|
Plagegeister aller Art und deren Bekämpfung: Bundespolizei Virus auf Laptop (win 7)Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
21.07.2012, 02:19 | #1 |
| Bundespolizei Virus auf Laptop (win 7) Hallo, ich habe seit heute einen Trojaner der Bundespolizei auf dem Laptop und weis nicht wie ich den wieder entfernen kann. Hab hier auch schon einige Threads durchgelesen, aber der einzige der zu meinem Problem passt war nicht weiter bearbeitet. Kann mir da bitte mal jemand helfen? Danke. Habe ein Problem beim Erstellen der OTL.txt Dateien. Bei mir entsteht nämlich keine Extras.txt Datei und ich habe den Scan schon 2 Mal durchlaufen lassen. Hat jemand einen Rat für mich, wie es funktionieren könnte bzw. was ich tun kann damit es beide Dateien erstellt? Danke schonmal im voraus. |
21.07.2012, 22:29 | #2 |
/// Helfer-Team | Bundespolizei Virus auf Laptop (win 7)1. Schritt Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten. 2. Schritt Systemscan mit OTL (bebilderte Anleitung)
__________________ |
21.07.2012, 23:37 | #3 |
| Bundespolizei Virus auf Laptop (win 7) Ok werde ich mal sofort versuchen. Nur wie kann ich Malwarebytes auf dem Laptop ausführen, da ich nicht auf den Desktop zugreifen kann? Oder soll ich es über den REATOGO-X-PE Desktop starten?
__________________ |
21.07.2012, 23:48 | #4 |
/// Helfer-Team | Bundespolizei Virus auf Laptop (win 7) Mit einem sauberen 2. Rechner eine OTLPE-CD erstellen und den infizierten Rechner dann von dieser CD booten: Falls Du kein Brennprogramm installiert hast, lade dir bitte ISOBurner herunter. Das Programm wird Dir erlauben, OTLPE auf eine CD zu brennen und sie bootfähig zu machen. Du brauchst das Tool nur zu installieren, der Rest läuft automatisch => Wie brenne ich eine ISO Datei auf CD/DVD.
|
22.07.2012, 00:47 | #5 |
| Bundespolizei Virus auf Laptop (win 7) Also bei mir funktioniert das mit OTL irgendwie gar nicht wie es soll. Es erstellt immer nur die OTL.txt Datei, aber keine Extras.txt Datei wie ich schonmal erwähnt hatte. |
22.07.2012, 00:58 | #6 |
/// Helfer-Team | Bundespolizei Virus auf Laptop (win 7) Warum postest du nicht endlich mal die OTL.txt? Auf die Extras koennen wir vorerst verzichten!
__________________ --> Bundespolizei Virus auf Laptop (win 7) |
22.07.2012, 01:10 | #7 |
| Bundespolizei Virus auf Laptop (win 7) Ok hier ist die OTL.txt Datei. |
22.07.2012, 01:23 | #8 |
/// Helfer-Team | Bundespolizei Virus auf Laptop (win 7) Fixen mit OTLpe
Code:
ATTFilter :OTL SRV - [2011/11/03 18:29:48 | 000,066,872 | ---- | M] () [Auto] -- F:\Windows\SysWOW64\PnkBstrA.exe -- (PnkBstrA) SRV - [2009/03/05 05:54:50 | 000,311,296 | ---- | M] () [Auto] -- F:\Windows\SysWOW64\Rezip.exe -- (Rezip) IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\HaTi_ON_F\..\URLSearchHook: - Reg Error: Key error. File not found IE - HKU\HaTi_ON_F\..\URLSearchHook: {40c3cc16-7269-4b32-9531-17f2950fb06f} - Reg Error: Key error. File not found IE - HKU\HaTi_ON_F\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 FF:64bit: - HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE: File not found FF - HKLM\Software\Wow6432Node\MozillaPlugins\@microsoft.com/GENUINE: File not found File not found (No name found) -- O3:64bit: - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found. O3 - HKLM\..\Toolbar: (Norton Toolbar) - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - F:\Program Files (x86)\Norton 360\Engine\6.2.1.5\coieplg.dll (Symantec Corporation) O3 - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found. O3 - HKU\HaTi_ON_F\..\Toolbar\WebBrowser: (no name) - {40C3CC16-7269-4B32-9531-17F2950FB06F} - No CLSID value found. O4:64bit: - HKLM..\Run: [] File not found O4:64bit: - HKLM..\Run: [MacroKeyManager] F:\Windows\System32\WTMKM.exe () O4 - HKLM..\Run: [Conime] File not found O4 - HKU\HaTi_ON_F..\Run: [sbqgmullmbmpknr] F:\ProgramData\sbqgmull.exe () O4 - HKU\LocalService_ON_F..\RunOnce: [mctadmin] File not found O4 - HKU\NetworkService_ON_F..\RunOnce: [mctadmin] File not found O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3 O18:64bit: - Protocol\Handler\livecall {828030A1-22C1-4009-854F-8E305202313F} - Reg Error: Key error. File not found O18:64bit: - Protocol\Handler\msnim {828030A1-22C1-4009-854F-8E305202313F} - Reg Error: Key error. File not found O18:64bit: - Protocol\Handler\wlmailhtml {03C514A3-1EFB-4856-9F99-10D7BE1653C0} - Reg Error: Key error. File not found O18:64bit: - Protocol\Handler\wlpg {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - Reg Error: Key error. File not found O21:64bit: - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - CLSID or File not found. O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - CLSID or File not found. O27:64bit: - HKLM IFEO\AcroRd32.exe: Debugger - F:\Program Files (x86)\TuneUp Utilities 2011\TUAutoReactivator64.exe (TuneUp Software) O27:64bit: - HKLM IFEO\hamachi-2-ui.exe: Debugger - F:\Program Files (x86)\TuneUp Utilities 2011\TUAutoReactivator64.exe (TuneUp Software) O27:64bit: - HKLM IFEO\manager1.exe: Debugger - F:\Program Files (x86)\TuneUp Utilities 2011\TUAutoReactivator64.exe (TuneUp Software) O32 - HKLM CDRom: AutoRun - 1 O33 - MountPoints2\{72b7de40-909e-11e0-869c-806e6f6e6963}\Shell - "" = AutoRun O33 - MountPoints2\{72b7de40-909e-11e0-869c-806e6f6e6963}\Shell\AutoRun\command - "" = F:\AutoRun.exe O34 - HKLM BootExecute: (autocheck autochk /r \??\H:) - File not found O34 - HKLM BootExecute: (autocheck autochk *) - File not found 64bit: O35 - HKLM\..comfile [open] -- "%1" %* File not found 64bit: O35 - HKLM\..exefile [open] -- "%1" %* File not found [2012/07/20 17:09:00 | 000,000,884 | ---- | M] () -- F:\Windows\tasks\Adobe Flash Player Updater.job [2012/07/02 11:20:17 | 000,000,000 | ---D | C] -- F:\Users\HaTi\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\GameWiz32 [2012/07/02 11:20:17 | 000,000,000 | ---D | C] -- F:\ProgramData\Microsoft\Windows\Start Menu\Programs\GameWiz32 [2012/07/02 11:20:16 | 000,000,000 | ---D | C] -- F:\Program Files (x86)\GameWiz32 [2012/07/02 11:20:17 | 000,000,000 | ---D | M] -- F:\ProgramData\Microsoft\Windows\Start Menu\Programs\GameWiz32 [2012/07/02 11:20:17 | 000,073,728 | ---- | C] () -- F:\Windows\SysWow64\GkSui18.EXE :Files ipconfig /flushdns /c :Commands [purity] [emptytemp] [emptyflash]
|
22.07.2012, 02:21 | #9 |
| Bundespolizei Virus auf Laptop (win 7) Hier ist der log. Code:
ATTFilter ========== OTL ========== Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\PnkBstrA deleted successfully. F:\Windows\SysWOW64\PnkBstrA.exe moved successfully. Registry key HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Rezip deleted successfully. F:\Windows\SysWOW64\Rezip.exe moved successfully. HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! Registry value HKEY_USERS\HaTi_ON_F\Software\Microsoft\Internet Explorer\URLSearchHooks\\ deleted successfully. Registry value HKEY_USERS\HaTi_ON_F\Software\Microsoft\Internet Explorer\URLSearchHooks\\{40c3cc16-7269-4b32-9531-17f2950fb06f} deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{40c3cc16-7269-4b32-9531-17f2950fb06f}\ not found. HKU\HaTi_ON_F\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! 64bit-Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@microsoft.com/GENUINE\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\Software\Wow6432Node\MozillaPlugins\@microsoft.com/GENUINE\ deleted successfully. 64bit-Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\Locked deleted successfully. Registry value HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Toolbar\\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA}\ deleted successfully. F:\Program Files (x86)\Norton 360\Engine\6.2.1.5\coieplg.dll moved successfully. Registry value HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Toolbar\\Locked deleted successfully. Registry value HKEY_USERS\HaTi_ON_F\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\\{40C3CC16-7269-4B32-9531-17F2950FB06F} deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{40C3CC16-7269-4B32-9531-17F2950FB06F}\ not found. 64bit-Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\ deleted successfully. 64bit-Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\MacroKeyManager deleted successfully. File F:\Windows\System32\WTMKM.exe not found. Registry value HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\\Conime deleted successfully. Registry key HKEY_USERS\HaTi_ON_F\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run not found. F:\ProgramData\sbqgmull.exe moved successfully. Registry key HKEY_USERS\LocalService_ON_F\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce not found. Registry key HKEY_USERS\NetworkService_ON_F\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce not found. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoActiveDesktop deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorAdmin deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorUser deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\livecall\ deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{828030A1-22C1-4009-854F-8E305202313F}\ not found. File {828030A1-22C1-4009-854F-8E305202313F} - Reg Error: Key error. File not found not found. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\msnim\ deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{828030A1-22C1-4009-854F-8E305202313F}\ not found. File {828030A1-22C1-4009-854F-8E305202313F} - Reg Error: Key error. File not found not found. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\wlmailhtml\ deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{03C514A3-1EFB-4856-9F99-10D7BE1653C0}\ not found. File {03C514A3-1EFB-4856-9F99-10D7BE1653C0} - Reg Error: Key error. File not found not found. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\wlpg\ deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324}\ not found. File {E43EF6CD-A37A-4A9B-9E6F-83F89B8E6324} - Reg Error: Key error. File not found not found. 64bit-Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32.exe\ deleted successfully. F:\Program Files (x86)\TuneUp Utilities 2011\TUAutoReactivator64.exe moved successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hamachi-2-ui.exe\ deleted successfully. File F:\Program Files (x86)\TuneUp Utilities 2011\TUAutoReactivator64.exe not found. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\manager1.exe\ deleted successfully. File F:\Program Files (x86)\TuneUp Utilities 2011\TUAutoReactivator64.exe not found. HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{72b7de40-909e-11e0-869c-806e6f6e6963}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72b7de40-909e-11e0-869c-806e6f6e6963}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{72b7de40-909e-11e0-869c-806e6f6e6963}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72b7de40-909e-11e0-869c-806e6f6e6963}\ not found. File F:\AutoRun.exe not found. Registry value HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session manager\\BootExecute:autocheck autochk /r \??\H: deleted successfully. Registry value HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session manager\\BootExecute:autocheck autochk * deleted successfully. F:\Windows\Tasks\Adobe Flash Player Updater.job moved successfully. F:\Users\HaTi\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\GameWiz32 folder moved successfully. F:\ProgramData\Microsoft\Windows\Start Menu\Programs\GameWiz32 folder moved successfully. F:\Program Files (x86)\GameWiz32 folder moved successfully. Folder F:\ProgramData\Microsoft\Windows\Start Menu\Programs\GameWiz32\ not found. F:\Windows\SysWOW64\GkSui18.EXE moved successfully. ========== FILES ========== < ipconfig /flushdns /c > Windows IP Configuration An internal error occurred: The system cannot find the file specified. Please contact Microsoft Product Support Services for further help. Additional information: Unable to open registry key for tcpip. F:\cmd.bat deleted successfully. F:\cmd.txt deleted successfully. ========== COMMANDS ========== [EMPTYTEMP] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33416 bytes User: Default User User: HaTi ->Temp folder emptied: 625140 bytes ->Temporary Internet Files folder emptied: 23965772 bytes ->Java cache emptied: 20500635 bytes ->Opera cache emptied: 90857040 bytes ->Flash cache emptied: 105637 bytes User: Public %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 200704 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32 (64bit) .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 9038 bytes %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 85029 bytes Total Files Cleaned = 130.00 mb [EMPTYFLASH] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: Default User User: HaTi ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes ->Java cache emptied: 0 bytes ->Opera cache emptied: 0 bytes ->Flash cache emptied: 0 bytes User: Public Total Flash Files Cleaned = 0.00 mb OTLPE by OldTimer - Version 3.1.48.0 log created on 07222012_084740 |
22.07.2012, 09:29 | #10 |
/// Helfer-Team | Bundespolizei Virus auf Laptop (win 7) Sehr gut! 1. Schritt Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten.danach: 2. Schritt Downloade Dir bitte AdwCleaner auf deinen Desktop.
|
22.07.2012, 14:47 | #11 |
| Bundespolizei Virus auf Laptop (win 7) Danke, hab alles so gemacht wie beschrieben. Hier ist der Inhalt der Textdatei. Code:
ATTFilter # AdwCleaner v1.703 - Logfile created 07/22/2012 at 15:39:26 # Updated 20/07/2012 by Xplode # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits) # User : HaTi - HATI-PC # Running from : H:\adwcleaner.exe # Option [Search] ***** [Services] ***** ***** [Files / Folders] ***** Folder Found : C:\Users\HaTi\AppData\Local\Conduit Folder Found : C:\Users\HaTi\AppData\LocalLow\Conduit Folder Found : C:\Users\HaTi\AppData\Roaming\loadtbs Folder Found : C:\Program Files (x86)\Conduit ***** [Registry] ***** [*] Key Found : HKLM\SOFTWARE\Classes\Toolbar.CT2319825 Key Found : HKCU\Software\AppDataLow\Software\Conduit Key Found : HKCU\Software\AppDataLow\Software\ConduitSearchScopes Key Found : HKCU\Software\AppDataLow\Software\SmartBar Key Found : HKLM\SOFTWARE\Classes\AppID\escort.DLL Key Found : HKLM\SOFTWARE\Classes\facemoods.facemoodsHlpr Key Found : HKLM\SOFTWARE\Classes\facemoods.facemoodsHlpr.1 Key Found : HKLM\SOFTWARE\Conduit Key Found : HKLM\SOFTWARE\DT Soft Value Found : HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel [Homepage] [x64] Key Found : HKCU\Software\AppDataLow\Software\Conduit [x64] Key Found : HKCU\Software\AppDataLow\Software\ConduitSearchScopes [x64] Key Found : HKCU\Software\AppDataLow\Software\SmartBar [x64] Key Found : HKLM\SOFTWARE\Classes\AppID\escort.DLL [x64] Key Found : HKLM\SOFTWARE\Classes\facemoods.facemoodsHlpr [x64] Key Found : HKLM\SOFTWARE\Classes\facemoods.facemoodsHlpr.1 [x64] Value Found : HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel [Homepage] ***** [Registre - GUID] ***** Key Found : HKLM\SOFTWARE\Classes\AppID\{5B1881D1-D9C7-46DF-B041-1E593282C7D0} Key Found : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1} Key Found : HKLM\SOFTWARE\Classes\CLSID\{64182481-4F71-486B-A045-B233BD0DA8FC} Key Found : HKLM\SOFTWARE\Classes\CLSID\{DDE2C74F-58CC-4D71-8CE1-09DEBB8CFB78} Key Found : HKLM\SOFTWARE\Classes\CLSID\{DFEFCDEE-CF1A-4FC8-88AD-129872198372} Key Found : HKLM\SOFTWARE\Classes\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0} Key Found : HKLM\SOFTWARE\Classes\Interface\{F16AB1DB-15C0-4456-A29E-4DF24FB9E3D2} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{DFEFCDEE-CF1A-4FC8-88AD-129872198372} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DFEFCDEE-CF1A-4FC8-88AD-129872198372} Value Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{DFEFCDEE-CF1A-4FC8-88AD-129872198372}] Value Found : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{40C3CC16-7269-4B32-9531-17F2950FB06F}] Value Found : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{40C3CC16-7269-4B32-9531-17F2950FB06F}] [x64] Key Found : HKLM\SOFTWARE\Classes\AppID\{5B1881D1-D9C7-46DF-B041-1E593282C7D0} [x64] Key Found : HKLM\SOFTWARE\Classes\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0} [x64] Key Found : HKLM\SOFTWARE\Classes\Interface\{F16AB1DB-15C0-4456-A29E-4DF24FB9E3D2} [x64] Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{DFEFCDEE-CF1A-4FC8-88AD-129872198372} [x64] Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DFEFCDEE-CF1A-4FC8-88AD-129872198372} [x64] Value Found : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{40C3CC16-7269-4B32-9531-17F2950FB06F}] [x64] Value Found : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{40C3CC16-7269-4B32-9531-17F2950FB06F}] ***** [Internet Browsers] ***** -\\ Internet Explorer v9.0.8112.16421 [OK] Registry is clean. -\\ Opera v12.0.1467.0 File : C:\Users\HaTi\AppData\Roaming\Opera\Opera\operaprefs.ini [OK] File is clean. ************************* AdwCleaner[R1].txt - [3775 octets] - [22/07/2012 15:39:26] ########## EOF - C:\AdwCleaner[R1].txt - [3903 octets] ########## |
22.07.2012, 18:31 | #12 |
/// Helfer-Team | Bundespolizei Virus auf Laptop (win 7) Wo ist das Log von Malwarebytes? |
22.07.2012, 18:38 | #13 |
| Bundespolizei Virus auf Laptop (win 7) Sorry, hier ist der Log. Code:
ATTFilter Malwarebytes Anti-Malware (Test) 1.62.0.1300 www.malwarebytes.org Datenbank Version: v2012.07.22.06 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 9.0.8112.16421 HaTi :: HATI-PC [Administrator] Schutz: Aktiviert 22.07.2012 21:14:57 mbam-log-2012-07-22 (21-14-57).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|F:\|G:\|H:\|I:\|Q:\|) Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 399236 Laufzeit: 57 Minute(n), 47 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 2 HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System|DisableRegedit (Hijack.Regedit) -> Daten: 0 -> Erfolgreich gelöscht und in Quarantäne gestellt. HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System|DisableRegedit (Hijack.Regedit) -> Daten: 0 -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Dateiobjekte der Registrierung: 1 HKCU\SOFTWARE\Policies\Microsoft\Internet Explorer\control panel|HomePage (PUM.Hijack.HomePageControl) -> Bösartig: (1) Gut: (0) -> Erfolgreich ersetzt und in Quarantäne gestellt. Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 2 I:\prog\APS6_final\patch\adobe.photoshop.cs6-patch.exe (RiskWare.Tool.HCK) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\HaTi\0.9075852126642864.exe (Trojan.Agent.Gen) -> Erfolgreich gelöscht und in Quarantäne gestellt. (Ende) |
22.07.2012, 18:40 | #14 |
/// Helfer-Team | Bundespolizei Virus auf Laptop (win 7) Sehr gut!
danach: Malware-Scan mit Emsisoft Anti-Malware Lade die Gratisversion von => Emsisoft Anti-Malware herunter und installiere das Programm. Lade über Jetzt Updaten die aktuellen Signaturen herunter. Wähle den Freeware-Modus aus. Wähle Detail Scan und starte über den Button Scan die Überprüfung des Computers. Am Ende des Scans nichts loeschen lassen!. Mit Klick auf Bericht speichern das Logfile auf dem Desktop speichern und hier in den Thread posten. Anleitung: http://www.trojaner-board.de/103809-...i-malware.html |
22.07.2012, 20:48 | #15 |
| Bundespolizei Virus auf Laptop (win 7) Danke, hier ist Logfile Nr. 1 von ADW Code:
ATTFilter # AdwCleaner v1.703 - Logfile created 07/22/2012 at 19:41:12 # Updated 20/07/2012 by Xplode # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits) # User : HaTi - HATI-PC # Running from : H:\adwcleaner.exe # Option [Delete] ***** [Services] ***** ***** [Files / Folders] ***** Folder Deleted : C:\Users\HaTi\AppData\Local\Conduit Folder Deleted : C:\Users\HaTi\AppData\LocalLow\Conduit Folder Deleted : C:\Users\HaTi\AppData\Roaming\loadtbs Folder Deleted : C:\Program Files (x86)\Conduit ***** [Registry] ***** [*] Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT2319825 Key Deleted : HKCU\Software\AppDataLow\Software\Conduit Key Deleted : HKCU\Software\AppDataLow\Software\ConduitSearchScopes Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar Key Deleted : HKLM\SOFTWARE\Classes\AppID\escort.DLL Key Deleted : HKLM\SOFTWARE\Classes\facemoods.facemoodsHlpr Key Deleted : HKLM\SOFTWARE\Classes\facemoods.facemoodsHlpr.1 Key Deleted : HKLM\SOFTWARE\Conduit Key Deleted : HKLM\SOFTWARE\DT Soft Value Deleted : HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel [Homepage] ***** [Registre - GUID] ***** Key Deleted : HKLM\SOFTWARE\Classes\AppID\{5B1881D1-D9C7-46DF-B041-1E593282C7D0} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{64182481-4F71-486B-A045-B233BD0DA8FC} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DDE2C74F-58CC-4D71-8CE1-09DEBB8CFB78} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DFEFCDEE-CF1A-4FC8-88AD-129872198372} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F16AB1DB-15C0-4456-A29E-4DF24FB9E3D2} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{DFEFCDEE-CF1A-4FC8-88AD-129872198372} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DFEFCDEE-CF1A-4FC8-88AD-129872198372} Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{DFEFCDEE-CF1A-4FC8-88AD-129872198372}] Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{40C3CC16-7269-4B32-9531-17F2950FB06F}] Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{40C3CC16-7269-4B32-9531-17F2950FB06F}] [x64] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A9379648-F6EB-4F65-A624-1C10411A15D0} [x64] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F16AB1DB-15C0-4456-A29E-4DF24FB9E3D2} ***** [Internet Browsers] ***** -\\ Internet Explorer v9.0.8112.16421 [OK] Registry is clean. -\\ Opera v12.0.1467.0 File : C:\Users\HaTi\AppData\Roaming\Opera\Opera\operaprefs.ini [OK] File is clean. ************************* AdwCleaner[R1].txt - [3876 octets] - [22/07/2012 15:39:26] AdwCleaner[S1].txt - [2823 octets] - [22/07/2012 19:41:12] ########## EOF - C:\AdwCleaner[S1].txt - [2951 octets] ########## Code:
ATTFilter Emsisoft Anti-Malware - Version 6.6 Letztes Update: 7/22/2012 8:00:05 PM Scan Einstellungen: Scan Methode: Detail Scan Objekte: Rootkits, Speicher, Traces, C:\, D:\, I:\, Q:\ Archiv Scan: An ADS Scan: An Scan Beginn: 7/22/2012 8:00:24 PM Value: hkey_local_machine\software\microsoft\windows\currentversion\uninstall\dmo --> displayname gefunden: Trace.Registry.ezula!E1 Value: hkey_local_machine\software\microsoft\windows\currentversion\uninstall\dmo --> uninstallstring gefunden: Trace.Registry.ezula!E1 Key: hkey_local_machine\software\microsoft\windows\currentversion\uninstall\dmo gefunden: Trace.Registry.netpal!E1 C:\_OTL\MovedFiles\07222012_084740\F_ProgramData\sbqgmull.exe gefunden: Win32.SuspectCrc!E2 I:\Spiele..;)\Fallout 3\FalloutLauncher.exe gefunden: Trojan.Win32.Virut.AMN!E1 I:\Spiele..;)\Fallout 3\Uncut-Patch\Uncut-Patch\Fallout3ng.exe gefunden: PossibleThreat.Crack.FallOut3!E2 I:\Spiele..;)\Angry.Birds.Space.v1.0.0.cracked.READ.NFO-THETA\Patch\Patch.exe gefunden: Riskware.Keygen.SuspectCRC!E2 Gescannt 651412 Gefunden 7 Scan Ende: 7/22/2012 9:38:10 PM Scan Zeit: 1:37:46 |
Themen zu Bundespolizei Virus auf Laptop (win 7) |
bundespolizei, bundespolizei virus, einzige, entferne, entfernen, heute, laptop, problem, threads, troja, trojaner, virus, win, win 7 |