Hallo Thecla, we kijken verder: graag de twee logs in n keer posten - gebruik de tools in de volgorde zoals aangegeven.
Stap 1
Download
Junkware Removal Tool by Thisisu.
Downloadlokatie: Dit programma absoluut naar het bureaublad downloaden of anders naar het bureaublad verplaatsen!
Opmerkingen:
- Alle openstaande programma's en webpagina's dienen afgesloten te zijn.
- Het is raadzaam de actieve beveiligingssoftware te de-activeren, zodat mogelijke conflicten met JRT.exe uitgsloten worden.:
- Hier en hier vindt je gegevens hoe antivirusprogramma's en spywarescanners te deaktiveren.
- Dat tijdens de scan van JRT.exe tijdelijk de snelkoppelingen verdwijnen van het bureaublad, is normaal.
Junkware Removal Tool by Thisisu opstarten:
- Windows 2000 en Windows XP: dubbelklik op JRT.exe.
- Windows Vista, Windows 7, Windows 8 en Windows 10: via rechtsklik op JRT.exe en kies voor "Als Administrator uitvoeren".
- JRT.exe zal daarna Windows gaan scannen.
- Deze scan kan afhankelijk van de systeemspecificaties soms vrij lang duren, wees dus geduldig.
- Indien de scan voltooid is, zal een logje (JRT.txt) op het bureaublad opgeslagen worden en automatisch openen.
- Post de inhoud van dit log in je volgende bericht.
Stap 2
Download
AdwCleaner by Xplode.
Downloadlokatie: Dit programma absoluut naar het bureaublad downloaden of anders naar het bureaublad verplaatsen!
Opmerkingen:
- Alle openstaande programma's en webpagina's dienen afgesloten te zijn.
AdwCleaner opstarten:
- Windows 2000 en Windows XP: dubbelklik op adwcleaner.exe.
- Windows Vista, Windows 7, Windows 8 en Windows 10: via rechtsklik op adwcleaner.exe en kies voor "Als Administrator uitvoeren".
AdwCleaner is opgestart:
- Klik op de knop Scan
- Is de scan gereed, klik dan op de knop Verwijderen
- Klik bij AdwCleaner Afsluiting van de programma's op OK
- Klik bij AdwCleaner Herstarten noodzakelijk op OK
AdwCleaner logbestand:
- Nadat de PC opnieuw is opgestart, opent een logfile.
- Ingeval het log niet opent, is dit alsnog terug te vinden in C:\AdwCleaner\AdwCleaner[R0, of 1, of 2].txt
- Post vervolgens de inhoud van dit log in je volgende bericht.
Logbestand JRT
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.0.7 (07.03.2016)
Operating System: Windows 10 Home x86
Ran by Thecla (Administrator) on do 18-08-2016 at 17:55:10,09
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
File System: 9
Successfully deleted: C:\ProgramData\freerip (Folder)
Successfully deleted: C:\WINDOWS\System32\Tasks\DSite (Task)
Successfully deleted: C:\Program Files\freerip3 (Folder)
Successfully deleted: C:\WINDOWS\prefetch\DRIVERTOOLKIT.EXE-B925D8FF.pf (File)
Successfully deleted: C:\WINDOWS\prefetch\DRIVERTOOLKITINSTALLER.TMP-0C68DC4A.pf (File)
Successfully deleted: C:\WINDOWS\prefetch\DRIVERTOOLKITINSTALLER.TMP-15D2D9BC.pf (File)
Successfully deleted: C:\WINDOWS\prefetch\DRIVERTOOLKITINSTALLER.TMP-184D7914.pf (File)
Successfully deleted: C:\WINDOWS\prefetch\DRIVERTOOLKITINSTALLER.TMP-63F311C5.pf (File)
Successfully deleted: C:\WINDOWS\prefetch\DRIVERUPDATER.EXE-30FCA343.pf (File)
Registry: 2
Successfully deleted: HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0191A6B0-1154-4C22-9182-23A95BBE92D9} (Registry Key)
Successfully deleted: HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{67A2568C-7A0A-4EED-AECC-B5405DE63B64} (Registry Key)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on do 18-08-2016 at 17:59:31,24
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Logbestanden ADWcleaner
Bestand C0
# AdwCleaner v6.000 - Logfile created 18/08/2016 at 18:19:46
# Updated on 12/08/2016 by ToolsLib
# Database : 2016-08-18.2 [Server]
# Operating System : Windows 10 Home (X86)
# Username : Thecla - USER-PC
# Running from : C:\Users\Thecla\Downloads\adwcleaner_6.000.exe
# Mode: Clean
# Support :
https://toolslib.net/forum
***** [ Services ] *****
***** [ Folders ] *****
[-] Folder deleted: C:\Users\user\AppData\Local\VirtualStore\Program Files\Convesoft
[-] Folder deleted: C:\WINDOWS\system32\Tasks\TweakBit
[#] Folder deleted on reboot: C:\WINDOWS\system32\Tasks\TweakBit
***** [ Files ] *****
***** [ DLL ] *****
Logbestand S1
# AdwCleaner v6.000 - Logfile created 18/08/2016 at 18:18:48
# Updated on 12/08/2016 by ToolsLib
# Database : 2016-08-18.2 [Server]
# Operating System : Windows 10 Home (X86)
# Username : Thecla - USER-PC
# Running from : C:\Users\Thecla\Downloads\adwcleaner_6.000.exe
# Mode: Scan
# Support :
https://toolslib.net/forum
***** [ Services ] *****
No malicious services found.
***** [ Folders ] *****
Folder Found: C:\Users\user\AppData\Local\VirtualStore\Program Files\Convesoft
Folder Found: C:\WINDOWS\system32\Tasks\TweakBit
Folder Found: C:\WINDOWS\system32\Tasks\TweakBit
***** [ Files ] *****
No malicious files found.
***** [ DLL ] *****
No malicious DLLs found.
***** [ WMI ] *****
No malicious keys found.
***** [ Shortcuts ] *****
No infected shortcut found.
***** [ Scheduled Tasks ] *****
Task Found: {B7B0EE8F-7F37-4194-B00E-9C5AABC280BA}
Task Found: TweakBit\Driver Updater\Start Driver Updater ?n logon
***** [ Registry ] *****
Key Found: HKLM\SOFTWARE\Classes\Applications\iLividSetupV1.exe
Key Found: HKLM\SOFTWARE\Classes\ActiveToolBand.ShowBarObj
Key Found: HKLM\SOFTWARE\Classes\ActiveToolBand.ShowBarObj.1
Key Found: HKLM\SOFTWARE\Classes\OCComSDK.ComSDK
Key Found: HKLM\SOFTWARE\Classes\OCComSDK.ComSDK.1
Key Found: HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Key Found: HKLM\SOFTWARE\Classes\CLSID\{9AFB8248-617F-460D-9366-D71CDEDA3179}
Key Found: HKLM\SOFTWARE\Classes\CLSID\{3CCC052E-BDEE-408A-BEA7-90914EF2964B}
Key Found: HKLM\SOFTWARE\Classes\CLSID\{61F47056-E400-43D3-AF1E-AB7DFFD4C4AD}
Key Found: HKLM\SOFTWARE\Classes\CLSID\{E2B98EEA-EE55-4E9B-A8C1-6E5288DF785A}
Key Found: HKU\S-1-5-21-675696501-1297873133-954829076-1000\Software\Convesoft
Key Found: HKU\S-1-5-21-675696501-1297873133-954829076-1000\Software\AppDataLow\AskBarDis
Key Found: HKU\S-1-5-21-675696501-1297873133-954829076-1004\Software\IM
Key Found: HKCU\Software\IM
Key Found: HKLM\SOFTWARE\Convesoft
Key Found: HKLM\SOFTWARE\MGShareware
Key Found: HKLM\SOFTWARE\HPRewriter
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\mpc.am
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\search.mpc.am
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mpc.am
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\search.mpc.am
Key Found: HKLM\SOFTWARE\Classes\Applications\ilividsetupv1.exe
Value Found: HKLM\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow [*.crossrider.com]
***** [ Web browsers ] *****
No malicious Firefox based browser items found.
Chrome pref Found: [C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web data] - nl.ask.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - babylon.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - trovi.search
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - nl.yhs4.search.yahoo.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - delta-search.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - mystartsearch
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - isearch.avg.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - search.conduit.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - mpc safe search
*************************
C:\AdwCleaner\AdwCleaner[S0].txt - [4484 Bytes] - [18/08/2016 18:06:32]
C:\AdwCleaner\AdwCleaner[S1].txt - [4284 Bytes] - [18/08/2016 18:18:48]
########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [4357 Bytes] ##########
Logbestand S0
# AdwCleaner v6.000 - Logfile created 18/08/2016 at 18:06:32
# Updated on 12/08/2016 by ToolsLib
# Database : 2016-08-18.1 [Server]
# Operating System : Windows 10 Home (X86)
# Username : Thecla - USER-PC
# Running from : C:\Users\Thecla\Downloads\adwcleaner_6.000.exe
# Mode: Scan
# Support :
https://toolslib.net/forum
***** [ Services ] *****
No malicious services found.
***** [ Folders ] *****
Folder Found: C:\Users\user\AppData\Local\VirtualStore\Program Files\Convesoft
Folder Found: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FreeRIP3
Folder Found: C:\Program Files\Convesoft
Folder Found: C:\WINDOWS\system32\Tasks\TweakBit
Folder Found: C:\WINDOWS\system32\Tasks\TweakBit
***** [ Files ] *****
No malicious files found.
***** [ DLL ] *****
No malicious DLLs found.
***** [ WMI ] *****
No malicious keys found.
***** [ Shortcuts ] *****
No infected shortcut found.
***** [ Scheduled Tasks ] *****
Task Found: {B7B0EE8F-7F37-4194-B00E-9C5AABC280BA}
Task Found: TweakBit\Driver Updater\Start Driver Updater ?n logon
***** [ Registry ] *****
Key Found: HKLM\SOFTWARE\Classes\Applications\iLividSetupV1.exe
Key Found: HKLM\SOFTWARE\Classes\ActiveToolBand.ShowBarObj
Key Found: HKLM\SOFTWARE\Classes\ActiveToolBand.ShowBarObj.1
Key Found: HKLM\SOFTWARE\Classes\OCComSDK.ComSDK
Key Found: HKLM\SOFTWARE\Classes\OCComSDK.ComSDK.1
Key Found: HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Key Found: HKLM\SOFTWARE\Classes\CLSID\{9AFB8248-617F-460D-9366-D71CDEDA3179}
Key Found: HKLM\SOFTWARE\Classes\CLSID\{3CCC052E-BDEE-408A-BEA7-90914EF2964B}
Key Found: HKLM\SOFTWARE\Classes\CLSID\{61F47056-E400-43D3-AF1E-AB7DFFD4C4AD}
Key Found: HKLM\SOFTWARE\Classes\CLSID\{E2B98EEA-EE55-4E9B-A8C1-6E5288DF785A}
Key Found: HKU\S-1-5-21-675696501-1297873133-954829076-1000\Software\Convesoft
Key Found: HKU\S-1-5-21-675696501-1297873133-954829076-1000\Software\AppDataLow\AskBarDis
Key Found: HKU\S-1-5-21-675696501-1297873133-954829076-1004\Software\IM
Key Found: HKCU\Software\IM
Key Found: HKLM\SOFTWARE\Convesoft
Key Found: HKLM\SOFTWARE\MGShareware
Key Found: HKLM\SOFTWARE\HPRewriter
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\mpc.am
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\search.mpc.am
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mpc.am
Key Found: HKCU\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\search.mpc.am
Key Found: HKLM\SOFTWARE\Classes\Applications\ilividsetupv1.exe
Value Found: HKLM\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow [*.crossrider.com]
***** [ Web browsers ] *****
No malicious Firefox based browser items found.
Chrome pref Found: [C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web data] - nl.ask.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - babylon.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - trovi.search
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - nl.yhs4.search.yahoo.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - delta-search.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - mystartsearch
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - isearch.avg.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - search.conduit.com
Chrome pref Found: [C:\Users\Thecla\AppData\Local\Google\Chrome\User Data\Default\Web data] - mpc safe search
*************************
C:\AdwCleaner\AdwCleaner[S0].txt - [4332 Bytes] - [18/08/2016 18:06:32]
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [4405 Bytes] ##########
--- Update ---
Het is een programma om drivers mee te installeren, iemand anders toegang tot jou computer?
Gebruik de 2 programma`s van Abraham eens, dit verwijderd denk ik al een hoop rommel.
Ik weet dat dat een programma is om drivers te updaten. Maar dat soort programma's gebruik ik niet. Haal mijn drivers rechtstreeks van de site van de fabrikant van het onderdeel.