| Speed9001 | 09.02.2016 16:31 | Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlaufdatum: 09.02.2016
Suchlaufzeit: 11:56:54
Protokolldatei: mbam.txt
Administrator: Ja
Version: 2.02.0.1024
Malware-Datenbank: v2016.02.09.01
Rootkit-Datenbank: v2016.02.08.01
Lizenz: Premium-Version
Malware-Schutz: Aktiviert
Schutz vor bösartigen Websites: Aktiviert
Selbstschutz: Deaktiviert
Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: Dom
Suchlauftyp: Bedrohungssuchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 389152
Abgelaufene Zeit: 12 Min., 30 Sek.
Speicher: Aktiviert
Start: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Heuristik: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 0
(keine bösartigen Elemente erkannt)
Module: 0
(keine bösartigen Elemente erkannt)
Registrierungsschlüssel: 10
PUP.Optional.Elex, HKLM\SOFTWARE\CLASSES\TYPELIB\{8DD92279-9B04-4C6F-A862-EF3C24603804}, In Quarantäne, [ecb9312dfc9d3df951d6422d2cd6f50b],
PUP.Optional.Elex, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{8DD92279-9B04-4C6F-A862-EF3C24603804}, In Quarantäne, [ecb9312dfc9d3df951d6422d2cd6f50b],
PUP.Optional.Elex, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{8DD92279-9B04-4C6F-A862-EF3C24603804}, In Quarantäne, [ecb9312dfc9d3df951d6422d2cd6f50b],
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\LAYERS\VC32LDR , In Quarantäne, [cdd861fd5742ae88d7f005fb45bf2cd4],
PUP.Optional.Linkury, HKLM\SOFTWARE\WOW6432NODE\mtdlohn, In Quarantäne, [4461da84a2f7fc3a743d400d11f345bb],
PUP.Optional.Linkury, HKLM\SOFTWARE\WOW6432NODE\mtLabtech, In Quarantäne, [7f2647176e2b2b0b24ae4011ea1a8e72],
PUP.Optional.Linkury, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SILENTPROCESSEXIT\Labtech.exe, In Quarantäne, [2f763a2466332d09ab26ea67f3114fb1],
PUP.Optional.Linkury, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\EVENTLOG\APPLICATION\Application Hosting, In Quarantäne, [b6ef0856a4f51a1cc559727be51db24e],
PUP.Optional.Linkury, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\LABTECH, In Quarantäne, [c1e479e56a2f53e36a18cb891de79070],
PUP.Optional.Komodia, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\INSTALLPATH\STATUS, In Quarantäne, [9b0a4a1468311e1859103f0c1ee6a15f],
Registrierungswerte: 11
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\LAYERS\VC32Ldr |{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, 130992196231709222, In Quarantäne, [cdd861fd5742ae88d7f005fb45bf2cd4]
PUP.Optional.Linkury, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\LABTECH|ImagePath, C:\ProgramData\\Labtech\\Labtech.exe shuz -f "C:\ProgramData\\Labtech\\Labtech.dat" -l -a, In Quarantäne, [c1e479e56a2f53e36a18cb891de79070]
PUP.Optional.RelevantKnowledge, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{3652284C-5E66-4E1A-871A-9750BA314027}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Program Files (x86)\RelevantKnowledge\rlvknlg.exe|Name=rlvknlg.exe|, In Quarantäne, [aafbce901b7e78bed1567dc04db7aa56]
PUP.Optional.RelevantKnowledge, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{E7A3D930-C326-466D-93DD-0162A1BD6571}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Program Files (x86)\RelevantKnowledge\rlvknlg.exe|Name=rlvknlg.exe|, In Quarantäne, [e8bdabb338613df9cf58310c64a0ee12]
PUP.Optional.RelevantKnowledge, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{86422A76-AC0B-4164-AD10-D2767106B329}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files (x86)\RelevantKnowledge\rlvknlg.exe|Name=rlvknlg.exe|, In Quarantäne, [c1e45b03f4a53600f235a6976b99f709]
PUP.Optional.RelevantKnowledge, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{47446EC6-C8F2-468D-A350-F01EFA7E21E1}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files (x86)\RelevantKnowledge\rlvknlg.exe|Name=rlvknlg.exe|, In Quarantäne, [d0d5abb32f6a61d56fb8f44908fcc23e]
PUP.Optional.MaxDriverUpdater, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{878ACE18-A2F7-4F66-A3A3-B47D679133CF}, v2.10|Action=Allow|Active=TRUE|Dir=In|App=C:\Program Files (x86)\Max Driver Updater\maxdu.exe|Name=MaxDriverUpdater|, In Quarantäne, [1e87c29c4f4a290da96db9876f953ac6]
PUP.Optional.Linkury, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\ENVIRONMENT|SNF, C:\ProgramData\dlohns\snp.sc, In Quarantäne, [aef77ae42673360033bc8a5a867d4ab6]
PUP.Optional.Linkury, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\ENVIRONMENT|SNP, hxxp://%66%65%65%64.%73%6E%61%70%64%6F.%63%6F%6D?publisher=APSFRec&co=DE&userid=2ef6e4b4-bc45-f7d3-9fea-e14931b1077e&searchtype=sc&installDate=07.02.2016&barcodeid=50045888&channelid=888&av=avira, In Quarantäne, [eeb71f3fb4e5171f519f8e56649fe51b]
PUP.Optional.Komodia, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\INSTALLPATH\STATUS|FlowsurfCB, P, In Quarantäne, [9b0a4a1468311e1859103f0c1ee6a15f]
PUP.Optional.DeskBar, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|DeskBar.exe, 8888, In Quarantäne, [cbda194556435bdb59780c3cc93bb14f]
Registrierungsdaten: 0
(keine bösartigen Elemente erkannt)
Ordner: 0
(keine bösartigen Elemente erkannt)
Dateien: 6
PUP.Optional.Cherimoya, C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\cherimoya.sys-k.mbam, In Quarantäne, [4c599dc11c7db77f45661ae4828254ac],
PUP.Optional.Cherimoya, C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\cherimoya.sys-r.mbam, In Quarantäne, [8520d787128772c4703b906e1aea4fb1],
PUP.Optional.Cherimoya, C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\cherimoya.sys-u.mbam, In Quarantäne, [eabb59058e0bc67093188b735ea6d729],
PUP.Optional.Elex, C:\$Recycle.Bin\S-1-5-21-1235700998-711781633-2637323769-1000\$R2V361E\ihpmServer.exe, In Quarantäne, [dfc6ec720b8e290d18b2229a9170be42],
PUP.Optional.Elex, C:\$Recycle.Bin\S-1-5-21-1235700998-711781633-2637323769-1000\$R2V361E\Raydld.exe, In Quarantäne, [802517479009d165c30a3b81a061d42c],
PUP.Optional.Linkury.ShrtCln, C:\Users\Dom\AppData\Roaming\Mozilla\Firefox\Profiles\b30g5a7z.default\prefs.js, Gut: (user_pref("browser.startup.homepage", "https://www.malwarebytes.org/restorebrowser/), Schlecht: (user_pref("browser.startup.homepage", "C:\\ProgramData\\dlohns\\ff.HP), Ersetzt,[376e9ac475242a0cd79e80891de822de]
Physische Sektoren: 0
(keine bösartigen Elemente erkannt)
(end) Code:
ESETSmartInstaller@High as downloader log:
Can not open internetESETSmartInstaller@High as downloader log:
Can not open internetESETSmartInstaller@High as downloader log:
Can not open internetCan not open internetESETSmartInstaller@High as downloader log:
Can not open internetCan not open internetESETSmartInstaller@High as downloader log:
Can not open internetCan not open internetESETSmartInstaller@High as downloader log:
Can not open internetCan not open internetESETSmartInstaller@High as downloader log:
Can not open internetCan not open internetESETSmartInstaller@High as downloader log:
Can not open internetCan not open internetESETSmartInstaller@High as downloader log:
Can not open internetCan not open internetESETSmartInstaller@High as downloader log:
Can not open internetCan not open internetESETSmartInstaller@High as downloader log:
Can not open internet# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=abe955d44d5e274f9fde3877df6c90a6
# end=init
# utc_time=2016-02-09 11:24:13
# local_time=2016-02-09 12:24:13 (+0100, Mitteleuropäische Zeit)
# country="Germany"
# osver=6.1.7601 NT Service Pack 1
Update Init
Update Download
Update Finalize
Updated modules version: 28042
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=abe955d44d5e274f9fde3877df6c90a6
# end=updated
# utc_time=2016-02-09 11:28:28
# local_time=2016-02-09 12:28:28 (+0100, Mitteleuropäische Zeit)
# country="Germany"
# osver=6.1.7601 NT Service Pack 1
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.7777
# api_version=3.1.1
# EOSSerial=abe955d44d5e274f9fde3877df6c90a6
# engine=28042
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2016-02-09 01:03:51
# local_time=2016-02-09 02:03:51 (+0100, Mitteleuropäische Zeit)
# country="Germany"
# lang=1031
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode_1=''
# compatibility_mode=5893 16776574 100 94 6022267 206652881 0 0
# scanned=377797
# found=8
# cleaned=0
# scan_time=5723
sh=6673BD9A1B2A1594E9DC61B9E70805C208FBABBA ft=1 fh=a70b5efdab44dd52 vn="Mehrere Bedrohungen" ac=I fn="C:\$Recycle.Bin\S-1-5-21-1235700998-711781633-2637323769-1000\$RVTWRAV\Uninstall_PCSpeedUp.exe"
sh=6BE0CB83D2A56A3BC4F7F802131F9358DC4EC012 ft=0 fh=0000000000000000 vn="VBS/TrojanDownloader.Agent.NSW Trojaner" ac=I fn="C:\AdwCleaner\Quarantine\C\task.vbs.vir"
sh=BCC5BB1F889EA9BE95E7F44C994F21FDEBAF02A7 ft=1 fh=d9865bc30cd837fb vn="Variante von Win32/RiskWare.Komodia.G Anwendung" ac=I fn="C:\AdwCleaner\Quarantine\C\Program Files (x86)\QuickSearch\poz.exe.vir"
sh=FBFE3294CC95A338FE68A7F79A57630DBB33CF4C ft=0 fh=0000000000000000 vn="VBS/TrojanDownloader.Agent.NSW Trojaner" ac=I fn="C:\AdwCleaner\Quarantine\C\Users\Dom\AppData\Local\Temp\task.vbs.vir"
sh=40F29CFF3A1127228DF08C722F42B1B77D2DEF15 ft=1 fh=d2e5c051dc8cb44a vn="Variante von Win32/Adware.Hicosmea.J Anwendung" ac=I fn="C:\Config.Msi\a20eb.rbf"
sh=DF7E881BBFD3523DBF2792A553101FAD11F07C4C ft=1 fh=a816dea73d4b7715 vn="Variante von Win64/Adware.Hicosmea.I Anwendung" ac=I fn="C:\Config.Msi\a20ec.rbf"
sh=812D5993E2870376E2F10BFBC40F9578818B419D ft=1 fh=bd05769236fe2510 vn="Variante von Win32/AdWare.RK.AR Anwendung" ac=I fn="C:\FRST\Quarantine\C\Windows\System32\rlls64.dll.xBAD"
sh=E5A3C100D2D0FD94482783AF2B2FF94CDFC9923F ft=1 fh=a0ddd0619a504a2e vn="Variante von Win32/Hao123.A evtl. unerwünschte Anwendung" ac=I fn="C:\Program Files (x86)\FreeTime\FormatFactory\FFModules\Package\BaiDu\hao123inst.exe" Code:
Results of screen317's Security Check version 1.009
Windows 7 Service Pack 1 x64 (UAC is enabled)
Internet Explorer 11 ``````````````Antivirus/Firewall Check:``````````````
WMI entry may not exist for antivirus; attempting automatic update. `````````Anti-malware/Other Utilities Check:`````````
Java 8 Update 71
Java version 32-bit out of Date!
Adobe Flash Player 20.0.0.286
Mozilla Firefox (44.0) ````````Process Check: objlist.exe by Laurent````````
Malwarebytes Anti-Malware mbamservice.exe
Malwarebytes Anti-Malware mbam.exe
Malwarebytes Anti-Malware mbamscheduler.exe `````````````````System Health check`````````````````
Total Fragmentation on Drive C: ````````````````````End of Log`````````````````````` |