iusb3hub.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3hub.sys [x]
S3 iusb3xhc;Intel(R) USB 3.0 eXtensible-Hostcontrollertreiber;c:\windows\system32\DRIVERS\iusb3xhc.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3xhc.sys [x]
S3 klkbdflt;Kaspersky Lab KLKBDFLT;c:\windows\system32\DRIVERS\klkbdflt.sys;c:\windows\SYSNATIVE\DRIVERS\klkbdflt.sys [x]
S3 klmouflt;Kaspersky Lab KLMOUFLT;c:\windows\system32\DRIVERS\klmouflt.sys;c:\windows\SYSNATIVE\DRIVERS\klmouflt.sys [x]
S3 L1C;NDIS Miniport Driver for Atheros AR81xx PCI-E Ethernet Controller;c:\windows\system32\DRIVERS\L1C60x64.sys;c:\windows\SYSNATIVE\DRIVERS\L1C60x64.sys [x]
.
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2012-03-02 170264]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2012-03-02 398616]
"Persistence"="c:\windows\system32\igfxpers.exe" [2012-03-02 440600]
"Eraser"="c:\progra~1\Eraser\Eraser.exe" [2012-05-22 980920]
.
------- Zusätzlicher Suchlauf -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
IE: Nach Microsoft E&xel exportieren - c:\progra~2\MICROS~1\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.178.1
FF - ProfilePath - c:\users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\
.
- - - - Entfernte verwaiste Registrierungseinträge - - - -
.
Wow6432Node-HKU-Default-RunOnce-SPReview - c:\windows\System32\SPReview\SPReview.exe
HKLM_Wow6432Node-ActiveSetup-{2D46B6DC-2207-486B-B523-A557E6D54B47} - start
.
.
.
--------------------- Gesperrte Registrierungsschluessel ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_12_0_0_77_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_12_0_0_77_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_12_0_0_77_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_12_0_0_77_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_12_0_0_77.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.12"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_12_0_0_77.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_12_0_0_77.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_12_0_0_77.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*]
@="?????????????????? v1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*\CLSID]
@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*]
@="?????????????????? v2"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*\CLSID]
@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Zeit der Fertigstellung: 2014-04-19  16:36:43
ComboFix-quarantined-files.txt  2014-04-19 14:36
.
Vor Suchlauf: 11 Verzeichnis(se), 399.767.216.128 Bytes frei
Nach Suchlauf: 15 Verzeichnis(se), 399.456.354.304 Bytes frei
.
- - End Of File - - AE7B7C4B8B8BB4CF2791CF63A9BA544B
         
__________________

Alt 20.04.2014, 17:55   #4
schrauber
/// the machine
/// TB-Ausbilder
 

Fake Java-Umleitung - Standard

Fake Java-Umleitung



Downloade Dir bitte Malwarebytes Anti-Malware
  • Installiere das Programm in den vorgegebenen Pfad. (Bebilderte Anleitung zu MBAM)
  • Starte Malwarebytes' Anti-Malware (MBAM).
  • Klicke im Anschluss auf Scannen, wähle den Bedrohungssuchlauf aus und klicke auf Suchlauf starten.
  • Lass am Ende des Suchlaufs alle Funde (falls vorhanden) in die Quarantäne verschieben. Klicke dazu auf Auswahl entfernen.
  • Lass deinen Rechner ggf. neu starten, um die Bereinigung abzuschließen.
  • Starte MBAM, klicke auf Verlauf und dann auf Anwendungsprotokolle.
  • Wähle das neueste Scan-Protokoll aus und klicke auf Export. Wähle Textdatei (.txt) aus und speichere die Datei als mbam.txt auf dem Desktop ab. Das Logfile von MBAM findest du hier.
  • Füge den Inhalt der mbam.txt mit deiner nächsten Antwort hinzu.


Downloade Dir bitte AdwCleaner Logo Icon AdwCleaner auf deinen Desktop.
  • Schließe alle offenen Programme und Browser. Bebilderte Anleitung zu AdwCleaner.
  • Starte die AdwCleaner.exe mit einem Doppelklick.
  • Stimme den Nutzungsbedingungen zu.
  • Klicke auf Optionen und vergewissere dich, dass die folgenden Punkte ausgewählt sind:
    • "Tracing" Schlüssel löschen
    • Winsock Einstellungen zurücksetzen
    • Proxy Einstellungen zurücksetzen
    • Internet Explorer Richtlinien zurücksetzen
    • Chrome Richtlinien zurücksetzen
    • Stelle sicher, dass alle 5 Optionen wie hier dargestellt, ausgewählt sind
  • Klicke auf Suchlauf und warte bis dieser abgeschlossen ist.
  • Klicke nun auf Löschen und bestätige auftretende Hinweise mit Ok.
  • Dein Rechner wird automatisch neu gestartet. Nach dem Neustart öffnet sich eine Textdatei. Poste mir deren Inhalt mit deiner nächsten Antwort.
  • Die Logdatei findest du auch unter C:\AdwCleaner\AdwCleaner[Cx].txt. (x = fortlaufende Nummer).

Beende bitte Deine Schutzsoftware um eventuelle Konflikte zu vermeiden.
Bitte lade Junkware Removal Tool auf Deinen Desktop

  • Starte das Tool mit Doppelklick. Ab Windows Vista (oder höher) bitte mit Rechtsklick "als Administrator ausführen" starten.
  • Drücke eine beliebige Taste, um das Tool zu starten.
  • Je nach System kann der Scan eine Weile dauern.
  • Wenn das Tool fertig ist wird das Logfile (JRT.txt) auf dem Desktop gespeichert und automatisch geöffnet.
  • Bitte poste den Inhalt der JRT.txt in Deiner nächsten Antwort.


und ein frisches FRST log bitte.
__________________
gruß,
schrauber

Proud Member of UNITE and ASAP since 2009

Spenden
Anleitungen und Hilfestellungen
Trojaner-Board Facebook-Seite

Keine Hilfestellung via PM!

Alt 21.04.2014, 11:00   #5
racer
 
Fake Java-Umleitung - Standard

Fake Java-Umleitung



MBAM Scan

Code:
ATTFilter
 Malwarebytes Anti-Malware 
www.malwarebytes.org

Suchlauf Datum: 21.04.2014
Suchlauf-Zeit: 10:52:01
Logdatei: mbam.txt
Administrator: Ja

Version: 2.00.1.1004
Malware Datenbank: v2014.04.21.03
Rootkit Datenbank: v2014.03.27.01
Lizenz: Kostenlos
Malware Schutz: Deaktiviert
Bösartiger Webseiten Schutz: Deaktiviert
Chameleon: Deaktiviert

Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS


Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 279552
Verstrichene Zeit: 22 Min, 37 Sek

Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Aktiviert
Shuriken: Aktiviert
PUP: Aktiviert
PUM: Aktiviert

Prozesse: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registrierungsschlüssel: 0
(No malicious items detected)

Registrierungswerte: 0
(No malicious items detected)

Registrierungsdaten: 0
(No malicious items detected)

Ordner: 0
(No malicious items detected)

Dateien: 0
(No malicious items detected)

Physische Sektoren: 0
(No malicious items detected)


(end)
         

AdwCleaner Logfile:
Code:
ATTFilter
# AdwCleaner v3.101 - Bericht erstellt am 21/04/2014 um 11:11:11
# Aktualisiert 20/04/2014 von Xplode
# Betriebssystem : Windows 7 Professional Service Pack 1 (64 bits)
# Gestartet von : C:\Users\Dekir\Downloads\adwcleaner.exe
# Option : Löschen

***** [ Dienste ] *****


***** [ Dateien / Ordner ] *****

Ordner Gelöscht : C:\ProgramData\Package Cache

***** [ Verknüpfungen ] *****


***** [ Registrierungsdatenbank ] *****

Schlüssel Gelöscht : HKLM\SOFTWARE\Google\Chrome\Extensions\blbkdnmdcafmfhinpmnlhhddbepgkeaa
***** [ Browser ] *****

-\\ Internet Explorer v11.0.9600.16521


-\\ Mozilla Firefox v28.0 (de)

[ Datei : C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default\prefs.js ]


-\\ Google Chrome v

[ Datei : C:\Users\Dekir\AppData\Local\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [3920 octets] - [21/04/2014 11:05:00]
AdwCleaner[S1].txt - [3843 octets] - [21/04/2014 11:11:11]

########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt - [3903 octets] ##########
         



JRT Scan

Code:
ATTFilter
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 7 Professional x64
Ran by Dekir on 21.04.2014 at 11:21:44,65
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys



~~~ Files



~~~ Folders



~~~ FireFox

Emptied folder: C:\Users\Dekir\AppData\Roaming\mozilla\firefox\profiles\6fxgigba.default\minidumps [1 files]



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 21.04.2014 at 11:29:04,34
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
         

FRST Logfile:

FRST Logfile:

FRST Logfile:
Code:
ATTFilter
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 20-04-2014 02
Ran by Dekir (administrator) on DEKIR-PC on 21-04-2014 11:49:22
Running from C:\Users\Dekir\Downloads
Windows 7 Professional Service Pack 1 (X64) OS Language: German Standard
Internet Explorer Version 11
Boot Mode: Normal



==================== Processes (Whitelisted) =================

(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(The Eraser Project) C:\Program Files\Eraser\Eraser.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
(Adobe Systems Incorporated) C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
(Oracle Corporation) C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
(Mozilla Corporation) C:\Program Files (x86)\Mozilla Firefox\firefox.exe


==================== Registry (Whitelisted) ==================

HKLM\...\Run: [Eraser] => C:\Program Files\Eraser\Eraser.exe [980920 2012-05-22] (The Eraser Project)
HKLM-x32\...\Run: [USB3MON] => C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291608 2012-02-27] (Intel Corporation)
HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [958576 2013-04-04] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [SunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [254336 2013-07-02] (Oracle Corporation)
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0x9C71A2A17AFCCD01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de-DE
StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe
BHO: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO)
BHO: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO)
BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
BHO-x32: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO)
BHO-x32: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
BHO-x32: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO-x32: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO)
BHO-x32: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO-x32: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
Toolbar: HKCU - No Name - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} -  No File
Tcpip\Parameters: [DhcpNameServer] 192.168.178.1

FireFox:
========
FF ProfilePath: C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_13_0_0_182.dll ()
FF Plugin: @java.com/DTPlugin,version=10.45.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.45.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_13_0_0_182.dll ()
FF Plugin-x32: @java.com/DTPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files (x86)\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @videolan.org/vlc,version=2.0.4 - C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin-x32: @videolan.org/vlc,version=2.1.3 - C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin-x32: Adobe Reader - C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF HKLM-x32\...\Firefox\Extensions:  - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com
FF Extension: Kaspersky URL Advisor - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [virtual_keyboard@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com
FF Extension: Virtual Keyboard - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [content_blocker@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com
FF Extension: Dangerous Websites Blocker - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [anti_banner@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com
FF Extension: Anti-Banner - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [online_banking@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com
FF Extension: Safe Money - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com [2013-11-02]

Chrome: 
=======
CHR HomePage: hxxp://www.google.com/
CHR RestoreOnStartup: "hxxp://www.google.com/"
CHR HKLM-x32\...\Chrome\Extension: [dchlnpcodkpfdpacogkljefecpegganj] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\urladvisor.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [hakdifolhalapjijoafobooafbilfakh] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\online_banking_chrome.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [hghkgaeecgjhjkannahfamoehjmkjail] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\content_blocker_chrome.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [jagncdcchgajhfhijbbhecadmaiegcmh] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\virtkbd.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [pjldcfjmnllhmgjclecdnfampinooman] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\ab.crx [2013-10-17]

==================== Services (Whitelisted) =================

S2 AVP; C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe [214512 2013-10-17] (Kaspersky Lab ZAO)
S3 SXDS10; C:\Program Files (x86)\Common Files\soft Xpansion\sxds10.exe [234096 2013-08-02] (soft Xpansion)
S3 aspnet_state; %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe [X]

==================== Drivers (Whitelisted) ====================

R0 kl1; C:\Windows\System32\DRIVERS\kl1.sys [458336 2013-11-07] (Kaspersky Lab ZAO)
S4 klflt; C:\Windows\System32\DRIVERS\klflt.sys [115296 2014-03-24] (Kaspersky Lab ZAO)
R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [625248 2014-03-24] (Kaspersky Lab ZAO)
R1 KLIM6; C:\Windows\System32\DRIVERS\klim6.sys [29792 2013-10-17] (Kaspersky Lab ZAO)
R3 klkbdflt; C:\Windows\System32\DRIVERS\klkbdflt.sys [29280 2014-02-18] (Kaspersky Lab ZAO)
R3 klmouflt; C:\Windows\System32\DRIVERS\klmouflt.sys [29280 2013-10-17] (Kaspersky Lab ZAO)
R1 klpd; C:\Windows\System32\DRIVERS\klpd.sys [15456 2013-04-12] (Kaspersky Lab ZAO)
R1 kltdi; C:\Windows\System32\DRIVERS\kltdi.sys [55904 2013-05-14] (Kaspersky Lab ZAO)
R1 kneps; C:\Windows\System32\DRIVERS\kneps.sys [178272 2013-12-19] (Kaspersky Lab ZAO)
R3 L1C; C:\Windows\System32\DRIVERS\L1C60x64.sys [106096 2011-11-15] (Atheros Communications, Inc.)

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-04-21 11:48 - 2014-04-21 11:48 - 00000000 ____D () C:\Users\Dekir\Downloads\FRST-OlderVersion
2014-04-21 11:29 - 2014-04-21 11:29 - 00000756 _____ () C:\Users\Dekir\Desktop\JRT.txt
2014-04-21 11:03 - 2014-04-21 11:03 - 01322509 _____ () C:\Users\Dekir\Downloads\adwcleaner.exe
2014-04-20 19:36 - 2014-04-20 19:46 - 00000000 ____D () C:\Users\Dekir\AppData\Roaming\vlc
2014-04-19 16:36 - 2014-04-19 16:36 - 00016612 _____ () C:\ComboFix.txt
2014-04-19 16:25 - 2011-06-26 08:45 - 00256000 _____ () C:\Windows\PEV.exe
2014-04-19 16:25 - 2010-11-07 19:20 - 00208896 _____ () C:\Windows\MBR.exe
2014-04-19 16:25 - 2009-04-20 06:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00098816 _____ () C:\Windows\sed.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00080412 _____ () C:\Windows\grep.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00068096 _____ () C:\Windows\zip.exe
2014-04-19 16:24 - 2014-04-19 16:36 - 00000000 ____D () C:\Qoobox
2014-04-19 16:24 - 2014-04-19 16:34 - 00000000 ____D () C:\Windows\erdnt
2014-04-19 16:22 - 2014-04-19 16:22 - 05195154 ____R (Swearware) C:\Users\Dekir\Downloads\ComboFix.exe
2014-04-19 12:21 - 2014-04-19 12:21 - 593592608 _____ () C:\Windows\MEMORY.DMP
2014-04-19 12:21 - 2014-04-19 12:21 - 00330336 _____ () C:\Windows\Minidump\041914-22900-01.dmp
2014-04-19 12:21 - 2014-04-19 12:21 - 00000000 ____D () C:\Windows\Minidump
2014-04-19 12:10 - 2014-04-19 12:10 - 00380416 _____ () C:\Users\Dekir\Downloads\Gmer-19357.exe
2014-04-19 12:07 - 2014-04-21 10:25 - 00000000 ____D () C:\Users\Dekir\Desktop\Scans
2014-04-19 12:00 - 2014-04-19 12:01 - 00017584 _____ () C:\Users\Dekir\Downloads\Addition.txt
2014-04-19 11:59 - 2014-04-21 11:49 - 00010968 _____ () C:\Users\Dekir\Downloads\FRST.txt
2014-04-19 11:58 - 2014-04-21 11:49 - 00000000 ____D () C:\FRST
2014-04-19 11:58 - 2014-04-21 11:48 - 02056704 _____ (Farbar) C:\Users\Dekir\Downloads\FRST64.exe
2014-04-19 11:55 - 2014-04-19 11:55 - 00000472 _____ () C:\Users\Dekir\Downloads\defogger_disable.log
2014-04-19 11:55 - 2014-04-19 11:55 - 00000000 _____ () C:\Users\Dekir\defogger_reenable
2014-04-19 11:54 - 2014-04-19 11:54 - 00050477 _____ () C:\Users\Dekir\Downloads\Defogger.exe
2014-04-19 11:09 - 2014-04-21 10:29 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\Program Files (x86)\ Malwarebytes Anti-Malware 
2014-04-19 11:09 - 2014-04-03 09:51 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-19 11:09 - 2014-04-03 09:51 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-19 11:09 - 2014-04-03 09:50 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-04-19 11:06 - 2014-04-19 11:07 - 17305616 _____ (Malwarebytes Corporation ) C:\Users\Dekir\Downloads\mbam-setup-2.0.1.1004.exe
2014-04-19 10:59 - 2014-04-19 10:59 - 00001337 _____ () C:\Users\Dekir\Documents\JRT.txt
2014-04-19 10:46 - 2014-04-19 10:46 - 00000000 ____D () C:\Windows\ERUNT
2014-04-19 10:44 - 2014-04-19 10:44 - 01016261 _____ (Thisisu) C:\Users\Dekir\Downloads\JRT.exe
2014-04-19 10:37 - 2014-04-21 11:11 - 00000000 ____D () C:\AdwCleaner
2014-04-19 10:34 - 2014-04-19 10:34 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-04-17 08:59 - 2014-04-17 08:58 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-17 08:59 - 2014-04-17 08:58 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-17 08:59 - 2014-04-17 08:58 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-17 08:59 - 2014-04-17 08:58 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-17 08:58 - 2014-04-17 08:58 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-17 08:56 - 2014-04-17 08:57 - 29164456 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jre-7u55-windows-i586.exe
2014-04-17 08:54 - 2014-04-17 08:54 - 24677393 _____ () C:\Users\Dekir\Downloads\vlc-2.1.3-win32.exe
2014-04-12 14:38 - 2014-04-12 14:38 - 00000000 ____D () C:\ProgramData\Sun
2014-04-12 14:32 - 2014-04-12 14:32 - 00921000 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jxpiinstall.exe
2014-04-12 12:15 - 2014-04-12 12:15 - 00000000 ____D () C:\Users\Dekir\Desktop\Fotos
2014-04-09 12:35 - 2014-03-31 03:16 - 23134208 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-04-09 12:35 - 2014-03-31 03:13 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-04-09 12:35 - 2014-03-31 02:13 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-04-09 12:35 - 2014-03-31 01:57 - 17073152 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 01163264 _____ (Microsoft Corporation) C:\Windows\system32\kernel32.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00362496 _____ (Microsoft Corporation) C:\Windows\system32\wow64win.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00243712 _____ (Microsoft Corporation) C:\Windows\system32\wow64.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00016384 _____ (Microsoft Corporation) C:\Windows\system32\ntvdm64.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00013312 _____ (Microsoft Corporation) C:\Windows\system32\wow64cpu.dll
2014-04-09 12:34 - 2014-03-04 11:17 - 00014336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntvdm64.dll
2014-04-09 12:34 - 2014-03-04 11:16 - 01114112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kernel32.dll
2014-04-09 12:34 - 2014-03-04 11:16 - 00025600 _____ (Microsoft Corporation) C:\Windows\SysWOW64\setup16.exe
2014-04-09 12:34 - 2014-03-04 11:16 - 00005120 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wow32.dll
2014-04-09 12:34 - 2014-03-04 10:09 - 00007680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\instnm.exe
2014-04-09 12:34 - 2014-03-04 10:09 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\user.exe
2014-03-29 14:50 - 2014-03-29 14:50 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox

==================== One Month Modified Files and Folders =======

2014-04-21 11:49 - 2014-04-19 11:59 - 00010968 _____ () C:\Users\Dekir\Downloads\FRST.txt
2014-04-21 11:49 - 2014-04-19 11:58 - 00000000 ____D () C:\FRST
2014-04-21 11:48 - 2014-04-21 11:48 - 00000000 ____D () C:\Users\Dekir\Downloads\FRST-OlderVersion
2014-04-21 11:48 - 2014-04-19 11:58 - 02056704 _____ (Farbar) C:\Users\Dekir\Downloads\FRST64.exe
2014-04-21 11:47 - 2009-07-14 19:58 - 04494568 _____ () C:\Windows\system32\perfh007.dat
2014-04-21 11:47 - 2009-07-14 19:58 - 01360200 _____ () C:\Windows\system32\perfc007.dat
2014-04-21 11:47 - 2009-07-14 07:13 - 00005582 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-21 11:46 - 2012-11-23 00:13 - 02093143 _____ () C:\Windows\WindowsUpdate.log
2014-04-21 11:29 - 2014-04-21 11:29 - 00000756 _____ () C:\Users\Dekir\Desktop\JRT.txt
2014-04-21 11:19 - 2009-07-14 06:45 - 00016240 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-04-21 11:19 - 2009-07-14 06:45 - 00016240 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-04-21 11:13 - 2013-11-02 14:31 - 00000000 ____D () C:\ProgramData\Kaspersky Lab
2014-04-21 11:12 - 2009-07-14 07:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-21 11:12 - 2009-07-14 06:51 - 00102284 _____ () C:\Windows\setupact.log
2014-04-21 11:11 - 2014-04-19 10:37 - 00000000 ____D () C:\AdwCleaner
2014-04-21 11:03 - 2014-04-21 11:03 - 01322509 _____ () C:\Users\Dekir\Downloads\adwcleaner.exe
2014-04-21 10:29 - 2014-04-19 11:09 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-21 10:25 - 2014-04-19 12:07 - 00000000 ____D () C:\Users\Dekir\Desktop\Scans
2014-04-20 19:46 - 2014-04-20 19:36 - 00000000 ____D () C:\Users\Dekir\AppData\Roaming\vlc
2014-04-19 21:03 - 2012-11-23 10:56 - 00479806 _____ () C:\Windows\PFRO.log
2014-04-19 16:36 - 2014-04-19 16:36 - 00016612 _____ () C:\ComboFix.txt
2014-04-19 16:36 - 2014-04-19 16:24 - 00000000 ____D () C:\Qoobox
2014-04-19 16:36 - 2009-07-14 05:20 - 00000000 __RHD () C:\Users\Default
2014-04-19 16:34 - 2014-04-19 16:24 - 00000000 ____D () C:\Windows\erdnt
2014-04-19 16:33 - 2009-07-14 04:34 - 00000215 _____ () C:\Windows\system.ini
2014-04-19 16:22 - 2014-04-19 16:22 - 05195154 ____R (Swearware) C:\Users\Dekir\Downloads\ComboFix.exe
2014-04-19 12:25 - 2013-05-06 10:52 - 00000000 ____D () C:\Users\Dekir\AppData\Local\CrashDumps
2014-04-19 12:21 - 2014-04-19 12:21 - 593592608 _____ () C:\Windows\MEMORY.DMP
2014-04-19 12:21 - 2014-04-19 12:21 - 00330336 _____ () C:\Windows\Minidump\041914-22900-01.dmp
2014-04-19 12:21 - 2014-04-19 12:21 - 00000000 ____D () C:\Windows\Minidump
2014-04-19 12:10 - 2014-04-19 12:10 - 00380416 _____ () C:\Users\Dekir\Downloads\Gmer-19357.exe
2014-04-19 12:01 - 2014-04-19 12:00 - 00017584 _____ () C:\Users\Dekir\Downloads\Addition.txt
2014-04-19 11:55 - 2014-04-19 11:55 - 00000472 _____ () C:\Users\Dekir\Downloads\defogger_disable.log
2014-04-19 11:55 - 2014-04-19 11:55 - 00000000 _____ () C:\Users\Dekir\defogger_reenable
2014-04-19 11:55 - 2012-11-23 00:20 - 00000000 ____D () C:\Users\Dekir
2014-04-19 11:54 - 2014-04-19 11:54 - 00050477 _____ () C:\Users\Dekir\Downloads\Defogger.exe
2014-04-19 11:41 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\Help
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\Program Files (x86)\ Malwarebytes Anti-Malware 
2014-04-19 11:07 - 2014-04-19 11:06 - 17305616 _____ (Malwarebytes Corporation ) C:\Users\Dekir\Downloads\mbam-setup-2.0.1.1004.exe
2014-04-19 10:59 - 2014-04-19 10:59 - 00001337 _____ () C:\Users\Dekir\Documents\JRT.txt
2014-04-19 10:46 - 2014-04-19 10:46 - 00000000 ____D () C:\Windows\ERUNT
2014-04-19 10:44 - 2014-04-19 10:44 - 01016261 _____ (Thisisu) C:\Users\Dekir\Downloads\JRT.exe
2014-04-19 10:34 - 2014-04-19 10:34 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-04-18 15:22 - 2014-03-15 13:01 - 00017118 _____ () C:\Users\Dekir\deutsche Medailliengewinner.xlsx
2014-04-17 08:59 - 2014-01-06 12:33 - 00000000 ____D () C:\ProgramData\Oracle
2014-04-17 08:58 - 2014-04-17 08:59 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-17 08:58 - 2014-04-17 08:59 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-17 08:58 - 2014-04-17 08:59 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-17 08:58 - 2014-04-17 08:59 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-17 08:58 - 2014-04-17 08:58 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-17 08:57 - 2014-04-17 08:56 - 29164456 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jre-7u55-windows-i586.exe
2014-04-17 08:55 - 2012-11-23 10:10 - 00001070 _____ () C:\Users\Public\Desktop\VLC media player.lnk
2014-04-17 08:54 - 2014-04-17 08:54 - 24677393 _____ () C:\Users\Dekir\Downloads\vlc-2.1.3-win32.exe
2014-04-13 14:54 - 2014-03-14 17:13 - 00012725 _____ () C:\Users\Dekir\Desktop\olympia wintersport-1.xlsx
2014-04-12 14:38 - 2014-04-12 14:38 - 00000000 ____D () C:\ProgramData\Sun
2014-04-12 14:32 - 2014-04-12 14:32 - 00921000 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jxpiinstall.exe
2014-04-12 12:15 - 2014-04-12 12:15 - 00000000 ____D () C:\Users\Dekir\Desktop\Fotos
2014-04-12 10:12 - 2013-11-09 16:16 - 00012265 _____ () C:\Users\Dekir\dynamo.xlsx
2014-04-09 13:17 - 2013-07-16 06:39 - 00000000 ____D () C:\Windows\system32\MRT
2014-04-09 13:17 - 2012-11-23 09:55 - 00000000 ____D () C:\ProgramData\Microsoft Help
2014-04-09 13:16 - 2012-11-23 15:55 - 90655440 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-04-08 21:16 - 2012-11-23 15:51 - 00692400 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-04-08 21:16 - 2012-11-23 15:51 - 00070832 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-04-08 21:14 - 2012-11-25 11:17 - 00000000 ____D () C:\Users\Dekir\AppData\Local\Adobe
2014-04-03 09:51 - 2014-04-19 11:09 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-03 09:51 - 2014-04-19 11:09 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-03 09:50 - 2014-04-19 11:09 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-31 09:35 - 2013-02-26 10:11 - 00270496 ____N (Microsoft Corporation) C:\Windows\system32\MpSigStub.exe
2014-03-31 03:16 - 2014-04-09 12:35 - 23134208 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-03-31 03:13 - 2014-04-09 12:35 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-03-31 02:13 - 2014-04-09 12:35 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-03-31 01:57 - 2014-04-09 12:35 - 17073152 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-03-29 15:16 - 2012-11-23 10:04 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service
2014-03-29 14:50 - 2014-03-29 14:50 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-03-29 10:49 - 2009-07-14 07:08 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-03-24 11:32 - 2013-11-02 14:31 - 00625248 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klif.sys
2014-03-24 11:32 - 2013-11-02 14:31 - 00115296 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klflt.sys

Some content of TEMP:
====================
C:\Users\Dekir\AppData\Local\Temp\Quarantine.exe


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit


LastRegBack: 2014-04-18 15:59

==================== End Of Log ============================
         
--- --- ---

--- --- ---

--- --- ---

--- --- ---


Alt 22.04.2014, 12:07   #6
schrauber
/// the machine
/// TB-Ausbilder
 

Fake Java-Umleitung - Standard

Fake Java-Umleitung




ESET Online Scanner

  • Hier findest du eine bebilderte Anleitung zu ESET Online Scanner
  • Lade und starte Eset Online Scanner
  • Setze einen Haken bei Ja, ich bin mit den Nutzungsbedingungen einverstanden und klicke auf Starten.
  • Aktiviere die "Erkennung von eventuell unerwünschten Anwendungen" und wähle folgende Einstellungen.
  • Klicke auf Starten.
  • Die Signaturen werden heruntergeladen, der Scan beginnt automatisch.
  • Klicke am Ende des Suchlaufs auf Fertig stellen.
  • Schließe das Fenster von ESET.
  • Explorer öffnen.
  • C:\Programme\Eset\EsetOnlineScanner\log.txt (bei 64 Bit auch C:\Programme (x86)\Eset\EsetOnlineScanner\log.txt) suchen und mit Deinem Editor öffnen (bebildert).
  • Logfile hier posten.
  • Deinstallation: Systemsteuerung => Software / Programme deinstallieren => Eset Online Scanner V3 entfernen.
  • Manuell folgenden Ordner löschen und Papierkorb leeren => C:\Programme\Eset


Downloade Dir bitte SecurityCheck und:

  • Speichere es auf dem Desktop.
  • Starte SecurityCheck.exe und folge den Anweisungen in der DOS-Box.
  • Wenn der Scan beendet wurde sollte sich ein Textdokument (checkup.txt) öffnen.
Poste den Inhalt bitte hier.

und ein frisches FRST log bitte. Noch Probleme?
__________________
--> Fake Java-Umleitung

Alt 28.04.2014, 15:54   #7
racer
 
Fake Java-Umleitung - Standard

Fake Java-Umleitung



Eset Online Scanner

Code:
ATTFilter
ESETSmartInstaller@High as downloader log:
Can not read file from internet.ESETSmartInstaller@High as downloader log:
Can not read file from internet.# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6920
# api_version=3.0.2
# EOSSerial=c5cf2fd62a17e949bf37a168ca0a5d05
# engine=18048
# end=stopped
# remove_checked=false
# archives_checked=true
# unwanted_checked=false
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2014-04-27 03:02:53
# local_time=2014-04-27 05:02:53 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1031
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode=5893 16776573 100 94 4853 150240823 0 0
# scanned=13003
# found=0
# cleaned=0
# scan_time=703
ESETSmartInstaller@High as downloader log:
all ok
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.6920
# api_version=3.0.2
# EOSSerial=c5cf2fd62a17e949bf37a168ca0a5d05
# engine=18048
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=false
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2014-04-27 05:51:31
# local_time=2014-04-27 07:51:31 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1031
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode=5893 16776573 100 94 14971 150250941 0 0
# scanned=163128
# found=0
# cleaned=0
# scan_time=9882
         
Security Check
Code:
ATTFilter
 Results of screen317's Security Check version 0.99.82  
 Windows 7 Service Pack 1 x64 (UAC is enabled)  
 Internet Explorer 11  
``````````````Antivirus/Firewall Check:`````````````` 
Kaspersky Internet Security   
 Antivirus up to date!   
`````````Anti-malware/Other Utilities Check:````````` 
 Java 7 Update 55  
 Adobe Flash Player 13.0.0.182  
 Adobe Reader XI  
 Mozilla Firefox (28.0) 
````````Process Check: objlist.exe by Laurent````````  
 Kaspersky Lab Kaspersky Internet Security 14.0.0 avpui.exe  
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C:  
````````````````````End of Log``````````````````````
         

FRST Logfile:

FRST Logfile:
Code:
ATTFilter
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 27-04-2014
Ran by Dekir (administrator) on DEKIR-PC on 28-04-2014 16:50:34
Running from C:\Users\Dekir\Downloads
Windows 7 Professional Service Pack 1 (X64) OS Language: German Standard
Internet Explorer Version 11
Boot Mode: Normal



==================== Processes (Whitelisted) =================

(Kaspersky Lab ZAO) C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(The Eraser Project) C:\Program Files\Eraser\Eraser.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
(Adobe Systems Incorporated) C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
(Oracle Corporation) C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
(Kaspersky Lab ZAO) C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avpui.exe
(Mozilla Corporation) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
(Intel Corporation) C:\Windows\system32\igfxsrvc.exe


==================== Registry (Whitelisted) ==================

HKLM\...\Run: [Eraser] => C:\Program Files\Eraser\Eraser.exe [980920 2012-05-22] (The Eraser Project)
HKLM-x32\...\Run: [USB3MON] => C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291608 2012-02-27] (Intel Corporation)
HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [958576 2013-04-04] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [SunJavaUpdateSched] => C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe [254336 2013-07-02] (Oracle Corporation)
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0x9C71A2A17AFCCD01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de-DE
StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe
BHO: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO)
BHO: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO)
BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
BHO-x32: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO)
BHO-x32: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
BHO-x32: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO-x32: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO)
BHO-x32: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO-x32: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
Toolbar: HKCU - No Name - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} -  No File
Tcpip\Parameters: [DhcpNameServer] 192.168.178.1

FireFox:
========
FF ProfilePath: C:\Users\Dekir\AppData\Roaming\Mozilla\Firefox\Profiles\6fxgigba.default
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_13_0_0_182.dll ()
FF Plugin: @java.com/DTPlugin,version=10.45.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.45.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_13_0_0_182.dll ()
FF Plugin-x32: @java.com/DTPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files (x86)\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @videolan.org/vlc,version=2.0.4 - C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin-x32: @videolan.org/vlc,version=2.1.3 - C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll (VideoLAN)
FF Plugin-x32: Adobe Reader - C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF HKLM-x32\...\Firefox\Extensions:  - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com
FF Extension: Kaspersky URL Advisor - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [virtual_keyboard@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com
FF Extension: Virtual Keyboard - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [content_blocker@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com
FF Extension: Dangerous Websites Blocker - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [anti_banner@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com
FF Extension: Anti-Banner - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com [2013-11-02]
FF HKLM-x32\...\Firefox\Extensions: [online_banking@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com
FF Extension: Safe Money - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com [2013-11-02]

Chrome: 
=======
CHR HomePage: hxxp://www.google.com/
CHR RestoreOnStartup: "hxxp://www.google.com/"]},"first_run_tabs":["hxxp://www.google.com/","hxxp://welcome_page"
CHR HKLM-x32\...\Chrome\Extension: [dchlnpcodkpfdpacogkljefecpegganj] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\urladvisor.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [hakdifolhalapjijoafobooafbilfakh] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\online_banking_chrome.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [hghkgaeecgjhjkannahfamoehjmkjail] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\content_blocker_chrome.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [jagncdcchgajhfhijbbhecadmaiegcmh] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\virtkbd.crx [2013-10-17]
CHR HKLM-x32\...\Chrome\Extension: [pjldcfjmnllhmgjclecdnfampinooman] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\ab.crx [2013-10-17]

==================== Services (Whitelisted) =================

R2 AVP; C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe [214512 2013-10-17] (Kaspersky Lab ZAO)
S3 SXDS10; C:\Program Files (x86)\Common Files\soft Xpansion\sxds10.exe [234096 2013-08-02] (soft Xpansion)
S3 aspnet_state; %SystemRoot%\Microsoft.NET\Framework\v2.0.50727\aspnet_state.exe [X]

==================== Drivers (Whitelisted) ====================

R0 kl1; C:\Windows\System32\DRIVERS\kl1.sys [458336 2013-11-07] (Kaspersky Lab ZAO)
S4 klflt; C:\Windows\System32\DRIVERS\klflt.sys [115296 2014-03-24] (Kaspersky Lab ZAO)
R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [625248 2014-03-24] (Kaspersky Lab ZAO)
R1 KLIM6; C:\Windows\System32\DRIVERS\klim6.sys [29792 2013-10-17] (Kaspersky Lab ZAO)
R3 klkbdflt; C:\Windows\System32\DRIVERS\klkbdflt.sys [29280 2014-02-18] (Kaspersky Lab ZAO)
R3 klmouflt; C:\Windows\System32\DRIVERS\klmouflt.sys [29280 2013-10-17] (Kaspersky Lab ZAO)
R1 klpd; C:\Windows\System32\DRIVERS\klpd.sys [15456 2013-04-12] (Kaspersky Lab ZAO)
R1 kltdi; C:\Windows\System32\DRIVERS\kltdi.sys [55904 2013-05-14] (Kaspersky Lab ZAO)
R1 kneps; C:\Windows\System32\DRIVERS\kneps.sys [178272 2013-12-19] (Kaspersky Lab ZAO)
R3 L1C; C:\Windows\System32\DRIVERS\L1C60x64.sys [106096 2011-11-15] (Atheros Communications, Inc.)

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2014-04-27 19:55 - 2014-04-27 19:55 - 00855379 _____ () C:\Users\Dekir\Downloads\SecurityCheck.exe
2014-04-27 16:36 - 2014-04-27 16:36 - 02347384 _____ (ESET) C:\Users\Dekir\Downloads\esetsmartinstaller_deu.exe
2014-04-23 08:54 - 2014-03-06 12:21 - 23549440 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-04-23 08:54 - 2014-03-06 11:32 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-04-23 08:54 - 2014-03-06 11:31 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-04-23 08:54 - 2014-03-06 11:19 - 17387008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-04-23 08:54 - 2014-03-06 10:59 - 00066048 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-04-23 08:54 - 2014-03-06 10:57 - 00548352 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll
2014-04-23 08:54 - 2014-03-06 10:57 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-04-23 08:54 - 2014-03-06 10:53 - 02767360 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-04-23 08:54 - 2014-03-06 10:40 - 00051200 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-04-23 08:54 - 2014-03-06 10:39 - 00033792 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-04-23 08:54 - 2014-03-06 10:32 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-04-23 08:54 - 2014-03-06 10:32 - 00574976 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-04-23 08:54 - 2014-03-06 10:29 - 00139264 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-04-23 08:54 - 2014-03-06 10:29 - 00111616 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-04-23 08:54 - 2014-03-06 10:28 - 00752640 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-04-23 08:54 - 2014-03-06 10:15 - 00940032 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-04-23 08:54 - 2014-03-06 10:11 - 05784064 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-04-23 08:54 - 2014-03-06 10:09 - 00453120 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll
2014-04-23 08:54 - 2014-03-06 10:03 - 00586240 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-04-23 08:54 - 2014-03-06 10:02 - 00455168 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll
2014-04-23 08:54 - 2014-03-06 10:02 - 00061952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2014-04-23 08:54 - 2014-03-06 10:01 - 00051200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll
2014-04-23 08:54 - 2014-03-06 09:56 - 00038400 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll
2014-04-23 08:54 - 2014-03-06 09:48 - 00195584 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-04-23 08:54 - 2014-03-06 09:47 - 02178048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-04-23 08:54 - 2014-03-06 09:46 - 04254720 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-04-23 08:54 - 2014-03-06 09:46 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-04-23 08:54 - 2014-03-06 09:45 - 00032768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2014-04-23 08:54 - 2014-03-06 09:42 - 00296960 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll
2014-04-23 08:54 - 2014-03-06 09:40 - 00440832 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2014-04-23 08:54 - 2014-03-06 09:38 - 00112128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2014-04-23 08:54 - 2014-03-06 09:36 - 00592896 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll
2014-04-23 08:54 - 2014-03-06 09:22 - 00367616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll
2014-04-23 08:54 - 2014-03-06 09:21 - 00628736 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-04-23 08:54 - 2014-03-06 09:13 - 00032256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\JavaScriptCollectionAgent.dll
2014-04-23 08:54 - 2014-03-06 09:11 - 02043904 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-04-23 08:54 - 2014-03-06 09:07 - 00164864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2014-04-23 08:54 - 2014-03-06 09:01 - 00244224 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll
2014-04-23 08:54 - 2014-03-06 08:53 - 13551104 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-04-23 08:54 - 2014-03-06 08:46 - 00524288 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-04-23 08:54 - 2014-03-06 08:40 - 01967104 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2014-04-23 08:54 - 2014-03-06 08:36 - 11745792 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-04-23 08:54 - 2014-03-06 08:22 - 02260480 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-04-23 08:54 - 2014-03-06 07:58 - 01400832 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-04-23 08:54 - 2014-03-06 07:50 - 00846336 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-04-23 08:54 - 2014-03-06 07:43 - 00704512 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll
2014-04-23 08:54 - 2014-03-06 07:41 - 01789440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-04-23 08:54 - 2014-03-06 07:36 - 01143808 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-04-21 12:22 - 2014-04-21 12:22 - 00009770 _____ () C:\Users\Dekir\DFB Spieler.xlsx
2014-04-21 11:48 - 2014-04-28 16:41 - 00000000 ____D () C:\Users\Dekir\Downloads\FRST-OlderVersion
2014-04-21 11:29 - 2014-04-21 11:29 - 00000756 _____ () C:\Users\Dekir\Desktop\JRT.txt
2014-04-21 11:03 - 2014-04-21 11:03 - 01322509 _____ () C:\Users\Dekir\Downloads\adwcleaner.exe
2014-04-20 19:36 - 2014-04-20 19:46 - 00000000 ____D () C:\Users\Dekir\AppData\Roaming\vlc
2014-04-19 16:36 - 2014-04-19 16:36 - 00016612 _____ () C:\ComboFix.txt
2014-04-19 16:25 - 2011-06-26 08:45 - 00256000 _____ () C:\Windows\PEV.exe
2014-04-19 16:25 - 2010-11-07 19:20 - 00208896 _____ () C:\Windows\MBR.exe
2014-04-19 16:25 - 2009-04-20 06:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00098816 _____ () C:\Windows\sed.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00080412 _____ () C:\Windows\grep.exe
2014-04-19 16:25 - 2000-08-31 02:00 - 00068096 _____ () C:\Windows\zip.exe
2014-04-19 16:24 - 2014-04-19 16:36 - 00000000 ____D () C:\Qoobox
2014-04-19 16:24 - 2014-04-19 16:34 - 00000000 ____D () C:\Windows\erdnt
2014-04-19 16:22 - 2014-04-19 16:22 - 05195154 ____R (Swearware) C:\Users\Dekir\Downloads\ComboFix.exe
2014-04-19 12:21 - 2014-04-19 12:21 - 593592608 _____ () C:\Windows\MEMORY.DMP
2014-04-19 12:21 - 2014-04-19 12:21 - 00330336 _____ () C:\Windows\Minidump\041914-22900-01.dmp
2014-04-19 12:21 - 2014-04-19 12:21 - 00000000 ____D () C:\Windows\Minidump
2014-04-19 12:10 - 2014-04-19 12:10 - 00380416 _____ () C:\Users\Dekir\Downloads\Gmer-19357.exe
2014-04-19 12:07 - 2014-04-28 16:50 - 00000000 ____D () C:\Users\Dekir\Desktop\Scans
2014-04-19 12:00 - 2014-04-28 16:44 - 00023414 _____ () C:\Users\Dekir\Downloads\Addition.txt
2014-04-19 11:59 - 2014-04-28 16:50 - 00011290 _____ () C:\Users\Dekir\Downloads\FRST.txt
2014-04-19 11:58 - 2014-04-28 16:50 - 00000000 ____D () C:\FRST
2014-04-19 11:58 - 2014-04-28 16:41 - 02061824 _____ (Farbar) C:\Users\Dekir\Downloads\FRST64.exe
2014-04-19 11:55 - 2014-04-19 11:55 - 00000472 _____ () C:\Users\Dekir\Downloads\defogger_disable.log
2014-04-19 11:55 - 2014-04-19 11:55 - 00000000 _____ () C:\Users\Dekir\defogger_reenable
2014-04-19 11:54 - 2014-04-19 11:54 - 00050477 _____ () C:\Users\Dekir\Downloads\Defogger.exe
2014-04-19 11:09 - 2014-04-21 10:29 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ Malwarebytes Anti-Malware 
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\Program Files (x86)\ Malwarebytes Anti-Malware 
2014-04-19 11:09 - 2014-04-03 09:51 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-19 11:09 - 2014-04-03 09:51 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-19 11:09 - 2014-04-03 09:50 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-04-19 11:06 - 2014-04-19 11:07 - 17305616 _____ (Malwarebytes Corporation ) C:\Users\Dekir\Downloads\mbam-setup-2.0.1.1004.exe
2014-04-19 10:59 - 2014-04-19 10:59 - 00001337 _____ () C:\Users\Dekir\Documents\JRT.txt
2014-04-19 10:46 - 2014-04-19 10:46 - 00000000 ____D () C:\Windows\ERUNT
2014-04-19 10:44 - 2014-04-19 10:44 - 01016261 _____ (Thisisu) C:\Users\Dekir\Downloads\JRT.exe
2014-04-19 10:37 - 2014-04-21 11:11 - 00000000 ____D () C:\AdwCleaner
2014-04-19 10:34 - 2014-04-19 10:34 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-04-17 08:59 - 2014-04-17 08:58 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-17 08:59 - 2014-04-17 08:58 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-17 08:59 - 2014-04-17 08:58 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-17 08:59 - 2014-04-17 08:58 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-17 08:58 - 2014-04-17 08:58 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-17 08:56 - 2014-04-17 08:57 - 29164456 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jre-7u55-windows-i586.exe
2014-04-17 08:54 - 2014-04-17 08:54 - 24677393 _____ () C:\Users\Dekir\Downloads\vlc-2.1.3-win32.exe
2014-04-12 14:38 - 2014-04-12 14:38 - 00000000 ____D () C:\ProgramData\Sun
2014-04-12 14:32 - 2014-04-12 14:32 - 00921000 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jxpiinstall.exe
2014-04-12 12:15 - 2014-04-12 12:15 - 00000000 ____D () C:\Users\Dekir\Desktop\Fotos
2014-04-09 12:34 - 2014-03-04 11:44 - 01163264 _____ (Microsoft Corporation) C:\Windows\system32\kernel32.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00362496 _____ (Microsoft Corporation) C:\Windows\system32\wow64win.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00243712 _____ (Microsoft Corporation) C:\Windows\system32\wow64.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00016384 _____ (Microsoft Corporation) C:\Windows\system32\ntvdm64.dll
2014-04-09 12:34 - 2014-03-04 11:44 - 00013312 _____ (Microsoft Corporation) C:\Windows\system32\wow64cpu.dll
2014-04-09 12:34 - 2014-03-04 11:17 - 00014336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntvdm64.dll
2014-04-09 12:34 - 2014-03-04 11:16 - 01114112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kernel32.dll
2014-04-09 12:34 - 2014-03-04 11:16 - 00025600 _____ (Microsoft Corporation) C:\Windows\SysWOW64\setup16.exe
2014-04-09 12:34 - 2014-03-04 11:16 - 00005120 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wow32.dll
2014-04-09 12:34 - 2014-03-04 10:09 - 00007680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\instnm.exe
2014-04-09 12:34 - 2014-03-04 10:09 - 00002048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\user.exe
2014-03-29 14:50 - 2014-03-29 14:50 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox

==================== One Month Modified Files and Folders =======

2014-04-28 16:50 - 2014-04-19 12:07 - 00000000 ____D () C:\Users\Dekir\Desktop\Scans
2014-04-28 16:50 - 2014-04-19 11:59 - 00011290 _____ () C:\Users\Dekir\Downloads\FRST.txt
2014-04-28 16:50 - 2014-04-19 11:58 - 00000000 ____D () C:\FRST
2014-04-28 16:44 - 2014-04-19 12:00 - 00023414 _____ () C:\Users\Dekir\Downloads\Addition.txt
2014-04-28 16:42 - 2009-07-14 19:58 - 04775616 _____ () C:\Windows\system32\perfh007.dat
2014-04-28 16:42 - 2009-07-14 19:58 - 01450184 _____ () C:\Windows\system32\perfc007.dat
2014-04-28 16:42 - 2009-07-14 07:13 - 00005582 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-28 16:41 - 2014-04-21 11:48 - 00000000 ____D () C:\Users\Dekir\Downloads\FRST-OlderVersion
2014-04-28 16:41 - 2014-04-19 11:58 - 02061824 _____ (Farbar) C:\Users\Dekir\Downloads\FRST64.exe
2014-04-28 16:40 - 2012-11-23 00:13 - 01328679 _____ () C:\Windows\WindowsUpdate.log
2014-04-28 09:09 - 2009-07-14 06:45 - 00016240 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-04-28 09:09 - 2009-07-14 06:45 - 00016240 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-04-28 09:03 - 2013-11-02 14:31 - 00000000 ____D () C:\ProgramData\Kaspersky Lab
2014-04-28 09:02 - 2009-07-14 07:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-28 09:02 - 2009-07-14 06:51 - 00103404 _____ () C:\Windows\setupact.log
2014-04-27 19:55 - 2014-04-27 19:55 - 00855379 _____ () C:\Users\Dekir\Downloads\SecurityCheck.exe
2014-04-27 16:36 - 2014-04-27 16:36 - 02347384 _____ (ESET) C:\Users\Dekir\Downloads\esetsmartinstaller_deu.exe
2014-04-26 11:22 - 2012-11-23 00:20 - 00000000 ____D () C:\Users\Dekir
2014-04-25 17:02 - 2014-03-15 13:01 - 00017103 _____ () C:\Users\Dekir\deutsche Medailliengewinner.xlsx
2014-04-25 09:30 - 2014-03-14 17:13 - 00012740 _____ () C:\Users\Dekir\Desktop\olympia wintersport-1.xlsx
2014-04-23 09:01 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\PolicyDefinitions
2014-04-21 12:22 - 2014-04-21 12:22 - 00009770 _____ () C:\Users\Dekir\DFB Spieler.xlsx
2014-04-21 11:29 - 2014-04-21 11:29 - 00000756 _____ () C:\Users\Dekir\Desktop\JRT.txt
2014-04-21 11:11 - 2014-04-19 10:37 - 00000000 ____D () C:\AdwCleaner
2014-04-21 11:03 - 2014-04-21 11:03 - 01322509 _____ () C:\Users\Dekir\Downloads\adwcleaner.exe
2014-04-21 10:29 - 2014-04-19 11:09 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-20 19:46 - 2014-04-20 19:36 - 00000000 ____D () C:\Users\Dekir\AppData\Roaming\vlc
2014-04-19 21:03 - 2012-11-23 10:56 - 00479806 _____ () C:\Windows\PFRO.log
2014-04-19 16:36 - 2014-04-19 16:36 - 00016612 _____ () C:\ComboFix.txt
2014-04-19 16:36 - 2014-04-19 16:24 - 00000000 ____D () C:\Qoobox
2014-04-19 16:36 - 2009-07-14 05:20 - 00000000 __RHD () C:\Users\Default
2014-04-19 16:34 - 2014-04-19 16:24 - 00000000 ____D () C:\Windows\erdnt
2014-04-19 16:33 - 2009-07-14 04:34 - 00000215 _____ () C:\Windows\system.ini
2014-04-19 16:22 - 2014-04-19 16:22 - 05195154 ____R (Swearware) C:\Users\Dekir\Downloads\ComboFix.exe
2014-04-19 12:25 - 2013-05-06 10:52 - 00000000 ____D () C:\Users\Dekir\AppData\Local\CrashDumps
2014-04-19 12:21 - 2014-04-19 12:21 - 593592608 _____ () C:\Windows\MEMORY.DMP
2014-04-19 12:21 - 2014-04-19 12:21 - 00330336 _____ () C:\Windows\Minidump\041914-22900-01.dmp
2014-04-19 12:21 - 2014-04-19 12:21 - 00000000 ____D () C:\Windows\Minidump
2014-04-19 12:10 - 2014-04-19 12:10 - 00380416 _____ () C:\Users\Dekir\Downloads\Gmer-19357.exe
2014-04-19 11:55 - 2014-04-19 11:55 - 00000472 _____ () C:\Users\Dekir\Downloads\defogger_disable.log
2014-04-19 11:55 - 2014-04-19 11:55 - 00000000 _____ () C:\Users\Dekir\defogger_reenable
2014-04-19 11:54 - 2014-04-19 11:54 - 00050477 _____ () C:\Users\Dekir\Downloads\Defogger.exe
2014-04-19 11:41 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\Help
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ Malwarebytes Anti-Malware 
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-19 11:09 - 2014-04-19 11:09 - 00000000 ____D () C:\Program Files (x86)\ Malwarebytes Anti-Malware 
2014-04-19 11:07 - 2014-04-19 11:06 - 17305616 _____ (Malwarebytes Corporation ) C:\Users\Dekir\Downloads\mbam-setup-2.0.1.1004.exe
2014-04-19 10:59 - 2014-04-19 10:59 - 00001337 _____ () C:\Users\Dekir\Documents\JRT.txt
2014-04-19 10:46 - 2014-04-19 10:46 - 00000000 ____D () C:\Windows\ERUNT
2014-04-19 10:44 - 2014-04-19 10:44 - 01016261 _____ (Thisisu) C:\Users\Dekir\Downloads\JRT.exe
2014-04-19 10:34 - 2014-04-19 10:34 - 00000000 ____D () C:\Windows\system32\appmgmt
2014-04-17 08:59 - 2014-01-06 12:33 - 00000000 ____D () C:\ProgramData\Oracle
2014-04-17 08:58 - 2014-04-17 08:59 - 00264616 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe
2014-04-17 08:58 - 2014-04-17 08:59 - 00175528 _____ (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe
2014-04-17 08:58 - 2014-04-17 08:59 - 00175016 _____ (Oracle Corporation) C:\Windows\SysWOW64\java.exe
2014-04-17 08:58 - 2014-04-17 08:59 - 00096168 _____ (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll
2014-04-17 08:58 - 2014-04-17 08:58 - 00000000 ____D () C:\Program Files (x86)\Java
2014-04-17 08:57 - 2014-04-17 08:56 - 29164456 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jre-7u55-windows-i586.exe
2014-04-17 08:55 - 2012-11-23 10:10 - 00001070 _____ () C:\Users\Public\Desktop\VLC media player.lnk
2014-04-17 08:55 - 2012-11-23 10:10 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VideoLAN
2014-04-17 08:54 - 2014-04-17 08:54 - 24677393 _____ () C:\Users\Dekir\Downloads\vlc-2.1.3-win32.exe
2014-04-12 14:38 - 2014-04-12 14:38 - 00000000 ____D () C:\ProgramData\Sun
2014-04-12 14:32 - 2014-04-12 14:32 - 00921000 _____ (Oracle Corporation) C:\Users\Dekir\Downloads\jxpiinstall.exe
2014-04-12 12:15 - 2014-04-12 12:15 - 00000000 ____D () C:\Users\Dekir\Desktop\Fotos
2014-04-12 10:12 - 2013-11-09 16:16 - 00012265 _____ () C:\Users\Dekir\dynamo.xlsx
2014-04-09 13:17 - 2013-07-16 06:39 - 00000000 ____D () C:\Windows\system32\MRT
2014-04-09 13:17 - 2012-11-23 09:55 - 00000000 ____D () C:\ProgramData\Microsoft Help
2014-04-09 13:16 - 2012-11-23 15:55 - 90655440 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-04-08 21:16 - 2012-11-23 15:51 - 00692400 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-04-08 21:16 - 2012-11-23 15:51 - 00070832 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-04-08 21:14 - 2012-11-25 11:17 - 00000000 ____D () C:\Users\Dekir\AppData\Local\Adobe
2014-04-03 09:51 - 2014-04-19 11:09 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-03 09:51 - 2014-04-19 11:09 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-03 09:50 - 2014-04-19 11:09 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-31 09:35 - 2013-02-26 10:11 - 00270496 ____N (Microsoft Corporation) C:\Windows\system32\MpSigStub.exe
2014-03-29 15:16 - 2012-11-23 10:04 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service
2014-03-29 14:50 - 2014-03-29 14:50 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-03-29 10:49 - 2009-07-14 07:08 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT

Some content of TEMP:
====================
C:\Users\Dekir\AppData\Local\Temp\Quarantine.exe


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit


LastRegBack: 2014-04-18 15:59

==================== End Of Log ============================
         
--- --- ---

--- --- ---

Alt 29.04.2014, 16:59   #8
schrauber
/// the machine
/// TB-Ausbilder
 

Fake Java-Umleitung - Standard

Fake Java-Umleitung



Fertig

Die Reihenfolge ist hier entscheidend.
  1. Falls Defogger benutzt wurde: Defogger nochmal starten und auf re-enable klicken.
  2. Falls Combofix benutzt wurde: (Alternativ in uninstall.exe umbenennen und starten)
    • Windowstaste + R > Combofix /Uninstall (eingeben) > OK
    • Alternative: Combofix.exe in uninstall.exe umbenennen und starten
    • Combofix wird jetzt starten, sich evtl updaten und dann alle Reste von sich selbst entfernen.
  3. Downloade Dir bitte auf jeden Fall DelFix Download DelFix auf deinen Desktop:
    • Schließe alle offenen Programme.
    • Starte die delfix.exe mit einem Doppelklick.
    • Setze vor jede Funktion ein Häkchen.
    • Klicke auf Start.
    • Hinweis: DelFix entfernt u. a. alle verwendeten Programme, die Quarantäne unserer Scanner, den Java-Cache und löscht sich abschließend selbst.
    • Starte deinen Rechner abschließend neu.
  4. Sollten jetzt noch Programme aus unserer Bereinigung übrig sein kannst du sie bedenkenlos löschen.



Falls Du Lob oder Kritik abgeben möchtest kannst Du das hier tun

Hier noch ein paar Tipps zur Absicherung deines Systems.


Ich kann garnicht zu oft erwähnen, wie wichtig es ist, dass dein System Up to Date ist.
  • Bitte überprüfe ob dein System Windows Updates automatisch herunter lädt
  • Windows Updates
    • Windows XP: Start --> Systemsteuerung --> Doppelklick auf Automatische Updates
    • Windows Vista / 7: Start --> Systemsteuerung --> System und Sicherheit --> Automatische Updates aktivieren oder deaktivieren
  • Gehe sicher das die automatischen Updates aktiviert sind.
  • Software Updates
    Installierte Software kann ebenfalls Sicherheitslücken haben, welche Malware nutzen kann, um dein System zu infizieren.
    Um deine Installierte Software up to date zu halten, empfehle ich dir Secunia Online Software.


Anti- Viren Software
  • Gehe sicher immer eine Anti Viren Software installiert zu haben und das diese auch up to date ist. Es ist nämlich nutzlos wenn diese out of date sind.


Zusätzlicher Schutz
  • MalwareBytes Anti Malware
    Dies ist eines der besten Anti-Malware Tools auf dem Markt. Es ist ein On- Demond Scan Tool welches viele aktuelle Malware erkennt und auch entfernt.
    Update das Tool und lass es einmal in der Woche laufen. Die Kaufversion biete zudem noch einen Hintergrundwächter.
    Ein Tutorial zur Verwendung findest Du hier.
  • WinPatrol
    Diese Software macht einen Snapshot deines Systems und warnt dich vor eventuellen Änderungen. Downloade dir die Freeware Version von hier.


Sicheres Browsen
  • SpywareBlaster
    Eine kurze Einführung findest du Hier
  • MVPs hosts file
    Ein Tutorial findest Du hier. Leider habe ich bis jetzt kein deutschsprachiges gefunden.
  • WOT (Web of trust)
    Dieses AddOn warnt Dich bevor Du eine als schädlich gemeldete Seite besuchst.


Alternative Browser

Andere Browser tendieren zu etwas mehr Sicherheit als der IE, da diese keine Active X Elemente verwenden. Diese können von Spyware zur Infektion deines Systems missbraucht werden.
  • Opera
  • Mozilla Firefox.
    • Hinweis: Für diesen Browser habe ich hier ein paar nützliche Add Ons
    • NoScript
      Dieses AddOn blockt JavaScript, Java and Flash und andere Plugins. Sie werden nur dann ausgeführt wenn Du es bestätigst.
    • AdblockPlus
      Dieses AddOn blockt die meisten Werbung von selbst. Ein Rechtsklick auf den Banner um diesen zu AdBlockPlus hinzu zu fügen reicht und dieser wird nicht mehr geladen.
      Es spart ausserdem Downloadkapazität.

Performance
Bereinige regelmäßig deine Temp Files. Ich empfehle hierzu TFC
Halte dich fern von jedlichen Registry Cleanern.
Diese Schaden deinem System mehr als sie helfen. Hier ein paar ( englishe ) Links
Miekemoes Blogspot ( MVP )
Bill Castner ( MVP )



Don'ts
  • Klicke nicht auf alles nur weil es Dich dazu auffordert und schön bunt ist.
  • verwende keine peer to peer oder Filesharing Software (Emule, uTorrent,..)
  • Lass die Finger von Cracks, Keygens, Serials oder anderer illegaler Software.
  • Öffne keine Anhänge von Dir nicht bekannten Emails. Achte vor allem auf die Dateiendung wie zb deinFoto.jpg.exe
Nun bleibt mir nur noch dir viel Spass beim sicheren Surfen zu wünschen.

Hinweis: Bitte gib mir eine kurze Rückmeldung wenn alles erledigt ist und keine Fragen mehr vorhanden sind, so das ich diesen Thread aus meinen Abos löschen kann.
__________________
gruß,
schrauber

Proud Member of UNITE and ASAP since 2009

Spenden
Anleitungen und Hilfestellungen
Trojaner-Board Facebook-Seite

Keine Hilfestellung via PM!

Antwort

Themen zu Fake Java-Umleitung
avg, coupons, defender, der lokale bluetooth-adapter ist aus einem unbekannten grund fehlgeschlagen, ebanking, error, failed, firefox, flash player, freemium, homepage, internet explorer, mozilla, olympia, performance, preferences, prozess, pup.optional.bundler, pup.optional.bundlore, pup.optional.crossrider, pup.optional.crossrider.a, pup.optional.firseria, pup.optional.lyricssay.a, security, services.exe, svchost.exe




Ähnliche Themen: Fake Java-Umleitung


  1. ständige Umleitung zu Java und Adobe Updates, trotz mehrer Versuche der Entfernung mit ADWCleaner, JRT, etc
    Log-Analyse und Auswertung - 17.11.2014 (17)
  2. Win 7: Ständige Umleitung zu Java-Fake-Updateseiten
    Log-Analyse und Auswertung - 03.06.2014 (16)
  3. [WIN7] Fake Flashplayer/Java Redirect auf fertig geladenen Seiten
    Log-Analyse und Auswertung - 03.06.2014 (13)
  4. Videos untebrochen: Umleitung auf fake Java Seiten
    Plagegeister aller Art und deren Bekämpfung - 16.05.2014 (9)
  5. Windows Vista 32Bit: Probleme nach Reparatur von Fake Java Update mit MalwareBytes
    Alles rund um Windows - 13.05.2014 (9)
  6. Videos untebrochen: Umleitung auf fake Java Seiten
    Plagegeister aller Art und deren Bekämpfung - 12.05.2014 (9)
  7. Fake-Java Update stellt sich als webserch(-virus?)oder andere nervige software heraus
    Log-Analyse und Auswertung - 04.05.2014 (10)
  8. Windows 8.1 64 bit: Java Update Fake in allen Browsern (z.B. von mostshinstar.com)
    Log-Analyse und Auswertung - 26.04.2014 (23)
  9. Umleitung zu fake java-update
    Log-Analyse und Auswertung - 24.04.2014 (19)
  10. Windows 7: Fake Java Seiten
    Log-Analyse und Auswertung - 24.04.2014 (14)
  11. [Win7] Browser-Redirects zu fake "Java Update"
    Log-Analyse und Auswertung - 19.04.2014 (11)
  12. Fake JAVA(.exe) setup
    Plagegeister aller Art und deren Bekämpfung - 16.04.2014 (1)
  13. Umleitung zu (vermeintlichem) java-update
    Plagegeister aller Art und deren Bekämpfung - 14.04.2014 (11)
  14. Windows XP: Auf fake links für Flash und Java reingefallen
    Plagegeister aller Art und deren Bekämpfung - 26.02.2014 (11)
  15. Windows 7: 2 Rechner mit fake-Java-update und nicht eingrenzbarer Audio-Werbung in chrome befallen
    Log-Analyse und Auswertung - 10.02.2014 (22)
  16. Umleitung zu Java Update
    Plagegeister aller Art und deren Bekämpfung - 06.01.2014 (9)
  17. Umleitung auf 'get-new-java.com'
    Log-Analyse und Auswertung - 20.11.2013 (18)

Zum Thema Fake Java-Umleitung - Hallo, ich habe auch das Problem wie viele andere im Forum, dass wenn ich manche Seiten öffnen, eine Umleitung zu einem vermeintlichem java-update passiert. Dies passiert sowohl, wenn ich mit - Fake Java-Umleitung...
Archiv
Du betrachtest: Fake Java-Umleitung auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.