Hi,
ok..
In the case of the process I thought I have read anywhere, if no company's name stands in front, that would be a warning signal.
EDIT: Would it be possible, that this process got hijacked?As with the registry there is then nothing to do, too. The Startup items are mostly trusted, but I was wondering about their appearance on the list.
EDIT: Ok, something better to leave alone. I'm trusting all of them, but from some of these items (below) I know how easy and how open they get infected.
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Fehlerquellen beheben.bat - Verknüpfung.lnk [2017-10-25]
ShortcutTarget: Fehlerquellen beheben.bat - Verknüpfung.lnk -> C:\Users\praxis\Kurzeinführung Fehlermanagement\Fehlerquellen beheben.bat ()
ShortcutTarget: hevos.lnk -> C:\Program Files (x86)\henova GmbH\hevos\Hevos.GUI.Client.exe (Henova GmbH)
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\login.bat - Verknüpfung.lnk [2017-08-02]
ShortcutTarget: login.bat - Verknüpfung.lnk -> C:\Users\login.bat ()
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\NetScaler Gateway.lnk [2017-10-18]
In case of the hosts file I will just believe that from you, the NameServer, dumb mistake..
EDIT: You mean the host file entries? Yes, I cannot remember seeing them in the log of PCSRV. Nevertheless I didn't get why the hosts file is somewhere it doesn't belong?
Oh, ok then better not removing. Yes, diverse browser extensions, but I took now a deeper look and things like Java or the Office plugins, yes makes sense, but is the rest not at least useless? Or take a nearer look of the first two elements in IE, hxxp?!
EDIT: Maybe I can deliver something like that, don't know if you can make use of it.
Ok so far:
As with drivers there is only this one suspicious:
S0 wjtvys; kein ImagePath
As with the 'Created' and 'Modified' Files/Folders 1st: Does it make sense to unhide the hidden system files?
And, is it right that an object should be checked if there's no company name and no attribute letter, especially when it's in the Windows folder?
That would match only for a few:
C:\Windows\DOCFEST.INI
C:\Users\Public\Desktop\ESET Sicheres Online-Banking und Bezahlen.lnk
C:\Users\praxis\Desktop\smadav.1log.txt
C:\Users\praxis\Downloads\Lisa (1).pdf
C:\Users\praxis\Downloads\Lisa.pdf
C:\Windows\system32\Drivers\etc\hosts.20171023-194230.backup
C:\Windows\system32\administration.bat
C:\Windows\system32\Fehlerquellen beheben.bat
C:\Windows\system32\close.bat
C:\Windows\system32\auxiliary.bat
C:\Windows\SysWOW64\uninst.exe
And them:
C:\Windows\ZAM.krnl.trace
C:\Windows\ZAM_Guard.krnl.trace
C:\Windows\system32\perfh007.dat
C:\Windows\system32\perfc007.dat
C:\Windows\system32\PerfStringBackup.INI
C:\Users\praxis\Desktop\Fehlerquellen beheben.bat - Verknüpfung.lnk
C:\Windows\system32\Drivers\TrueSight.sys
C:\Windows\system32\FNTCACHE.DAT
C:\Windows\SysWOW64\PerfStringBackup.INI
C:\Users\Public\Desktop\x.servicecenter.lnk
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\x.comfort Word-Assistent.lnk
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\comfort.lnk
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\medatixx Fernservice.lnk
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Google Chrome.lnk
C:\Users\Public\Desktop\Google Chrome.lnk
Or, if we substract user modified ones, this is what remains:
C:\Windows\DOCFEST.INI
C:\Windows\system32\Drivers\etc\hosts.20171023-194230.backup
C:\Windows\SysWOW64\uninst.exe
C:\Windows\ZAM.krnl.trace
C:\Windows\ZAM_Guard.krnl.trace
C:\Windows\system32\perfh007.dat
C:\Windows\system32\perfc007.dat
C:\Windows\system32\PerfStringBackup.INI
C:\Windows\system32\Drivers\TrueSight.sys
C:\Windows\system32\FNTCACHE.DAT
C:\Windows\SysWOW64\PerfStringBackup.INI
Then the section with Root Directory, which meaning does it have, when something is listed there?
2017-08-02 20:26 - 2017-08-02 20:26 - 000000779 _____ () C:\Users\praxis\AppData\Roaming\gdscan.log
2017-08-02 19:25 - 2017-08-02 19:25 - 000361646 _____ () C:\ProgramData\ds_update.log
2017-08-02 19:21 - 2017-08-02 19:21 - 000000132 _____ () C:\ProgramData\Microsoft.SqlServer.Compact.351.32.bc
2017-03-15 09:01 - 2017-03-15 09:01 - 000010272 _____ () C:\ProgramData\regid.2013-04.medatixx.de,softwareproduktion_85D1FE7C-C5B0-451C-9C29-234CAEA6DEBA.swidtag
2017-03-15 09:02 - 2017-03-15 09:02 - 000010268 _____ () C:\ProgramData\regid.2013-04.medatixx.de,softwareproduktion_DFCF6231-755B-44A8-87E4-A38B5FAFB29F.swidtag
I know the listed TEMP folder content does not have to be malware, but isn't it safer to delete this or do I have any advantage of it?
2017-10-23 17:43 - 2017-09-13 17:31 - 001732864 _____ (Microsoft Corporation) C:\Users\praxis\AppData\Local\Temp\dllnt_dump.dll
2017-08-08 11:20 - 2017-08-08 11:20 - 000271872 ____N (Kohsuke Kawaguchi) C:\Users\praxis\AppData\Local\Temp\native-helpler-4037951261073866670-com4j-x86.dll
And, at last, I didn't got it really what it have with the Bamital & Volsnap section on it..
==================== Bamital & volsnap ======================
(Es ist kein automatischer Fix für Dateien vorhanden, die an der Verifikation gescheitert sind.)
C:\Windows\system32\winlogon.exe => Datei ist digital signiert
C:\Windows\system32\wininit.exe => Datei ist digital signiert
C:\Windows\SysWOW64\wininit.exe => Datei ist digital signiert
C:\Windows\explorer.exe => Datei ist digital signiert
C:\Windows\SysWOW64\explorer.exe => Datei ist digital signiert
C:\Windows\system32\svchost.exe => Datei ist digital signiert
C:\Windows\SysWOW64\svchost.exe => Datei ist digital signiert
C:\Windows\system32\services.exe => Datei ist digital signiert
C:\Windows\system32\User32.dll => Datei ist digital signiert
C:\Windows\SysWOW64\User32.dll => Datei ist digital signiert
C:\Windows\system32\userinit.exe => Datei ist digital signiert
C:\Windows\SysWOW64\userinit.exe => Datei ist digital signiert
C:\Windows\system32\rpcss.dll => Datei ist digital signiert
C:\Windows\system32\dnsapi.dll => Datei ist digital signiert
C:\Windows\SysWOW64\dnsapi.dll => Datei ist digital signiert
C:\Windows\system32\Drivers\volsnap.sys => Datei ist digital signiert
I'm not really leaning wide out of the window saying that 'volsnap.sys' is kind of suspicious?
Also, the two 'dnsapi.dll' detections, I think I've seen them in an example log of Farbar in this section.
Or did all of them not passed verification?
Gets more and more complicated, but I still got more possibilities, the problem finally has to be somewhere.