Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlauf Datum: 31.03.2014
Suchlauf-Zeit: 17:58:00
Logdatei: mbam.txt
Administrator: Ja
Version: 2.00.0.1000
Malware Datenbank: v2014.03.31.06
Rootkit Datenbank: v2014.03.27.01
Lizenz: Testversion
Malware Schutz: Aktiviert
Bösartiger Webseiten Schutz: Aktiviert
Chameleon: Deaktiviert
Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: Julia Türkon
Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 245336
Verstrichene Zeit: 20 Min, 21 Sek
Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Aktiviert
Shuriken: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 0
(No malicious items detected)
Module: 0
(No malicious items detected)
Registrierungsschlüssel: 4
PUP.Optional.Delta.A, HKLM\SOFTWARE\CLASSES\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, In Quarantäne, [26da649c49b76d93b051013d917155ab],
PUP.Optional.Delta.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}, In Quarantäne, [26da649c49b76d93b051013d917155ab],
PUP.Optional.DataMngr.A, HKU\S-1-5-21-2066285920-3689302262-723459534-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\DataMngr_Toolbar, Löschen bei Neustart, [24dcae52b34d976978c545390ff4ed13],
PUP.Optional.BProtector.A, HKU\S-1-5-21-2066285920-3689302262-723459534-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\bProtectSettings, Löschen bei Neustart, [d42ca759b14f01ff77240081ae55d22e],
Registrierungswerte: 3
PUP.Optional.BrowserProtect.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\ABOUTURLS|bProtectTabs, hxxp://www2.delta-search.com/?affID=121562&babsrc=NT_ss&mntrId=F22C4C809306DC87, In Quarantäne, [e7193ec21ce4669a803b334e7192a35d]
PUP.BProtector, HKU\S-1-5-21-2066285920-3689302262-723459534-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|bProtector Start Page, hxxp://www.google.de/, Löschen bei Neustart, [5fa1c13f1be5c63afd421c627390fe02]
PUP.BProtector, HKU\S-1-5-21-2066285920-3689302262-723459534-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|bProtectorDefaultScope, {A8D61EA9-506F-43E0-BDBF-781355B84853}, Löschen bei Neustart, [de22d62a59a746ba132d532bb84bdf21]
Registrierungsdaten: 0
(No malicious items detected)
Ordner: 9
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\1B046ADFAA304B2B897E9012493EEA2F, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\2DDA36F93ABC4B44A5C8876DADEE3999, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\98B4E8D57CD84062BDFDA4FC8773D12B, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\B96B824F278A45C89E833F19175787F1, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\EE1CE24248544AC6A1E3ED61CDBA7AA5, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.FileScout.A, C:\Users\Julia Türkon\AppData\Roaming\File Scout, In Quarantäne, [a06078886d93ac540db569e7a95933cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
Dateien: 23
PUP.Optional.OpenCandy.A, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\2DDA36F93ABC4B44A5C8876DADEE3999\Setupsft_chr_p1v7.exe, In Quarantäne, [f40ce41c02fe48b863f36d9617ed54ac],
PUP.Optional.Conduit.A, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\98B4E8D57CD84062BDFDA4FC8773D12B\mconduitinstaller.exe, In Quarantäne, [619f9967bf4150b0623a9886f40ca060],
PUP.Optional.Babylon.A, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\B96B824F278A45C89E833F19175787F1\DeltaTB.exe, In Quarantäne, [45bbc33d669a89775065c13c28d802fe],
PUP.Optional.Delta.A, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\EE1CE24248544AC6A1E3ED61CDBA7AA5\DeltaTB.exe, In Quarantäne, [7b8509f725dbca36b67737c802fe4eb2],
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\1B046ADFAA304B2B897E9012493EEA2F\TuneUpUtilities2013-2200217_de-DE.exe, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\EE1CE24248544AC6A1E3ED61CDBA7AA5\5404.ico, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\EE1CE24248544AC6A1E3ED61CDBA7AA5\EBB77268-338F-4C6A-8590-AD88FED26F4A, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.OpenCandy, C:\Users\Julia Türkon\AppData\Roaming\OpenCandy\EE1CE24248544AC6A1E3ED61CDBA7AA5\OCBrowserHelper_1.0.6.124.exe, In Quarantäne, [6c94dd23cb352ad66149321e867c8c74],
PUP.Optional.FileScout.A, C:\Users\Julia Türkon\AppData\Roaming\File Scout\uninst.exe, In Quarantäne, [a06078886d93ac540db569e7a95933cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\appCntrl.js, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\bg.html, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\bg.js, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\chMntz.dll, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\CrmAdpt.dll, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\ct.js, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\CTB.dll, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\dpk.js, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\hprtkMsg.htm, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\hprtkMsg.js, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\json2.min.js, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\logo.png, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\manifest.json, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
PUP.Optional.Softonic.A, C:\Users\Julia Türkon\AppData\Local\Google\Chrome\User Data\default\extensions\elchiiiejkobdbblfejjkbphbddgmljf\1.0_0\pref.json, In Quarantäne, [a35d8d73e31d738d236c3e1ae81a33cd],
Physische Sektoren: 0
(No malicious items detected)
(end) Code:
# AdwCleaner v3.022 - Bericht erstellt am 31/03/2014 um 18:11:28
# Aktualisiert 13/03/2014 von Xplode
# Betriebssystem : Windows 7 Home Premium Service Pack 1 (64 bits)
# Benutzername : Julia Türkon - JULIATÜRKON-PC
# Gestartet von : C:\Users\Julia Türkon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\49T81BPZ\adwcleaner.exe
# Option : Löschen
***** [ Dienste ] *****
***** [ Dateien / Ordner ] *****
Ordner Gelöscht : C:\ProgramData\Babylon
Ordner Gelöscht : C:\ProgramData\BitGuard
Ordner Gelöscht : C:\Program Files (x86)\Conduit
Ordner Gelöscht : C:\Users\Julia Türkon\AppData\Local\Conduit
Ordner Gelöscht : C:\Users\Julia Türkon\AppData\LocalLow\Conduit
Ordner Gelöscht : C:\Users\Julia Türkon\AppData\LocalLow\Delta
Ordner Gelöscht : C:\Users\Julia Türkon\AppData\LocalLow\Softonic
Ordner Gelöscht : C:\Users\Julia Türkon\AppData\Roaming\Babylon
Ordner Gelöscht : C:\Users\Julia Türkon\AppData\Roaming\pdfforge
***** [ Verknüpfungen ] *****
***** [ Registrierungsdatenbank ] *****
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\*\shell\filescout
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Prod.cap
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\apnstub_RASAPI32
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\apnstub_RASMANCS
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\askpartnercobrandingtool_rasapi32
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\askpartnercobrandingtool_rasmancs
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\AskSLib_RASAPI32
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\AskSLib_RASMANCS
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\au__rasapi32
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\au__rasmancs
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASAPI32
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASMANCS
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\TaskScheduler_RASAPI32
Schlüssel Gelöscht : HKLM\SOFTWARE\Microsoft\Tracing\TaskScheduler_RASMANCS
Schlüssel Gelöscht : HKCU\Software\d4dc8ab23ce544
Schlüssel Gelöscht : HKLM\SOFTWARE\d4dc8ab23ce544
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Toolbar.CT3281675
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\AppID\{0A18A436-2A7A-49F3-A488-30538A2F6323}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\AppID\{7ABBFE1C-E485-44AA-8F36-353751B4124D}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{25A3A431-30BB-47C8-AD6A-E1063801134F}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Schlüssel Gelöscht : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{25A3A431-30BB-47C8-AD6A-E1063801134F}
Schlüssel Gelöscht : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{25A3A431-30BB-47C8-AD6A-E1063801134F}
Schlüssel Gelöscht : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{E44A1809-4D10-4AB8-B343-3326B64C7CDD}
Schlüssel Gelöscht : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Wert Gelöscht : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{25A3A431-30BB-47C8-AD6A-E1063801134F}]
Schlüssel Gelöscht : HKCU\Software\filescout
Schlüssel Gelöscht : HKCU\Software\OCS
Schlüssel Gelöscht : HKCU\Software\Softonic
Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\ConduitSearchScopes
Schlüssel Gelöscht : HKCU\Software\AppDataLow\Software\SmartBar
Schlüssel Gelöscht : HKLM\Software\Babylon
Schlüssel Gelöscht : HKLM\Software\Conduit
Schlüssel Gelöscht : HKLM\Software\DataMngr
***** [ Browser ] *****
-\\ Internet Explorer v11.0.9600.16521
*************************
AdwCleaner[R0].txt - [4063 octets] - [31/03/2014 18:10:10]
AdwCleaner[S0].txt - [3731 octets] - [31/03/2014 18:11:28]
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [3791 octets] ########## Code:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.3 (03.23.2014:1)
OS: Windows 7 Home Premium x64
Ran by Julia Trkon on 31.03.2014 at 18:19:57,11
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-2066285920-3689302262-723459534-1000\Software\sweetim
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{54138639-1146-46E8-8E08-C4E6392D0E55}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{A8D61EA9-506F-43E0-BDBF-781355B84853}
~~~ Files
~~~ Folders
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 31.03.2014 at 18:25:53,75
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FRST Logfile: Code:
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 13-03-2014
Ran by Julia Türkon (administrator) on JULIATÜRKON-PC on 31-03-2014 18:33:49
Running from C:\Users\Julia Türkon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\49T81BPZ
Windows 7 Home Premium Service Pack 1 (X64) OS Language: German Standard
Internet Explorer Version 11
Boot Mode: Normal
==================== Processes (Whitelisted) =================
(Microsoft Corporation) C:\Windows\system32\WLANExt.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe
(ArcSoft Inc.) C:\Program Files (x86)\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
(Samsung) C:\Program Files\Samsung\AllShare Framework DMS\1.3.23\AllShareFrameworkManagerDMS.exe
(Intel(R) Corporation) C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVBg64.exe
(Samsung) C:\Program Files\Samsung\AllShare Framework DMS\1.3.23\AllShareFrameworkDMS.exe
(Intel Corporation) C:\Program Files\Intel\BluetoothHS\BTHSAmpPalService.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe
(Copyright 2013 SAMSUNG) C:\Program Files\SAMSUNG\Samsung Link\Samsung Link Tray Agent.exe
(OpenOffice.org) C:\Program Files (x86)\OpenOffice.org 3\program\soffice.exe
(OpenOffice.org) C:\Program Files (x86)\OpenOffice.org 3\program\soffice.bin
(Intel(R) Corporation) C:\Program Files\Intel\BluetoothHS\BTHSSecurityMgr.exe
(Intel(R) Corporation) C:\Program Files\Intel\WiFi\bin\EvtEng.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe
(Renesas Electronics Corporation) C:\Program Files (x86)\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe
(ArcSoft Inc.) C:\Program Files (x86)\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe
(pdfforge GmbH) C:\Program Files (x86)\PDF Architect\HelperService.exe
(pdfforge GmbH) C:\Program Files (x86)\PDF Architect\ConversionService.exe
(Intel(R) Corporation) C:\Program Files\Common Files\Intel\WirelessCommon\RegSrvc.exe
(Copyright 2013 SAMSUNG) C:\Program Files\Samsung\Samsung Link\Samsung Link.exe
(Copyright 2013 SAMSUNG) C:\Program Files\Samsung\Samsung Link\Samsung Link.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avshadow.exe
(Microsoft Corporation) C:\Windows\SysWOW64\notepad.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
==================== Registry (Whitelisted) ==================
HKLM\...\Run: [IntelPAN] - C:\Program Files\Common Files\Intel\WirelessCommon\iFrmewrk.exe [1935120 2011-09-15] (Intel(R) Corporation)
HKLM\...\Run: [RtHDVCpl] - C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [12681320 2011-12-12] (Realtek Semiconductor)
HKLM\...\Run: [RtHDVBg_Dolby] - C:\Program Files\Realtek\Audio\HDA\RAVBg64.exe [2277480 2011-12-12] (Realtek Semiconductor)
HKLM\...\Run: [Samsung Link] - C:\Program Files\Samsung\Samsung Link\Samsung Link Tray Agent.exe [600928 2014-03-13] (Copyright 2013 SAMSUNG)
HKLM-x32\...\Run: [NUSB3MON] - C:\Program Files (x86)\Renesas Electronics\USB 3.0 Host Controller Driver\Application\nusb3mon.exe [113288 2011-12-12] (Renesas Electronics Corporation)
HKLM-x32\...\Run: [avgnt] - C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe [689744 2014-02-21] (Avira Operations GmbH & Co. KG)
HKLM-x32\...\Run: [GrooveMonitor] - C:\Program Files (x86)\Microsoft Office\Office12\GrooveMonitor.exe [30040 2009-02-26] (Microsoft Corporation)
HKLM-x32\...\Run: [Adobe ARM] - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [ArcSoft Connection Service] - C:\Program Files (x86)\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe [207424 2010-10-27] (ArcSoft Inc.)
Startup: C:\Users\Julia Türkon\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OpenOffice.org 3.4.1.lnk
ShortcutTarget: OpenOffice.org 3.4.1.lnk -> C:\Program Files (x86)\OpenOffice.org 3\program\quickstart.exe ()
==================== Internet (Whitelisted) ====================
HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.google.de/
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0xCA6E159E0D45CE01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de
StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe
SearchScopes: HKCU - DefaultScope {8F966F64-7925-4F4F-8628-25AF4B843324} URL = https://www.google.com/search?q={searchTerms}
SearchScopes: HKCU - {8F966F64-7925-4F4F-8628-25AF4B843324} URL = https://www.google.com/search?q={searchTerms}
BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
BHO-x32: PDF Architect Helper - {3A2D5EBA-F86D-4BD3-A177-019765996711} - C:\Program Files (x86)\PDF Architect\PDFIEHelper.dll (pdfforge GmbH)
BHO-x32: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files (x86)\Microsoft Office\Office12\GrooveShellExtensions.dll (Microsoft Corporation)
BHO-x32: Microsoft-Konto-Anmelde-Hilfsprogramm - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
Tcpip\Parameters: [DhcpNameServer] 192.168.2.1
Chrome:
=======
Error reading preferences. Please check "preferences" file for possible corruption. <======= ATTENTION
==================== Services (Whitelisted) =================
R2 ACDaemon; C:\Program Files (x86)\Common Files\ArcSoft\Connection Service\Bin\ACService.exe [113152 2010-03-18] (ArcSoft Inc.)
R2 AllShare Framework DMS; C:\Program Files\Samsung\AllShare Framework DMS\1.3.23\AllShareFrameworkManagerDMS.exe [404360 2013-12-21] (Samsung)
R2 AntiVirSchedulerService; C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe [440400 2014-02-21] (Avira Operations GmbH & Co. KG)
R2 AntiVirService; C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe [440400 2014-02-21] (Avira Operations GmbH & Co. KG)
R2 MBAMScheduler; C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe [1809720 2014-03-05] (Malwarebytes Corporation)
R2 MBAMService; C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe [857912 2014-03-05] (Malwarebytes Corporation)
S3 MyWiFiDHCPDNS; C:\Program Files\Intel\WiFi\bin\PanDhcpDns.exe [340240 2011-09-15] ()
R2 PDF Architect Helper Service; C:\Program Files (x86)\PDF Architect\HelperService.exe [1320496 2013-04-08] (pdfforge GmbH)
R2 PDF Architect Service; C:\Program Files (x86)\PDF Architect\ConversionService.exe [799280 2013-04-08] (pdfforge GmbH)
R2 Samsung Link Service; C:\Program Files\Samsung\Samsung Link\Samsung Link.exe [609632 2014-03-13] (Copyright 2013 SAMSUNG)
==================== Drivers (Whitelisted) ====================
U5 AppMgmt; C:\Windows\system32\svchost.exe [27136 2009-07-14] (Microsoft Corporation)
R2 avgntflt; C:\Windows\System32\DRIVERS\avgntflt.sys [108440 2013-12-29] (Avira Operations GmbH & Co. KG)
R1 avipbb; C:\Windows\System32\DRIVERS\avipbb.sys [131576 2013-12-29] (Avira Operations GmbH & Co. KG)
R1 avkmgr; C:\Windows\System32\DRIVERS\avkmgr.sys [28600 2013-11-29] (Avira Operations GmbH & Co. KG)
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [25816 2014-03-05] (Malwarebytes Corporation)
R3 MBAMSwissArmy; C:\Windows\system32\drivers\MBAMSwissArmy.sys [119512 2014-03-31] (Malwarebytes Corporation)
R3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [63192 2014-03-05] (Malwarebytes Corporation)
S3 catchme; \??\C:\ComboFix\catchme.sys [X]
S3 hwdatacard; system32\DRIVERS\ewusbmdm.sys [X]
==================== NetSvcs (Whitelisted) ===================
==================== One Month Created Files and Folders ========
2014-03-31 18:25 - 2014-03-31 18:25 - 00001111 _____ () C:\Users\Julia Türkon\Desktop\JRT.txt
2014-03-31 18:19 - 2014-03-31 18:19 - 00000000 ____D () C:\Windows\ERUNT
2014-03-31 18:18 - 2014-03-31 18:18 - 00008511 _____ () C:\Users\Julia Türkon\Desktop\mbam.txt
2014-03-31 18:09 - 2014-03-31 18:11 - 00000000 ____D () C:\AdwCleaner
2014-03-31 17:35 - 2014-03-31 18:16 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-03-31 17:35 - 2014-03-31 17:35 - 00001066 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-31 17:35 - 2014-03-31 17:35 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-03-31 17:35 - 2014-03-31 17:35 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-03-31 17:35 - 2014-03-05 09:26 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-03-31 17:35 - 2014-03-05 09:26 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-03-31 17:35 - 2014-03-05 09:26 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-31 17:23 - 2014-03-31 17:23 - 00018301 _____ () C:\ComboFix.txt
2014-03-30 22:04 - 2011-06-26 08:45 - 00256000 _____ () C:\Windows\PEV.exe
2014-03-30 22:04 - 2010-11-07 19:20 - 00208896 _____ () C:\Windows\MBR.exe
2014-03-30 22:04 - 2009-04-20 06:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe
2014-03-30 22:04 - 2000-08-31 02:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe
2014-03-30 22:04 - 2000-08-31 02:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe
2014-03-30 22:04 - 2000-08-31 02:00 - 00098816 _____ () C:\Windows\sed.exe
2014-03-30 22:04 - 2000-08-31 02:00 - 00080412 _____ () C:\Windows\grep.exe
2014-03-30 22:04 - 2000-08-31 02:00 - 00068096 _____ () C:\Windows\zip.exe
2014-03-30 22:02 - 2014-03-31 17:23 - 00000000 ____D () C:\Qoobox
2014-03-30 22:02 - 2014-03-30 22:11 - 00000000 ____D () C:\Windows\erdnt
2014-03-30 21:53 - 2014-03-30 21:53 - 00001228 _____ () C:\Users\Julia Türkon\Desktop\Revo Uninstaller.lnk
2014-03-30 21:53 - 2014-03-30 21:53 - 00000000 ____D () C:\Program Files (x86)\VS Revo Group
2014-03-28 21:05 - 2014-03-31 18:33 - 00000000 ____D () C:\FRST
2014-03-28 02:18 - 2014-03-28 02:18 - 00273248 _____ () C:\Windows\Minidump\032814-31496-01.dmp
2014-03-28 02:12 - 2014-03-28 02:18 - 510864222 _____ () C:\Windows\MEMORY.DMP
2014-03-28 02:12 - 2014-03-28 02:18 - 00000000 ____D () C:\Windows\Minidump
2014-03-28 02:12 - 2014-03-28 02:12 - 00276960 _____ () C:\Windows\Minidump\032814-50809-01.dmp
2014-03-27 01:10 - 2014-03-27 01:15 - 00000000 ____D () C:\Users\Julia Türkon\Desktop\Playbacks
2014-03-26 16:13 - 2014-03-26 16:13 - 00000000 ____D () C:\Users\Julia Türkon\Documents\WebCam Media
2014-03-26 16:13 - 2014-03-26 16:13 - 00000000 ____D () C:\Users\Julia Türkon\AppData\Local\ArcSoft
2014-03-26 16:12 - 2014-03-26 16:13 - 00000000 ____D () C:\ProgramData\ArcSoft
2014-03-26 16:12 - 2014-03-26 16:12 - 00002012 _____ () C:\Users\Public\Desktop\WebCam Companion 4.lnk
2014-03-26 16:11 - 2014-03-26 16:11 - 00000000 ____D () C:\Program Files (x86)\ArcSoft
2014-03-26 16:10 - 2014-03-27 02:25 - 00000000 ____D () C:\Users\Julia Türkon\AppData\Roaming\ArcSoft
2014-03-26 16:09 - 2014-03-26 16:09 - 78849016 _____ (ArcSoft ) C:\Users\Julia Türkon\Desktop\webcamcompanion4_4.0.20.365.exe
2014-03-26 15:24 - 2014-03-26 15:24 - 01262173 _____ () C:\Users\Julia Türkon\Desktop\Unbenannt4.wma
2014-03-26 15:18 - 2014-03-26 15:18 - 01199313 _____ () C:\Users\Julia Türkon\Documents\Unbenannt4.wma
2014-03-26 14:46 - 2014-03-26 14:46 - 00003354 _____ () C:\Windows\System32\Tasks\{435479C5-F1CA-4DED-B597-EBC1A56676CD}
2014-03-26 14:45 - 2010-06-02 05:55 - 00527192 _____ (Microsoft Corporation) C:\Windows\SysWOW64\XAudio2_7.dll
2014-03-26 14:45 - 2010-06-02 05:55 - 00518488 _____ (Microsoft Corporation) C:\Windows\system32\XAudio2_7.dll
2014-03-26 14:45 - 2010-06-02 05:55 - 00077656 _____ (Microsoft Corporation) C:\Windows\system32\XAPOFX1_5.dll
2014-03-26 14:45 - 2010-06-02 05:55 - 00074072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\XAPOFX1_5.dll
2014-03-26 14:45 - 2010-05-26 12:41 - 02526056 _____ (Microsoft Corporation) C:\Windows\system32\D3DCompiler_43.dll
2014-03-26 14:45 - 2010-05-26 12:41 - 02106216 _____ (Microsoft Corporation) C:\Windows\SysWOW64\D3DCompiler_43.dll
2014-03-26 14:45 - 2010-05-26 12:41 - 00276832 _____ (Microsoft Corporation) C:\Windows\system32\d3dx11_43.dll
2014-03-26 14:45 - 2010-05-26 12:41 - 00248672 _____ (Microsoft Corporation) C:\Windows\SysWOW64\d3dx11_43.dll
2014-03-26 14:44 - 2009-09-04 18:29 - 00523088 _____ (Microsoft Corporation) C:\Windows\system32\d3dx10_42.dll
2014-03-26 14:44 - 2009-09-04 18:29 - 00453456 _____ (Microsoft Corporation) C:\Windows\SysWOW64\d3dx10_42.dll
2014-03-26 14:44 - 2006-11-29 14:06 - 04398360 _____ (Microsoft Corporation) C:\Windows\system32\d3dx9_32.dll
2014-03-26 14:44 - 2006-11-29 14:06 - 03426072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\d3dx9_32.dll
2014-03-26 14:43 - 2014-03-26 14:43 - 00002163 _____ () C:\Users\Julia Türkon\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Microsoft SkyDrive.lnk
2014-03-26 14:43 - 2014-03-26 14:43 - 00002084 _____ () C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Microsoft SkyDrive.lnk
2014-03-26 14:43 - 2014-03-26 14:43 - 00002084 _____ () C:\Users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Microsoft SkyDrive.lnk
2014-03-26 14:37 - 2014-03-26 14:37 - 00000000 ____D () C:\Users\Julia Türkon\Documents\My CamStudio Temp Files
2014-03-26 14:31 - 2014-03-26 14:38 - 00004535 _____ () C:\Users\Julia Türkon\AppData\Roaming\CamStudio.cfg
2014-03-26 14:31 - 2014-03-26 14:38 - 00000408 _____ () C:\Users\Julia Türkon\AppData\Roaming\CamShapes.ini
2014-03-26 14:31 - 2014-03-26 14:38 - 00000408 _____ () C:\Users\Julia Türkon\AppData\Roaming\CamLayout.ini
2014-03-26 14:31 - 2014-03-26 14:38 - 00000096 _____ () C:\Users\Julia Türkon\AppData\Roaming\Camdata.ini
2014-03-25 22:15 - 2014-03-26 14:36 - 00000096 _____ () C:\Users\Julia Türkon\AppData\Roaming\version2.xml
2014-03-25 22:14 - 2014-03-25 22:14 - 00000853 _____ () C:\Users\Public\Desktop\CamStudio.lnk
2014-03-25 22:14 - 2014-03-25 22:14 - 00000000 ____D () C:\Program Files\CamStudio 2.7
2014-03-25 22:01 - 2014-03-25 22:01 - 00961343 _____ () C:\Users\Julia Türkon\Desktop\Unbenannt3.wma
2014-03-25 21:59 - 2014-03-25 21:59 - 00341723 _____ () C:\Users\Julia Türkon\Desktop\Unbenannt2.wma
2014-03-25 21:54 - 2014-03-25 21:54 - 01051143 _____ () C:\Users\Julia Türkon\Desktop\Unbenannt.wma
2014-03-18 00:06 - 2014-03-18 00:06 - 00000000 ____D () C:\Users\Julia Türkon\AppData\Roaming\SAMSUNG
2014-03-15 23:29 - 2014-03-01 08:05 - 23133696 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-03-15 23:29 - 2014-03-01 07:17 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-03-15 23:29 - 2014-03-01 07:16 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-03-15 23:29 - 2014-03-01 06:58 - 02765824 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-03-15 23:29 - 2014-03-01 06:52 - 00066048 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-03-15 23:29 - 2014-03-01 06:51 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-03-15 23:29 - 2014-03-01 06:42 - 00053760 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-03-15 23:29 - 2014-03-01 06:40 - 00033792 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-03-15 23:29 - 2014-03-01 06:37 - 00574976 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-03-15 23:29 - 2014-03-01 06:33 - 00139264 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-03-15 23:29 - 2014-03-01 06:33 - 00111616 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-03-15 23:29 - 2014-03-01 06:32 - 00708608 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-03-15 23:29 - 2014-03-01 06:30 - 17074688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-03-15 23:29 - 2014-03-01 06:23 - 00940032 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-03-15 23:29 - 2014-03-01 06:17 - 00218624 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-03-15 23:29 - 2014-03-01 06:11 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-03-15 23:29 - 2014-03-01 06:02 - 00195584 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-03-15 23:29 - 2014-03-01 05:54 - 05768704 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-03-15 23:29 - 2014-03-01 05:52 - 00061952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2014-03-15 23:29 - 2014-03-01 05:51 - 00051200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll
2014-03-15 23:29 - 2014-03-01 05:47 - 02168320 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-03-15 23:29 - 2014-03-01 05:43 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-03-15 23:29 - 2014-03-01 05:43 - 00032768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2014-03-15 23:29 - 2014-03-01 05:42 - 00627200 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-03-15 23:29 - 2014-03-01 05:40 - 00440832 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2014-03-15 23:29 - 2014-03-01 05:38 - 00112128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2014-03-15 23:29 - 2014-03-01 05:37 - 00553472 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll
2014-03-15 23:29 - 2014-03-01 05:35 - 02041856 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-03-15 23:29 - 2014-03-01 05:18 - 13051904 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-03-15 23:29 - 2014-03-01 05:16 - 00164864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2014-03-15 23:29 - 2014-03-01 05:14 - 04244480 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-03-15 23:29 - 2014-03-01 05:10 - 02334208 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-03-15 23:29 - 2014-03-01 05:03 - 00524288 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-03-15 23:29 - 2014-03-01 05:00 - 01964032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2014-03-15 23:29 - 2014-03-01 04:57 - 11266048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-03-15 23:29 - 2014-03-01 04:38 - 01393664 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-03-15 23:29 - 2014-03-01 04:32 - 01820160 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-03-15 23:29 - 2014-03-01 04:27 - 01156096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-03-15 23:29 - 2014-03-01 04:25 - 00817664 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-03-15 23:29 - 2014-03-01 04:25 - 00703488 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll
2014-03-15 22:49 - 2014-02-04 04:32 - 01424384 _____ (Microsoft Corporation) C:\Windows\system32\WindowsCodecs.dll
2014-03-15 22:49 - 2014-02-04 04:04 - 01230336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\WindowsCodecs.dll
2014-03-15 22:47 - 2014-01-28 04:32 - 00228864 _____ (Microsoft Corporation) C:\Windows\system32\wwansvc.dll
2014-03-14 23:40 - 2014-02-07 03:23 - 03156480 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys
2014-03-14 23:40 - 2014-01-29 04:32 - 00484864 _____ (Microsoft Corporation) C:\Windows\system32\wer.dll
2014-03-14 23:40 - 2014-01-29 04:06 - 00381440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wer.dll
2014-03-14 23:39 - 2014-02-04 04:32 - 00624128 _____ (Microsoft Corporation) C:\Windows\system32\qedit.dll
2014-03-14 23:39 - 2014-02-04 04:04 - 00509440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\qedit.dll
2014-03-12 14:49 - 2014-03-27 01:09 - 00000000 ____D () C:\Users\Julia Türkon\Desktop\12.03.14
2014-03-02 21:16 - 2014-03-03 18:59 - 01593252 _____ () C:\Windows\SysWOW64\PerfStringBackup.INI
==================== One Month Modified Files and Folders =======
2014-03-31 18:33 - 2014-03-28 21:05 - 00000000 ____D () C:\FRST
2014-03-31 18:25 - 2014-03-31 18:25 - 00001111 _____ () C:\Users\Julia Türkon\Desktop\JRT.txt
2014-03-31 18:21 - 2009-07-14 06:45 - 00016752 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-03-31 18:21 - 2009-07-14 06:45 - 00016752 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-03-31 18:19 - 2014-03-31 18:19 - 00000000 ____D () C:\Windows\ERUNT
2014-03-31 18:18 - 2014-03-31 18:18 - 00008511 _____ () C:\Users\Julia Türkon\Desktop\mbam.txt
2014-03-31 18:18 - 2011-05-16 16:04 - 00699440 _____ () C:\Windows\system32\perfh007.dat
2014-03-31 18:18 - 2011-05-16 16:04 - 00149548 _____ () C:\Windows\system32\perfc007.dat
2014-03-31 18:18 - 2009-07-14 07:13 - 01619700 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-03-31 18:16 - 2014-03-31 17:35 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-03-31 18:13 - 2010-11-21 05:47 - 00248814 _____ () C:\Windows\PFRO.log
2014-03-31 18:13 - 2009-07-14 07:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-03-31 18:13 - 2009-07-14 06:51 - 00038450 _____ () C:\Windows\setupact.log
2014-03-31 18:12 - 2013-04-28 11:30 - 02077578 _____ () C:\Windows\WindowsUpdate.log
2014-03-31 18:11 - 2014-03-31 18:09 - 00000000 ____D () C:\AdwCleaner
2014-03-31 17:47 - 2014-01-09 09:17 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-03-31 17:35 - 2014-03-31 17:35 - 00001066 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-03-31 17:35 - 2014-03-31 17:35 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-03-31 17:35 - 2014-03-31 17:35 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-03-31 17:23 - 2014-03-31 17:23 - 00018301 _____ () C:\ComboFix.txt
2014-03-31 17:23 - 2014-03-30 22:02 - 00000000 ____D () C:\Qoobox
2014-03-31 17:21 - 2009-07-14 04:34 - 00000215 _____ () C:\Windows\system.ini
2014-03-30 22:13 - 2009-07-14 05:20 - 00000000 __RHD () C:\Users\Default
2014-03-30 22:11 - 2014-03-30 22:02 - 00000000 ____D () C:\Windows\erdnt
2014-03-30 21:53 - 2014-03-30 21:53 - 00001228 _____ () C:\Users\Julia Türkon\Desktop\Revo Uninstaller.lnk
2014-03-30 21:53 - 2014-03-30 21:53 - 00000000 ____D () C:\Program Files (x86)\VS Revo Group
2014-03-28 02:41 - 2013-04-29 21:25 - 00116128 _____ () C:\Users\Julia Türkon\AppData\Local\GDIPFONTCACHEV1.DAT
2014-03-28 02:18 - 2014-03-28 02:18 - 00273248 _____ () C:\Windows\Minidump\032814-31496-01.dmp
2014-03-28 02:18 - 2014-03-28 02:12 - 510864222 _____ () C:\Windows\MEMORY.DMP
2014-03-28 02:18 - 2014-03-28 02:12 - 00000000 ____D () C:\Windows\Minidump
2014-03-28 02:17 - 2009-07-14 07:08 - 00008442 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-03-28 02:12 - 2014-03-28 02:12 - 00276960 _____ () C:\Windows\Minidump\032814-50809-01.dmp
2014-03-28 02:12 - 2009-07-14 06:45 - 00447840 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-03-27 02:27 - 2007-10-17 22:42 - 00024632 _____ () C:\Users\Julia Türkon\Documents\Heleno que si aprende Script.otf
2014-03-27 02:25 - 2014-03-26 16:10 - 00000000 ____D () C:\Users\Julia Türkon\AppData\Roaming\ArcSoft
2014-03-27 01:15 - 2014-03-27 01:10 - 00000000 ____D () C:\Users\Julia Türkon\Desktop\Playbacks
2014-03-27 01:09 - 2014-03-12 14:49 - 00000000 ____D () C:\Users\Julia Türkon\Desktop\12.03.14
2014-03-26 16:13 - 2014-03-26 16:13 - 00000000 ____D () C:\Users\Julia Türkon\Documents\WebCam Media
2014-03-26 16:13 - 2014-03-26 16:13 - 00000000 ____D () C:\Users\Julia Türkon\AppData\Local\ArcSoft
2014-03-26 16:13 - 2014-03-26 16:12 - 00000000 ____D () C:\ProgramData\ArcSoft
2014-03-26 16:12 - 2014-03-26 16:12 - 00002012 _____ () C:\Users\Public\Desktop\WebCam Companion 4.lnk
2014-03-26 16:11 - 2014-03-26 16:11 - 00000000 ____D () C:\Program Files (x86)\ArcSoft
2014-03-26 16:11 - 2013-04-29 21:07 - 00000000 ___HD () C:\Program Files (x86)\InstallShield Installation Information
2014-03-26 16:09 - 2014-03-26 16:09 - 78849016 _____ (ArcSoft ) C:\Users\Julia Türkon\Desktop\webcamcompanion4_4.0.20.365.exe
2014-03-26 15:24 - 2014-03-26 15:24 - 01262173 _____ () C:\Users\Julia Türkon\Desktop\Unbenannt4.wma
2014-03-26 15:18 - 2014-03-26 15:18 - 01199313 _____ () C:\Users\Julia Türkon\Documents\Unbenannt4.wma
2014-03-26 14:46 - 2014-03-26 14:46 - 00003354 _____ () C:\Windows\System32\Tasks\{435479C5-F1CA-4DED-B597-EBC1A56676CD}
2014-03-26 14:44 - 2013-07-08 20:22 - 00000547 _____ () C:\Windows\DirectX.log
2014-03-26 14:43 - 2014-03-26 14:43 - 00002163 _____ () C:\Users\Julia Türkon\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Microsoft SkyDrive.lnk
2014-03-26 14:43 - 2014-03-26 14:43 - 00002084 _____ () C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Microsoft SkyDrive.lnk
2014-03-26 14:43 - 2014-03-26 14:43 - 00002084 _____ () C:\Users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Microsoft SkyDrive.lnk
2014-03-26 14:43 - 2013-07-08 20:21 - 00000000 ___RD () C:\Users\Julia Türkon\SkyDrive
2014-03-26 14:43 - 2013-07-08 20:21 - 00000000 ____D () C:\Program Files (x86)\Microsoft SkyDrive
2014-03-26 14:38 - 2014-03-26 14:31 - 00004535 _____ () C:\Users\Julia Türkon\AppData\Roaming\CamStudio.cfg
2014-03-26 14:38 - 2014-03-26 14:31 - 00000408 _____ () C:\Users\Julia Türkon\AppData\Roaming\CamShapes.ini
2014-03-26 14:38 - 2014-03-26 14:31 - 00000408 _____ () C:\Users\Julia Türkon\AppData\Roaming\CamLayout.ini
2014-03-26 14:38 - 2014-03-26 14:31 - 00000096 _____ () C:\Users\Julia Türkon\AppData\Roaming\Camdata.ini
2014-03-26 14:37 - 2014-03-26 14:37 - 00000000 ____D () C:\Users\Julia Türkon\Documents\My CamStudio Temp Files
2014-03-26 14:36 - 2014-03-25 22:15 - 00000096 _____ () C:\Users\Julia Türkon\AppData\Roaming\version2.xml
2014-03-25 22:14 - 2014-03-25 22:14 - 00000853 _____ () C:\Users\Public\Desktop\CamStudio.lnk
2014-03-25 22:14 - 2014-03-25 22:14 - 00000000 ____D () C:\Program Files\CamStudio 2.7
2014-03-25 22:14 - 2009-07-14 05:20 - 00000000 ____D () C:\Program Files\Common Files\Microsoft Shared
2014-03-25 22:01 - 2014-03-25 22:01 - 00961343 _____ () C:\Users\Julia Türkon\Desktop\Unbenannt3.wma
2014-03-25 21:59 - 2014-03-25 21:59 - 00341723 _____ () C:\Users\Julia Türkon\Desktop\Unbenannt2.wma
2014-03-25 21:54 - 2014-03-25 21:54 - 01051143 _____ () C:\Users\Julia Türkon\Desktop\Unbenannt.wma
2014-03-18 00:07 - 2013-12-28 21:12 - 00000000 ____D () C:\Users\Julia Türkon\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Samsung
2014-03-18 00:06 - 2014-03-18 00:06 - 00000000 ____D () C:\Users\Julia Türkon\AppData\Roaming\SAMSUNG
2014-03-16 14:48 - 2013-06-27 20:00 - 00000000 ____D () C:\ProgramData\Microsoft Help
2014-03-12 00:34 - 2013-07-08 19:36 - 00006656 _____ () C:\Users\Julia Türkon\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
2014-03-11 23:38 - 2014-01-09 09:17 - 00003822 _____ () C:\Windows\System32\Tasks\Adobe Flash Player Updater
2014-03-11 23:38 - 2013-04-29 21:54 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-03-11 23:38 - 2013-04-29 21:54 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-03-05 22:08 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\rescache
2014-03-05 09:26 - 2014-03-31 17:35 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-03-05 09:26 - 2014-03-31 17:35 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-03-05 09:26 - 2014-03-31 17:35 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-03-03 18:59 - 2014-03-02 21:16 - 01593252 _____ () C:\Windows\SysWOW64\PerfStringBackup.INI
2014-03-01 08:05 - 2014-03-15 23:29 - 23133696 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-03-01 07:17 - 2014-03-15 23:29 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-03-01 07:16 - 2014-03-15 23:29 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-03-01 06:58 - 2014-03-15 23:29 - 02765824 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-03-01 06:52 - 2014-03-15 23:29 - 00066048 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-03-01 06:51 - 2014-03-15 23:29 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-03-01 06:42 - 2014-03-15 23:29 - 00053760 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-03-01 06:40 - 2014-03-15 23:29 - 00033792 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-03-01 06:37 - 2014-03-15 23:29 - 00574976 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-03-01 06:33 - 2014-03-15 23:29 - 00139264 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-03-01 06:33 - 2014-03-15 23:29 - 00111616 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-03-01 06:32 - 2014-03-15 23:29 - 00708608 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-03-01 06:30 - 2014-03-15 23:29 - 17074688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-03-01 06:23 - 2014-03-15 23:29 - 00940032 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-03-01 06:17 - 2014-03-15 23:29 - 00218624 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-03-01 06:11 - 2014-03-15 23:29 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-03-01 06:02 - 2014-03-15 23:29 - 00195584 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-03-01 05:54 - 2014-03-15 23:29 - 05768704 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-03-01 05:52 - 2014-03-15 23:29 - 00061952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2014-03-01 05:51 - 2014-03-15 23:29 - 00051200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll
2014-03-01 05:47 - 2014-03-15 23:29 - 02168320 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-03-01 05:43 - 2014-03-15 23:29 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-03-01 05:43 - 2014-03-15 23:29 - 00032768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2014-03-01 05:42 - 2014-03-15 23:29 - 00627200 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-03-01 05:40 - 2014-03-15 23:29 - 00440832 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2014-03-01 05:38 - 2014-03-15 23:29 - 00112128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2014-03-01 05:37 - 2014-03-15 23:29 - 00553472 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll
2014-03-01 05:35 - 2014-03-15 23:29 - 02041856 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-03-01 05:18 - 2014-03-15 23:29 - 13051904 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-03-01 05:16 - 2014-03-15 23:29 - 00164864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2014-03-01 05:14 - 2014-03-15 23:29 - 04244480 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-03-01 05:10 - 2014-03-15 23:29 - 02334208 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-03-01 05:03 - 2014-03-15 23:29 - 00524288 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-03-01 05:00 - 2014-03-15 23:29 - 01964032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2014-03-01 04:57 - 2014-03-15 23:29 - 11266048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-03-01 04:38 - 2014-03-15 23:29 - 01393664 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-03-01 04:32 - 2014-03-15 23:29 - 01820160 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-03-01 04:27 - 2014-03-15 23:29 - 01156096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-03-01 04:25 - 2014-03-15 23:29 - 00817664 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-03-01 04:25 - 2014-03-15 23:29 - 00703488 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll
Files to move or delete:
====================
C:\Users\Julia Türkon\AppData\Roaming\Camdata.ini
C:\Users\Julia Türkon\AppData\Roaming\CamLayout.ini
C:\Users\Julia Türkon\AppData\Roaming\CamShapes.ini
Some content of TEMP:
====================
C:\Users\Julia Türkon\AppData\Local\Temp\avgnt.exe
C:\Users\Julia Türkon\AppData\Local\Temp\Quarantine.exe
==================== Bamital & volsnap Check =================
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit
LastRegBack: 2014-03-30 21:51
==================== End Of Log ============================ --- --- --- |