![]() |
|
Log-Analyse und Auswertung: Win7SP1: svchost braucht 50% CPU Teil1Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() | #1 |
![]() | ![]() Win7SP1: svchost braucht 50% CPU Teil1 Hallo, habe auf meinem WIN7SP1 Rechner den svchost Prozess für netsvcs mit 50% CPU am laufen. Habe zuletzt elixir/erlang/phoenix installiert. Evt. Bestand das Problem aber schon vorher und wurde nicht bemerkt. Habe AdwCleaner, JRT laufen lassen. Hoffe man kann mir hier helfen. Die vorhandenen logfiles folgen: Code:
ATTFilter # AdwCleaner v5.029 - Bericht erstellt am 16/01/2016 um 10:58:16 # Aktualisiert am 11/01/2016 von Xplode # Datenbank : 2016-01-15.2 [Server] # Betriebssystem : Windows 7 Ultimate Service Pack 1 (x64) # Benutzername : volker - VOLKER-PC # Gestartet von : C:\Users\volker\Downloads\SPECIAL\AdwCleaner_5.029.exe # Option : L?schen # Unterstützung : hxxp://toolslib.net/forum ***** [ Dienste ] ***** ***** [ Ordner ] ***** [-] Ordner Gel?scht : C:\Program Files\Hola [-] Ordner Gel?scht : C:\ProgramData\Tarma Installer [-] Ordner Gel?scht : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\eSupport.com [-] Ordner Gel?scht : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Media Finder [-] Ordner Gel?scht : C:\Users\volker\AppData\Local\PackageAware [-] Ordner Gel?scht : C:\Users\volker\AppData\Roaming\eIntaller [-] Ordner Gel?scht : C:\Users\volker\AppData\Roaming\GrabPro [-] Ordner Gel?scht : C:\Users\volker\AppData\Roaming\Media Finder [-] Ordner Gel?scht : C:\Users\volker\AppData\Roaming\ProgSense [#] Ordner Gel?scht : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\Extensions\{c0c9a2c7-2e5c-4447-bc53-97718bc91e1b}.xpi [-] Ordner Gel?scht : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\Extensions\{ef62e1ce-d2a4-4cdd-b7ec-92b120366b66} [-] Ordner Gel?scht : C:\Windows\SysWOW64\C2MP ***** [ Dateien ] ***** [-] Datei Gel?scht : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\CodecPackTrayMenu.lnk [-] Datei Gel?scht : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\bb9k5o8x.devdev\user.js [-] Datei Gel?scht : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\user.js [-] Datei Gel?scht : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\user.js ***** [ DLLs ] ***** ***** [ Verknüpfungen ] ***** [-] Verknüpfung Desinfiziert : C:\Users\volker\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk [-] Verknüpfung Desinfiziert : C:\Users\volker\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Mozilla Firefox.lnk ***** [ Aufgabenplanung ] ***** [-] Geplante Aufgabe Gel?scht : Desk 365 RunAsStdUser ***** [ Registrierungsdatenbank ] ***** [-] Schlüssel Gel?scht : HKCU\Software\Microsoft\Internet Explorer\MenuExt\Download with &Media Finder [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\AppID\IEPlugin.DLL [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\IEPlugin.IEWebHook [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\IEPlugin.IEWebHook.1 [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\MF [-] Schlüssel Gel?scht : HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Application\DeskSvc [-] Schlüssel Gel?scht : HKCU\Software\Classes\MF [-] Wert Gel?scht : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [Codec Settings UAC Manager] [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\PPStream.exe [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\AppID\{3F39D17D-50C7-4AC4-A63A-CDF6CDBD0C61} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\CLSID\{35B8892D-C3FB-4D88-990D-31DB2EBD72BD} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\CLSID\{5EC7C511-CD0F-42E6-830C-1BD9882F3458} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\Interface\{AE9908C1-3400-4B10-9061-C6C04D96E3D2} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\TypeLib\{71E3A30E-9444-49D9-ABDB-B4B531D0BBA3} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Classes\TypeLib\{93E3D79C-0786-48FF-9329-93BC9F6DC2B3} [-] Schlüssel Gel?scht : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2974C985-8151-4DE5-B23C-B875F0A8522F} [-] Schlüssel Gel?scht : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{AD4DF010-E2FD-43CE-864A-6BD1EDC59AC2} [-] Schlüssel Gel?scht : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{AD4DF010-E2FD-43CE-864A-6BD1EDC59AC2} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2974C985-8151-4DE5-B23C-B875F0A8522F} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4250488A-CB24-0893-C066-B1AEA57BCFF2} [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{BAC94FEE-45B4-4FD4-9EEA-D8978EC96C6E} [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Classes\CLSID\{AD4DF010-E2FD-43CE-864A-6BD1EDC59AC2} [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C} [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Classes\Interface\{462862BE-9A5C-49A5-9CBD-A649EAC63645} [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Classes\Interface\{9EDC0C90-2B5B-4512-953E-35767BAD5C67} [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Classes\Interface\{AE9908C1-3400-4B10-9061-C6C04D96E3D2} [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785} [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AD4DF010-E2FD-43CE-864A-6BD1EDC59AC2} [-] Schlüssel Gel?scht : HKCU\Software\APN PIP [-] Schlüssel Gel?scht : HKCU\Software\Conduit [-] Schlüssel Gel?scht : HKCU\Software\eSupport.com [-] Schlüssel Gel?scht : HKCU\Software\Headlight [-] Schlüssel Gel?scht : HKCU\Software\MediaFinder [-] Schlüssel Gel?scht : HKCU\Software\YahooPartnerToolbar [-] Schlüssel Gel?scht : HKCU\Software\ProgSense [-] Schlüssel Gel?scht : HKCU\Software\PPStream [-] Schlüssel Gel?scht : HKCU\Software\Hola [-] Schlüssel Gel?scht : HKLM\SOFTWARE\AppDataLow\SOFTWARE\Conduit [-] Schlüssel Gel?scht : HKLM\SOFTWARE\BetterSurf [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Conduit [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Desksvc [-] Schlüssel Gel?scht : HKLM\SOFTWARE\hdcode [-] Schlüssel Gel?scht : HKLM\SOFTWARE\PIP [-] Schlüssel Gel?scht : HKLM\SOFTWARE\V9 [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Better-Surf [-] Schlüssel Gel?scht : HKLM\SOFTWARE\PPStream [-] Schlüssel Gel?scht : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PPStream [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Tarma Installer [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Hola [-] Schlüssel Gel?scht : HKU\.DEFAULT\Software\Hola [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\464AA55239C100F32AF2D438EDDC0F47 [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5652BA3D5FB98AE31B337BF0AF939856 [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\86EB95E1AFCBABE3DB9ECCC669B99494 [-] Daten Wiederhergestellt : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Page_URL] [-] Daten Wiederhergestellt : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page] [-] Schlüssel Gel?scht : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{343566E2-ABF6-4E67-B1EE-B55A940C202F} [-] Schlüssel Gel?scht : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86} [-] Daten Wiederhergestellt : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes [DefaultScope] ***** [ Internetbrowser ] ***** [-] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\prefs.js] [Preference] Gel?scht : user_pref("browser.startup.homepage", "hxxp://www.qvo6.com/?utm_source=b&utm_medium=amt&from=amt&uid=MAXTORXSTM380215A_9QZA378TXXXX9QZA378T&ts=1372356030"); [-] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\prefs.js] [Preference] Gel?scht : user_pref("browser.search.defaultenginename", "qvo6"); [-] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\prefs.js] [Preference] Gel?scht : user_pref("browser.search.order.1", "qvo6"); [-] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\prefs.js] [Preference] Gel?scht : user_pref("browser.search.selectedEngine", "qvo6"); [-] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\prefs.js] [Preference] Gel?scht : user_pref("browser.search.order.1", "qvo6"); [-] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\prefs.js] [Preference] Gel?scht : user_pref("extensions.foxlingo.addit.defaultAddons", "{ \"software\": {\"7\": {\"id\": \"7\",\"title\": \"Billeo\",\"type\": \"XPI\",\"url\": \"hxxps://addons.mozilla.org/firefox/downloads/file/103313[...] [-] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\prefs.js] [Preference] Gel?scht : user_pref("extensions.gencrawler@some.com.install-event-fired", true); [-] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\prefs.js] [Preference] Gel?scht : user_pref("extensions.plugin@getwebcake.com.install-event-fired", true); [-] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\lefxos71.default-1400349538589\prefs.js] [Preference] Gel?scht : user_pref("extensions.fvd_single.surfcanyon.ramp.start_time", "1400387151113"); ************************* :: "Tracing" Schlüssel gel?scht :: Proxy Einstellungen zurückgesetzt :: Winsock Einstellungen zurückgesetzt :: Chrome Richtlinien gel?scht ########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [9569 Bytes] ########## Code:
ATTFilter # AdwCleaner v5.029 - Bericht erstellt am 16/01/2016 um 10:53:29 # Aktualisiert am 11/01/2016 von Xplode # Datenbank : 2016-01-15.2 [Server] # Betriebssystem : Windows 7 Ultimate Service Pack 1 (x64) # Benutzername : volker - VOLKER-PC # Gestartet von : C:\Users\volker\Downloads\SPECIAL\AdwCleaner_5.029.exe # Option : Suchlauf # Unterstützung : hxxp://toolslib.net/forum ***** [ Dienste ] ***** ***** [ Ordner ] ***** Ordner Gefunden : C:\Program Files\Hola Ordner Gefunden : C:\ProgramData\Tarma Installer Ordner Gefunden : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\eSupport.com Ordner Gefunden : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Media Finder Ordner Gefunden : C:\Users\volker\AppData\Local\PackageAware Ordner Gefunden : C:\Users\volker\AppData\Roaming\eIntaller Ordner Gefunden : C:\Users\volker\AppData\Roaming\GrabPro Ordner Gefunden : C:\Users\volker\AppData\Roaming\Media Finder Ordner Gefunden : C:\Users\volker\AppData\Roaming\ProgSense Ordner Gefunden : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\Extensions\{c0c9a2c7-2e5c-4447-bc53-97718bc91e1b}.xpi Ordner Gefunden : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\Extensions\{ef62e1ce-d2a4-4cdd-b7ec-92b120366b66} Ordner Gefunden : C:\Windows\SysWOW64\C2MP ***** [ Dateien ] ***** Datei Gefunden : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\CodecPackTrayMenu.lnk Datei Gefunden : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\bb9k5o8x.devdev\user.js Datei Gefunden : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\user.js Datei Gefunden : C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\user.js ***** [ DLL ] ***** ***** [ Verknüpfungen ] ***** Verknüpfung Infiziert : C:\Users\volker\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Internet Explorer (No Add-ons).lnk ( hxxp://www.qvo6.com/?utm_source=b&utm_medium=amt&from=amt&uid=MAXTORXSTM380215A_9QZA378TXXXX9QZA378T&ts=1372356030 ) Verknüpfung Infiziert : C:\Users\volker\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Mozilla Firefox.lnk ( hxxp://www.qvo6.com/?utm_source=b&utm_medium=amt&from=amt&uid=MAXTORXSTM380215A_9QZA378TXXXX9QZA378T&ts=1372356030 ) ***** [ Aufgabenplanung ] ***** Geplante Aufgabe Gefunden : Desk 365 RunAsStdUser ***** [ Registrierungsdatenbank ] ***** Schlüssel Gefunden : HKCU\Software\Microsoft\Internet Explorer\MenuExt\Download with &Media Finder Schlüssel Gefunden : HKLM\SOFTWARE\Classes\AppID\IEPlugin.DLL Schlüssel Gefunden : HKLM\SOFTWARE\Classes\IEPlugin.IEWebHook Schlüssel Gefunden : HKLM\SOFTWARE\Classes\IEPlugin.IEWebHook.1 Schlüssel Gefunden : HKLM\SOFTWARE\Classes\MF Schlüssel Gefunden : HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Application\DeskSvc Schlüssel Gefunden : HKCU\Software\Classes\MF Wert Gefunden : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [Codec Settings UAC Manager] Schlüssel Gefunden : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\PPStream.exe Schlüssel Gefunden : HKLM\SOFTWARE\Classes\AppID\{3F39D17D-50C7-4AC4-A63A-CDF6CDBD0C61} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{35B8892D-C3FB-4D88-990D-31DB2EBD72BD} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{5EC7C511-CD0F-42E6-830C-1BD9882F3458} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{AE9908C1-3400-4B10-9061-C6C04D96E3D2} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\TypeLib\{71E3A30E-9444-49D9-ABDB-B4B531D0BBA3} Schlüssel Gefunden : HKLM\SOFTWARE\Classes\TypeLib\{93E3D79C-0786-48FF-9329-93BC9F6DC2B3} Schlüssel Gefunden : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2974C985-8151-4DE5-B23C-B875F0A8522F} Schlüssel Gefunden : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{AD4DF010-E2FD-43CE-864A-6BD1EDC59AC2} Schlüssel Gefunden : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{AD4DF010-E2FD-43CE-864A-6BD1EDC59AC2} Schlüssel Gefunden : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{2974C985-8151-4DE5-B23C-B875F0A8522F} Schlüssel Gefunden : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{4250488A-CB24-0893-C066-B1AEA57BCFF2} Schlüssel Gefunden : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{BAC94FEE-45B4-4FD4-9EEA-D8978EC96C6E} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\CLSID\{AD4DF010-E2FD-43CE-864A-6BD1EDC59AC2} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{3F607E46-0D3C-4442-B1DE-DE7FA4768F5C} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{462862BE-9A5C-49A5-9CBD-A649EAC63645} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{9EDC0C90-2B5B-4512-953E-35767BAD5C67} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{AE9908C1-3400-4B10-9061-C6C04D96E3D2} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{FE0273D1-99DF-4AC0-87D5-1371C6271785} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AD4DF010-E2FD-43CE-864A-6BD1EDC59AC2} Schlüssel Gefunden : HKCU\Software\APN PIP Schlüssel Gefunden : HKCU\Software\Conduit Schlüssel Gefunden : HKCU\Software\eSupport.com Schlüssel Gefunden : HKCU\Software\Headlight Schlüssel Gefunden : HKCU\Software\MediaFinder Schlüssel Gefunden : HKCU\Software\YahooPartnerToolbar Schlüssel Gefunden : HKCU\Software\ProgSense Schlüssel Gefunden : HKCU\Software\PPStream Schlüssel Gefunden : HKCU\Software\Hola Schlüssel Gefunden : HKLM\SOFTWARE\AppDataLow\SOFTWARE\Conduit Schlüssel Gefunden : HKLM\SOFTWARE\BetterSurf Schlüssel Gefunden : HKLM\SOFTWARE\Conduit Schlüssel Gefunden : HKLM\SOFTWARE\Desksvc Schlüssel Gefunden : HKLM\SOFTWARE\hdcode Schlüssel Gefunden : HKLM\SOFTWARE\PIP Schlüssel Gefunden : HKLM\SOFTWARE\V9 Schlüssel Gefunden : HKLM\SOFTWARE\Better-Surf Schlüssel Gefunden : HKLM\SOFTWARE\PPStream Schlüssel Gefunden : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PPStream Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Tarma Installer Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Hola Schlüssel Gefunden : HKU\.DEFAULT\Software\Hola Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\464AA55239C100F32AF2D438EDDC0F47 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5652BA3D5FB98AE31B337BF0AF939856 Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\86EB95E1AFCBABE3DB9ECCC669B99494 Daten Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Default_Page_URL] - hxxp://www.qvo6.com/?utm_source=b&utm_medium=amt&from=amt&uid=MAXTORXSTM380215A_9QZA378TXXXX9QZA378T&ts=1372356030 Daten Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page] - hxxp://www.qvo6.com/?utm_source=b&utm_medium=amt&from=amt&uid=MAXTORXSTM380215A_9QZA378TXXXX9QZA378T&ts=1372356030 Schlüssel Gefunden : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{343566E2-ABF6-4E67-B1EE-B55A940C202F} Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{33BB0A4E-99AF-4226-BDF6-49120163DE86} Daten Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes [DefaultScope] - {33BB0A4E-99AF-4226-BDF6-49120163DE86} ***** [ Internetbrowser ] ***** [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\prefs.js] [Preference] Gefunden : user_pref("browser.startup.homepage", "hxxp://www.qvo6.com/?utm_source=b&utm_medium=amt&from=amt&uid=MAXTORXSTM380215A_9QZA378TXXXX9QZA378T&ts=1372356030"); [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\prefs.js] [Preference] Gefunden : user_pref("browser.search.defaultenginename", "qvo6"); [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\prefs.js] [Preference] Gefunden : user_pref("browser.search.order.1", "qvo6"); [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\ds9rm53g.dev\prefs.js] [Preference] Gefunden : user_pref("browser.search.selectedEngine", "qvo6"); [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\prefs.js] [Preference] Gefunden : user_pref("browser.search.order.1", "qvo6"); [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\prefs.js] [Preference] Gefunden : user_pref("extensions.foxlingo.addit.defaultAddons", "{ \"software\": {\"7\": {\"id\": \"7\",\"title\": \"Billeo\",\"type\": \"XPI\",\"url\": \"hxxps://addons.mozilla.org/firefox/downloads/file/103313[...] [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\prefs.js] [Preference] Gefunden : user_pref("extensions.gencrawler@some.com.install-event-fired", true); [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\prefs.js] [Preference] Gefunden : user_pref("extensions.plugin@getwebcake.com.install-event-fired", true); [C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\lefxos71.default-1400349538589\prefs.js] [Preference] Gefunden : user_pref("extensions.fvd_single.surfcanyon.ramp.start_time", "1400387151113"); ########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt - [9434 Bytes] ########## Code:
ATTFilter ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Junkware Removal Tool (JRT) by Malwarebytes Version: 8.0.2 (01.06.2016) Operating System: Windows 7 Ultimate x64 Ran by volker (Administrator) on 16.01.2016 at 11:13:23,78 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ File System: 36 Successfully deleted: C:\ProgramData\alawarentertainment (Folder) Successfully deleted: C:\ProgramData\Start Menu\Programs\clipgrab (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\alawar (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\alawarentertainment (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\getrighttogo (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-html32-19970114 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-html40-19980424 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-html401-19991224 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-rdfa-syntax-20081014 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-smil-19980615 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-SMIL2-20051213 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-smil20-20050107 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-SMIL3-20081201 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-SVG-20010904 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-SVG11-20030114 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-xhtml-basic-20001219 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-xhtml-basic-20080729 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-xhtml-modularization-20081008 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-xhtml-print-20060920 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-xhtml1-20020801 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\REC-xml-entity-names-20100401 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\WD-MathML3-20100610 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\WD-XHTMLplusMathMLplusSVG-20020809 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\XX-MathML2-20031104 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\XX-MathML2-20031104\iso8879 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\{3b56bcc7-54e5-44a2-9b44-66c3ef58c13e}\sgml-lib\XX-xhtml11-20090630 (Folder) Successfully deleted: C:\Users\volker\AppData\Roaming\Mozilla\Firefox\Profiles\gpgxibqd.default\extensions\foxmarks@kei.com\chrome\content\newuser.js (File) Successfully deleted: C:\Users\volker\AppData\Roaming\pdfforge (Folder) Successfully deleted: C:\Windows\wininit.ini (File) Successfully deleted: C:\Users\volker\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2KQKO0J4 (Folder) Successfully deleted: C:\Users\volker\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\578U2N8U (Folder) Successfully deleted: C:\Users\volker\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\E8VNH0EQ (Folder) Successfully deleted: C:\Users\volker\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TSV8SYCQ (Folder) Successfully deleted: C:\Windows\SysWOW64\RENBA3.tmp (File) Successfully deleted: C:\Windows\SysWOW64\RENBA4.tmp (File) Successfully deleted: C:\Windows\SysWOW64\RENBA5.tmp (File) Registry: 0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Scan was completed on 16.01.2016 at 11:19:49,19 End of JRT log ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
Themen zu Win7SP1: svchost braucht 50% CPU Teil1 |
administrator, appdata, browser, clipgrab, cpu, dateien, einstellungen, explorer, firefox, folge, helper, internet, internet explorer, launch, logfiles, microsoft, mozilla, ordner, problem, proxy, prozess, rechner, server, software, svchost, tarma, windows, winsock |