![]() |
Code: Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version: 16-10-2017 |
Malwarebytes Anti-Rootkit (MBAR) Downloade dir bitte ![]()
Starte keine andere Datei in diesem Ordner ohne Anweisung eines Helfers ![]() Posten in CODE-Tags Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR oder 7Z-Archiv zu packen erschwert mir massiv die Arbeit. Auch wenn die Logs für einen Beitrag zu groß sein sollten, bitte ich dich die Logs direkt und notfalls über mehrere Beiträge verteilt zu posten. Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
|
Malwarebytes Anti-Rootkit BETA 1.9.3.1001 www.malwarebytes.org Database version: main: v2017.10.18.10 rootkit: v2017.10.14.01 Windows 10 x64 NTFS Internet Explorer 11.674.15063.0 heiko :: DESKTOP-481JS9J [administrator] 18.10.2017 22:17:46 mbar-log-2017-10-18 (22-17-46).txt Scan type: Quick scan Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken Scan options disabled: Objects scanned: 338358 Time elapsed: 15 minute(s), 6 second(s) Memory Processes Detected: 0 (No malicious items detected) Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 0 (No malicious items detected) Registry Values Detected: 0 (No malicious items detected) Registry Data Items Detected: 0 (No malicious items detected) Folders Detected: 0 (No malicious items detected) Files Detected: 0 (No malicious items detected) Physical Sectors Detected: 0 (No malicious items detected) (end) |
Log in CODE-Tags posten! Adware/Junkware/Toolbars entfernen Alte Versionen von adwCleaner und falls vorhanden JRT vorher löschen, danach neu runterladen auf den Desktop! Virenscanner jetzt vor dem Einsatz dieser Tools bitte komplett deaktivieren! 1. Schritt: adwCleaner v7.x Downloade Dir bitte AdwCleaner auf deinen Desktop (Bebilderte Anleitung).
2. Schritt: JRT - Junkware Removal Tool Beende bitte Deine Schutzsoftware um eventuelle Konflikte zu vermeiden.
|
# AdwCleaner 7.0.3.1 - Logfile created on Thu Oct 19 05:19:02 2017 # Updated on 2017/29/09 by Malwarebytes # Running on Windows 10 Home (X64) # Mode: clean # Support: https://www.malwarebytes.com/support ***** [ Services ] ***** Deleted: WCAssistantService ***** [ Folders ] ***** Deleted: C:\ProgramData\IObit\Advanced SystemCare Deleted: C:\Windows\System32\config\systemprofile\AppData\Roaming\IObit\Advanced SystemCare Deleted: C:\Program Files (x86)\Common Files\IObit\Advanced SystemCare Deleted: C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\IObit\Advanced SystemCare Deleted: C:\Users\All Users\IObit\Advanced SystemCare Deleted: C:\Users\heiko\AppData\LocalLow\IObit\Advanced SystemCare Deleted: C:\Users\heiko\AppData\Roaming\IObit\Advanced SystemCare Deleted: C:\Program Files (x86)\DriverToolkit Deleted: C:\Users\heiko\AppData\Local\DriverToolkit Deleted: C:\ProgramData\lavasoft\web companion Deleted: C:\ProgramData\Application Data\lavasoft\web companion Deleted: C:\Program Files (x86)\lavasoft\web companion Deleted: C:\Users\All Users\lavasoft\web companion Deleted: C:\Users\heiko\AppData\Roaming\lavasoft\web companion Deleted: C:\Users\Default\AppData\Local\Host App Service Deleted: C:\Users\Default User\AppData\Local\Host App Service Deleted: C:\Users\heiko\AppData\Local\Host App Service Deleted: C:\ProgramData\IObit\ASCDownloader Deleted: C:\Users\All Users\IObit\ASCDownloader Deleted: C:\Users\heiko\AppData\Local\Downloaded Installations\{DAD82379-C684-4D04-83D5-2B9934A9C362} Deleted: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Lavasoft\WebCompanion Deleted: C:\ProgramData\FileViewPro Deleted: C:\Users\All Users\FileViewPro ***** [ Files ] ***** Deleted: C:\Windows\Reimage.ini ***** [ DLL ] ***** No malicious DLLs cleaned. ***** [ WMI ] ***** No malicious WMI cleaned. ***** [ Shortcuts ] ***** No malicious shortcuts cleaned. ***** [ Tasks ] ***** No malicious tasks deleted. ***** [ Registry ] ***** Deleted: [Key] - HKLM\SOFTWARE\IOBIT\ASC Deleted: [Value] - HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{94714831-F50E-4DD7-8EBB-6EEB72885755} Deleted: [Value] - HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{1A61777E-E882-4584-A4E9-6058C7D8080F} Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\WebDiscoverBrowser Deleted: [Key] - HKCU\Software\WebDiscoverBrowser Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\DriverToolkit Deleted: [Key] - HKCU\Software\DriverToolkit Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\AppDataLow\Software\adawarebp Deleted: [Key] - HKCU\Software\AppDataLow\Software\adawarebp Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\Host App Service Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\Microsoft\Windows\CurrentVersion\Uninstall\Host App Service Deleted: [Key] - HKCU\Software\Host App Service Deleted: [Key] - HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\Host App Service Deleted: [Key] - HKLM\SOFTWARE\Lavasoft\Web Companion Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\Lavasoft\Web Companion Deleted: [Key] - HKCU\Software\Lavasoft\Web Companion Deleted: [Key] - HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{10ECCE17-29B5-4880-A8F5-EAD298611484} Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{9BB31AD8-5DB2-459E-A901-DEA536F23BA4} Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{BD51A48E-EB5F-4454-8774-EF962DF64546} Deleted: [Key] - HKLM\SOFTWARE\Classes\TypeLib\{FA6468D2-FAA4-4951-A53B-2A5CF9CC0A36} Deleted: [Key] - HKLM\SOFTWARE\Classes\CLSID\{8BF0126F-A5B7-4720-ABB2-2414A0AF5474} Deleted: [Value] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run|Web Companion Deleted: [Key] - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\Local AppWizard-Generated Applications\Reimage - Windows Problem Relief. Deleted: [Key] - HKCU\Software\Local AppWizard-Generated Applications\Reimage - Windows Problem Relief. Deleted: [Key] - HKLM\SOFTWARE\Reimage Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\Reimage Deleted: [Key] - HKCU\Software\Reimage Deleted: [Key] - HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\chip 1-click download service Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\csastats Deleted: [Key] - HKCU\Software\csastats Deleted: [Key] - HKU\S-1-5-21-1738615060-3833924508-473278261-1001\Software\PRODUCTSETUP Deleted: [Key] - HKCU\Software\PRODUCTSETUP ***** [ Firefox (and derivatives) ] ***** No malicious Firefox entries deleted. ***** [ Chromium (and derivatives) ] ***** No malicious Chromium entries deleted. ************************* ::Tracing keys deleted ::Winsock settings cleared ::Prefetch files deleted ::Proxy settings cleared ::IE policies deleted ::Chrome policies deleted ::Additional Actions: 0 ************************* C:/AdwCleaner/AdwCleaner[S0].txt - [6061 B] - [2017/10/19 5:18:18] ########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt ##########JRT Logfile: Code: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
Okay, beide Tools bitte zwecks Kontrolle wiederholen. |
# AdwCleaner 7.0.3.1 - Logfile created on Thu Oct 19 20:18:48 2017 # Updated on 2017/29/09 by Malwarebytes # Database: 10-17-2017.1 # Running on Windows 10 Home (X64) # Mode: scan # Support: https://www.malwarebytes.com/support ***** [ Services ] ***** No malicious services found. ***** [ Folders ] ***** No malicious folders found. ***** [ Files ] ***** No malicious files found. ***** [ DLL ] ***** No malicious DLLs found. ***** [ WMI ] ***** No malicious WMI found. ***** [ Shortcuts ] ***** No malicious shortcuts found. ***** [ Tasks ] ***** No malicious tasks found. ***** [ Registry ] ***** No malicious registry entries found. ***** [ Firefox (and derivatives) ] ***** No malicious Firefox entries. ***** [ Chromium (and derivatives) ] ***** No malicious Chromium entries. ************************* C:/AdwCleaner/AdwCleaner[C0].txt - [5500 B] - [2017/10/19 5:19:2] C:/AdwCleaner/AdwCleaner[C1].txt - [1510 B] - [2017/10/19 20:17:0] C:/AdwCleaner/AdwCleaner[S0].txt - [6061 B] - [2017/10/19 5:18:18] C:/AdwCleaner/AdwCleaner[S1].txt - [1246 B] - [2017/10/19 20:16:22] ########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt ##########JRT Logfile: Code: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
Ich brauche neue FRST-Logs . Haken setzen bei addition.txt dann auf Untersuchen klicken. http://www.trojaner-board.de/picture...&pictureid=611 |
Code: Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version: 18-10-2017 01 |
Code: Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version: 18-10-2017 01 |
Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code: ShellIconOverlayIdentifiers: [00asw] -> {472083B0-C522-11CF-8763-00608CC02F24} => -> Keine Datei Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
|
Entferungsergebnis von Farbar Recovery Scan Tool (x64) Version: 21-10-2017 durchgeführt von heiko (23-10-2017 10:10:29) Run:1 Gestartet von C:\Users\heiko\Downloads Geladene Profile: heiko (Verfügbare Profile: heiko) Start-Modus: Normal ============================================== fixlist Inhalt: ***************** ShellIconOverlayIdentifiers: [00asw] -> {472083B0-C522-11CF-8763-00608CC02F24} => -> Keine Datei ShellIconOverlayIdentifiers: [00avg] -> {472083B0-C522-11CF-8763-00608CC02F24} => -> Keine Datei HKLM Group Policy restriction on software: %systemroot%\system32\mrt.exe <==== ACHTUNG FF Extension: (Search Anonymo) - C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\@searchanonymo.xpi [2017-09-21] FF Extension: (Avira Browserschutz) - C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\abs@avira.com.xpi [2017-09-04] FF Extension: (Get Mail Plus C.F.DE) - C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\endor815@cronos.com.xpi [2017-08-23] FF Extension: (Safe Browsing Version 4 (temporary add-on)) - C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\sbv4-gradual-rollout@mozilla.com.xpi [2017-10-12] FF Extension: (Avira Password Manager) - C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\passwordmanager@avira.com.xpi [2017-10-08] hosts: emptytemp: ***************** HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\00asw => Schlüssel erfolgreich entfernt HKLM\Software\Classes\CLSID\{472083B0-C522-11CF-8763-00608CC02F24} => Schlüssel nicht gefunden. HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\00avg => Schlüssel erfolgreich entfernt HKLM\Software\Classes\CLSID\{472083B0-C522-11CF-8763-00608CC02F24} => Schlüssel nicht gefunden. HKLM Group Policy restriction on software: %systemroot%\system32\mrt.exe <==== ACHTUNG => erfolgreich wiederhergestellt C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\@searchanonymo.xpi => erfolgreich verschoben C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\abs@avira.com.xpi => erfolgreich verschoben C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\endor815@cronos.com.xpi => erfolgreich verschoben C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\sbv4-gradual-rollout@mozilla.com.xpi => erfolgreich verschoben C:\Users\heiko\AppData\Roaming\Mozilla\Firefox\Profiles\q1oc0j08.default\Extensions\passwordmanager@avira.com.xpi => erfolgreich verschoben C:\Windows\System32\Drivers\etc\hosts => erfolgreich verschoben Hosts erfolgreich wiederhergestellt. =========== EmptyTemp: ========== BITS transfer queue => 7888896 B DOMStore, IE Recovery, AppCache, Feeds Cache, Thumbcache, IconCache => 307292903 B Java, Flash, Steam htmlcache => 1244 B Windows/system/drivers => 253610190 B Edge => 3671180 B Chrome => 0 B Firefox => 396626673 B Opera => 0 B Temp, IE cache, history, cookies, recent: Default => 6656 B Users => 0 B ProgramData => 0 B Public => 0 B systemprofile => 43705 B systemprofile32 => 128 B LocalService => 52982 B NetworkService => 200982 B heiko => 863648316 B RecycleBin => 0 B EmptyTemp: => 1.7 GB temporäre Dateien entfernt. ================================ Das System musste neu gestartet werden. ==== Ende von Fixlog 10:11:03 ==== |
Kontrollscans mit (1) MBAM, (2) ESET und (3) SecurityCheck bitte: 1. Schritt: Malwarebytes Version 3 Downloade Dir bitte Malwarebytes Anti-Malware 3
2. Schritt: ESET Downloade Dir bitte ESET Online Scanner (Bebilderte Anleitung)
3. Schritt: SecurityCheck Downloade Dir bitte ![]()
|
Malwarebytes www.malwarebytes.com -Protokolldetails- Scan-Datum: 23.10.17 Scan-Zeit: 10:37 Protokolldatei: 79de58d6-b7cd-11e7-916e-78f29eef3ffb.json Administrator: Ja -Softwaredaten- Version: 3.2.2.2029 Komponentenversion: 1.0.212 Version des Aktualisierungspakets: 1.0.3073 Lizenz: Abgelaufen -Systemdaten- Betriebssystem: Windows 10 (Build 15063.674) CPU: x64 Dateisystem: NTFS Benutzer: DESKTOP-481JS9J\heiko -Scan-Übersicht- Scan-Typ: Bedrohungs-Scan Ergebnis: Abgeschlossen Gescannte Objekte: 437769 Erkannte Bedrohungen: 2 In die Quarantäne verschobene Bedrohungen: 2 Abgelaufene Zeit: 2 Min., 30 Sek. -Scan-Optionen- Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Warnen PUM: Erkennung -Scan-Details- Prozess: 0 (keine bösartigen Elemente erkannt) Modul: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 0 (keine bösartigen Elemente erkannt) Registrierungswert: 1 PUP.Optional.ByteFence, HKU\S-1-5-21-1738615060-3833924508-473278261-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UFH\SHC|200, In Quarantäne, [632], [393167],1.0.3073 Registrierungsdaten: 0 (keine bösartigen Elemente erkannt) Daten-Stream: 0 (keine bösartigen Elemente erkannt) Ordner: 0 (keine bösartigen Elemente erkannt) Datei: 1 Generic.Malware/Suspicious, C:\USERS\HEIKO\APPDATA\ROAMING\APPLE COMPUTER\MOBILESYNC\BACKUP\2D1B49C705E0600D76BF9BD02D8E1CBF5FB9E8DF\F25ED4329FF30EB7EA5BF01FED8673A466F69FE5, In Quarantäne, [0], [392686],1.0.3073 Physischer Sektor: 0 (keine bösartigen Elemente erkannt) (end) |
Logs in CODE-Tags posten! |
Alle Zeitangaben in WEZ +1. Es ist jetzt 01:45 Uhr. |
Copyright ©2000-2025, Trojaner-Board