Johanna LK. | 02.06.2014 18:57 | Hier ist der Inhalt der MBAM-Datei: Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlauf Datum: 02.06.2014
Suchlauf-Zeit: 14:31:10
Logdatei: mbam.txt
Administrator: Nein
Version: 2.00.2.1012
Malware Datenbank: v2014.06.02.04
Rootkit Datenbank: v2014.05.21.01
Lizenz: Kostenlos
Malware Schutz: Deaktiviert
Bösartiger Webseiten Schutz: Deaktiviert
Self-protection: Deaktiviert
Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: Johanna
Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 324696
Verstrichene Zeit: 19 Min, 11 Sek
Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Heuristics: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 0
(No malicious items detected)
Module: 0
(No malicious items detected)
Registrierungsschlüssel: 8
PUP.Optional.Fortunitas.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{c6f3fc7b-d607-44ec-9caf-2a41d547137f}, In Quarantäne, [882421524b3055e16655b97ad42e8080],
PUP.Optional.Fortunitas.A, HKLM\SOFTWARE\CLASSES\TYPELIB\{eff4f283-3c8b-4a01-8297-ddc839210b86}, In Quarantäne, [882421524b3055e16655b97ad42e8080],
PUP.Optional.Fortunitas.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{94F1FD29-FDC2-4BF9-B008-AFB0452634E6}, In Quarantäne, [882421524b3055e16655b97ad42e8080],
PUP.Optional.Fortunitas.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{94F1FD29-FDC2-4BF9-B008-AFB0452634E6}, In Quarantäne, [882421524b3055e16655b97ad42e8080],
PUP.Optional.Fortunitas.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{eff4f283-3c8b-4a01-8297-ddc839210b86}, In Quarantäne, [882421524b3055e16655b97ad42e8080],
PUP.Optional.Fortunitas.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{C6F3FC7B-D607-44EC-9CAF-2A41D547137F}, In Quarantäne, [882421524b3055e16655b97ad42e8080],
PUP.Optional.Fortunitas.A, HKLM\SOFTWARE\WOW6432NODE\Fortunitas, In Quarantäne, [3b71a1d28cef81b50db59715d72b31cf],
PUP.Optional.Fortunitas.A, HKU\S-1-5-21-578327087-4110603385-1361986703-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\Fortunitas, In Quarantäne, [0d9f7df64239c57101c036761ee40000],
Registrierungswerte: 0
(No malicious items detected)
Registrierungsdaten: 1
PUP.Optional.Qone8, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Gut: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Schlecht: ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Ersetzt,[c6e6f67dcdae86b0025cfc65bb49ab55]
Ordner: 1
PUP.Optional.Conduit.A, C:\Users\Johanna\AppData\Local\Temp\ct2269050, In Quarantäne, [1a929dd64f2c42f4fdc2f08b33cf6a96],
Dateien: 69
PUP.Optional.SweetIM, C:\Users\Johanna\AppData\Local\Temp\bundlesweetimsetup.exe, In Quarantäne, [47657df67ffcb77fde1285ff22e2e51b],
Adware.DomaIQ, C:\Users\Johanna\AppData\Local\Temp\jki4A3A.tmp, In Quarantäne, [3f6d274cf68595a1eef5e5449a6842be],
Adware.DomaIQ, C:\Users\Johanna\AppData\Local\Temp\jki5D0E.tmp, In Quarantäne, [9b118ae9c5b67eb8b92a54d5020033cd],
PUP.Optional.Iminent.A, C:\Users\Johanna\AppData\Local\Temp\IminentSetup.exe, In Quarantäne, [a5070b68611a162056b34de28c755da3],
PUP.Optional.PricePeep.A, C:\Users\Johanna\AppData\Local\Temp\pricepeep_130001_0101.exe, In Quarantäne, [dbd1244f106b32046ef1102fff023fc1],
PUP.Optional.DealPly.A, C:\Users\Johanna\AppData\Local\Temp\dp.exe, In Quarantäne, [dcd0b0c386f5c37341d36f197c888c74],
Trojan.RotBrowse, C:\Users\Johanna\AppData\Local\Temp\D922.tmp, In Quarantäne, [0d9f1d56accf60d6b6234c0636ce8779],
PUP.Optional.PerformerSoft.A, C:\Users\Johanna\AppData\Local\Temp\FD6D.tmp, In Quarantäne, [f1bb175c81fa84b20c0232e6df2207f9],
Trojan.Sefnit, C:\Users\Johanna\AppData\Local\Temp\setup_fsu_cid.exe, In Quarantäne, [d4d8caa990eb45f17dd54aca60a231cf],
PUP.Optional.FileScout.A, C:\Users\Johanna\AppData\Local\Temp\265E.tmp, In Quarantäne, [3d6f7cf77308b3834af933d660a127d9],
PUP.Optional.PerformerSoft.A, C:\Users\Johanna\AppData\Local\Temp\B2E.tmp, In Quarantäne, [01abf182ccafbb7b34da41d7c938c53b],
Trojan.RotBrowse, C:\Users\Johanna\AppData\Local\Temp\B371.tmp, In Quarantäne, [8a2203702457bf7700dbe66c699b20e0],
PUP.Optional.Delta.A, C:\Users\Johanna\AppData\Local\Temp\DeltaTB.exe, In Quarantäne, [8d1fb4bf2a512f072ea01bed818044bc],
PUP.Optional.PerformerSoft.A, C:\Users\Johanna\AppData\Local\Temp\3086.tmp, In Quarantäne, [5755db98f586270f35d9a1770ef3619f],
PUP.Optional.Conduit.A, C:\Users\Johanna\AppData\Local\Temp\337D.tmp, In Quarantäne, [ebc1dd9628534aec96c1849ebf42af51],
PUP.Optional.Babylon.A, C:\Users\Johanna\AppData\Local\Temp\6F2A952C-BAB0-7891-B266-90940DD8F40B\Latest\BExternal.dll, In Quarantäne, [beee2a491665a195756fab776f91d42c],
Trojan.RotBrowse, C:\Users\Johanna\AppData\Local\Temp\6F2A952C-BAB0-7891-B266-90940DD8F40B\Latest\ccp.exe, In Quarantäne, [7a322152621938fe9c3d3d1546bec739],
PUP.Optional.Babylon.A, C:\Users\Johanna\AppData\Local\Temp\6F2A952C-BAB0-7891-B266-90940DD8F40B\Latest\CrxInstaller.dll, In Quarantäne, [f5b79fd4e89346f0b6c937e3d22f7090],
PUP.Optional.Delta.A, C:\Users\Johanna\AppData\Local\Temp\6F2A952C-BAB0-7891-B266-90940DD8F40B\Latest\MyBabylonTB.exe, In Quarantäne, [723a93e0790270c678e46f02ea179868],
PUP.Optional.Babylon.A, C:\Users\Johanna\AppData\Local\Temp\6F2A952C-BAB0-7891-B266-90940DD8F40B\Latest\Setup.exe, In Quarantäne, [cddf6c07403bcb6b3ff42cf4f70912ee],
PUP.Optional.CRX.A, C:\Users\Johanna\AppData\Local\Temp\busF73B\CrxUpdater_d.exe, In Quarantäne, [cddfb5bee79457dfd075230663a1c040],
PUP.Optional.Conduit, C:\Users\Johanna\AppData\Local\Temp\ct2269050\ieLogic.exe, In Quarantäne, [eac2eb889ddeef47eb9552dd47b98f71],
PUP.Optional.CRX.A, C:\Users\Johanna\AppData\Local\Temp\bus1CD5\CrxUpdater_d.exe, In Quarantäne, [6d3fa7cc9edda195b68f0029eb1945bb],
PUP.Optional.CRX.A, C:\Users\Johanna\AppData\Local\Temp\bus1FF5\CrxUpdater_d.exe, In Quarantäne, [aa028de683f87db9e85d87a2ea1aff01],
PUP.Optional.CRX.A, C:\Users\Johanna\AppData\Local\Temp\bus35BA\CrxUpdater_d.exe, In Quarantäne, [7f2d3c37f8833006440166c3a65e6c94],
PUP.Optional.CRX.A, C:\Users\Johanna\AppData\Local\Temp\bus85BF\CrxUpdater_d.exe, In Quarantäne, [5854581b2a51cd6948fd42e7c242df21],
PUP.Optional.CRX.A, C:\Users\Johanna\AppData\Local\Temp\bus8D8C\CrxUpdater_d.exe, In Quarantäne, [d9d397dc0972fb3ba99cdf4a5da79b65],
PUP.Optional.CRX.A, C:\Users\Johanna\AppData\Local\Temp\busA76\CrxUpdater_d.exe, In Quarantäne, [8527cda6b5c6e55102439990778d18e8],
PUP.Optional.BabSolution.A, C:\Users\Johanna\AppData\Local\Temp\busBD05\BUSolution.dll, In Quarantäne, [e7c541324c2fcc6ad6f507063bc651af],
PUP.Optional.SkyTech.A, C:\Users\Johanna\AppData\Local\Temp\fullpackage_temp1396040586\alilog.dll, In Quarantäne, [3d6fec871e5dd85e28ee67cb867abc44],
PUP.Optional.SkyTech.A, C:\Users\Johanna\AppData\Local\Temp\fullpackage_temp1396040586\package1.zip, In Quarantäne, [ab015b18c9b254e242d43df503fdd52b],
PUP.Optional.SupTab.A, C:\Users\Johanna\AppData\Local\Temp\fullpackage_temp1396040586\tmp\SupTab.exe, In Quarantäne, [f6b6dc97f08b63d3ea62979eae52fa06],
PUP.Optional.WpManager, C:\Users\Johanna\AppData\Local\Temp\fullpackage_temp1396040586\tmp\wpm.exe, In Quarantäne, [fdaf086b6a1163d361c699c917ea06fa],
PUP.Optional.Conduit.A, C:\Users\Johanna\AppData\Local\Temp\82e3cbed-82fa-4265-b41c-7e57f9e23dbb\spidentifierimpl.exe, In Quarantäne, [a00c165dc9b2fa3c12a69f8004fd7d83],
PUP.Optional.Fortunitas.A, C:\Users\Johanna\AppData\Local\Temp\82e3cbed-82fa-4265-b41c-7e57f9e23dbb\software\FortunitasSetup.exe, In Quarantäne, [c6e6621109727bbba50b73bf56ae28d8],
PUP.Optional.SkyTech.A, C:\Users\Johanna\AppData\Local\Temp\82e3cbed-82fa-4265-b41c-7e57f9e23dbb\software\tugs_webssearches.exe, In Quarantäne, [43697ff4cfac0333e9b859fe857c629e],
PUP.Optional.Verti, C:\Users\Johanna\Downloads\MediaPlayerClassic (1).exe, In Quarantäne, [88241b58b2c96fc7537957fb8f75c23e],
PUP.Optional.Verti, C:\Users\Johanna\Downloads\MediaPlayerClassic (2).exe, In Quarantäne, [77358be8d3a856e00dbf183a32d259a7],
PUP.Optional.Verti, C:\Users\Johanna\Downloads\MediaPlayerClassic.exe, In Quarantäne, [8e1eff74a1dabb7bddef84ce12f2936d],
PUP.Bundle.Installer.OI, C:\Users\Johanna\Downloads\mplayer_Setup.exe, In Quarantäne, [812b2c4781fa2a0cf4ea1385946c48b8],
PUP.Optional.OutBrowse, C:\Users\Johanna\Downloads\setup (3).exe, In Quarantäne, [3676da99f48737ff90ee5b1bcf32fd03],
Adware.DomaIQ, C:\Users\Johanna\Downloads\Player (1).exe, In Quarantäne, [268695de6e0d7eb8de05bf7d11ef34cc],
Adware.DomaIQ, C:\Users\Johanna\Downloads\Player.exe, In Quarantäne, [c5e70e6589f2003624bf4cf014ec1ae6],
PUP.Optional.OutBrowse, C:\Users\Johanna\Downloads\setup (1).exe, In Quarantäne, [d1db5c1795e6ba7c394592e448b904fc],
PUP.Optional.DomaIQ, C:\Users\Johanna\Downloads\Setup (2).exe, In Quarantäne, [45676f047efdf83e7169f25016ea837d],
PUP.Optional.DomaIQ, C:\Users\Johanna\Downloads\Nicht bestätigt 244726.crdownload, In Quarantäne, [0d9fb8bba8d3f73f9cdc67182fd219e7],
PUP.Optional.BundleInstaller.A, C:\Users\Johanna\Downloads\Nicht bestätigt 359665.crdownload, In Quarantäne, [e4c83b38cab1a98d901aa78d808408f8],
PUP.Optional.BundleInstaller.A, C:\Users\Johanna\Downloads\Nicht bestätigt 550118.crdownload, In Quarantäne, [cfdd502380fb280ec622fe483bc637c9],
Adware.InstallBrain, C:\Users\Johanna\Downloads\VideoPerformerSetup.exe, In Quarantäne, [69437300ccaf1224bd797b8e58a939c7],
PUP.BundleInstaller.VG, C:\Users\Johanna\Downloads\video_downloader (1).exe, In Quarantäne, [8a2291e2146769cdeb847317b24e669a],
PUP.BundleInstaller.VG, C:\Users\Johanna\Downloads\video_downloader (2).exe, In Quarantäne, [159701729be038fe9dd278129769b947],
PUP.Optional.Bundlore, C:\Users\Johanna\Downloads\video_downloader (3).exe, In Quarantäne, [3a72b0c3a1da4ee88827f80e4db43cc4],
PUP.Optional.Bundlore, C:\Users\Johanna\Downloads\video_downloader (4).exe, In Quarantäne, [a606b4bf87f43105476864a249b85fa1],
PUP.BundleInstaller.VG, C:\Users\Johanna\Downloads\video_downloader.exe, In Quarantäne, [d3d9ff7492e916207df279119a6614ec],
PUP.Optional.Somoto, C:\Users\Johanna\Downloads\VLCMediaPlayerSetup-bJXUBG1.exe, In Quarantäne, [4e5e0f6454279f979403a4e0c242ba46],
PUP.Optional.Somoto.A, C:\Users\Johanna\Downloads\VLCVideoConverterSetup.exe, In Quarantäne, [9b11591a4833b284cf3adc5c34cc28d8],
PUP.Optional.OneClickDownloader.A, C:\Users\Johanna\Downloads\Harry.Potter.und.der.Feuerkelch.German.2005.AC3.DVDRiP.XViD.exe, In Quarantäne, [3d6f00734239cd69b6c4be7f30d1b749],
PUP.Optional.OneClickDownloader.A, C:\Users\Johanna\Downloads\HDvid-codec-Chrome (1).exe, In Quarantäne, [525ad1a27efd082eb6b9c94a6b963dc3],
PUP.Optional.OneClickDownloader.A, C:\Users\Johanna\Downloads\HDvid-codec-Chrome.exe, In Quarantäne, [5c5080f3accf68ce5619cd4625dca858],
PUP.Optional.Bandoo, C:\Users\Johanna\Downloads\iLividSetup-r495-n-bc.exe, In Quarantäne, [6745eb88e596102650cc8f7c46bbad53],
PUP.Optional.Bandoo, C:\Users\Johanna\Downloads\iLividSetup.exe, In Quarantäne, [02aa8de6f08b290de4385caf877a2fd1],
PUP.Optional.OutBrowse, C:\Users\Johanna\Downloads\setup (6).exe, In Quarantäne, [7a32afc48fec092d7b33ea9153aed22e],
PUP.Optional.OutBrowse, C:\Users\Johanna\Downloads\setup (8).exe, In Quarantäne, [33799cd7cab142f4840a3b3d748de21e],
Adware.DomaIQ, C:\Users\Johanna\Downloads\Setup.exe, In Quarantäne, [7537452e5d1e94a208dbc676dc24fc04],
PUP.Optional.Softonic, C:\Users\Johanna\Downloads\SoftonicDownloader_fuer_samsung-kies.exe, In Quarantäne, [07a50d66bcbfac8a75a724e239c8bf41],
PUP.Optional.Superfish.A, C:\Users\Johanna\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage, In Quarantäne, [e3c9dd96403b0135242dddb8ba480ff1],
PUP.Optional.Superfish.A, C:\Users\Johanna\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.superfish.com_0.localstorage-journal, In Quarantäne, [baf2c2b1c2b9fb3bdf7297feba4817e9],
PUP.Optional.Fortunitas.A, C:\Users\Johanna\AppData\Roaming\Mozilla\Firefox\Profiles\i8d9acpl.default\extensions\{b8a90375-3b37-4954-86de-f96c458c4ce2}.xpi, In Quarantäne, [802c5d16007be74fe094653e1fe3f808],
PUP.Optional.Conduit.A, C:\Users\Johanna\AppData\Local\Temp\ct2269050\statisticsStub.exe, In Quarantäne, [1a929dd64f2c42f4fdc2f08b33cf6a96],
Physische Sektoren: 0
(No malicious items detected)
(end) |