![]() |
Lässtige werbung trotz addblock Hi zusammen :) Seid Gestern habe ich in google chrome andauernd einblendende werbung die ich nicht weg bekomme die stört sowas von!!! benutze win 7 64 bit brauche Dringend Hilfe MFG Adrian FRST Logfile: FRST Logfile: Code: Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 27-12-2014 --- --- --- --- --- --- --- --- --- FRST Additions Logfile: Code: Additional scan result of Farbar Recovery Scan Tool (x64) Version: 27-12-2014 |
Hi und :hallo: Adware/Junkware/Toolbars entfernen (alte Versionen von adwCleaner und falls vorhanden JRT vorher löschen, danach neu runterladen auf den Desktop!) 1. Schritt: adwCleaner Downloade Dir bitte ![]()
2. Schritt: JRT - Junkware Removal Tool Beende bitte Deine Schutzsoftware um eventuelle Konflikte zu vermeiden.
3. Schritt: Frisches Log mit FRST Bitte lade dir die passende Version von Farbar's Recovery Scan Tool auf deinen Desktop: ![]() (Wenn du nicht sicher bist: Lade beide Versionen oder unter Start > Computer (Rechtsklick) > Eigenschaften nachschauen)
|
adw cleaner AdwCleaner Logfile: Code: # AdwCleaner v4.106 - Report created 27/12/2014 at 15:50:26 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Junkware Removal Tool (JRT) by Thisisu Version: 6.4.0 (11.29.2014:1) OS: Windows 7 Ultimate x64 Ran by Reisser on 27.12.2014 at 15:56:14,99 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Services ~~~ Registry Values Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\\Start Page Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Default_Page_URL ~~~ Registry Keys Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{11111111-1111-1111-1111-110611171162} Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{11111111-1111-1111-1111-110611171162} ~~~ Files Successfully deleted: [File] "C:\Users\Reisser\appdata\local\google\chrome\user data\default\local storage\http_www.superfish.com_0.localstorage" Successfully deleted: [File] "C:\Users\Reisser\appdata\local\google\chrome\user data\default\local storage\http_www.superfish.com_0.localstorage-journal" ~~~ Folders ~~~ Event Viewer Logs were cleared ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Scan was completed on 27.12.2014 at 15:58:41,48 End of JRT log ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # FRST Logfile: FRST Logfile: FRST Logfile: Code: Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 27-12-2014 --- --- --- --- --- --- ist das alles so richtig? |
Bitte auch ne neue Addition.txt erstellen, dazu FRST starten und einen Haken setzen bei Addition.txt, dann auf Scan klicken. http://saved.im/mtg0mjy4yjlu/2014-04...ryscantool.png |
FRST Additions Logfile: Code: Additional scan result of Farbar Recovery Scan Tool (x64) Version: 27-12-2014 |
Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code: HKLM-x32\...\Run: [gmsd_de_44] => [X] Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
|
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 28-12-2014 Ran by Reisser at 2014-12-29 08:15:52 Run:1 Running from C:\Users\Reisser\Downloads\FRST-OlderVersion Loaded Profile: Reisser (Available profiles: Reisser) Boot Mode: Normal ============================================== Content of fixlist: ***************** HKLM-x32\...\Run: [gmsd_de_44] => [X] CHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION ProxyEnable: [.DEFAULT] => Internet Explorer proxy is enabled. ProxyServer: [.DEFAULT] => http=127.0.0.1:50863;https=127.0.0.1:50863 SearchScopes: HKU\.DEFAULT -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = SearchScopes: HKU\S-1-5-19 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = SearchScopes: HKU\S-1-5-20 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = R2 dZPlDQFMAyN; C:\ProgramData\qMuLXOMiMf\dZPlDQFMAyN.exe [2726776 2014-12-27] (Time Lapse Solutions) Task: {32E4AC8B-D955-4847-BF7D-215EA9001513} - System32\Tasks\PTJGYIFC => C:\Users\Reisser\AppData\Roaming\PTJGYIFC.exe [2014-12-26] (HQ-VideoV26.12) <==== ATTENTION Task: {7C46BBB5-8422-47C1-A9C2-3BB2C3C41657} - System32\Tasks\upfs7235 => C:\Program Files (x86)\Flwsrf\upfs7235.exe [2014-12-05] () Task: {E1B12AA3-8587-49F7-8FD4-24A42FBB9ED3} - System32\Tasks\KWWB => C:\Users\Reisser\AppData\Roaming\KWWB.exe [2014-12-27] (Cinema HDV27.12) <==== ATTENTION Task: {F125BC51-2941-4F4A-B676-B6C8A5B0E166} - System32\Tasks\{FAE8AC9F-4635-4533-905E-1266F8CF043B} => pcalua.exe -a C:\Users\Reisser\AppData\Roaming\omiga-plus\UninstallManager.exe -c -ptid=tugs Task: C:\Windows\Tasks\KWWB.job => C:\Users\Reisser\AppData\Roaming\KWWB.exe <==== ATTENTION Task: C:\Windows\Tasks\PTJGYIFC.job => C:\Users\Reisser\AppData\Roaming\PTJGYIFC.exe <==== ATTENTION C:\Users\Reisser\AppData\Roaming\omiga-plus C:\Users\Reisser\AppData\Local\Temp\089C73368233.exe C:\Users\Reisser\AppData\Local\Temp\D3065033-A7E9-A772-2B8A-BEFA7C6AFE24.dll C:\Users\Reisser\AppData\Local\Temp\D3065033-A7E9-A772-2B8A-BEFA7C6AFE24.exe C:\Users\Reisser\AppData\Local\Temp\EFDF6877-8E55-A3B8-0364-69652FE51F4F.exe C:\Users\Reisser\AppData\Local\Temp\ICReinstall_FileOpenerSetup.exe C:\Users\Reisser\AppData\Local\Temp\Launcher__10272.exe C:\Users\Reisser\AppData\Local\Temp\Launcher__9848.exe C:\Users\Reisser\AppData\Local\Temp\Launcher__9999.exe C:\Users\Reisser\AppData\Local\Temp\LiveSupport_setup.exe C:\Users\Reisser\AppData\Local\Temp\ms.exe C:\Users\Reisser\AppData\Local\Temp\nvSCPAPI.dll C:\Users\Reisser\AppData\Local\Temp\nvSCPAPI64.dll C:\Users\Reisser\AppData\Local\Temp\nvStInst.exe C:\Users\Reisser\AppData\Local\Temp\optprosetup.exe C:\Users\Reisser\AppData\Local\Temp\Quarantine.exe C:\Users\Reisser\AppData\Local\Temp\setup_384.exe C:\Users\Reisser\AppData\Local\Temp\SpOrder.dll C:\Users\Reisser\AppData\Local\Temp\sqlite3.dll C:\Users\Reisser\AppData\Local\Temp\Storio2_DE_ger_Setup_pid_1588.exe C:\Users\Reisser\Desktop\Continue File Opener Installation.lnk C:\Users\Reisser\Downloads\FileOpenerSetup.exe C:\Program Files (x86)\2f4249ae-2ea2-4d9e-8f18-8c64e6461106 C:\Windows\Tasks\KWWB.job C:\Windows\System32\Tasks\KWWB C:\Users\Reisser\AppData\Roaming\KWWB.exe C:\Program Files (x86)\Flwsrf C:\Windows\SysWOW64\abengine.ini C:\Windows\System32\Tasks\upfs7235 C:\Windows\SysWOW64\abengineOff.ini C:\Windows\system32\abengineOff.ini C:\Windows\system32\abengine64.dll C:\Windows\SysWOW64\abengine.dll C:\ProgramData\qMuLXOMiMf C:\Users\Reisser\Downloads\rla-dtvpmt1.ts.nfo C:\Users\Reisser\Downloads\Goldesel.to - Die Seite fuer Direkt-Downloads aller Art.url C:\Users\Reisser\Downloads\goldesel.to - quality source for more than 15 years .txt C:\Users\Reisser\Downloads\DTVP.Mockingjay.Teil1-RELiABLE.part1.rar C:\Users\Reisser\Downloads\DTVP.Mockingjay.Teil1-RELiABLE.part3.rar C:\Users\Reisser\Downloads\DTVP.Mockingjay.Teil1-RELiABLE.part2.rar C:\Users\Reisser\Downloads\DTVP.Mockingjay.Teil1-RELiABLE.part4.rar C:\Windows\System32\Tasks\{FAE8AC9F-4635-4533-905E-1266F8CF043B} C:\Users\Reisser\Downloads\Orphan.Das.Waisenkind.German.AC3.HDRip.XViD-FuN.avi C:\Users\Reisser\AppData\Roaming\dlg C:\ProgramData\SecurityUtilityData C:\ProgramData\SecurityUtility C:\Windows\Tasks\PTJGYIFC.job C:\Windows\patsearch.bin C:\Users\Reisser\AppData\Roaming\PTJGYIFC.exe C:\Windows\System32\Tasks\PTJGYIFC C:\Users\Reisser\Downloads\34020109 C:\Program Files (x86)\BuyyNsaave C:\ProgramData\migbhnamcclanachieldofcbpebkajke C:\Users\Reisser\Downloads\The Purge 2.mkv C:\Users\Reisser\Downloads\G0neGrl.ld.HD.de C:\ProgramData\3872871776 C:\ProgramData\SecurityUtility C:\ProgramData\qMuLXOMiMf C:\Users\Reisser\AppData\Local\24567 EmptyTemp: Hosts: ***************** HKLM\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\\gmsd_de_44 => value deleted successfully. "HKLM\SOFTWARE\Policies\Google" => Key deleted successfully. HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable => value deleted successfully. HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyServer => value deleted successfully. HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value deleted successfully. HKU\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value deleted successfully. HKU\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value deleted successfully. dZPlDQFMAyN => Unable to stop service dZPlDQFMAyN => Service deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{32E4AC8B-D955-4847-BF7D-215EA9001513}" => Key deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{32E4AC8B-D955-4847-BF7D-215EA9001513}" => Key deleted successfully. C:\Windows\System32\Tasks\PTJGYIFC => Moved successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\PTJGYIFC" => Key deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{7C46BBB5-8422-47C1-A9C2-3BB2C3C41657}" => Key deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{7C46BBB5-8422-47C1-A9C2-3BB2C3C41657}" => Key deleted successfully. C:\Windows\System32\Tasks\upfs7235 => Moved successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\upfs7235" => Key deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{E1B12AA3-8587-49F7-8FD4-24A42FBB9ED3}" => Key deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{E1B12AA3-8587-49F7-8FD4-24A42FBB9ED3}" => Key deleted successfully. C:\Windows\System32\Tasks\KWWB => Moved successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\KWWB" => Key deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{F125BC51-2941-4F4A-B676-B6C8A5B0E166}" => Key deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{F125BC51-2941-4F4A-B676-B6C8A5B0E166}" => Key deleted successfully. C:\Windows\System32\Tasks\{FAE8AC9F-4635-4533-905E-1266F8CF043B} => Moved successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\{FAE8AC9F-4635-4533-905E-1266F8CF043B}" => Key deleted successfully. C:\Windows\Tasks\KWWB.job => Moved successfully. C:\Windows\Tasks\PTJGYIFC.job => Moved successfully. "C:\Users\Reisser\AppData\Roaming\omiga-plus" => File/Directory not found. C:\Users\Reisser\AppData\Local\Temp\089C73368233.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\D3065033-A7E9-A772-2B8A-BEFA7C6AFE24.dll => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\D3065033-A7E9-A772-2B8A-BEFA7C6AFE24.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\EFDF6877-8E55-A3B8-0364-69652FE51F4F.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\ICReinstall_FileOpenerSetup.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\Launcher__10272.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\Launcher__9848.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\Launcher__9999.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\LiveSupport_setup.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\ms.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\nvSCPAPI.dll => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\nvSCPAPI64.dll => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\nvStInst.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\optprosetup.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\Quarantine.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\setup_384.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\SpOrder.dll => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\sqlite3.dll => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\Storio2_DE_ger_Setup_pid_1588.exe => Moved successfully. C:\Users\Reisser\Desktop\Continue File Opener Installation.lnk => Moved successfully. C:\Users\Reisser\Downloads\FileOpenerSetup.exe => Moved successfully. C:\Program Files (x86)\2f4249ae-2ea2-4d9e-8f18-8c64e6461106 => Moved successfully. "C:\Windows\Tasks\KWWB.job" => File/Directory not found. "C:\Windows\System32\Tasks\KWWB" => File/Directory not found. C:\Users\Reisser\AppData\Roaming\KWWB.exe => Moved successfully. C:\Program Files (x86)\Flwsrf => Moved successfully. C:\Windows\SysWOW64\abengine.ini => Moved successfully. "C:\Windows\System32\Tasks\upfs7235" => File/Directory not found. C:\Windows\SysWOW64\abengineOff.ini => Moved successfully. C:\Windows\system32\abengineOff.ini => Moved successfully. C:\Windows\system32\abengine64.dll => Moved successfully. C:\Windows\SysWOW64\abengine.dll => Moved successfully. "C:\ProgramData\qMuLXOMiMf" directory move: Could not move "C:\ProgramData\qMuLXOMiMf\dZPlDQFMAyN.dat" => Scheduled to move on reboot. C:\ProgramData\qMuLXOMiMf\dZPlDQFMAyN.exe => Moved successfully. C:\ProgramData\qMuLXOMiMf\dZPlDQFMAyN.exe.config => Moved successfully. Could not move "C:\ProgramData\qMuLXOMiMf\info.dat" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\CPbbcyH.exe" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\CPbbcyH.exe.config" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\FUalhq.exe" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\FUalhq.exe.config" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\fvbqzObVHb.dll" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\WQSxEJcIi.dll" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf" directory. => Scheduled to move on reboot. C:\Users\Reisser\Downloads\rla-dtvpmt1.ts.nfo => Moved successfully. C:\Users\Reisser\Downloads\Goldesel.to - Die Seite fuer Direkt-Downloads aller Art.url => Moved successfully. "C:\Users\Reisser\Downloads\goldesel.to - quality source for more than 15 years .txt" => File/Directory not found. C:\Users\Reisser\Downloads\DTVP.Mockingjay.Teil1-RELiABLE.part1.rar => Moved successfully. C:\Users\Reisser\Downloads\DTVP.Mockingjay.Teil1-RELiABLE.part3.rar => Moved successfully. C:\Users\Reisser\Downloads\DTVP.Mockingjay.Teil1-RELiABLE.part2.rar => Moved successfully. C:\Users\Reisser\Downloads\DTVP.Mockingjay.Teil1-RELiABLE.part4.rar => Moved successfully. "C:\Windows\System32\Tasks\{FAE8AC9F-4635-4533-905E-1266F8CF043B}" => File/Directory not found. C:\Users\Reisser\Downloads\Orphan.Das.Waisenkind.German.AC3.HDRip.XViD-FuN.avi => Moved successfully. C:\Users\Reisser\AppData\Roaming\dlg => Moved successfully. C:\ProgramData\SecurityUtilityData => Moved successfully. C:\ProgramData\SecurityUtility => Moved successfully. "C:\Windows\Tasks\PTJGYIFC.job" => File/Directory not found. C:\Windows\patsearch.bin => Moved successfully. C:\Users\Reisser\AppData\Roaming\PTJGYIFC.exe => Moved successfully. "C:\Windows\System32\Tasks\PTJGYIFC" => File/Directory not found. C:\Users\Reisser\Downloads\34020109 => Moved successfully. C:\Program Files (x86)\BuyyNsaave => Moved successfully. C:\ProgramData\migbhnamcclanachieldofcbpebkajke => Moved successfully. C:\Users\Reisser\Downloads\The Purge 2.mkv => Moved successfully. C:\Users\Reisser\Downloads\G0neGrl.ld.HD.de => Moved successfully. C:\ProgramData\3872871776 => Moved successfully. "C:\ProgramData\SecurityUtility" => File/Directory not found. "C:\ProgramData\qMuLXOMiMf" directory move: Could not move "C:\ProgramData\qMuLXOMiMf\dZPlDQFMAyN.dat" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\info.dat" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\CPbbcyH.exe" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\CPbbcyH.exe.config" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\FUalhq.exe" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\FUalhq.exe.config" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\fvbqzObVHb.dll" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf\dat\WQSxEJcIi.dll" => Scheduled to move on reboot. Could not move "C:\ProgramData\qMuLXOMiMf" directory. => Scheduled to move on reboot. C:\Users\Reisser\AppData\Local\24567 => Moved successfully. C:\Windows\System32\Drivers\etc\hosts => Moved successfully. Hosts was reset successfully. EmptyTemp: => Removed 14.2 GB temporary data. => Result of Scheduled Files to move (Boot Mode: Normal) (Date&Time: 2014-12-29 08:17:48)<= C:\ProgramData\qMuLXOMiMf\dZPlDQFMAyN.dat => Is moved successfully. C:\ProgramData\qMuLXOMiMf\info.dat => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\CPbbcyH.exe => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\CPbbcyH.exe.config => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\FUalhq.exe => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\FUalhq.exe.config => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\fvbqzObVHb.dll => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\WQSxEJcIi.dll => Is moved successfully. C:\ProgramData\qMuLXOMiMf => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dZPlDQFMAyN.dat => Is moved successfully. C:\ProgramData\qMuLXOMiMf\info.dat => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\CPbbcyH.exe => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\CPbbcyH.exe.config => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\FUalhq.exe => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\FUalhq.exe.config => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\fvbqzObVHb.dll => Is moved successfully. C:\ProgramData\qMuLXOMiMf\dat\WQSxEJcIi.dll => Is moved successfully. C:\ProgramData\qMuLXOMiMf => Is moved successfully. ==== End of Fixlog 08:17:48 ==== scheint als wenn alles ok ist kommt bis jetzt nichtzs mehr nerviges!!! ;) vielen dank für die Kompetente Hilfe :) schnell und echt super geholfen MFG Adrian !TOP! |
Dann zeig mal frische FRST Logs. Haken setzen bei addition.txt dann auf Scan klicken http://saved.im/mtg0mjy4yjlu/2014-04...ryscantool.png |
FRST Logfile: FRST Logfile: Code: Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 28-12-2014 --- --- --- FRST Additions Logfile: Code: Additional scan result of Farbar Recovery Scan Tool (x64) Version: 28-12-2014 |
Das ist ja immer noch Adware ....:balla:....bitte nochmal das volle Programm!! :kloppen: Adware/Junkware/Toolbars entfernen (alte Versionen von adwCleaner und falls vorhanden JRT vorher löschen, danach neu runterladen auf den Desktop!) 1. Schritt: adwCleaner Downloade Dir bitte ![]()
2. Schritt: JRT - Junkware Removal Tool Beende bitte Deine Schutzsoftware um eventuelle Konflikte zu vermeiden.
3. Schritt: Frisches Log mit FRST Bitte lade dir die passende Version von Farbar's Recovery Scan Tool auf deinen Desktop: ![]() (Wenn du nicht sicher bist: Lade beide Versionen oder unter Start > Computer (Rechtsklick) > Eigenschaften nachschauen)
|
AdwCleaner Logfile: Code: # AdwCleaner v4.106 - Report created 05/01/2015 at 09:33:08 mnhg~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Junkware Removal Tool (JRT) by Thisisu Version: 6.4.1 (12.28.2014:1) OS: Windows 7 Ultimate x64 Ran by Reisser on 05.01.2015 at 9:36:32,08 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Services ~~~ Registry Values ~~~ Registry Keys ~~~ Files Successfully deleted: [File] "C:\Users\Reisser\appdata\local\google\chrome\user data\default\local storage\http_www.trovi.com_0.localstorage" Successfully deleted: [File] "C:\Users\Reisser\appdata\local\google\chrome\user data\default\local storage\http_www.trovi.com_0.localstorage-journal" ~~~ Folders ~~~ Event Viewer Logs were cleared ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Scan was completed on 05.01.2015 at 9:38:49,77 End of JRT log ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ FRST Logfile: FRST Logfile: FRST Logfile: FRST Logfile: FRST Logfile: Code: Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 04-01-2015 --- --- --- --- --- --- --- --- --- --- --- --- FRST Additions Logfile: Code: Additional scan result of Farbar Recovery Scan Tool (x64) Version: 04-01-2015 #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Junkware Removal Tool (JRT) by Thisisu Version: 6.4.1 (12.28.2014:1) OS: Windows 7 Ultimate x64 Ran by Reisser on 05.01.2015 at 9:36:32,08 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Services ~~~ Registry Values ~~~ Registry Keys ~~~ Files Successfully deleted: [File] "C:\Users\Reisser\appdata\local\google\chrome\user data\default\local storage\http_www.trovi.com_0.localstorage" Successfully deleted: [File] "C:\Users\Reisser\appdata\local\google\chrome\user data\default\local storage\http_www.trovi.com_0.localstorage-journal" ~~~ Folders ~~~ Event Viewer Logs were cleared ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Scan was completed on 05.01.2015 at 9:38:49,77 End of JRT log ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code: ProxyEnable: [.DEFAULT] => Internet Explorer proxy is enabled. Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
|
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 04-01-2015 Ran by Reisser at 2015-01-05 13:14:57 Run:2 Running from C:\Users\Reisser\Desktop Loaded Profile: Reisser (Available profiles: Reisser) Boot Mode: Normal ============================================== Content of fixlist: ***************** ProxyEnable: [.DEFAULT] => Internet Explorer proxy is enabled. ProxyServer: [.DEFAULT] => http=127.0.0.1:51111;https=127.0.0.1:51111 SearchScopes: HKU\.DEFAULT -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = SearchScopes: HKU\S-1-5-19 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = SearchScopes: HKU\S-1-5-20 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = FF HKU\S-1-5-21-1744345613-2801571155-2633355246-1000\...\Firefox\Extensions: [{75229658-C485-8921-6792-5A8E5A8C26B4}] - C:\Program Files (x86)\ver3BetterMarkIt\185.xpi CHR DefaultSuggestURL: Default -> hxxp://suggest.seccint.com/CSuggestJson.ashx?prefix={searchTerms} Task: {C2A4DBCF-85DB-4AF7-9667-235505B79D5D} - System32\Tasks\PESM => C:\Users\Reisser\AppData\Roaming\PESM.exe [2015-01-04] (home) <==== ATTENTION Task: C:\Windows\Tasks\PESM.job => C:\Users\Reisser\AppData\Roaming\PESM.exe <==== ATTENTION C:\Windows\Tasks\PESM.job C:\Windows\System32\Tasks\PESM C:\Program Files (x86)\c37590b6-b104-45a2-80cb-69d810a404ed C:\Users\Reisser\AppData\Roaming\PESM.exe C:\Windows\{4626E3EA-85B3-464E-B296-F3F5488D8B08} C:\ProgramData\1078601655 C:\Users\Reisser\AppData\Local\Temp\A76AB81D-707A-5889-895E-EED6F2E97078.dll C:\Users\Reisser\AppData\Local\Temp\A76AB81D-707A-5889-895E-EED6F2E97078.exe C:\Users\Reisser\AppData\Local\Temp\ED0B3C23-8BE8-3EB3-1490-A4C4FFFA8DA2.exe C:\Users\Reisser\AppData\Local\Temp\nse838F.exe C:\Program Files (x86)\ver3BetterMarkIt EmptyTemp: Hosts: ***************** HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable => value deleted successfully. HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyServer => value deleted successfully. HKU\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value deleted successfully. HKU\S-1-5-19\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value deleted successfully. HKU\S-1-5-20\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value deleted successfully. HKU\S-1-5-21-1744345613-2801571155-2633355246-1000\Software\Mozilla\Firefox\Extensions\\{75229658-C485-8921-6792-5A8E5A8C26B4} => value deleted successfully. Chrome DefaultSuggestURL deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{C2A4DBCF-85DB-4AF7-9667-235505B79D5D}" => Key deleted successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C2A4DBCF-85DB-4AF7-9667-235505B79D5D}" => Key deleted successfully. C:\Windows\System32\Tasks\PESM => Moved successfully. "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\PESM" => Key deleted successfully. C:\Windows\Tasks\PESM.job => Moved successfully. "C:\Windows\Tasks\PESM.job" => File/Directory not found. "C:\Windows\System32\Tasks\PESM" => File/Directory not found. C:\Program Files (x86)\c37590b6-b104-45a2-80cb-69d810a404ed => Moved successfully. C:\Users\Reisser\AppData\Roaming\PESM.exe => Moved successfully. C:\Windows\{4626E3EA-85B3-464E-B296-F3F5488D8B08} => Moved successfully. C:\ProgramData\1078601655 => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\A76AB81D-707A-5889-895E-EED6F2E97078.dll => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\A76AB81D-707A-5889-895E-EED6F2E97078.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\ED0B3C23-8BE8-3EB3-1490-A4C4FFFA8DA2.exe => Moved successfully. C:\Users\Reisser\AppData\Local\Temp\nse838F.exe => Moved successfully. "C:\Program Files (x86)\ver3BetterMarkIt" => File/Directory not found. C:\Windows\System32\Drivers\etc\hosts => Moved successfully. Hosts was reset successfully. EmptyTemp: => Removed 545.4 MB temporary data. The system needed a reboot. ==== End of Fixlog 13:15:06 ==== |
Okay, dann Kontrollscans mit MBAM und ESET bitte: Downloade Dir bitte ![]()
ESET Online Scanner
|
Malwarebytes Anti-Malware www.malwarebytes.org Suchlauf Datum: 05.01.2015 Suchlauf-Zeit: 13:52:38 Logdatei: mbam.txt Administrator: Ja Version: 2.00.4.1028 Malware Datenbank: v2015.01.05.05 Rootkit Datenbank: v2014.12.30.01 Lizenz: Kostenlos Malware Schutz: Deaktiviert Bösartiger Webseiten Schutz: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 7 Service Pack 1 CPU: x64 Dateisystem: NTFS Benutzer: Reisser Suchlauf-Art: Bedrohungs-Suchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 315176 Verstrichene Zeit: 7 Min, 28 Sek Speicher: Aktiviert Autostart: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 0 (Keine schädliche Elemente erkannt) Module: 0 (Keine schädliche Elemente erkannt) Registrierungsschlüssel: 9 PUP.Optional.SearchProtect, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\INSTALLEDSDB\{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}, In Quarantäne, [696014dfa4e559ddc860835f788c56aa], PUP.Optional.SearchProtect, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\INSTALLEDSDB\{cf2797aa-b7ec-e311-8ed9-005056c00008}, In Quarantäne, [92374fa48ffa092d4ed9f0f22ed6f50b], PUP.Optional.CinemaHDPro.A, HKLM\SOFTWARE\WOW6432NODE\CinemaHd For Pro 2.4cV27.12-nv, In Quarantäne, [dfea777c92f73ef89a9467ff966d7e82], PUP.Optional.HDVid.A, HKLM\SOFTWARE\WOW6432NODE\TheHDvid-Codec V10-nv, In Quarantäne, [dbee747fdfaae5512be530500cf73ec2], PUP.Optional.HDVid.A, HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\TheHDvid-Codec V10-nv, In Quarantäne, [efda91620d7c82b4f9181f61ed16f907], PUP.Optional.CrossRider.A, HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\HQPro-Video 1.6V26.12, In Quarantäne, [ffca26cd395054e2c0eb87e517ec8878], PUP.Optional.HDVid.A, HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\APPDATALOW\SOFTWARE\TheHDvid-Codec V10, In Quarantäne, [4980f7fc9bee8ea8070b1769f3107e82], PUP.Optional.CinemaHDPro.A, HKU\S-1-5-21-1744345613-2801571155-2633355246-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\CinemaHd For Pro 2.4cV27.12-nv, In Quarantäne, [9d2c965d3752e15575baa1c520e3cf31], PUP.Optional.HDVid.A, HKU\S-1-5-21-1744345613-2801571155-2633355246-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\TheHDvid-Codec V10-nv, In Quarantäne, [785137bcd4b5b97d60b1453bde25827e], Registrierungswerte: 0 (Keine schädliche Elemente erkannt) Registrierungsdaten: 0 (Keine schädliche Elemente erkannt) Ordner: 0 (Keine schädliche Elemente erkannt) Dateien: 13 PUP.Optional.Nova.A, C:\Program Files (x86)\AGEIA Technologies\382b2585-51fa-44d5-80fa-5d6425b8899f.dll, In Quarantäne, [4782b0436722191d479638c8b34f6c94], PUP.Optional.Nova.A, C:\Program Files (x86)\AGEIA Technologies\9c1d7823-4df5-447b-9440-3f94dbcc7595.dll, In Quarantäne, [7b4e886b5633b77fc41920e01ce6ce32], PUP.Optional.SearchProtect.A, C:\Windows\AppPatch\AppPatch64\VCLdr64.dll, In Quarantäne, [80492ac9800979bd033fe5c852af827e], PUP.Optional.SearchProtect.A, C:\Windows\AppPatch\nbin\VC32Loader.dll, In Quarantäne, [2d9c6d86444588aee35f139a9a679868], PUP.Optional.WebInstrNew.A, C:\Windows\System32\drivers\Msft_Kernel_webinstrNewH_01009.Wdf, In Quarantäne, [3e8b995a7c0d6bcb45d65f05010201ff], PUP.Optional.Trovi.A, C:\Users\Reisser\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.trovi.com_0.localstorage, Löschen bei Neustart, [8f3aca29e5a463d348e4820d19ea6898], PUP.Optional.Trovi.A, C:\Users\Reisser\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_www.trovi.com_0.localstorage-journal, Löschen bei Neustart, [2b9e24cff198e45248e4830c06fd04fc], PUP.Optional.SearchProtect, C:\Windows\AppPatch\Custom\Custom64\{cf2797aa-b7ec-e311-8ed9-005056c00008}.sdb, In Quarantäne, [19b0f2015c2dc37353d8538fc44023dd], PUP.Optional.ReMarkable.A, C:\Users\Reisser\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.re-markable00.re-markable.net_0.localstorage, Löschen bei Neustart, [1faa23d02a5f2c0ad63bfae9e024ee12], PUP.Optional.ReMarkable.A, C:\Users\Reisser\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.re-markable00.re-markable.net_0.localstorage-journal, Löschen bei Neustart, [8643d122810880b6ba5712d158ac52ae], PUP.Optional.ColorMedia.A, C:\Windows\SysWOW64\ColorMedia.ini, In Quarantäne, [1dac9f54f792e0561568816218ec9d63], PUP.Optional.ColorMedia.A, C:\Windows\System32\ColorMediaOff.ini, In Quarantäne, [2a9f22d1addc3600d1ad25bed43037c9], PUP.Optional.ColorMedia.A, C:\Windows\SysWOW64\ColorMediaOff.ini, In Quarantäne, [a623f5fed6b30e28c6b85c87c0447f81], Physische Sektoren: 0 (Keine schädliche Elemente erkannt) (end) |
![]() Posten in CODE-Tags Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR oder 7Z-Archiv zu packen erschwert mir massiv die Arbeit. Auch wenn die Logs für einen Beitrag zu groß sein sollten, bitte ich dich die Logs direkt und notfalls über mehrere Beiträge verteilt zu posten. Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
|
Code: ESETSmartInstaller@High as downloader log: Code: Malwarebytes Anti-Malware |
Sieht soweit ok aus :daumenhoc Wegen Cookies und anderer Dinge im Web: Um die Pest von vornherein zu blocken (also TrackingCookies, Werbebanner etc.) empfehle ich die Erweiterung Ghostery, diese verhindert weitgehend Usertracking bzw. das Anzeigen von Werbebannern. Info: Cookies sind keine Schädlinge direkt, aber es besteht die Gefahr der missbräuchlichen Verwendung (eindeutige Wiedererkennung zB für gezielte Werbung o.ä. => HTTP-Cookie ) Ansonsten gibt es noch gute Cookiemanager, Erweiterungen für den Firefox zB wäre da CookieCuller Wenn du aber damit leben kannst, dich bei jeder Browsersession überall neu einzuloggen (zB Facebook, Ebay, GMX, oder auch Trojaner-Board) dann stell den Browser einfach so ein, dass einfach alles beim Beenden des Browser inkl. Cookies gelöscht wird. Ist dein System nun wieder in Ordnung oder gibt's noch andere Funde oder Probleme? |
Hey danke für die tip`s also die blöden werbungen kammen noch nach dem ich Ghostery drauf gemacht habe wird es geblockt hoffe das bleibt so ;) Danke dir für die lange anstrengende Hilfe ihr seid echt spitze :) |
Dann wären wir durch! :daumenhoc Falls du noch Lob oder Kritik loswerden möchtest => Lob, Kritik und Wünsche - Trojaner-Board Die Programme, die hier zum Einsatz kamen, können alle deinstalliert werden. Es empfiehlt sich Malwarebytes Anti-Malware zu behalten und damit wöchentlich nach Malware zu scannen. Helfen kann dir dabei delfix: Die Reihenfolge ist hier entscheidend.
Bitte abschließend noch die Updates prüfen, unten mein Leitfaden dazu. Um in Zukunft die Aktualität der installierten Programme besser im Überblick zu halten, kannst du zB Secunia PSI verwenden. Für noch mehr Sicherheit solltest Du nach der beseitigten Infektion auch möglichst alle Passwörter ändern. Microsoftupdate Windows XP:Besuch mit dem IE die MS-Updateseite und lass Dir alle wichtigen Updates installieren. Windows Vista/7: Start, Systemsteuerung, Windows-Update PDF-Reader aktualisieren Ein veralteter AdobeReader stellt ein großes Sicherheitsrisiko dar. Du solltest daher besser alte Versionen vom AdobeReader über Systemsteuerung => Software bzw. Programme und Funktionen deinstallieren, indem Du dort auf "Adobe Reader x.0" klickst und das Programm entfernst. (falls du AdobeReader installiert hast) Ich empfehle einen alternativen PDF-Reader wie PDF Xchange Viewer, SumatraPDF oder Foxit PDF Reader, die sind sehr viel schlanker und flotter als der AdobeReader. Bitte überprüf bei der Gelegenheit auch die Aktualität des Flashplayers: Prüfen => Adobe - Flash Player Downloadlinks findest du hier => Browsers and Plugins - FilePony.de Alle Plugins im Firefox-Browser kannst du auch ganz einfach hier auf Aktualität prüfen => https://www.mozilla.org/de/plugincheck Natürlich auch darauf achten, dass andere installierte Browser wie zB Firefox, Opera oder Chrome aktuell sind. Java-Update Veraltete Java-Installationen sind ein großes Sicherheitsrisiko, daher solltest Du die alten Versionen deinstallieren. Beende dazu alle Programme (v.a. die Browser), klick danach auf Start, Systemsteuerung, Software (bzw. Programme und Funktionen) und deinstalliere darüber alle aufgelisteten Java-Versionen. Lad Dir danach von hier das aktuelle Java SE Runtime Environment (JRE) herunter und installiere es. |
Alle Zeitangaben in WEZ +1. Es ist jetzt 13:55 Uhr. |
Copyright ©2000-2025, Trojaner-Board