|
Log-Analyse und Auswertung: Polizei Trojaner ÖsterreichWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
14.07.2012, 21:28 | #1 |
| Polizei Trojaner Österreich Hallo liebe Trojaner Boardler, wie viele andere habe auch ich mir den Polizei Trojaner eingefangen. Nach anfänglichen Versuchen mittels der im Netz befindlichen Anleitungen, muss ich jetzt doch euch bitten mir zu helfen. Einige Infos vorab: ich hatte den Trojaner erstmals gestern am Computer. Als Pragmatiker habe ich einfach eine "Windows Wiederherstellung" gemacht und das Problem schien vorläufig gelöst. Heute hab ich aber eine andere Version des Trojaners am Computer. Ich hab dan Malwarebytes drüber laufen lassen mit zwei funden (log file hänge ich an - war aber leider kein Treffer) und auch Avira hat was gefunden (EXP/pidief - auch hier häng ich mal das logfile an). Ich hab im forum gelesen dass ihr für etwaige Hilfe den Logfile von OTL braucht - hängt auch an. Nur zur Info: ich konnte das Programm OTL nur im abgesicherten Modus starten und auch nur im abgesicherten Modus scannen - hoffe das ist kein Problem. Vielen Dank im Voraus, lg Burgi |
15.07.2012, 11:03 | #2 |
/// Helfer-Team | Polizei Trojaner Österreich Fixen mit OTL
__________________Lade (falls noch nicht vorhanden) OTL von Oldtimer herunter und speichere es auf Deinem Desktop (nicht woanders hin).
Code:
ATTFilter :OTL IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {6A1806CD-94D4-4689-BA73-E35EA1EA9990} IE:64bit: - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE:64bit: - HKLM\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7 IE - HKLM\..\SearchScopes,DefaultScope = {67A2568C-7A0A-4EED-AECC-B5405DE63B64} IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE - HKLM\..\SearchScopes\{67A2568C-7A0A-4EED-AECC-B5405DE63B64}: "URL" = http://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7ACAW IE - HKLM\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7 IE - HKCU\..\SearchScopes,DefaultScope = {67A2568C-7A0A-4EED-AECC-B5405DE63B64} IE - HKCU\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC IE - HKCU\..\SearchScopes\{67A2568C-7A0A-4EED-AECC-B5405DE63B64}: "URL" = http://www.google.at/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7ACAW_de___AT391 IE - HKCU\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7 IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = 127.0.0.1:9421; FF - prefs.js..browser.startup.homepage: "http://www.google.at/" FF - prefs.js..extensions.enabledItems: {AB2CE124-6272-4b12-94A9-7303C7397BD1}:5.0.0.6778 FF - prefs.js..extensions.enabledItems: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}:6.0.22 FF - prefs.js..extensions.enabledItems: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}:6.0.23 FF - prefs.js..extensions.enabledItems: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA}:6.0.24 FF - prefs.js..network.proxy.type: 0 FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll (Google Inc.) FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll (Google Inc.) O3:64bit: - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found. O3 - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found. O3:64bit: - HKCU\..\Toolbar\WebBrowser: (Google Toolbar) - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.) O4:64bit: - HKLM..\Run: [ScreenRotation] C:\Program Files (x86)\STMicroelectronics\STScreenDetection\SDTabletPC.exe () O4:64bit: - HKLM..\Run: [SNUVCDSM] C:\Windows\snuvcdsm.exe () O4 - HKLM..\Run: [DivXUpdate] C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe () O4 - HKCU..\Run: [Akamai NetSession Interface] C:\Users\XXXXXX\AppData\Local\Akamai\netsession_win.exe (Akamai Technologies, Inc) O4 - HKCU..\Run: [Update] C:\Users\XXXXXX\AppData\Roaming\fest0r_ot.exe () O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3 O32 - HKLM CDRom: AutoRun - 1 O33 - MountPoints2\{10cbfab1-2e22-11e0-8864-001e645c4dec}\Shell - "" = AutoRun O33 - MountPoints2\{10cbfab1-2e22-11e0-8864-001e645c4dec}\Shell\AutoRun\command - "" = D:\AutoRun.exe O33 - MountPoints2\{284bcc64-2e23-11e0-8638-001e645c4dec}\Shell - "" = AutoRun O33 - MountPoints2\{284bcc64-2e23-11e0-8638-001e645c4dec}\Shell\AutoRun\command - "" = D:\AutoRun.exe O33 - MountPoints2\{4714ae8b-c4a0-11e0-8906-8d07da4839b3}\Shell - "" = AutoRun O33 - MountPoints2\{4714ae8b-c4a0-11e0-8906-8d07da4839b3}\Shell\AutoRun\command - "" = D:\Autorun.exe O33 - MountPoints2\{5c71bdcc-2e20-11e0-8729-001e645c4dec}\Shell - "" = AutoRun O33 - MountPoints2\{5c71bdcc-2e20-11e0-8729-001e645c4dec}\Shell\AutoRun\command - "" = D:\AutoRun.exe O33 - MountPoints2\{af8627e5-2d4c-11e0-8bef-c80aa941af16}\Shell - "" = AutoRun O33 - MountPoints2\{af8627e5-2d4c-11e0-8bef-c80aa941af16}\Shell\AutoRun\command - "" = D:\.\Autorun.exe AUTORUN=1 O33 - MountPoints2\{baa9ead6-2e1a-11e0-8864-c80aa941af16}\Shell - "" = AutoRun O33 - MountPoints2\{baa9ead6-2e1a-11e0-8864-c80aa941af16}\Shell\AutoRun\command - "" = D:\AutoRun.exe O33 - MountPoints2\{bf1e4ebf-a0ae-11df-a50d-001e645c4dec}\Shell - "" = AutoRun O33 - MountPoints2\{bf1e4ebf-a0ae-11df-a50d-001e645c4dec}\Shell\AutoRun\command - "" = D:\AutoRun.exe O33 - MountPoints2\{bf1e4ece-a0ae-11df-a50d-001e645c4dec}\Shell - "" = AutoRun O33 - MountPoints2\{bf1e4ece-a0ae-11df-a50d-001e645c4dec}\Shell\AutoRun\command - "" = D:\AutoRun.exe O33 - MountPoints2\{c19cc3a8-e4da-11df-8b85-001e645c4dec}\Shell - "" = AutoRun O33 - MountPoints2\{c19cc3a8-e4da-11df-8b85-001e645c4dec}\Shell\AutoRun\command - "" = D:\AutoRun.exe O33 - MountPoints2\{d0b6b904-b87b-11df-9022-c80aa941af16}\Shell - "" = AutoRun O33 - MountPoints2\{d0b6b904-b87b-11df-9022-c80aa941af16}\Shell\AutoRun\command - "" = D:\AutoRun.exe O33 - MountPoints2\{dd6084dc-2d4e-11e0-8a1e-001e645c4dec}\Shell - "" = AutoRun O33 - MountPoints2\{dd6084dc-2d4e-11e0-8a1e-001e645c4dec}\Shell\AutoRun\command - "" = D:\.\Autorun.exe AUTORUN=1 O33 - MountPoints2\{f6fc6fc6-7c8b-11e0-a4a8-8872965f29a9}\Shell - "" = AutoRun O33 - MountPoints2\{f6fc6fc6-7c8b-11e0-a4a8-8872965f29a9}\Shell\AutoRun\command - "" = "D:\WD SmartWare.exe" autoplay=true [2011.12.30 15:17:34 | 000,142,337 | ---- | C] () -- C:\Windows\SysWow64\Wait.exe [2012.07.14 21:46:59 | 000,001,106 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineCore.job [2012.07.14 21:34:07 | 000,000,884 | ---- | M] () -- C:\Windows\tasks\Adobe Flash Player Updater.job [2012.07.14 20:50:00 | 000,001,110 | ---- | M] () -- C:\Windows\tasks\GoogleUpdateTaskMachineUA.job [2012.07.13 23:48:33 | 004,503,728 | ---- | M] () -- C:\ProgramData\to_r0tsef.pad [2012.07.13 18:15:15 | 004,503,728 | ---- | C] () -- C:\ProgramData\to_r0tsef.pad [2011.12.30 15:17:34 | 000,142,337 | ---- | C] () -- C:\Windows\SysWow64\Wait.exe [2010.11.17 10:11:44 | 000,000,408 | ---- | M] () -- C:\Windows\Tasks\Install_NSS.job :Files C:\ProgramData\to_r0tsef.pad C:\Windows\SysWow64\Wait.exe C:\Windows\Tasks\Install_NSS.job ipconfig /flushdns /c :Commands [purity] [emptytemp] [emptyflash] [resethosts]
Hinweis für Mitleser: Obiges OTL-Script ist ausschließlich für diesen User in dieser Situtation erstellt worden. Auf keinen Fall auf anderen Rechnern anwenden, das kann andere Systeme nachhaltig schädigen!
__________________ |
15.07.2012, 15:33 | #3 |
| Polizei Trojaner Österreich Hallo t'john,
__________________schon mal vielen Dank für die schnelle Hilfe! Ich hab den Fix jetzt ausgeführt, hier der Code: Code:
ATTFilter All processes killed ========== OTL ========== HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}\ deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}\ not found. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{67A2568C-7A0A-4EED-AECC-B5405DE63B64}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{67A2568C-7A0A-4EED-AECC-B5405DE63B64}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}\ not found. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{67A2568C-7A0A-4EED-AECC-B5405DE63B64}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{67A2568C-7A0A-4EED-AECC-B5405DE63B64}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}\ not found. HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyOverride| /E : value set successfully! Prefs.js: "hxxp://www.google.at/" removed from browser.startup.homepage Prefs.js: {AB2CE124-6272-4b12-94A9-7303C7397BD1}:5.0.0.6778 removed from extensions.enabledItems Prefs.js: {CAFEEFAC-0016-0000-0022-ABCDEFFEDCBA}:6.0.22 removed from extensions.enabledItems Prefs.js: {CAFEEFAC-0016-0000-0023-ABCDEFFEDCBA}:6.0.23 removed from extensions.enabledItems Prefs.js: {CAFEEFAC-0016-0000-0024-ABCDEFFEDCBA}:6.0.24 removed from extensions.enabledItems Prefs.js: 0 removed from network.proxy.type Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@tools.google.com/Google Update;version=3\ deleted successfully. C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll moved successfully. Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@tools.google.com/Google Update;version=9\ deleted successfully. File C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll not found. 64bit-Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\Locked deleted successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\Locked deleted successfully. 64bit-Registry value HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{2318C2B1-4965-11D4-9B18-009027A5CD4F} deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2318C2B1-4965-11D4-9B18-009027A5CD4F}\ deleted successfully. C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll moved successfully. 64bit-Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\ScreenRotation deleted successfully. C:\Program Files (x86)\STMicroelectronics\STScreenDetection\SDTabletPC.exe moved successfully. 64bit-Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\SNUVCDSM deleted successfully. C:\Windows\snuvcdsm.exe moved successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\DivXUpdate deleted successfully. C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe moved successfully. Registry value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\Akamai NetSession Interface deleted successfully. C:\Users\***\AppData\Local\Akamai\netsession_win.exe moved successfully. Registry value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\Update deleted successfully. C:\Users\***\AppData\Roaming\fest0r_ot.exe moved successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoActiveDesktop deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoActiveDesktopChanges deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorAdmin deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorUser deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{10cbfab1-2e22-11e0-8864-001e645c4dec}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{10cbfab1-2e22-11e0-8864-001e645c4dec}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{10cbfab1-2e22-11e0-8864-001e645c4dec}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{10cbfab1-2e22-11e0-8864-001e645c4dec}\ not found. File D:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{284bcc64-2e23-11e0-8638-001e645c4dec}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{284bcc64-2e23-11e0-8638-001e645c4dec}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{284bcc64-2e23-11e0-8638-001e645c4dec}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{284bcc64-2e23-11e0-8638-001e645c4dec}\ not found. File D:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{4714ae8b-c4a0-11e0-8906-8d07da4839b3}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4714ae8b-c4a0-11e0-8906-8d07da4839b3}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{4714ae8b-c4a0-11e0-8906-8d07da4839b3}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4714ae8b-c4a0-11e0-8906-8d07da4839b3}\ not found. File D:\Autorun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{5c71bdcc-2e20-11e0-8729-001e645c4dec}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5c71bdcc-2e20-11e0-8729-001e645c4dec}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{5c71bdcc-2e20-11e0-8729-001e645c4dec}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{5c71bdcc-2e20-11e0-8729-001e645c4dec}\ not found. File D:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{af8627e5-2d4c-11e0-8bef-c80aa941af16}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{af8627e5-2d4c-11e0-8bef-c80aa941af16}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{af8627e5-2d4c-11e0-8bef-c80aa941af16}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{af8627e5-2d4c-11e0-8bef-c80aa941af16}\ not found. File D:\.\Autorun.exe AUTORUN=1 not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{baa9ead6-2e1a-11e0-8864-c80aa941af16}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{baa9ead6-2e1a-11e0-8864-c80aa941af16}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{baa9ead6-2e1a-11e0-8864-c80aa941af16}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{baa9ead6-2e1a-11e0-8864-c80aa941af16}\ not found. File D:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{bf1e4ebf-a0ae-11df-a50d-001e645c4dec}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bf1e4ebf-a0ae-11df-a50d-001e645c4dec}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{bf1e4ebf-a0ae-11df-a50d-001e645c4dec}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bf1e4ebf-a0ae-11df-a50d-001e645c4dec}\ not found. File D:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{bf1e4ece-a0ae-11df-a50d-001e645c4dec}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bf1e4ece-a0ae-11df-a50d-001e645c4dec}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{bf1e4ece-a0ae-11df-a50d-001e645c4dec}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bf1e4ece-a0ae-11df-a50d-001e645c4dec}\ not found. File D:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c19cc3a8-e4da-11df-8b85-001e645c4dec}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c19cc3a8-e4da-11df-8b85-001e645c4dec}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{c19cc3a8-e4da-11df-8b85-001e645c4dec}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{c19cc3a8-e4da-11df-8b85-001e645c4dec}\ not found. File D:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0b6b904-b87b-11df-9022-c80aa941af16}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d0b6b904-b87b-11df-9022-c80aa941af16}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d0b6b904-b87b-11df-9022-c80aa941af16}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d0b6b904-b87b-11df-9022-c80aa941af16}\ not found. File D:\AutoRun.exe not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{dd6084dc-2d4e-11e0-8a1e-001e645c4dec}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{dd6084dc-2d4e-11e0-8a1e-001e645c4dec}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{dd6084dc-2d4e-11e0-8a1e-001e645c4dec}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{dd6084dc-2d4e-11e0-8a1e-001e645c4dec}\ not found. File D:\.\Autorun.exe AUTORUN=1 not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{f6fc6fc6-7c8b-11e0-a4a8-8872965f29a9}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f6fc6fc6-7c8b-11e0-a4a8-8872965f29a9}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{f6fc6fc6-7c8b-11e0-a4a8-8872965f29a9}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f6fc6fc6-7c8b-11e0-a4a8-8872965f29a9}\ not found. File "D:\WD SmartWare.exe" autoplay=true not found. C:\Windows\SysWOW64\Wait.exe moved successfully. C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job moved successfully. C:\Windows\Tasks\Adobe Flash Player Updater.job moved successfully. C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job moved successfully. C:\ProgramData\to_r0tsef.pad moved successfully. File C:\ProgramData\to_r0tsef.pad not found. File C:\Windows\SysWow64\Wait.exe not found. C:\Windows\Tasks\Install_NSS.job moved successfully. ========== FILES ========== File\Folder C:\ProgramData\to_r0tsef.pad not found. File\Folder C:\Windows\SysWow64\Wait.exe not found. File\Folder C:\Windows\Tasks\Install_NSS.job not found. < ipconfig /flushdns /c > Windows-IP-Konfiguration Der DNS-Aufl”sungscache wurde geleert. C:\Users\***\Desktop\cmd.bat deleted successfully. C:\Users\***\Desktop\cmd.txt deleted successfully. ========== COMMANDS ========== [EMPTYTEMP] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: *** ->Temp folder emptied: 1626393505 bytes ->Temporary Internet Files folder emptied: 488544067 bytes ->Java cache emptied: 7984464 bytes ->FireFox cache emptied: 70364863 bytes ->Flash cache emptied: 139411 bytes User: Public %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 0 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32 (64bit) .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 304068806 bytes %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 50300 bytes RecycleBin emptied: 7369892038 bytes Total Files Cleaned = 9.410,00 mb [EMPTYFLASH] User: All Users User: Default User: Default User User: *** ->Flash cache emptied: 0 bytes User: Public Total Flash Files Cleaned = 0,00 mb C:\Windows\System32\drivers\etc\Hosts moved successfully. HOSTS file reset successfully OTL by OldTimer - Version 3.2.54.0 log created on 07152012_161845 Files\Folders moved on Reboot... C:\Users\***\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully. PendingFileRenameOperations files... File C:\Users\***\AppData\Local\Temp\FXSAPIDebugLogFile.txt not found! Registry entries deleted on Reboot... Burgi |
15.07.2012, 15:41 | #4 |
/// Helfer-Team | Polizei Trojaner Österreich Sehr gut! Wie laeuft der Rechner? 1. Schritt Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten. danach: Downloade Dir bitte AdwCleaner auf deinen Desktop.
|
15.07.2012, 19:04 | #5 |
| Polizei Trojaner Österreich Hi t'john, wie man bei uns so schön sagt: Ois Rodscha! Bist mei Höd! Läuft Glatt wie ein Babypopo! ;-) Hat jetzt ein bissal gedauert weil ich erst die Scans durchgeführt habe. Hier die Codes: Malwarebytes: Code:
ATTFilter Malwarebytes Anti-Malware (Test) 1.62.0.1300 www.malwarebytes.org Datenbank Version: v2012.07.15.08 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 9.0.8112.16421 *** :: *** [Administrator] Schutz: Aktiviert 15.07.2012 16:53:45 mbam-log-2012-07-15 (16-53-45).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|) Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 381699 Laufzeit: 2 Stunde(n), 18 Minute(n), 28 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 1 C:\_OTL\MovedFiles\07152012_161845\C_Users\***\AppData\Roaming\fest0r_ot.exe (Trojan.Agent.3D) -> Erfolgreich gelöscht und in Quarantäne gestellt. (Ende) Code:
ATTFilter # AdwCleaner v1.702 - Logfile created 07/15/2012 at 19:59:15 # Updated 13/07/2012 by Xplode # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits) # User : *** - *** # Running from : C:\Users\***\Desktop\adwcleaner.exe # Option [Search] ***** [Services] ***** ***** [Files / Folders] ***** ***** [Registry] ***** Key Found : HKCU\Software\Softonic [x64] Key Found : HKCU\Software\Softonic ***** [Registre - GUID] ***** Key Found : HKLM\SOFTWARE\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Key Found : HKLM\SOFTWARE\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556} Key Found : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Key Found : HKLM\SOFTWARE\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E} [x64] Key Found : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} [x64] Key Found : HKLM\SOFTWARE\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E} ***** [Internet Browsers] ***** -\\ Internet Explorer v9.0.8112.16421 [OK] Registry is clean. -\\ Mozilla Firefox v13.0.1 (de) Profile name : default File : C:\Users\***\AppData\Roaming\Mozilla\Firefox\Profiles\4awl0sku.default\prefs.js [OK] File is clean. ************************* AdwCleaner[R1].txt - [1328 octets] - [15/07/2012 19:59:15] ########## EOF - C:\AdwCleaner[R1].txt - [1456 octets] ########## Burgi |
15.07.2012, 19:06 | #6 |
/// Helfer-Team | Polizei Trojaner Österreich Sehr gut!
danach: Malware-Scan mit Emsisoft Anti-Malware Lade die Gratisversion von => Emsisoft Anti-Malware herunter und installiere das Programm. Lade über Jetzt Updaten die aktuellen Signaturen herunter. Wähle den Freeware-Modus aus. Wähle Detail Scan und starte über den Button Scan die Überprüfung des Computers. Am Ende des Scans nichts loeschen lassen!. Mit Klick auf Bericht speichern das Logfile auf dem Desktop speichern und hier in den Thread posten. Anleitung: http://www.trojaner-board.de/103809-...i-malware.html
__________________ --> Polizei Trojaner Österreich |
15.07.2012, 22:06 | #7 |
| Polizei Trojaner Österreich Des is ja gaunz schö vü oabeit - Danke für die Bemühungen. hier die beiden codes: ADW Cleaner Code:
ATTFilter # AdwCleaner v1.702 - Logfile created 07/15/2012 at 20:08:01 # Updated 13/07/2012 by Xplode # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits) # User : *** - *** # Running from : C:\Users\***\Desktop\adwcleaner.exe # Option [Delete] ***** [Services] ***** ***** [Files / Folders] ***** ***** [Registry] ***** Key Deleted : HKCU\Software\Softonic ***** [Registre - GUID] ***** Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{2D5E2D34-BED5-4B9F-9793-A31E26E6806E} [x64] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} ***** [Internet Browsers] ***** -\\ Internet Explorer v9.0.8112.16421 [OK] Registry is clean. -\\ Mozilla Firefox v13.0.1 (de) Profile name : default File : C:\Users\***\AppData\Roaming\Mozilla\Firefox\Profiles\4awl0sku.default\prefs.js [OK] File is clean. ************************* AdwCleaner[R1].txt - [1451 octets] - [15/07/2012 19:59:15] AdwCleaner[S1].txt - [1266 octets] - [15/07/2012 20:08:01] ########## EOF - C:\AdwCleaner[S1].txt - [1394 octets] ########## Code:
ATTFilter Emsisoft Anti-Malware - Version 6.6 Letztes Update: 15.07.2012 20:19:01 Scan Einstellungen: Scan Methode: Detail Scan Objekte: Rootkits, Speicher, Traces, C:\ Archiv Scan: An ADS Scan: An Scan Beginn: 15.07.2012 20:19:40 c:\windows\downloaded program files\default.inf gefunden: Trace.File.ieplugin!E1 Gescannt 618872 Gefunden 1 Scan Ende: 15.07.2012 22:52:18 Scan Zeit: 2:32:38 c:\windows\downloaded program files\default.inf Quarantäne Trace.File.ieplugin!E1 Burgi |
16.07.2012, 13:23 | #8 |
/// Helfer-Team | Polizei Trojaner Österreich Sehr gut! damit bist Du sauber und entlassen! Deinstalliere: Emsisoft Anti-Malware Tool-Bereinigung mit OTL Wir werden nun die CleanUp!-Funktion von OTL nutzen, um die meisten Programme, die wir zur Bereinigung installiert haben, wieder von Deinem System zu löschen.
Lektuere zum abarbeiten: http://www.trojaner-board.de/90880-d...tallation.html http://www.trojaner-board.de/105213-...tellungen.html PluginCheck http://www.trojaner-board.de/96344-a...-rechners.html Secunia Online Software Inspector http://www.trojaner-board.de/71715-k...iendungen.html http://www.trojaner-board.de/83238-a...sschalten.html |
16.07.2012, 15:09 | #9 |
| Polizei Trojaner Österreich Hi t'john! alles klar, vielen herzlichen dank. ich bin die liste nochmals durchgegangen. Alles Gute, cheers, Burgi |
Themen zu Polizei Trojaner Österreich |
abgesicherten, avira, brauch, einfach, file, forum, heute, hängt, infos, log, log file, logfile, malwarebytes, modus, polizei trojaner österreich, problem, programm, scan, scannen, starten, trojaner, version, versuche, windows, Österreich |