Zurück   Trojaner-Board > Malware entfernen > Plagegeister aller Art und deren Bekämpfung

Plagegeister aller Art und deren Bekämpfung: Chinesische Zeichen in den zuletzt verwendeten Dateien. Speicherort Desktop

Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen.

 
Alt 03.10.2018, 12:47   #5
Sony2591
 
Chinesische Zeichen in den zuletzt verwendeten Dateien. Speicherort Desktop - Standard

Chinesische Zeichen in den zuletzt verwendeten Dateien. Speicherort Desktop



## -------------------------------
# Malwarebytes AdwCleaner 7.2.3.1
# -------------------------------
# Build: 09-03-2018
# Database: (Cloud)
# Support: https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Clean
# -------------------------------
# Start: 09-30-2018
# Duration: 00:00:23
# OS: Windows 10 Home
# Cleaned: 80
# Failed: 1


***** [ Services ] *****

Deleted IMFservice
Deleted AdvancedSystemCareService11

***** [ Folders ] *****

Deleted C:\ProgramData\Pokki
Deleted C:\Users\Public\Pokki
Deleted C:\Users\Sonja\AppData\Local\Pokki
Deleted C:\ProgramData\IObit\Advanced SystemCare V8
Deleted C:\Program Files (x86)\Common Files\IObit\Advanced SystemCare V8
Deleted C:\Users\Sonja\AppData\LocalLow\IObit\Advanced SystemCare V8
Deleted C:\Users\Sonja\AppData\Roaming\IObit\Advanced SystemCare V8
Deleted C:\ProgramData\IObit\Advanced SystemCare
Not Deleted C:\Program Files (x86)\IObit\Advanced SystemCare
Deleted C:\Program Files (x86)\Common Files\IObit\Advanced SystemCare
Deleted C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\IObit\Advanced SystemCare
Deleted C:\Users\Sonja\AppData\LocalLow\IObit\Advanced SystemCare
Deleted C:\Users\Sonja\AppData\Roaming\IObit\Advanced SystemCare
Deleted C:\Program Files\Booking.com
Deleted C:\Users\Sonja\AppData\Local\Downloaded Installations\{DAD82379-C684-4D04-83D5-2B9934A9C362}
Deleted C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Advanced SystemCare
Deleted C:\Users\Sonja\AppData\Local\SweetLabs App Platform

***** [ Files ] *****

Deleted C:\Users\Sonja\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Advanced SystemCare 11.lnk
Deleted C:\Users\Public\Desktop\Advanced SystemCare 11.lnk
Deleted C:\Windows\System32\REGISTRYDEFRAGBOOTTIME.EXE
Deleted C:\Users\Sonja\AppData\Roaming\Mozilla\Firefox\Profiles\gbdm7i0w.default\invalidprefs.js
Deleted C:\Windows\System32\LavasoftTcpService64.dll
Deleted C:\Windows\System32\LavasoftTcpServiceOff.ini
Deleted C:\Windows\SysWOW64\LavasoftTcpServiceOff.ini
Deleted C:\Windows\SysWOW64\lavasofttcpservice.dll
Deleted C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PC App Store.lnk

***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

Deleted C:\Windows\System32\Tasks\ASC11_SKIPUAC_SONJA
Deleted C:\Windows\System32\Tasks\ASC11_PerformanceMonitor
Deleted C:\Windows\System32\Tasks\Driver Booster Scheduler

***** [ Registry ] *****

Deleted HKCU\Software\SweetLabs App Platform
Deleted HKCU\Software\Classes\lnkfile\shell\pokki
Deleted HKCU\Software\Classes\Drive\shell\pokki
Deleted HKCU\Software\Classes\Directory\shell\pokki
Deleted HKCU\Software\Classes\AllFileSystemObjects\shell\pokki
Deleted HKCU\Software\Classes\pokki
Deleted HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{2E155179-EA48-431C-A549-38E6119EE5AE}#
Deleted HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2E155179-EA48-431C-A549-38E6119EE5AE}#
Deleted HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\ASC11_SkipUac_Sonja
Deleted HKCU\Software\Microsoft\Windows\CurrentVersion\Run|Advanced SystemCare 11
Deleted HKLM\Software\Wow6432Node\IObit\RealTimeProtector
Deleted HKCU\Software\IObit\Advanced SystemCare
Deleted HKLM\Software\Wow6432Node\IObit\Advanced SystemCare
Deleted HKLM\Software\Wow6432Node\IOBIT\ASC
Deleted HKLM\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\Advanced SystemCare
Deleted HKLM\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\Advanced SystemCare
Deleted HKLM\Software\Wow6432Node\Google\Chrome\NativeMessagingHosts\com.ascplugin.protect
Deleted HKLM\SOFTWARE\CLASSES\LNKFILE\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
Deleted HKLM\SOFTWARE\CLASSES\DRIVE\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
Deleted HKLM\SOFTWARE\CLASSES\DIRECTORY\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
Deleted HKLM\Software\Wow6432Node\Classes\TypeLib\{60AD0991-ECD4-49DC-B170-8B7E7C60F51B}
Deleted HKLM\Software\Classes\TypeLib\{60AD0991-ECD4-49DC-B170-8B7E7C60F51B}
Deleted HKLM\Software\Classes\CLSID\{2803063F-4B8D-4dc6-8874-D1802487FE2D}
Deleted HKLM\Software\Wow6432Node\Classes\Interface\{BA935377-E17C-4475-B1BF-DE3110613A99}
Deleted HKLM\Software\Classes\Interface\{BA935377-E17C-4475-B1BF-DE3110613A99}
Deleted HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{3EAF510E-EAC1-4BD3-BB49-354E73CB10EF}#
Deleted HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\ASC11_PerformanceMonitor
Deleted HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\chip 1-click download service
Deleted HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced SystemCare_is1
Deleted HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\SweetLabs_AP
Deleted HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{BA0C978D-D909-49B6-AFE2-8BDE245DC7E6}
Deleted HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BA0C978D-D909-49B6-AFE2-8BDE245DC7E6}
Deleted HKLM\Software\Wow6432Node\Classes\CLSID\{BA0C978D-D909-49B6-AFE2-8BDE245DC7E6}
Deleted HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{44708F83-451F-4E77-91EA-B288C4762ED1}
Deleted HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{BEAB0BC1-3AAA-4135-BBE4-AE73FD71B3F2}
Deleted HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{041156AB-62BE-4189-9422-7A2214D09F8E}#
Deleted HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Driver Booster Scheduler
Deleted HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}
Deleted HKCU\Software\Microsoft\Internet Explorer\Main|Start Page
Deleted HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AA9A4890-4262-4441-8977-E2FFCBFB706C}
Deleted HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{AA9A4890-4262-4441-8977-E2FFCBFB706C}
Deleted HKLM\Software\Microsoft\Internet Explorer\SearchScopes\{AA9A4890-4262-4441-8977-E2FFCBFB706C}
Deleted HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0A35EA1B-78C8-11E5-8269-3065EC70842C}
Deleted HKCU\Software\Microsoft\Internet Explorer\DOMStorage\cdn.castplatform.com
Deleted HKCU\Software\Microsoft\Internet Explorer\DOMStorage\castplatform.com
Deleted HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
Deleted HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
Deleted HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
Deleted HKLM\SYSTEM\Setup\FirstBoot\Services\WCAssistantService

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries cleaned.

***** [ Chromium URLs ] *****

No malicious Chromium URLs cleaned.

***** [ Firefox (and derivatives) ] *****

Deleted IObit Surfing Protection & Ads Removal

***** [ Firefox URLs ] *****

No malicious Firefox URLs cleaned.


*************************

[+] Delete Tracing Keys
[+] Reset Chromium Policies
[+] Reset IE Policies
[+] Reset Proxy Settings
[+] Reset Winsock

*************************

AdwCleaner[S00].txt - [9422 octets] - [30/09/2018 12:52:33]

########## EOF - C:\AdwCleaner\Logs\AdwCleaner[C00].txt ##########

# -------------------------------
# Malwarebytes AdwCleaner 7.2.4.0
# -------------------------------
# Build: 09-25-2018
# Database: 2018-09-24.1 (Cloud)
# Support: https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Clean
# -------------------------------
# Start: 09-30-2018
# Duration: 00:00:01
# OS: Windows 10 Home
# Cleaned: 1
# Failed: 0


***** [ Services ] *****

No malicious services cleaned.

***** [ Folders ] *****

Deleted C:\Program Files (x86)\IObit\Advanced SystemCare

***** [ Files ] *****

No malicious files cleaned.

***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

No malicious tasks cleaned.

***** [ Registry ] *****

No malicious registry entries cleaned.

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries cleaned.

***** [ Chromium URLs ] *****

No malicious Chromium URLs cleaned.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries cleaned.

***** [ Firefox URLs ] *****

No malicious Firefox URLs cleaned.


*************************

[+] Delete Prefetch
[+] Delete Tracing Keys
[+] Reset Chromium Policies
[+] Reset IE Policies
[+] Reset Proxy Settings
[+] Reset Winsock

*************************

AdwCleaner[S00].txt - [9422 octets] - [30/09/2018 12:52:33]
AdwCleaner[C00].txt - [8216 octets] - [30/09/2018 12:53:10]
AdwCleaner[S01].txt - [1425 octets] - [30/09/2018 13:02:49]

########## EOF - C:\AdwCleaner\Logs\AdwCleaner[C01].txt ##########

# -------------------------------
# Malwarebytes AdwCleaner 7.2.3.1
# -------------------------------
# Build: 09-03-2018
# Database: (Cloud)
# Support: https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Scan
# -------------------------------
# Start: 09-30-2018
# Duration: 00:00:20
# OS: Windows 10 Home
# Scanned: 41933
# Detected: 81


***** [ Services ] *****

PUP.Optional.AdvancedSystemCare IMFservice
PUP.Optional.AdvancedSystemCare AdvancedSystemCareService11

***** [ Folders ] *****

Adware.pokki C:\ProgramData\Pokki
Adware.pokki C:\Users\Public\Pokki
Adware.pokki C:\Users\Sonja\AppData\Local\Pokki
PUP.Optional.AdvancedSystemCare C:\ProgramData\IObit\Advanced SystemCare V8
PUP.Optional.AdvancedSystemCare C:\Program Files (x86)\Common Files\IObit\Advanced SystemCare V8
PUP.Optional.AdvancedSystemCare C:\Users\Sonja\AppData\LocalLow\IObit\Advanced SystemCare V8
PUP.Optional.AdvancedSystemCare C:\Users\Sonja\AppData\Roaming\IObit\Advanced SystemCare V8
PUP.Optional.AdvancedSystemCare C:\ProgramData\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare C:\Program Files (x86)\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare C:\Program Files (x86)\Common Files\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare C:\Users\Sonja\AppData\LocalLow\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare C:\Users\Sonja\AppData\Roaming\IObit\Advanced SystemCare
PUP.Optional.Booking C:\Program Files\Booking.com
PUP.Optional.Chip C:\Users\Sonja\AppData\Local\Downloaded Installations\{DAD82379-C684-4D04-83D5-2B9934A9C362}
PUP.Optional.Legacy C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Advanced SystemCare
PUP.Optional.Legacy C:\Users\Sonja\AppData\Local\SweetLabs App Platform

***** [ Files ] *****

PUP.Optional.AdvancedSystemCare C:\Users\Sonja\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\Advanced SystemCare 11.lnk
PUP.Optional.AdvancedSystemCare C:\Users\Public\Desktop\Advanced SystemCare 11.lnk
PUP.Optional.AdvancedSystemCare C:\Windows\System32\REGISTRYDEFRAGBOOTTIME.EXE
PUP.Optional.Legacy C:\Users\Sonja\AppData\Roaming\Mozilla\Firefox\Profiles\gbdm7i0w.default\invalidprefs.js
PUP.Optional.Legacy C:\Windows\System32\LavasoftTcpService64.dll
PUP.Optional.Legacy C:\Windows\System32\LavasoftTcpServiceOff.ini
PUP.Optional.Legacy C:\Windows\SysWOW64\LavasoftTcpServiceOff.ini
PUP.Optional.Legacy C:\Windows\SysWOW64\lavasofttcpservice.dll
PUP.Optional.PCAppStore C:\Users\Sonja\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PC App Store.lnk

***** [ DLL ] *****

No malicious DLLs found.

***** [ WMI ] *****

No malicious WMI found.

***** [ Shortcuts ] *****

No malicious shortcuts found.

***** [ Tasks ] *****

PUP.Adware.Heuristic C:\Windows\System32\Tasks\ASC11_SKIPUAC_SONJA
PUP.Optional.AdvancedSystemCare C:\Windows\System32\Tasks\ASC11_PerformanceMonitor
PUP.Optional.Legacy C:\Windows\System32\Tasks\Driver Booster Scheduler

***** [ Registry ] *****

Adware.pokki HKCU\Software\SweetLabs App Platform
Adware.pokki HKCU\Software\Classes\lnkfile\shell\pokki
Adware.pokki HKCU\Software\Classes\Drive\shell\pokki
Adware.pokki HKCU\Software\Classes\Directory\shell\pokki
Adware.pokki HKCU\Software\Classes\AllFileSystemObjects\shell\pokki
Adware.pokki HKCU\Software\Classes\pokki
PUP.Adware.Heuristic HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{2E155179-EA48-431C-A549-38E6119EE5AE}#
PUP.Adware.Heuristic HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2E155179-EA48-431C-A549-38E6119EE5AE}#
PUP.Adware.Heuristic HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\ASC11_SkipUac_Sonja
PUP.Optional.AdvancedSystemCare HKCU\Software\Microsoft\Windows\CurrentVersion\Run|Advanced SystemCare 11
PUP.Optional.AdvancedSystemCare HKLM\Software\Wow6432Node\IObit\RealTimeProtector
PUP.Optional.AdvancedSystemCare HKCU\Software\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare HKLM\Software\Wow6432Node\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare HKLM\Software\Wow6432Node\IOBIT\ASC
PUP.Optional.AdvancedSystemCare HKLM\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\Advanced SystemCare
PUP.Optional.AdvancedSystemCare HKLM\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\Advanced SystemCare
PUP.Optional.AdvancedSystemCare HKLM\Software\Wow6432Node\Google\Chrome\NativeMessagingHosts\com.ascplugin.protect
PUP.Optional.AdvancedSystemCare HKLM\SOFTWARE\CLASSES\LNKFILE\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
PUP.Optional.AdvancedSystemCare HKLM\SOFTWARE\CLASSES\DRIVE\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
PUP.Optional.AdvancedSystemCare HKLM\SOFTWARE\CLASSES\DIRECTORY\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
PUP.Optional.AdvancedSystemCare HKLM\Software\Wow6432Node\Classes\TypeLib\{60AD0991-ECD4-49DC-B170-8B7E7C60F51B}
PUP.Optional.AdvancedSystemCare HKLM\Software\Classes\TypeLib\{60AD0991-ECD4-49DC-B170-8B7E7C60F51B}
PUP.Optional.AdvancedSystemCare HKLM\Software\Classes\CLSID\{2803063F-4B8D-4dc6-8874-D1802487FE2D}
PUP.Optional.AdvancedSystemCare HKLM\Software\Wow6432Node\Classes\Interface\{BA935377-E17C-4475-B1BF-DE3110613A99}
PUP.Optional.AdvancedSystemCare HKLM\Software\Classes\Interface\{BA935377-E17C-4475-B1BF-DE3110613A99}
PUP.Optional.AdvancedSystemCare HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{3EAF510E-EAC1-4BD3-BB49-354E73CB10EF}#
PUP.Optional.AdvancedSystemCare HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\ASC11_PerformanceMonitor
PUP.Optional.Chip HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\chip 1-click download service
PUP.Optional.Legacy HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Advanced SystemCare_is1
PUP.Optional.Legacy HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\SweetLabs_AP
PUP.Optional.Legacy HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{BA0C978D-D909-49B6-AFE2-8BDE245DC7E6}
PUP.Optional.Legacy HKLM\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BA0C978D-D909-49B6-AFE2-8BDE245DC7E6}
PUP.Optional.Legacy HKLM\Software\Wow6432Node\Classes\CLSID\{BA0C978D-D909-49B6-AFE2-8BDE245DC7E6}
PUP.Optional.Legacy HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{44708F83-451F-4E77-91EA-B288C4762ED1}
PUP.Optional.Legacy HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules|{BEAB0BC1-3AAA-4135-BBE4-AE73FD71B3F2}
PUP.Optional.Legacy HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{041156AB-62BE-4189-9422-7A2214D09F8E}#
PUP.Optional.Legacy HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Driver Booster Scheduler
PUP.Optional.Legacy HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}
PUP.Optional.Legacy HKCU\Software\Microsoft\Internet Explorer\Main|Start Page
PUP.Optional.Legacy HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{AA9A4890-4262-4441-8977-E2FFCBFB706C}
PUP.Optional.Legacy HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{AA9A4890-4262-4441-8977-E2FFCBFB706C}
PUP.Optional.Legacy HKLM\Software\Microsoft\Internet Explorer\SearchScopes\{AA9A4890-4262-4441-8977-E2FFCBFB706C}
PUP.Optional.Legacy HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0A35EA1B-78C8-11E5-8269-3065EC70842C}
PUP.Optional.SlimCleanerPlus HKCU\Software\Microsoft\Internet Explorer\DOMStorage\cdn.castplatform.com
PUP.Optional.SlimCleanerPlus HKCU\Software\Microsoft\Internet Explorer\DOMStorage\castplatform.com
PUP.Optional.WebCompanion HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
PUP.Optional.WebCompanion HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
PUP.Optional.WebCompanion HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\webcompanion.com
PUP.Optional.WebCompanion HKLM\SYSTEM\Setup\FirstBoot\Services\WCAssistantService

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries found.

***** [ Chromium URLs ] *****

No malicious Chromium URLs found.

***** [ Firefox (and derivatives) ] *****

PUP.Optional.AdvancedSystemCare IObit Surfing Protection & Ads Removal

***** [ Firefox URLs ] *****

No malicious Firefox URLs found.



########## EOF - C:\AdwCleaner\Logs\AdwCleaner[S00].txt ##########

# -------------------------------
# Malwarebytes AdwCleaner 7.2.4.0
# -------------------------------
# Build: 09-25-2018
# Database: 2018-09-24.1 (Cloud)
# Support: https://www.malwarebytes.com/support
#
# -------------------------------
# Mode: Scan
# -------------------------------
# Start: 09-30-2018
# Duration: 00:00:20
# OS: Windows 10 Home
# Scanned: 42059
# Detected: 1


***** [ Services ] *****

No malicious services found.

***** [ Folders ] *****

PUP.Optional.AdvancedSystemCare C:\Program Files (x86)\IObit\Advanced SystemCare

***** [ Files ] *****

No malicious files found.

***** [ DLL ] *****

No malicious DLLs found.

***** [ WMI ] *****

No malicious WMI found.

***** [ Shortcuts ] *****

No malicious shortcuts found.

***** [ Tasks ] *****

No malicious tasks found.

***** [ Registry ] *****

No malicious registry entries found.

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries found.

***** [ Chromium URLs ] *****

No malicious Chromium URLs found.

***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries found.

***** [ Firefox URLs ] *****

No malicious Firefox URLs found.


AdwCleaner[S00].txt - [9422 octets] - [30/09/2018 12:52:33]
AdwCleaner[C00].txt - [8216 octets] - [30/09/2018 12:53:10]

########## EOF - C:\AdwCleaner\Logs\AdwCleaner[S01].txt ##########

Das mit dem # setzen, dass dann automatisch eckige Klammern kommen klappt irgendwie nicht...

Den Mb3 Log finde ich nicht. Soll ich den nochmal machen?


 

Themen zu Chinesische Zeichen in den zuletzt verwendeten Dateien. Speicherort Desktop
anwendungen, auf einmal, chinesische, chinesische zeichen, dateien, desktop, explorer, gen, nicht, posts, seite, speicherort, startseite, stehe, suche, thema, unter, versuch, versucht, zeichen, zuletzt, zuletzt verwendete dateien




Ähnliche Themen: Chinesische Zeichen in den zuletzt verwendeten Dateien. Speicherort Desktop


  1. Chinesische Zeichen in zuletzt verwendete Dateien WIN 10 und häufig BSoD - Defender findet nichts
    Plagegeister aller Art und deren Bekämpfung - 23.03.2018 (13)
  2. Win10: Chinesische Schriftzeichen als Dateibezeichnung unter "Zuletzt verwendete Dateien"
    Plagegeister aller Art und deren Bekämpfung - 28.08.2017 (21)
  3. Chinesische Schriftzeichen in Zuletzt verwendeten Dateien ( WIN 10 )
    Plagegeister aller Art und deren Bekämpfung - 06.04.2017 (20)
  4. Chinesische Zeichen Beim Öffnen von Menüs/Ordnern/Dateien mit der Rechten Maustaste
    Log-Analyse und Auswertung - 03.02.2017 (7)
  5. WIN10 Zuletzt kopierte Dateien finden
    Alles rund um Windows - 20.09.2016 (11)
  6. Chinesische Schriftzeichen in zuletzt verwendeten Dateien ( WIN 10 )
    Plagegeister aller Art und deren Bekämpfung - 31.08.2016 (9)
  7. Laptop sehr langsam und chinesische Zeichen
    Plagegeister aller Art und deren Bekämpfung - 02.06.2016 (2)
  8. Tencent qq, chinesische Zeichen ect. wie kann ich den deinstallieren?
    Log-Analyse und Auswertung - 25.05.2016 (2)
  9. Chinesische Datei in "Zuletzt verwendete Dateien"
    Log-Analyse und Auswertung - 09.01.2016 (2)
  10. Windows 7, Dienste, Chinesische Zeichen, Status beendet
    Log-Analyse und Auswertung - 11.10.2015 (17)
  11. Merkwürdige Dateien unter Zuletzt verwendet
    Plagegeister aller Art und deren Bekämpfung - 25.09.2015 (1)
  12. Chinesische Zeichen bei Booking.com
    Plagegeister aller Art und deren Bekämpfung - 05.08.2015 (30)
  13. "Oursurfing" Virus und Chinesische Zeichen Reloaded
    Plagegeister aller Art und deren Bekämpfung - 03.08.2015 (12)
  14. "Oursurfing" Virus und Chinesische Zeichen
    Plagegeister aller Art und deren Bekämpfung - 11.05.2015 (20)
  15. Windows 8; Chinesische Zeichen; Dienste
    Log-Analyse und Auswertung - 24.11.2014 (17)
  16. Dateien mit "kryptischen" u. chinesische Zeichen verfolgen Registry MRUListEx
    Log-Analyse und Auswertung - 20.12.2013 (12)
  17. Komische Zeichen tauchen von selbst als Verknüpfungen unter "Zuletzt Verwendet" auf
    Plagegeister aller Art und deren Bekämpfung - 14.06.2013 (25)

Zum Thema Chinesische Zeichen in den zuletzt verwendeten Dateien. Speicherort Desktop - ## ------------------------------- # Malwarebytes AdwCleaner 7.2.3.1 # ------------------------------- # Build: 09-03-2018 # Database: (Cloud) # Support: https://www.malwarebytes.com/support # # ------------------------------- # Mode: Clean # ------------------------------- # Start: 09-30-2018 # Duration: - Chinesische Zeichen in den zuletzt verwendeten Dateien. Speicherort Desktop...
Archiv
Du betrachtest: Chinesische Zeichen in den zuletzt verwendeten Dateien. Speicherort Desktop auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.