![]() |
Zip Datei entpakt, welche ein Javaskript enthält! Und nun? Liste der Anhänge anzeigen (Anzahl: 1) Hallo gestern hab ich wohl e weng Bockmist gebaut! Normalerweise öffne ich keine Mail-Anhänge, wo ich den Absender nicht kenne! Nur, den Absender der Mail von gestern abend habe ich gekannt! Leider haben wir zu spät gemerkt, das die Email-Adresse nicht zu diesem Namen passte! Ich habe keine Ahnung, wieso und weshalb! Jedenfalls war es wohl ein Javaskript oder so. Da ich die entpakte Datei schon einmal da hatte , haben wir sie mal mit einem Schreibprogramm geöffnet.Anhang 77523 Das ist die Erste Seite. Für mich schaut das aus, wie wenn sich das Programm meine Tasteneingaben merken soll!? Ich hab es dann halt mal gelöscht. Wie kann ich jetzt raus finden, ob noch irgend was aktiv ist? Mein Avira Antivirus Pro war mit allen Funktionen immer an, eine Meldung kam aber nicht. Dann hab ich den adwcleaner durch laufen lassen. Hier der Log: # AdwCleaner v5.033 - Bericht erstellt am 07/02/2016 um 19:39:30 # Aktualisiert am 07/02/2016 von Xplode # Datenbank : 2016-02-07.1 [Server] # Betriebssystem : Windows 10 Home (x64) # Benutzername : Sven - PCSASV # Gestartet von : C:\Users\Sven\Downloads\adwcleaner_5.033.exe # Option : Suchlauf # Unterstützung : hxxp://toolslib.net/forum ***** [ Dienste ] ***** Dienst Gefunden : APNMCP ***** [ Ordner ] ***** Ordner Gefunden : C:\Program Files (x86)\AskPartnerNetwork Ordner Gefunden : C:\Program Files (x86)\FreeRIP Ordner Gefunden : C:\ProgramData\apn Ordner Gefunden : C:\ProgramData\AskPartnerNetwork Ordner Gefunden : C:\Users\Sven\AppData\Local\AskPartnerNetwork Ordner Gefunden : C:\Users\Sven\AppData\Local\Temp\apn Ordner Gefunden : C:\Users\Sven\AppData\Roaming\OpenCandy Ordner Gefunden : C:\Users\Sven\AppData\Roaming\RHEng ***** [ Dateien ] ***** Datei Gefunden : C:\END Datei Gefunden : C:\Users\Public\Desktop\eBay.lnk Datei Gefunden : C:\Users\Sven\AppData\Roaming\Mozilla\Firefox\Profiles\kw99fd1p.default\searchplugins\conduit-search.xml Datei Gefunden : C:\WINDOWS\SysNative\roboot64.exe ***** [ DLL ] ***** ***** [ Verknüpfungen ] ***** ***** [ Aufgabenplanung ] ***** ***** [ Registrierungsdatenbank ] ***** Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{35B8892D-C3FB-4D88-990D-31DB2EBD72BD} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{44CBC005-6243-4502-8A02-3A096A282664} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{80703783-E415-4EE3-AB60-D36981C5A6F1} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{D8278076-BC68-4484-9233-6E7F1628B56C} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{F297534D-7B06-459D-BC19-2DD8EF69297B} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{41564952-412D-5637-4300-7A786E7484D7} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{3CCC052E-BDEE-408A-BEA7-90914EF2964B} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{61F47056-E400-43D3-AF1E-AB7DFFD4C4AD} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{E2B98EEA-EE55-4E9B-A8C1-6E5288DF785A} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{80703783-E415-4EE3-AB60-D36981C5A6F1} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{884189CF-7C10-41E8-A014-F7B2BE40AADB} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{BD125908-5F10-409F-9C01-F2207CA18887} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\TypeLib\{93E3D79C-0786-48FF-9329-93BC9F6DC2B3} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\TypeLib\{9945959C-AAD8-4312-8B57-2DE11927E770} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\TypeLib\{EEA63863-87BC-4DCA-A5B5-EB97E3B04806} Schlüssel Gefunden : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{41564952-412D-5637-4300-7A786E7484D7} Schlüssel Gefunden : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{41564952-412D-5637-4300-7A786E7484D7} Schlüssel Gefunden : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{41564952-412D-5637-4300-7A786E7484D7} Schlüssel Gefunden : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6978F29A-3493-40B2-8CDC-9C13A02F85A4} Schlüssel Gefunden : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7949A66-D936-4028-9552-14F7DC50F38D} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\CLSID\{41564952-412D-5637-4300-7A786E7484D7} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{6978F29A-3493-40B2-8CDC-9C13A02F85A4} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7949A66-D936-4028-9552-14F7DC50F38D} Schlüssel Gefunden : HKCU\Software\AskPartnerNetwork Schlüssel Gefunden : HKCU\Software\Conduit_Search_Protect Schlüssel Gefunden : HKCU\Software\InstallCore Schlüssel Gefunden : HKCU\Software\OCS Schlüssel Gefunden : HKLM\SOFTWARE\AskPartnerNetwork Schlüssel Gefunden : [x64] HKLM\SOFTWARE\AskPartnerNetwork Schlüssel Gefunden : HKU\.DEFAULT\Software\AskPartnerNetwork Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Installer\UpgradeCodes\7AB5857A57A0687786597A857BFFFFFF Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8036C72171EF4ba46856BF57969F6A36 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\89BB7852687BDC34B9A81E01C7FF9173 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CBC85D72B148084ABE8C2F072F781F4 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8CC5A38A64D6098468BC8395BA0EFF03 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\8DF9A1AC557F56c49B56F6B83E293C15 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A97C590397DCC454AA8923563BAB10E4 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B08932C78B697C244BE7BA3E6FF09B62 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CFA51B44D54927c4E9B7BC1D3FD1E49F Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\D14A7F65792054F418578C78367D13F7 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\DFE9F0BD163D827438CB6AD6B100EC48 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F739A19A8327dc64C9A8B641A9E89646 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\158D6D9E3FE81fa428925F22ACB3A965 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\15E6C514FEFC09f45BAFAAE1D7546ED4 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1DB42320A8525634AA089F0BEC86473B Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\22468B0D6050b2e46B9C4B67A8F59577 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\2251BF05A2F606d43BB064BD63CBD87E Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3255D95681398614190EDF0A4F3F77DB Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3CDF313E9B28c944FBC7579CF4949414 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\71E54748EDD3dc1468548785DC856EDA Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\754590DD06DE8d249B526503432F99D4 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\7AB5857A57A0687786597A857BFFFFFF Daten Gefunden : HKCU\Software\Microsoft\Internet Explorer\Main [Start Page] - hxxp://search.conduit.com/?gd=&ctid=CT3321540&octid=EB_ORIGINAL_CTID&ISID=M10898A40-D01F-47B7-A6A3-AA5780555B42&SearchSource=55&CUI=&UM=5&UP=SPA9054BCA-38E3-4321-B073-A54BFBD156ED&SSPV= Wert Gefunden : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [ApnTBMon] ***** [ Internetbrowser ] ***** ########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [7912 Bytes] ########## Dann hab ich Spybot hinterher gejagt: Search results from Spybot - Search & Destroy 07.02.2016 21:20:13 Scan took 00:27:02. 97 items found. DownloadSponsor: [SBI $CC437C6B] Settings (Registry Change, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\OCS\lastPID DownloadSponsor: [SBI $980DE8E4] Settings (Registry Change, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\OCS\PID Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\admin.brightcove.com\analytics.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\c.paypal.com\PayPalLSO.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\cdn.deltatv.co\com.jeroenwijering.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\chatango.com\fixed_id.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\chatango.com\mini_login.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\de-ipd.cdn.videoplaza.tv\com.videoplaza.adplayer.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\de-ipd.cdn.videoplaza.tv\com.videoplaza.bootloader.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\de-ipd.cdn.videoplaza.tv\se.videoplaza.kit.adplayer.adplayer.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\gadcreatives.mode.com\movad.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\live.gtcaster.com\com.jeroenwijering.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\members.bet365.com\FCE.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\mpsnare.iesnare.com\stm.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\p.jwpcdn.com\com.longtailvideo.jwplayer.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\static-cdn1.ustream.tv\flash.viewer.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.aadvertismentt.com\com.jeroenwijering.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.bet365.com\b365lipcs.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.bet365.com\b365push.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.bet365.com\bet365faves.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.bet365.com\betslip365.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.bet365.com\htrGgjy810GbjgGzynqGa1uwjkjwjshjx.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.bet365.com\htrGgjy810GbjgGzynqGgjyhfqquwjkjwjshjx.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.bet365.com\htrGgjy810GhjsyjwutirtizqjGifyfGhjsyjwutihttpnj.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.paypalobjects.com\PayPalLSO.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.paypalobjects.com\ppLsoTest.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www1.belboon.de\000013279.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $6AA61750] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www1.belboon.de\000016724.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $1EF45977] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.jsctool.com\d.swf\d.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $1EF45977] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\www.perfektdamen.com\#kernelteam\preferences.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $5555F3D7] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\cdn.livestream.com\swf\LSPlayer.swf\LSPlayer.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E Macromedia.FlashPlayer.Cookies: [SBI $5555F3D7] Text file (File, nothing done) C:\Users\Sven\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\7W6HHUNC\cdn2.dashbida.com\prod\vpaid2-dbfp.swf\dbStore.sol Properties.size=0 Properties.md5=D41D8CD98F00B204E9800998ECF8427E MediaPlex: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Tradedoubler: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Tradedoubler: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) MediaPlex: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Tradedoubler: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) FastClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Statcounter: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) MediaPlex: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) BurstMedia: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Zedo: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Zedo: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) MediaPlex: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) MediaPlex: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) MediaPlex: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Tradedoubler: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Tradedoubler: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Tradedoubler: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) FastClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) BurstMedia: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) WebTrends live: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Zedo: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Zedo: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Statcounter: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) Statcounter: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) CasaleMedia: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) CasaleMedia: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) CasaleMedia: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) CasaleMedia: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) CasaleMedia: [SBI $4E2AF2AC] Tracking cookie (Firefox: PE_C_PUBLIC (default)) (Browser: Cookie, nothing done) 7-Zip: [SBI $12C3A52C] Folder history (Registry Value, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\7-ZIP\FM\FolderHistory 7-Zip: [SBI $3D5692BD] Last used folder (Registry Change, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\7-ZIP\FM\PanelPath0 Internet Explorer: [SBI $1E8157BE] Typed URL list (Registry Key, nothing done) HKEY_USERS\S-1-5-19\Software\Microsoft\Internet Explorer\TypedURLs Internet Explorer: [SBI $1E8157BE] Typed URL list (Registry Key, nothing done) HKEY_USERS\S-1-5-20\Software\Microsoft\Internet Explorer\TypedURLs Internet Explorer: [SBI $1E8157BE] Typed URL list (Registry Key, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Internet Explorer\TypedURLs Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done) HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done) HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done) HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent MS Management Console: [SBI $ECD50EAD] Recent command list (Registry Key, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Microsoft Management Console\Recent File List MS Paint: [SBI $07867C39] Recent file list (Registry Key, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Windows\CurrentVersion\Applets\Paint\Recent File List Windows Explorer: [SBI $7308A845] Run history (Registry Key, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU Windows Explorer: [SBI $AA0766B5] Stream history (Registry Key, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\StreamMRU Windows Explorer: [SBI $D20DA0AD] Recent file global history (Registry Key, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs Windows Media SDK: [SBI $37AAEDE6] Computer name (Registry Change, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Windows Media\WMSDK\General\ComputerName Windows Media SDK: [SBI $CAA58B6E] Unique ID (Registry Change, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Windows Media\WMSDK\General\UniqueID Windows Media SDK: [SBI $BACCD0DA] Volume serial number (Registry Value, nothing done) HKEY_USERS\S-1-5-21-3896469874-4053130608-2395046965-1001\Software\Microsoft\Windows Media\WMSDK\General\VolumeSerialNumber Cookie: [SBI $49804B54] Browser: Cookie (40) (Browser: Cookie, nothing done) Cache: [SBI $49804B54] Browser: Cache (159) (Browser: Cache, nothing done) Verlauf: [SBI $49804B54] Browser: History (108) (Browser: History, nothing done) Cookie: [SBI $49804B54] Browser: Cookie (3747) (Browser: Cookie, nothing done) --- Spybot - Search & Destroy version: 2.4.40.131 DLL (build: 20140425) --- 2014-06-24 blindman.exe (2.4.40.151) 2014-06-24 explorer.exe (2.4.40.181) 2014-06-24 SDBootCD.exe (2.4.40.109) 2014-06-24 SDCleaner.exe (2.4.40.110) 2014-06-24 SDDelFile.exe (2.4.40.94) 2013-06-18 SDDisableProxy.exe 2014-06-24 SDFiles.exe (2.4.40.135) 2014-06-24 SDFileScanHelper.exe (2.4.40.1) 2014-06-24 SDFSSvc.exe (2.4.40.217) 2014-06-24 SDHelp.exe (2.4.40.1) 2014-04-25 SDHookHelper.exe (2.3.39.2) 2014-04-25 SDHookInst32.exe (2.3.39.2) 2014-04-25 SDHookInst64.exe (2.3.39.2) 2014-06-24 SDImmunize.exe (2.4.40.130) 2014-06-24 SDLogReport.exe (2.4.40.107) 2014-06-24 SDOnAccess.exe (2.4.40.11) 2014-06-24 SDPESetup.exe (2.4.40.3) 2014-06-24 SDPEStart.exe (2.4.40.86) 2014-06-24 SDPhoneScan.exe (2.4.40.28) 2014-06-24 SDPRE.exe (2.4.40.22) 2014-06-24 SDPrepPos.exe (2.4.40.15) 2014-06-24 SDQuarantine.exe (2.4.40.103) 2014-06-24 SDRootAlyzer.exe (2.4.40.116) 2014-06-24 SDSBIEdit.exe (2.4.40.39) 2014-06-24 SDScan.exe (2.4.40.181) 2014-06-24 SDScript.exe (2.4.40.54) 2014-06-24 SDSettings.exe (2.4.40.139) 2014-06-24 SDShell.exe (2.4.40.2) 2014-06-24 SDShred.exe (2.4.40.108) 2014-06-24 SDSysRepair.exe (2.4.40.102) 2014-06-24 SDTools.exe (2.4.40.157) 2014-06-24 SDTray.exe (2.4.40.129) 2014-06-27 SDUpdate.exe (2.4.40.94) 2014-06-27 SDUpdSvc.exe (2.4.40.77) 2014-06-24 SDWelcome.exe (2.4.40.130) 2014-04-25 SDWSCSvc.exe (2.3.39.2) 2015-03-25 spybotsd2-install-av-update.exe (2.4.40.0) 2014-05-20 spybotsd2-install-bdcore-update.exe (2.3.39.0) 2014-07-31 spybotsd2-translation-esx.exe 2013-06-19 spybotsd2-translation-frx.exe 2015-03-25 spybotsd2-translation-hrx.exe 2014-08-25 spybotsd2-translation-hux2.exe 2014-10-01 spybotsd2-translation-nlx2.exe 2014-11-05 spybotsd2-translation-ukx.exe 2015-07-28 spybotsd2-windows-upgrade-installer.exe (1.4.0.0) 2016-02-07 unins000.exe (51.1052.0.0) 1999-12-02 xcacls.exe 2012-08-23 borlndmm.dll (10.0.2288.42451) 2012-09-05 DelZip190.dll (1.9.0.107) 2012-09-10 libeay32.dll (1.0.0.4) 2012-09-10 libssl32.dll (1.0.0.4) 2014-04-25 NotificationSpreader.dll 2014-06-24 SDAdvancedCheckLibrary.dll (2.4.40.98) 2015-03-25 SDAV.dll 2014-06-24 SDECon32.dll (2.4.40.114) 2014-06-24 SDECon64.dll (2.3.39.113) 2014-06-24 SDEvents.dll (2.4.40.2) 2014-06-24 SDFileScanLibrary.dll (2.4.40.14) 2014-04-25 SDHook32.dll (2.3.39.2) 2014-04-25 SDHook64.dll (2.3.39.2) 2014-06-24 SDImmunizeLibrary.dll (2.4.40.2) 2014-06-24 SDLicense.dll (2.4.40.0) 2014-06-24 SDLists.dll (2.4.40.4) 2014-06-24 SDResources.dll (2.4.40.7) 2014-06-24 SDScanLibrary.dll (2.4.40.131) 2014-06-24 SDTasks.dll (2.4.40.15) 2014-06-24 SDWinLogon.dll (2.4.40.0) 2012-08-23 sqlite3.dll 2012-09-10 ssleay32.dll (1.0.0.4) 2014-06-24 Tools.dll (2.4.40.36) 2015-04-22 Includes\Adware-000.sbi (*) 2015-08-05 Includes\Adware-001.sbi (*) 2016-02-03 Includes\Adware-C.sbi (*) 2014-01-13 Includes\Adware.sbi (*) 2014-01-13 Includes\AdwareC.sbi (*) 2010-08-13 Includes\Cookies.sbi (*) 2014-11-14 Includes\Dialer-000.sbi (*) 2014-11-14 Includes\Dialer-001.sbi (*) 2015-07-29 Includes\Dialer-C.sbi (*) 2014-01-13 Includes\Dialer.sbi (*) 2014-01-13 Includes\DialerC.sbi (*) 2014-01-09 Includes\Fraud-000.sbi (*) 2014-01-09 Includes\Fraud-001.sbi (*) 2014-03-31 Includes\Fraud-002.sbi (*) 2014-01-09 Includes\Fraud-003.sbi (*) 2012-11-14 Includes\HeavyDuty.sbi (*) 2014-11-14 Includes\Hijackers-000.sbi (*) 2014-11-14 Includes\Hijackers-001.sbi (*) 2015-12-23 Includes\Hijackers-C.sbi (*) 2014-01-13 Includes\Hijackers.sbi (*) 2014-01-13 Includes\HijackersC.sbi (*) 2014-01-08 Includes\iPhone-000.sbi (*) 2014-01-08 Includes\iPhone.sbi (*) 2014-11-14 Includes\Keyloggers-000.sbi (*) 2014-09-24 Includes\Keyloggers-C.sbi (*) 2014-01-13 Includes\Keyloggers.sbi (*) 2014-01-13 Includes\KeyloggersC.sbi (*) 2015-06-25 Includes\Malware-000.sbi (*) 2014-11-14 Includes\Malware-001.sbi (*) 2014-11-14 Includes\Malware-002.sbi (*) 2015-11-19 Includes\Malware-003.sbi (*) 2014-11-14 Includes\Malware-004.sbi (*) 2014-11-14 Includes\Malware-005.sbi (*) 2014-02-26 Includes\Malware-006.sbi (*) 2014-01-09 Includes\Malware-007.sbi (*) 2016-02-03 Includes\Malware-C.sbi (*) 2014-01-13 Includes\Malware.sbi (*) 2013-12-23 Includes\MalwareC.sbi (*) 2014-11-14 Includes\PUPS-000.sbi (*) 2014-01-15 Includes\PUPS-001.sbi (*) 2014-01-15 Includes\PUPS-002.sbi (*) 2016-01-20 Includes\PUPS-C.sbi (*) 2012-11-14 Includes\PUPS.sbi (*) 2014-01-07 Includes\PUPSC.sbi (*) 2014-01-08 Includes\Security-000.sbi (*) 2015-12-02 Includes\Security-C.sbi (*) 2014-01-21 Includes\Security.sbi (*) 2014-01-21 Includes\SecurityC.sbi (*) 2015-11-11 Includes\Spyware-000.sbi (*) 2015-05-06 Includes\Spyware-001.sbi (*) 2015-08-12 Includes\Spyware-C.sbi (*) 2014-01-21 Includes\Spyware.sbi (*) 2014-01-21 Includes\SpywareC.sbi (*) 2011-06-07 Includes\Tracks.sbi (*) 2012-11-19 Includes\Tracks.uti (*) 2014-01-15 Includes\Trojans-000.sbi (*) 2014-01-15 Includes\Trojans-001.sbi (*) 2014-11-14 Includes\Trojans-002.sbi (*) 2016-01-20 Includes\Trojans-003.sbi (*) 2014-01-15 Includes\Trojans-004.sbi (*) 2014-03-19 Includes\Trojans-005.sbi (*) 2015-03-31 Includes\Trojans-006.sbi (*) 2014-01-15 Includes\Trojans-007.sbi (*) 2014-07-09 Includes\Trojans-008.sbi (*) 2014-07-09 Includes\Trojans-009.sbi (*) 2016-02-03 Includes\Trojans-C.sbi (*) 2014-01-15 Includes\Trojans-OG-000.sbi (*) 2014-01-15 Includes\Trojans-TD-000.sbi (*) 2014-01-15 Includes\Trojans-VM-000.sbi (*) 2014-01-15 Includes\Trojans-VM-001.sbi (*) 2014-01-15 Includes\Trojans-VM-002.sbi (*) 2014-01-15 Includes\Trojans-VM-003.sbi (*) 2014-01-15 Includes\Trojans-VM-004.sbi (*) 2014-01-15 Includes\Trojans-VM-005.sbi (*) 2014-01-15 Includes\Trojans-VM-006.sbi (*) 2014-01-15 Includes\Trojans-VM-007.sbi (*) 2014-01-15 Includes\Trojans-VM-008.sbi (*) 2014-01-15 Includes\Trojans-VM-009.sbi (*) 2014-01-15 Includes\Trojans-VM-010.sbi (*) 2014-01-15 Includes\Trojans-VM-011.sbi (*) 2014-01-15 Includes\Trojans-VM-012.sbi (*) 2014-01-15 Includes\Trojans-VM-013.sbi (*) 2014-01-15 Includes\Trojans-VM-014.sbi (*) 2014-01-15 Includes\Trojans-VM-015.sbi (*) 2014-01-15 Includes\Trojans-VM-016.sbi (*) 2014-01-15 Includes\Trojans-VM-017.sbi (*) 2014-01-15 Includes\Trojans-VM-018.sbi (*) 2014-01-15 Includes\Trojans-VM-019.sbi (*) 2014-01-15 Includes\Trojans-VM-020.sbi (*) 2014-01-15 Includes\Trojans-VM-021.sbi (*) 2014-01-15 Includes\Trojans-VM-022.sbi (*) 2014-01-15 Includes\Trojans-VM-023.sbi (*) 2014-01-15 Includes\Trojans-VM-024.sbi (*) 2014-01-15 Includes\Trojans-ZB-000.sbi (*) 2016-02-03 Includes\Trojans-ZL-000.sbi (*) 2014-01-09 Includes\Trojans.sbi (*) 2014-01-16 Includes\TrojansC-01.sbi (*) 2014-01-16 Includes\TrojansC-02.sbi (*) 2014-01-16 Includes\TrojansC-03.sbi (*) 2014-01-16 Includes\TrojansC-04.sbi (*) 2014-01-16 Includes\TrojansC-05.sbi (*) 2014-01-09 Includes\TrojansC.sbi (*) Was die 2 Programme gefunden haben, hab ich gelöscht. Kann ich sonst noch irgend was machen? Mein Avira Antivirus läuft gerade auch durch. Ach ja, Betriebsprogramm ist Windows 10... Vielen Dank für eure Hilfe. Sven |
:hallo: Mein Name ist Matthias und ich werde dir bei der Bereinigung deines Computers helfen. Bitte beachte folgende Hinweise:
Bitte arbeite alle Schritte in der vorgegebenen Reihefolge nacheinander ab und poste alle Logdateien in CODE-Tags: ![]() Posten in CODE-Tags Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR, 7Z-Archive zu packen erschwert deinem Helfer massiv die Arbeit, es sei denn natürlich die Datei wäre ansonsten zu groß für das Forum. Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
Danke für deine Mitarbeit! Zur ersten Analyse bitte FRST und TDSS-Killer ausführen: Schritt 1 Bitte lade dir die passende Version von Farbar's Recovery Scan Tool auf deinen Desktop: ![]() (Wenn du nicht sicher bist: Lade beide Versionen oder unter Start > Computer (Rechtsklick) > Eigenschaften nachschauen)
Schritt 2 Downloade dir bitte ![]()
Bitte poste mit deiner nächsten Antwort
|
Hallo und schon mal danke für die Hilfe! Und los gehts: Code: Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version:07-02-2016 Code: Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version:07-02-2016 |
Farbar recovery: Code: 18:33:56.0148 0x238c TDSS rootkit removing tool 3.1.0.9 Dec 11 2015 22:49:12 Code: Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version:07-02-2016 |
Servus, Schritt 1 Downloade Dir bitte ![]()
Schritt 2 Downloade Dir bitte ![]()
Schritt 3 Lade dir die passende Version von SystemLook vom folgenden Spiegel herunter und speichere das Tool auf dem Desktop: SystemLook (32 bit) | SystemLook (64 bit)
Schritt 4
Bitte poste mit deiner nächsten Antwort
|
Ok, vielen Dank schon mal! Und los geht´s, der ADWCleaner: Code: # AdwCleaner v5.033 - Bericht erstellt am 09/02/2016 um 19:39:59 Code: Malwarebytes Anti-Malware Code: SystemLook 30.07.11 by jpshortstuff Code: SystemLook 30.07.11 by jpshortstuff |
Servus, du hast zweimal die Logdatei von SystemLook gepostet. Es fehlen noch die beiden Logdateien von FRST (FRST.txt und Addition.txt). :) |
Ja, sorry. Nach dem 3. Stromausfall gestern abend war ich dann etwas nervös. Und als der Rechner das 4. mal aus ging, hatte ich entgültig die Nase voll! Aber jetzt: Addition Code: Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version:07-02-2016 Code: Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version:07-02-2016 |
Servus, wir entfernen die letzten Reste und kontrollieren nochmal alles. :) Hinweis: Der Suchlauf mit ESET kann länger dauern. Schritt 1 Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code: start Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
Schritt 2 Downloade dir die passende Version von HitmanPro auf deinen Desktop: HitmanPro - 32 Bit | HitmanPro - 64 Bit.
Schritt 3 ESET Online Scanner
Schritt 4
http://www.trojaner-board.de/extra/lesestoff.pngGibt es jetzt noch Probleme mit dem PC? Wenn ja, welche? Bitte poste mit deiner nächsten Antwort
|
So, Hitman ist durch! Aber die Logdatei lässt sich nicht speichern! Habe es 2x versucht. Der "Button" Logdatei speichern" reagiert zwar wenn ich mit der Maus drauf komme, aber nach dem an klicken passiert nix. Gefunden als potentielle Bedrohung wurden diverse Virensuchprogramme und viele Zahlen/Buchstaben_Kombinationen, hinter denen AskBar steht. ich mach halt mit ESET weiter... Gruß Sven Sorry, ich hab das fixlog vergessen. Ich denke mal, das ist die fixlist: Code: start |
Servus, ich will die Fixlog von FRST haben. ;) Hat HitmanPro denn was gefunden? Wenn ja, was? Weiter mit ESET bitte. |
Hallo Hitman hat gefunden: JavaRe Chip Installer Malwarebytes Chip installer Spybot Chip Installer FRST.exe jede Zahlen/Buchstaben von AskBar aber wie gesagt, Speichern ging net,,, So, hier das ESET-Log: Code: ESETSmartInstaller@High as downloader log: Code: Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version:07-02-2016 Code: Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version:07-02-2016 Ich habe lediglich dummerweise eine ZIP-Datei mit einem Javascript (nannte sich invoice-scan-YJJfMw.docx) entpackt. Habe ja oben mal eine pdf mit der WORD-Version an gehängt. Jetzt habe ich halt tierisch Panik, das ich mir was eingefangen habe und mein Konto noch kleiner wird, wie es eh schon ist! Mein "Großer" hat gesagt, das schaut aus wie etwas, das Tastatureingaben speichern soll. Naja, und da hab ich mal bei euch um Hilfe gebeten. Hab doch von so´n Scheiß keeeen Plan... Gruß Sven |
Servus, bisher haben wir nur etwas Adware gefunden, nichts gefährliches. führe bitte nochmal den FRST-Fix aus, das hast du nämlich noch nicht gemacht (Schritt 1). Poste mir die Logdatei des Fix. Dann nochmal FRST-Scan wie in Schritt 4 beschrieben. |
Ok, ich hoffe das ist das richtige. Mehr kommt net... Code: Untersuchungsergebnis von Farbar Recovery Scan Tool (FRST) (x64) Version:07-02-2016 Kann men eigentlich mit dem textfragment, was ich ganz oben mit gepostet habe was anfangen? Also, ich meine, schon mal sagen, was das sein kann bzw, was das eventuell anrichten könnte? Ich habe noch knapp 2 Seiten davon da. Gruß Sven |
Servus, Was genau meinst du mit dem "Textfragment"? Die pdf, die du gepostet hast, ist harmlos. Lies dir bitte die Anleitung zu Schritt 1 nochmal durch, du musst schon auf den Entfernen-Button in FRST drücken, nachdem du die fixlist.txt erstellt hast: Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster. Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument Code: start Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
|
Alle Zeitangaben in WEZ +1. Es ist jetzt 08:15 Uhr. |
Copyright ©2000-2025, Trojaner-Board