ZU Punkt eins kann ich berichten, dass der Revo Uninstaller FoxTab nicht findet.
Das andere läuft bereits..ich melde mich
Hier der Log von Malwarebytes Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlauf Datum: 30.04.2015
Suchlauf-Zeit: 19:36:50
Logdatei: MB.txt
Administrator: Ja
Version: 2.01.6.1022
Malware Datenbank: v2015.04.30.05
Rootkit Datenbank: v2015.04.21.01
Lizenz: Kostenlos
Malware Schutz: Deaktiviert
Bösartiger Webseiten Schutz: Deaktiviert
Selbstschutz: Deaktiviert
Betriebssystem: Windows 7
CPU: x86
Dateisystem: NTFS
Benutzer: admin
Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 366006
Verstrichene Zeit: 28 Min, 50 Sek
Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Heuristik: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 0
(Keine schädliche Elemente gefunden)
Module: 0
(Keine schädliche Elemente gefunden)
Registrierungsschlüssel: 3
PUP.Optional.MyWebSearch.A, HKLM\SOFTWARE\MOZILLAPLUGINS\@mywebsearch.com/Plugin, In Quarantäne, [813cda982763270f78c3202df2137e82],
PUP.Optional.FunWebProducts.A, HKU\S-1-5-21-2403307681-2365322253-235483669-1000\SOFTWARE\APPDATALOW\SOFTWARE\Fun Web Products, In Quarantäne, [7e3fcda57b0f40f61d21748ce12334cc],
PUP.Optional.FunWebProducts.A, HKU\S-1-5-21-2403307681-2365322253-235483669-1000\SOFTWARE\APPDATALOW\SOFTWARE\FunWebProducts, In Quarantäne, [9f1ed59d107ac472ae91847ca163fd03],
Registrierungswerte: 1
PUP.Optional.Mindspark.A, HKLM\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|m3ffxtbr@mywebsearch.com, C:\Program Files\MyWebSearch\bar\1.bin, In Quarantäne, [5b62145e90fa91a54cbb59aa52b2bf41]
Registrierungsdaten: 0
(Keine schädliche Elemente gefunden)
Ordner: 12
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Installr, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Installr\Cache, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Shared, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Shared\Cache, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\History, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Settings, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
Dateien: 57
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Installr\Cache\0034BEDC.exe, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Installr\Cache\files.ini, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Shared\Cache\CursorManiaBtn.html, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Shared\Cache\SmileyCentralBtn.html, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Shared\Cache\temp.html, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.FunWebProducts.A, C:\Users\Michi\AppData\LocalLow\FunWebProducts\Shared\Cache\WebfettiBtn.html, In Quarantäne, [427b99d9dfabb2843b74970b11f28e72],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\00350963, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\00350D78, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\00350F3D.bin, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\00351036.bmp, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\003510C3.bin, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\00351111.bin, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\0035117E.bin, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\003511FB.bin, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\0082ECE0.bin, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\0082ED7C.bin, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\0082EDBA.bin, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Cache\files.ini, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\History\search3, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\8_step1.gif, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\autoup.gif, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\autoup.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkez.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkgr.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkgs.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bklf.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkrg.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkwebfet.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkzc.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkzl.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkzn.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkzq.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkzr.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkzu.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkzv.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkzw.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\bkzwinky.jpg, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\blubtn2d.png, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\blubtn2r.png, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\blubtn3d.png, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\blubtn3r.png, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\center.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\index.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\mid_dots.gif, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\protect.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\rebut4.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\rebut4b.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\rebut4c.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\shield.png, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\shocked.gif, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\stop.gif, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\systray.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\systrayp.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\tp_grad.gif, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Message\COMMON\warn.gif, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.MyWebSearch.A, C:\Users\Michi\AppData\LocalLow\MyWebSearch\bar\Settings\prevcfg2.htm, In Quarantäne, [af0e452d2763f640e7784270f013ab55],
PUP.Optional.Conduit.A, C:\Users\Michi\AppData\Roaming\Mozilla\Firefox\Profiles\hg16e0to.default\prefs.js, Gut: (), Schlecht: (user_pref("CT2269050.SearchFromAddressBarUrl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2269050&q=");), Ersetzt,[0db0482aa8e2280e9d66aba40ff7817f]
Physische Sektoren: 0
(Keine schädliche Elemente gefunden)
(end) Hier der AdwCleaner: Code:
# AdwCleaner v4.202 - Logfile created 30/04/2015 at 20:17:23
# Updated 23/04/2015 by Xplode
# Database : 2015-04-27.1 [Server]
# Operating system : Windows 7 Home Premium (x86)
# Username : admin - BIG-SCHLAEPPI
# Running from : C:\Users\Michi\Downloads\AdwCleaner_4.202.exe
# Option : Cleaning
***** [ Services ] *****
***** [ Files / Folders ] *****
Folder Deleted : C:\Program Files\Common Files\DVDVideoSoft\TB
Folder Deleted : C:\Users\admin\AppData\Local\AskToolbar
Folder Deleted : C:\Users\Michi\AppData\Local\iMesh
Folder Deleted : C:\Users\Michi\AppData\Roaming\GrabPro
Folder Deleted : C:\Users\Michi\AppData\Roaming\ProgSense
Folder Deleted : C:\Users\Michi\AppData\Roaming\download Manager
***** [ Scheduled tasks ] *****
***** [ Shortcuts ] *****
***** [ Registry ] *****
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{35B8892D-C3FB-4D88-990D-31DB2EBD72BD}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9AFB8248-617F-460D-9366-D71CDEDA3179}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{120927BF-1700-43BC-810F-FAB92549B390}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1F52A5FA-A705-4415-B975-88503B291728}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3E720453-B472-4954-B7AA-33069EB53906}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7473D293-B7BB-4F24-AE82-7E2CE94BB6A9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7473D295-B7BB-4F24-AE82-7E2CE94BB6A9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7473D297-B7BB-4F24-AE82-7E2CE94BB6A9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{8E9CF769-3D3B-40EB-9E2D-76E7A205E4D2}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{991AAC62-B100-47CE-8B75-253965244F69}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A626CDBD-3D13-4F78-B819-440A28D7E8FC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{DB507187-9746-458C-97DA-C458131EEDE7}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E342AF55-B78A-4CD0-A2BB-DA7F52D9D25F}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E79DFBC9-5697-4FBD-94E5-5B2A9C7C1612}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E79DFBCB-5697-4FBD-94E5-5B2A9C7C1612}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F87D7FB5-9DC5-4C8C-B998-D8DFE02E2978}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{93E3D79C-0786-48FF-9329-93BC9F6DC2B3}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4250488A-CB24-0893-C066-B1AEA57BCFF2}
Key Deleted : HKU\.DEFAULT\Software\APN
Key Deleted : HKU\.DEFAULT\Software\Ask.com
Key Deleted : HKU\.DEFAULT\Software\AskToolbar
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\B696D3C37BD0D6C33A65D38BEC459181
Key Deleted : HKLM\SOFTWARE\Classes\Installer\Features\B696D3C37BD0D6C33A65D38BEC459181
Key Deleted : HKLM\SOFTWARE\Classes\Installer\Products\B696D3C37BD0D6C33A65D38BEC459181
***** [ Web browsers ] *****
-\\ Internet Explorer v8.0.7600.16930
*************************
AdwCleaner[R0].txt - [4114 bytes] - [30/04/2015 20:13:24]
AdwCleaner[R1].txt - [4173 bytes] - [30/04/2015 20:16:07]
AdwCleaner[S0].txt - [4186 bytes] - [30/04/2015 20:17:23]
########## EOF - \AdwCleaner\AdwCleaner[S0].txt - [4245 bytes] ########## Und hier das von Junkware.. Code:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.6.7 (04.30.2015:1)
OS: Windows 7 Home Premium x86
Ran by admin on 30.04.2015 at 20:24:40,51
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Tasks
~~~ Registry Values
Successfully repaired: [Registry Value] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\S-1-5-18\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\S-1-5-19\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\S-1-5-20\Software\Microsoft\Internet Explorer\Main\\Start Page
Successfully repaired: [Registry Value] HKEY_USERS\S-1-5-21-2403307681-2365322253-235483669-1008\Software\Microsoft\Internet Explorer\Main\\Start Page
~~~ Registry Keys
~~~ Files
~~~ Folders
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 30.04.2015 at 20:26:54,29
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Und noch mal ein neues FRST
FRST Logfile:
FRST Logfile: Code:
Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 27-04-2015 01
Ran by admin (administrator) on BIG-SCHLAEPPI on 30-04-2015 20:28:27
Running from C:\Users\Michi\Desktop
Loaded Profiles: Michi & admin (Available profiles: Michi & admin)
Platform: Microsoft Windows 7 Home Premium (X86) OS Language: Deutsch (Deutschland)
Internet Explorer Version 8 (Default browser: IE)
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/
==================== Processes (Whitelisted) =================
(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)
(Lexmark International, Inc.) C:\Windows\System32\LEXBCES.EXE
(Lexmark International, Inc.) C:\Windows\System32\LEXPPS.EXE
(Intel Corporation) C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
(Microsoft Corporation) C:\Program Files\Common Files\microsoft shared\Windows Live\WLIDSVC.EXE
(Microsoft Corporation) C:\Program Files\Common Files\microsoft shared\Windows Live\WLIDSVCM.EXE
(Intel Corporation) C:\Windows\System32\hkcmd.exe
() C:\Program Files\HTC\Internet Pass-Through\PassThruSvr.exe
() C:\Program Files\Synology Data Replicator 3\SynoDrService.exe
() C:\Program Files\Synology\Assistant\UsbClientService.exe
(Microsoft Corporation) C:\Windows\System32\wisptis.exe
(Microsoft Corporation) C:\Windows\System32\wisptis.exe
(Microsoft Corporation) C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe
(Acronis) C:\Program Files\Common Files\Acronis\SyncAgent\syncagentsrv.exe
(Mozilla Corporation) C:\Program Files\Mozilla Firefox\firefox.exe
(Kaspersky Lab ZAO) C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe
(Kaspersky Lab ZAO) C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\wmi32.exe
(Kaspersky Lab ZAO) C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avpui.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
==================== Registry (Whitelisted) ==================
(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)
HKLM\...\Run: [SynTPEnh] => C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [1594664 2009-12-11] (Synaptics Incorporated)
HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe [8522272 2010-03-02] (Realtek Semiconductor)
HKLM\...\Run: [RtHDVBg] => C:\Program Files\Realtek\Audio\HDA\RtHDVBg.exe [678432 2010-03-02] (Realtek Semiconductor)
HKLM\...\Run: [Adobe ARM] => C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [1022152 2014-12-19] (Adobe Systems Incorporated)
HKLM\...\Run: [SunJavaUpdateSched] => C:\Program Files\Common Files\Java\Java Update\jusched.exe [256896 2014-05-07] (Oracle Corporation)
HKU\S-1-5-21-2403307681-2365322253-235483669-1000\...\Run: [Amazon Music] => C:\Users\Michi\AppData\Local\Amazon Music\Amazon Music Helper.exe [6281024 2014-10-15] ()
HKU\S-1-5-21-2403307681-2365322253-235483669-1000\...\MountPoints2: {45da498c-4e4e-11e0-a569-00262df63b2e} - F:\AutoRun.exe
HKU\S-1-5-21-2403307681-2365322253-235483669-1000\...\MountPoints2: {45da4993-4e4e-11e0-a569-00262df63b2e} - F:\AutoRun.exe
HKU\S-1-5-21-2403307681-2365322253-235483669-1008\...\RunOnce: [Screensaver] => C:\Windows\Web\Wallpaper\MEDION\start.vbs [129 2009-10-23] ()
HKU\S-1-5-21-2403307681-2365322253-235483669-1008\...\RunOnce: [Report] => \AdwCleaner\AdwCleaner[S0].txt [4323 2015-04-30] ()
HKU\S-1-5-21-2403307681-2365322253-235483669-1008\Control Panel\Desktop\\SCRNSAVE.EXE -> C:\Windows\system32\MAHJON~1.SCR
==================== Internet (Whitelisted) ====================
(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)
ProxyServer: [S-1-5-21-2403307681-2365322253-235483669-1000] => 65.49.80.156:8088
HKU\S-1-5-21-2403307681-2365322253-235483669-1000\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.fwhg.de/
HKU\S-1-5-21-2403307681-2365322253-235483669-1000\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://www.aldi.com
HKU\S-1-5-21-2403307681-2365322253-235483669-1000\Software\Microsoft\Internet Explorer\Main,Default_Secondary_Page_URL = hxxp://medion.msn.com
SearchScopes: HKU\.DEFAULT -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
SearchScopes: HKU\S-1-5-19 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
SearchScopes: HKU\S-1-5-20 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
SearchScopes: HKU\S-1-5-21-2403307681-2365322253-235483669-1000 -> {73A6340A-1B04-483C-9CC2-587C4F90B070} URL = hxxp://www.bing.com/search?q={searchTerms}&form=MEDTDF&pc=MAMD&src=IE-SearchBox
BHO: Content Blocker Plugin -> {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} -> C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\ContentBlocker\ie_content_blocker_plugin.dll [2013-12-23] (Kaspersky Lab ZAO)
BHO: No Name -> {5C255C8A-E604-49b4-9D64-90988571CECB} -> No File
BHO: Search Helper -> {6EBF7485-159F-4bff-A14F-B9E3AAC4465B} -> C:\Program Files\Microsoft\Search Enhancement Pack\Search Helper\SEPsearchhelperie.dll [2009-05-19] (Microsoft Corporation)
BHO: Virtual Keyboard Plugin -> {73455575-E40C-433C-9784-C78DC7761455} -> C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll [2014-12-29] (Kaspersky Lab ZAO)
BHO: Java(tm) Plug-In SSV Helper -> {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} -> C:\Program Files\Java\jre7\bin\ssv.dll [2014-06-05] (Oracle Corporation)
BHO: Windows Live ID-Anmelde-Hilfsprogramm -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll [2009-03-30] (Microsoft Corporation)
BHO: Safe Money Plugin -> {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} -> C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\OnlineBanking\online_banking_bho.dll [2013-12-23] (Kaspersky Lab ZAO)
BHO: Java(tm) Plug-In 2 SSV Helper -> {DBC80044-A445-435b-BC74-9C25C1C588A9} -> C:\Program Files\Java\jre7\bin\jp2ssv.dll [2014-06-05] (Oracle Corporation)
BHO: Windows Live Toolbar Helper -> {E15A8DC0-8516-42A1-81EA-DC94EC1ACF10} -> C:\Program Files\Windows Live\Toolbar\wltcore.dll [2009-02-06] (Microsoft Corporation)
BHO: URL Advisor Plugin -> {E33CF602-D945-461A-83F0-819F76A199F8} -> C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\UrlAdvisor\klwtbbho.dll [2014-02-28] (Kaspersky Lab ZAO)
BHO: DeLorme Send To GPS -> {FBAAD182-3C7A-4BC4-A5E9-207B8E0F02FD} -> C:\Program Files\DeLorme\SendToGPS\PNPluginForIE.dll [2011-11-10] (DeLorme)
Toolbar: HKLM - &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll [2009-02-06] (Microsoft Corporation)
Toolbar: HKU\S-1-5-21-2403307681-2365322253-235483669-1000 -> &Windows Live Toolbar - {21FA44EF-376D-4D53-9B0F-8A89D3229068} - C:\Program Files\Windows Live\Toolbar\wltcore.dll [2009-02-06] (Microsoft Corporation)
Toolbar: HKU\S-1-5-21-2403307681-2365322253-235483669-1000 -> No Name - {D4027C7F-154A-4066-A1AD-4243D8127440} - No File
Handler: livecall - {828030A1-22C1-4009-854F-8E305202313F} - C:\Program Files\Windows Live\Messenger\msgrapp.14.0.8089.0726.dll [2009-07-26] (Microsoft Corporation)
Handler: ms-itss - {0A9007C0-4076-11D3-8789-0000F8105754} - C:\Program Files\Common Files\Microsoft Shared\Information Retrieval\msitss.dll [2007-06-08] (Microsoft Corporation)
Handler: msnim - {828030A1-22C1-4009-854F-8E305202313F} - C:\Program Files\Windows Live\Messenger\msgrapp.14.0.8089.0726.dll [2009-07-26] (Microsoft Corporation)
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files\Common Files\Skype\Skype4COM.dll [2011-11-03] (Skype Technologies)
Filter: deflate - {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\Windows\System32\urlmon.dll [2011-12-16] (Microsoft Corporation)
Filter: gzip - {8f6b0360-b80d-11d0-a9b3-006097942311} - C:\Windows\System32\urlmon.dll [2011-12-16] (Microsoft Corporation)
Tcpip\Parameters: [DhcpNameServer] 192.168.2.1
FireFox:
========
FF Plugin: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF32_17_0_0_169.dll [2015-04-22] ()
FF Plugin: @delorme.com/SendToGPS -> C:\Program Files\DeLorme\SendToGPS\nppnplugin.dll [2011-11-10] (DeLorme)
FF Plugin: @java.com/DTPlugin,version=10.60.2 -> C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll [2014-06-05] (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.60.2 -> C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll [2014-06-05] (Oracle Corporation)
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> c:\Program Files\Microsoft Silverlight\3.0.50106.0\npctrl.dll [2010-01-06] ( Microsoft Corporation)
FF Plugin: @microsoft.com/OfficeLive,version=1.3 -> C:\Program Files\Microsoft\Office Live\npOLW.dll [2009-06-09] (Microsoft Corp.)
FF Plugin: @microsoft.com/OfficeLive,version=1.4 -> C:\Program Files\Microsoft\Office Live\npOLW.dll [2009-06-09] (Microsoft Corp.)
FF Plugin: @microsoft.com/WLPG,version=14.0.8081.0709 -> C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll [2009-07-10] (Microsoft Corporation)
FF Plugin: @tools.google.com/Google Update;version=3 -> C:\Program Files\Google\Update\1.3.26.9\npGoogleUpdate3.dll [2015-02-08] (Google Inc.)
FF Plugin: @tools.google.com/Google Update;version=9 -> C:\Program Files\Google\Update\1.3.26.9\npGoogleUpdate3.dll [2015-02-08] (Google Inc.)
FF Plugin: @videolan.org/vlc,version=1.0.5 -> C:\Program Files\VideoLAN\VLC\npvlc.dll [2014-07-23] (VideoLAN)
FF Plugin: @videolan.org/vlc,version=2.1.5 -> C:\Program Files\VideoLAN\VLC\npvlc.dll [2014-07-23] (VideoLAN)
FF Plugin: Adobe Reader -> C:\Program Files\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll [2014-12-03] (Adobe Systems Inc.)
FF Plugin ProgramFiles/Appdata: C:\Program Files\mozilla firefox\plugins\NPOFF12.DLL [2006-10-26] (Microsoft Corporation)
FF Plugin ProgramFiles/Appdata: C:\Program Files\mozilla firefox\plugins\nppdf32.dll [2014-12-03] (Adobe Systems Inc.)
FF Extension: Hotspot Shield Helper (Please allow this installation) - C:\Program Files\Mozilla Firefox\extensions\afurladvisor@anchorfree.com [2015-04-24]
FF Extension: No Name - C:\Program Files\Mozilla Firefox\extensions\{AB2CE124-6272-4b12-94A9-7303C7397BD1} [2015-04-24]
FF HKLM\...\Firefox\Extensions: - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com
FF Extension: Kaspersky URL Advisor - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com [2013-12-23]
FF HKLM\...\Firefox\Extensions: [virtual_keyboard@kaspersky.com] - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com
FF Extension: Virtual Keyboard - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com [2013-12-23]
FF HKLM\...\Firefox\Extensions: [content_blocker@kaspersky.com] - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com
FF Extension: Dangerous Websites Blocker - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com [2013-12-23]
FF HKLM\...\Firefox\Extensions: [anti_banner@kaspersky.com] - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com
FF Extension: Anti-Banner - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com [2013-12-23]
FF HKLM\...\Firefox\Extensions: [online_banking@kaspersky.com] - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com
FF Extension: Safe Money - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com [2013-12-23]
Chrome:
=======
CHR HKLM\...\Chrome\Extension: [blbkdnmdcafmfhinpmnlhhddbepgkeaa] - https://chrome.google.com/webstore/detail/blbkdnmdcafmfhinpmnlhhddbepgkeaa
CHR HKLM\...\Chrome\Extension: [dchlnpcodkpfdpacogkljefecpegganj] - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\urladvisor.crx [2013-10-17]
CHR HKLM\...\Chrome\Extension: [hakdifolhalapjijoafobooafbilfakh] - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\online_banking_chrome.crx [2013-10-17]
CHR HKLM\...\Chrome\Extension: [hghkgaeecgjhjkannahfamoehjmkjail] - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\content_blocker_chrome.crx [2013-10-17]
CHR HKLM\...\Chrome\Extension: [jagncdcchgajhfhijbbhecadmaiegcmh] - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\virtkbd.crx [2013-10-17]
CHR HKLM\...\Chrome\Extension: [pjldcfjmnllhmgjclecdnfampinooman] - C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\ab.crx [2013-10-17]
========================== Services (Whitelisted) =================
(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)
S4 AcrSch2Svc; C:\Program Files\Common Files\Acronis\Schedule2\schedul2.exe [813320 2011-11-10] (Acronis)
S4 afcdpsrv; C:\Program Files\Common Files\Acronis\CDP\afcdpsrv.exe [3483600 2011-12-19] (Acronis)
R2 AVP; C:\Program Files\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe [214512 2013-10-17] (Kaspersky Lab ZAO)
S2 Fabs; C:\Program Files\Common Files\MAGIX Services\Database\bin\FABS.exe [1155072 2009-02-03] (MAGIX AG) [File not signed]
S4 FirebirdServerMAGIXInstance; C:\Program Files\Common Files\MAGIX Services\Database\bin\fbserver.exe [3276800 2008-08-07] (MAGIX®) [File not signed]
R2 LexBceS; C:\Windows\System32\LEXBCES.EXE [303104 2003-02-25] (Lexmark International, Inc.)
S2 MBAMService; C:\Program Files\Malwarebytes Anti-Malware\mbamservice.exe [1080120 2015-04-14] (Malwarebytes Corporation)
S2 NasPmService; C:\Program Files\BUFFALO\NASNAVI\nassvc.exe [251256 2010-10-28] (BUFFALO INC.)
R2 PassThru Service; C:\Program Files\HTC\Internet Pass-Through\PassThruSvr.exe [87040 2012-03-23] () [File not signed]
S2 RichVideo; C:\Program Files\CyberLink\Shared files\RichVideo.exe [244904 2010-02-10] () [File not signed]
R2 syncagentsrv; C:\Program Files\Common Files\Acronis\SyncAgent\syncagentsrv.exe [5899240 2011-11-10] (Acronis)
R2 SynoDrService; C:\Program Files\Synology Data Replicator 3\SynoDrService.exe [248704 2013-04-25] () [File not signed]
R2 UsbClientService; C:\Program Files\Synology\Assistant\UsbClientService.exe [248704 2013-04-30] () [File not signed]
R2 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [680960 2009-07-14] (Microsoft Corporation)
S2 WTGService; C:\Program Files\Verbindungsassistent\WTGService.exe [296400 2009-03-03] ()
S2 x10nets; C:\Program Files\Common Files\X10\Common\X10nets.exe [20480 2009-11-07] (X10) [File not signed]
==================== Drivers (Whitelisted) ====================
(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)
R3 busenum; C:\Windows\System32\DRIVERS\busenum.sys [45792 2012-08-03] (Windows (R) Win 7 DDK provider)
R3 dtsoftbus01; C:\Windows\System32\DRIVERS\dtsoftbus01.sys [218688 2011-02-22] (DT Soft Ltd)
R0 kl1; C:\Windows\System32\DRIVERS\kl1.sys [135776 2013-12-23] (Kaspersky Lab ZAO)
S4 klflt; C:\Windows\System32\DRIVERS\klflt.sys [94304 2014-03-28] (Kaspersky Lab ZAO)
R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [576608 2014-03-28] (Kaspersky Lab ZAO)
R1 KLIM6; C:\Windows\System32\DRIVERS\klim6.sys [25696 2013-10-17] (Kaspersky Lab ZAO)
R3 klkbdflt; C:\Windows\System32\DRIVERS\klkbdflt.sys [25184 2014-02-28] (Kaspersky Lab ZAO)
R3 klmouflt; C:\Windows\System32\DRIVERS\klmouflt.sys [25696 2013-10-17] (Kaspersky Lab ZAO)
R1 klpd; C:\Windows\System32\DRIVERS\klpd.sys [14432 2013-04-12] (Kaspersky Lab ZAO)
R1 kltdi; C:\Windows\System32\DRIVERS\kltdi.sys [45024 2013-05-14] (Kaspersky Lab ZAO)
R1 kneps; C:\Windows\System32\DRIVERS\kneps.sys [144992 2013-12-23] (Kaspersky Lab ZAO)
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [23256 2015-04-14] (Malwarebytes Corporation)
S3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [51928 2015-04-14] (Malwarebytes Corporation)
S3 mod7700; C:\Windows\System32\DRIVERS\mod7700.sys [621056 2011-05-23] (DiBcom SA)
S3 MODRC; C:\Windows\System32\DRIVERS\modrc.sys [13824 2007-07-11] (DiBcom S.A.) [File not signed]
S4 RsFx0102; C:\Windows\System32\DRIVERS\RsFx0102.sys [242712 2008-07-10] (Microsoft Corporation)
R0 sptd; C:\Windows\System32\Drivers\sptd.sys [691696 2012-05-06] () [File not signed]
R0 tdrpman; C:\Windows\System32\DRIVERS\tdrpman.sys [766496 2011-12-19] (Acronis)
R0 vididr; C:\Windows\System32\DRIVERS\vididr.sys [126144 2011-12-19] (Acronis)
R0 vidsflt61; C:\Windows\System32\DRIVERS\vsflt61.sys [84544 2011-12-19] (Acronis)
R3 vpcbus; C:\Windows\System32\DRIVERS\vpchbus.sys [165376 2009-09-23] (Microsoft Corporation)
R1 vpcnfltr; C:\Windows\System32\DRIVERS\vpcnfltr.sys [55040 2009-09-23] (Microsoft Corporation)
R3 vpcusb; C:\Windows\System32\DRIVERS\vpcusb.sys [78336 2009-09-23] (Microsoft Corporation)
R1 vpcvmm; C:\Windows\System32\drivers\vpcvmm.sys [295128 2009-12-01] (Microsoft Corporation)
R3 X10Hid; C:\Windows\System32\Drivers\x10hid.sys [13720 2009-05-13] (X10 Wireless Technology, Inc.)
R3 XUIF; C:\Windows\System32\Drivers\x10ufx2.sys [27160 2009-05-13] (X10 Wireless Technology, Inc.)
S3 appliandMP; system32\DRIVERS\appliand.sys [X]
S3 nmwcd; system32\drivers\ccdcmb.sys [X]
S3 nmwcdc; system32\drivers\ccdcmbo.sys [X]
S3 pccsmcfd; system32\DRIVERS\pccsmcfd.sys [X]
S3 RtsUIR; system32\DRIVERS\Rts516xIR.sys [X]
S3 taphss; system32\DRIVERS\taphss.sys [X]
S3 taphss6; system32\DRIVERS\taphss6.sys [X]
S3 upperdev; system32\DRIVERS\usbser_lowerflt.sys [X]
S3 USBCCID; system32\DRIVERS\RtsUCcid.sys [X]
S3 UsbserFilt; system32\DRIVERS\usbser_lowerfltj.sys [X]
S3 VBoxNetFlt; system32\DRIVERS\VBoxNetFlt.sys [X]
==================== NetSvcs (Whitelisted) ===================
(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)
==================== One Month Created Files and Folders ========
(If an entry is included in the fixlist, the file\folder will be moved.)
2015-04-30 20:26 - 2015-04-30 20:26 - 00001327 _____ () C:\Users\admin\Desktop\JRT.txt
2015-04-30 20:24 - 2015-04-30 20:24 - 00000207 _____ () C:\Windows\tweaking.com-regbackup-BIG-SCHLAEPPI-Windows-7-Home-Premium-(32-bit).dat
2015-04-30 20:24 - 2015-04-30 20:24 - 00000000 ____D () C:\RegBackup
2015-04-30 20:23 - 2015-04-30 20:24 - 02716306 _____ (Thisisu) C:\Users\Michi\Desktop\JRT.exe
2015-04-30 20:12 - 2015-04-30 20:17 - 00000000 ____D () C:\AdwCleaner
2015-04-30 20:11 - 2015-04-30 20:11 - 02224640 _____ () C:\Users\Michi\Downloads\AdwCleaner_4.202.exe
2015-04-30 20:00 - 2015-04-30 20:02 - 00000000 ____D () C:\Users\Michi\Eva
2015-04-30 19:36 - 2015-04-30 19:36 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2015-04-30 19:35 - 2015-04-30 19:35 - 00001064 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2015-04-30 19:35 - 2015-04-30 19:35 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2015-04-30 19:35 - 2015-04-30 19:35 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2015-04-30 19:35 - 2015-04-14 09:37 - 00092888 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2015-04-30 19:35 - 2015-04-14 09:37 - 00051928 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2015-04-30 19:35 - 2015-04-14 09:37 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2015-04-30 19:33 - 2015-04-30 19:34 - 21546080 _____ (Malwarebytes Corporation ) C:\Users\Michi\Downloads\mbam-setup-2.1.6.1022.exe
2015-04-30 19:28 - 2015-04-30 19:28 - 00001226 _____ () C:\Users\admin\Desktop\Revo Uninstaller.lnk
2015-04-30 19:28 - 2015-04-30 19:28 - 00000000 ____D () C:\Program Files\VS Revo Group
2015-04-30 19:27 - 2015-04-30 19:27 - 02623656 _____ (VS Revo Group Ltd.) C:\Users\Michi\Downloads\revosetup95.exe
2015-04-27 18:53 - 2015-04-27 18:54 - 00041319 _____ () C:\Users\Michi\Desktop\Addition.txt
2015-04-24 17:51 - 2015-04-24 17:51 - 00000000 ____D () C:\Users\admin\AppData\Local\Microsoft Help
2015-04-24 17:12 - 2015-04-30 20:28 - 00018630 _____ () C:\Users\Michi\Desktop\FRST.txt
2015-04-24 17:12 - 2015-04-30 20:28 - 00000000 ____D () C:\FRST
2015-04-24 17:11 - 2015-04-27 18:46 - 01140736 _____ (Farbar) C:\Users\Michi\Desktop\FRST.exe
2015-04-24 17:06 - 2015-04-24 17:06 - 00000000 ____D () C:\Users\admin\AppData\Roaming\Adobe
2015-04-24 16:56 - 2015-04-24 16:56 - 00000000 ____D () C:\Program Files\Mozilla Firefox
==================== One Month Modified Files and Folders =======
(If an entry is included in the fixlist, the file\folder will be moved.)
2015-04-30 20:27 - 2013-06-17 19:21 - 00000000 ____D () C:\ProgramData\Kaspersky Lab
2015-04-30 20:25 - 2009-07-14 06:34 - 00009888 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2015-04-30 20:25 - 2009-07-14 06:34 - 00009888 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2015-04-30 20:22 - 2010-05-09 12:21 - 01703054 _____ () C:\Windows\WindowsUpdate.log
2015-04-30 20:20 - 2011-03-13 21:32 - 00001094 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2015-04-30 20:18 - 2013-11-23 22:49 - 00020257 _____ () C:\Windows\setupact.log
2015-04-30 20:18 - 2011-11-20 01:00 - 00173666 _____ () C:\Windows\PFRO.log
2015-04-30 20:18 - 2009-07-14 06:53 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2015-04-30 20:01 - 2011-03-13 21:32 - 00001098 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2015-04-30 20:01 - 2010-05-09 12:22 - 00000000 ____D () C:\Users\Michi
2015-04-30 19:46 - 2012-04-29 16:29 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2015-04-30 19:35 - 2012-05-09 17:12 - 00000000 ____D () C:\ProgramData\Malwarebytes
2015-04-30 19:18 - 2010-03-02 07:02 - 01681776 _____ () C:\Windows\system32\PerfStringBackup.INI
2015-04-27 17:54 - 2012-05-06 14:37 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service
2015-04-24 17:52 - 2010-11-22 21:54 - 00000000 ____D () C:\Program Files\Microsoft Visual Studio 9.0
2015-04-24 17:52 - 2010-03-02 07:45 - 00000000 ____D () C:\ProgramData\Microsoft Help
2015-04-24 17:52 - 2009-07-14 04:37 - 00000000 ____D () C:\Program Files\Common Files\microsoft shared
2015-04-24 17:42 - 2012-11-22 22:09 - 00033186 _____ () C:\Windows\DPINST.LOG
2015-04-24 17:16 - 2010-03-02 07:17 - 00000000 ___HD () C:\Program Files\InstallShield Installation Information
2015-04-24 17:04 - 2015-03-08 17:54 - 00000000 ____D () C:\Program Files\Mozilla Firefox.bak
2015-04-22 02:46 - 2012-04-29 16:29 - 00778416 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerApp.exe
2015-04-22 02:46 - 2011-05-17 17:59 - 00142512 _____ (Adobe Systems Incorporated) C:\Windows\system32\FlashPlayerCPLApp.cpl
2015-04-21 20:42 - 2010-03-02 08:06 - 00000000 ____D () C:\ProgramData\X10 Settings
2015-04-21 20:37 - 2010-05-13 20:05 - 00000000 ____D () C:\Users\Michi\AppData\Roaming\vlc
2015-04-07 18:23 - 2014-11-07 23:01 - 00000000 ____D () C:\Users\admin\AppData\Local\Adobe
==================== Files in the root of some directories =======
2013-12-15 21:47 - 2013-12-15 21:47 - 49940480 _____ () C:\Program Files\GUTE1EC.tmp
2010-12-24 13:31 - 2010-12-24 13:31 - 0000952 ___SH () C:\ProgramData\KGyGaAvL.sys
Some content of TEMP:
====================
C:\Users\admin\AppData\Local\Temp\Quarantine.exe
C:\Users\admin\AppData\Local\Temp\sqlite3.dll
==================== Bamital & volsnap Check =================
(There is no automatic fix for files that do not pass verification.)
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\system32\winlogon.exe => File is digitally signed
C:\Windows\system32\wininit.exe => File is digitally signed
C:\Windows\system32\svchost.exe => File is digitally signed
C:\Windows\system32\services.exe => File is digitally signed
C:\Windows\system32\User32.dll => File is digitally signed
C:\Windows\system32\userinit.exe => File is digitally signed
C:\Windows\system32\rpcss.dll => File is digitally signed
C:\Windows\system32\Drivers\volsnap.sys => File is digitally signed
LastRegBack: 2015-04-27 18:24
==================== End Of Log ============================ --- --- ---
--- --- --- |