mitdemdeppda | 20.02.2022 12:30 | Ok, Danke für die Mühen, hier die Logs:
Malwarebytes: Code:
Malwarebytes
www.malwarebytes.com
-Protokolldetails-
Scan-Datum: 20.02.22
Scan-Zeit: 00:59
Protokolldatei: fd1e4616-91df-11ec-b3b1-d05099a4a671.json
-Softwaredaten-
Version: 4.5.4.168
Komponentenversion: 1.0.1599
Version des Aktualisierungspakets: 1.0.51373
Lizenz: Testversion
-Systemdaten-
Betriebssystem: Windows 10 (Build 19044.1526)
CPU: x64
Dateisystem: NTFS
Benutzer: DESKTOP-OL5SEPP\Gaboden
-Scan-Übersicht-
Scan-Typ: Bedrohungs-Scan
Scan gestartet von: Manuell
Ergebnis: Abgeschlossen
Gescannte Objekte: 375976
Erkannte Bedrohungen: 14
In die Quarantäne verschobene Bedrohungen: 14
Abgelaufene Zeit: 5 Min., 7 Sek.
-Scan-Optionen-
Speicher: Aktiviert
Start: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Aktiviert
Heuristik: Aktiviert
PUP: Erkennung
PUM: Erkennung
-Scan-Details-
Prozess: 0
(keine bösartigen Elemente erkannt)
Modul: 0
(keine bösartigen Elemente erkannt)
Registrierungsschlüssel: 0
(keine bösartigen Elemente erkannt)
Registrierungswert: 0
(keine bösartigen Elemente erkannt)
Registrierungsdaten: 0
(keine bösartigen Elemente erkannt)
Daten-Stream: 0
(keine bösartigen Elemente erkannt)
Ordner: 0
(keine bösartigen Elemente erkannt)
Datei: 14
Malware.Heuristic.1004, C:\$RECYCLE.BIN\S-1-5-21-788105542-1629936765-1078574702-1001\$RIWT0LS.lnk, In Quarantäne, 1000001, 0, , , , , AE0D01F93090C784A6CBFC588CE27535, D49E36E5E9D106F93E94374BF56C9021A0982F8E23765D3EFD5C6DA0700F508A
Malware.Heuristic.1004, C:\USERS\GABODEN\DESKTOP\Archiv\lp14\iPoker Tools.lnk, In Quarantäne, 1000001, 0, , , , , 9DBE945D07F392DD694429064690F7E0, 3B7E8C1354AC1D7BD1D320D461A7FCE70DEBD051E9062AD25EB0DBFCC0A51755
Malware.Heuristic.1004, C:\POKER\IPOKER TOOLS\IPT.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EC, dds, 01650151, 8519BAA82908AE12817D69F5522EC303, 35DFDBA42670E139D347B8B16950F3695855388C8A1B0F11D286954C4CE6524D
Malware.Heuristic.1003, C:\USERS\GABODEN\DESKTOP\ARCHIV\TABLETHEMES\PARTY\GTO V.2 FOR PARTYPOKER V.2.29.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EB, dds, 01650151, 1C6FC10C16E190BFCB8EAB69240D1A31, F47EECE10791E8AE8A321483B097B61C87577F7D8E94C394C067293B300F4595
Malware.Heuristic.1003, C:\USERS\GABODEN\DESKTOP\ARCHIV\TABLETHEMES\UNIBET\ALERT SOUNDS FOR UNIBET.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EB, dds, 01650151, 68CBBA877C4C7C1A0233968DF5B0CD2A, 24770F5A9D26C655D54E9C69F881B8AE8C7A9EB10BAADCCF72505464610DD6AA
Malware.Heuristic.1003, C:\USERS\GABODEN\DESKTOP\ARCHIV\TABLETHEMES\UNIBET\GTO V.2 OVAL TABLE FOR UNIBET 1 V.1.02.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EB, dds, 01650151, A505E1AEF3771BB2155B012DD3BA2CAF, B184A800EA604722EECE81E0A0AF0B3B0CBDC4D297269A2A1CA9DD55D0EEE722
Malware.Heuristic.1003, C:\USERS\GABODEN\DESKTOP\ARCHIV\TABLETHEMES\UNIBET\GTO V.2 RACETRACK TABLE FOR UNIBET 2 V.1.02.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EB, dds, 01650151, DF220191E768156453753AAE0A31CDD4, 4113DF48AD24B6432908959A1C645230A96246FE77B7091D1ECE457AE6EEAC87
Malware.Heuristic.1003, C:\USERS\GABODEN\DESKTOP\ARCHIV\TABLETHEMES\888\GTO V.2 FOR 888 V.3.09.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EB, dds, 01650151, 13FDC1094E8F49550F1397D6C4A022DA, EC5FEF069F2DE3FDF6CA2C1475E1ECC79F32E7AC8C1A05D1BD4D434052309F47
Malware.Heuristic.1003, C:\USERS\GABODEN\DESKTOP\ARCHIV\TABLETHEMES\BETSSON\GTO V.2 FOR IPOKER V.1.06.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EB, dds, 01650151, DF58CB4FD061CBDBCB811CB8EC46B8DD, F8C655A12A3087B03BD2923EC28D62C46DA0174DB4F1C4959112AD65B0D03F73
Malware.Heuristic.1003, C:\USERS\GABODEN\DESKTOP\ARCHIV\TABLETHEMES\UNIBET\GTO V.2 RACETRACK TABLE FOR UNIBET 1 V.1.02.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EB, dds, 01650151, 3CE51C4F2BDE23216D8745D7E50F73B0, 78ED1403466ED5D90F107B178156350E40CD380E12F424A6C6A1A19F583FDE27
Malware.Heuristic.1003, C:\USERS\GABODEN\DESKTOP\ARCHIV\TABLETHEMES\STARS AURORA\GTO V.2 FOR POKERSTARS AURORA V.3.22.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EB, dds, 01650151, C7E9EB3C537265D6225F62D76562CAD2, 3B6B6AA1191C88074B394CFECAA3302960AF1579AF3CC2942B00505563CC01C2
Malware.Heuristic.1003, C:\USERS\GABODEN\DESKTOP\ARCHIV\TABLETHEMES\UNIBET\GTO V.2 OVAL TABLE FOR UNIBET 2 V.1.02.EXE, In Quarantäne, 1000001, 0, 1.0.51373, 0000000000000000000003EB, dds, 01650151, FF4975F6A4F3DBEBE4AE1A166D9056B0, E854905E29FEC424F1807E577B1EDA446296F2C83AD7F3EA8358A935367E57EF
Generic.Malware/Suspicious, C:\USERS\GABODEN\DOWNLOADS\CLIPGRAB-3.6.6-CGDE.EXE, In Quarantäne, 0, 392686, 1.0.51373, , shuriken, , BB0E405DE0E0891D6BA4BD12CA5C2727, 9B6438FA0D8A298661A95C0F11F8312530180E403DB207FFBE469F78097C76C3
Adware.InstallCore, C:\USERS\GABODEN\DOWNLOADS\DEUS_EX_INVISIBLE_WAR_2483754001.EXE, In Quarantäne, 497, 845509, 1.0.51373, 5C834931624C7DC36E9D37FF, dds, 01650151, 9F9C5442041E2D597589C628296DDF47, 4D094159C2ADACED3C708993F7388CE0291CDF1427A76674192D097BB27A3666
Physischer Sektor: 0
(keine bösartigen Elemente erkannt)
WMI: 0
(keine bösartigen Elemente erkannt)
(end)
Rogue: Code:
Program : RogueKiller Anti-Malware
Version : 15.3.0.0
x64 : Yes
Program Date : Feb 17 2022
Location : C:\Users\Gaboden\Downloads\RogueKiller_portable64.exe
Premium : No
Company : Adlice Software
Website : https://www.adlice.com/
Contact : https://adlice.com/contact/
Website : https://adlice.com/download/roguekiller/
Operating System : Windows 10 (10.0.19044) 64-bit
64-bit OS : Yes
Startup : 0
WindowsPE : No
User : Gaboden
User is Admin : Yes
Date : 2022/02/20 06:56:12
Type : Removal
Aborted : No
Scan Mode : Standard
Duration : 4887
Found items : 8
Total scanned : 159365
Signatures Version : 20220218_101851
Truesight Driver : Yes
Updates Count : 6
************************* Warnings *************************
************************* Removal *************************
[PUP.Gen1 (Potentially Malicious)] HKEY_USERS\.DEFAULT\Software\OCS -- -> Deleted
[+] scan_what : 2
[+] vendors : PUP.Gen1
[+] Name : HKEY_USERS\.DEFAULT\Software\OCS
[+] Type : Registry
[+] file_vtscore : 0
[+] file_vttotal : 0
[+] is_malicious : Yes
[+] detection_level : 3
[+] id : 0
[+] status : 3
[+] status_str : Deleted
[+] removed : Yes
[+] status_choice : 2
[+] malpe_score : 0
[PUP.Gen1 (Potentially Malicious)] HKEY_USERS\S-1-5-21-788105542-1629936765-1078574702-1001\Software\OCS -- -> Deleted
[+] scan_what : 2
[+] vendors : PUP.Gen1
[+] Name : HKEY_USERS\S-1-5-21-788105542-1629936765-1078574702-1001\Software\OCS
[+] Type : Registry
[+] file_vtscore : 0
[+] file_vttotal : 0
[+] is_malicious : Yes
[+] detection_level : 3
[+] id : 1
[+] status : 3
[+] status_str : Deleted
[+] removed : Yes
[+] status_choice : 2
[+] malpe_score : 0
[PUP.Gen1 (Potentially Malicious)] HKEY_USERS\S-1-5-18\Software\OCS -- -> Deleted
[+] scan_what : 2
[+] vendors : PUP.Gen1
[+] Name : HKEY_USERS\S-1-5-18\Software\OCS
[+] Type : Registry
[+] file_vtscore : 0
[+] file_vttotal : 0
[+] is_malicious : Yes
[+] detection_level : 3
[+] id : 2
[+] status : 3
[+] status_str : Deleted
[+] removed : Yes
[+] status_choice : 2
[+] malpe_score : 0
[Suspicious.Path (Potentially Malicious)] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|UDP Query User{6BAB1398-DDC4-4255-9B74-6E79E27DE2B9}C:\users\gaboden\appdata\local\holdemresources\calculator\calculator.exe -- [%localappdata%\holdemresources\calculator\calculator.exe] -> Deleted
[+] scan_what : 1
[+] vendors : Suspicious.Path
[+] Name : HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|UDP Query User{6BAB1398-DDC4-4255-9B74-6E79E27DE2B9}C:\users\gaboden\appdata\local\holdemresources\calculator\calculator.exe
[+] value : [%localappdata%\holdemresources\calculator\calculator.exe]
[+] Type : Registry
[+] file_hash : F8F6EBB874B549411A1C45FA0F075396F40753E42F46E542B7A3CD3D7CCBAB4D
[+] file_vtscore : 0
[+] file_vttotal : 0
[+] is_malicious : Yes
[+] detection_level : 3
[+] id : 3
[+] status : 3
[+] status_str : Deleted
[+] removed : Yes
[+] status_choice : 2
[+] malpe_score : -1
[Suspicious.Path (Potentially Malicious)] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|TCP Query User{EDC562D3-497B-4DC0-9111-784D0D940B82}C:\users\gaboden\appdata\local\holdemresources\calculator\calculator.exe -- [%localappdata%\holdemresources\calculator\calculator.exe] -> Deleted
[+] scan_what : 1
[+] vendors : Suspicious.Path
[+] Name : HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|TCP Query User{EDC562D3-497B-4DC0-9111-784D0D940B82}C:\users\gaboden\appdata\local\holdemresources\calculator\calculator.exe
[+] value : [%localappdata%\holdemresources\calculator\calculator.exe]
[+] Type : Registry
[+] file_hash : F8F6EBB874B549411A1C45FA0F075396F40753E42F46E542B7A3CD3D7CCBAB4D
[+] file_vtscore : 0
[+] file_vttotal : 0
[+] is_malicious : Yes
[+] detection_level : 3
[+] id : 4
[+] status : 3
[+] status_str : Deleted
[+] removed : Yes
[+] status_choice : 2
[+] malpe_score : -1
[Suspicious.Path (Potentially Malicious)] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{C01A104D-95D2-42D5-A136-C6B4724783DA} -- [%localappdata%\Temp\unpacksos\1\SRManagerSOS.exe] -> Deleted
[+] scan_what : 1
[+] vendors : Suspicious.Path
[+] Name : HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{C01A104D-95D2-42D5-A136-C6B4724783DA}
[+] value : [%localappdata%\Temp\unpacksos\1\SRManagerSOS.exe]
[+] Type : Registry
[+] file_vtscore : 0
[+] file_vttotal : 0
[+] is_malicious : Yes
[+] detection_level : 3
[+] id : 5
[+] status : 3
[+] status_str : Deleted
[+] removed : Yes
[+] status_choice : 2
[+] malpe_score : -1
[Suspicious.Path (Potentially Malicious)] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|TCP Query User{C138321C-1622-448E-A645-89AC1F672CB9}C:\users\gaboden\appdata\local\betsson\data\qtwebengineprocess.exe -- [%localappdata%\betsson\data\qtwebengineprocess.exe] -> Deleted
[+] scan_what : 1
[+] vendors : Suspicious.Path
[+] Name : HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|TCP Query User{C138321C-1622-448E-A645-89AC1F672CB9}C:\users\gaboden\appdata\local\betsson\data\qtwebengineprocess.exe
[+] value : [%localappdata%\betsson\data\qtwebengineprocess.exe]
[+] Type : Registry
[+] file_vtscore : 0
[+] file_vttotal : 0
[+] is_malicious : Yes
[+] detection_level : 3
[+] id : 6
[+] status : 3
[+] status_str : Deleted
[+] removed : Yes
[+] status_choice : 2
[+] malpe_score : -1
[Suspicious.Path (Potentially Malicious)] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|UDP Query User{F2D5CE50-C6AB-470A-8211-7EC0E8A18FEE}C:\users\gaboden\appdata\local\betsson\data\qtwebengineprocess.exe -- [%localappdata%\betsson\data\qtwebengineprocess.exe] -> Deleted
[+] scan_what : 1
[+] vendors : Suspicious.Path
[+] Name : HKEY_LOCAL_MACHINE\System\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|UDP Query User{F2D5CE50-C6AB-470A-8211-7EC0E8A18FEE}C:\users\gaboden\appdata\local\betsson\data\qtwebengineprocess.exe
[+] value : [%localappdata%\betsson\data\qtwebengineprocess.exe]
[+] Type : Registry
[+] file_vtscore : 0
[+] file_vttotal : 0
[+] is_malicious : Yes
[+] detection_level : 3
[+] id : 7
[+] status : 3
[+] status_str : Deleted
[+] removed : Yes
[+] status_choice : 2
[+] malpe_score : -1 |