|
Plagegeister aller Art und deren Bekämpfung: Polizei Virus Österreich vom 23. Juli 2012Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
24.07.2012, 18:41 | #1 |
| Polizei Virus Österreich vom 23. Juli 2012 hallo, bei mir ist gestern abend (23. juli) der polizei-virus aufgetreten. ich habe windows xp. im "normalen modus" erscheint nach wenigen sekunden ein eingabefenster mit logo der österr. polizei, das einen ukash code mit bezahlung von euro 100,- fordert. ich komme nur noch im abgesicherten modus in meinen computer (sitze jetzt auf einem anderen laptop). ich habe zuerst im abgesicherten modus einen virenscanmit avira antivirus premium duchgeführt, es wurde eine adware (yontoo oder so ähnlich) erkannt und in quarantäne verschoben. nachdem ich danach noch immer nicht reinkonnte habe ich diese zwei viren gelöscht (leider - hab erst nachhergelesen dass ich das nicht löschen sollte) . jetzt habe ich einen OTL-scan durchgeführt. die dateien sind im anhang. ich hoffe sehr, dass ihr mir helfen könnt. danke im voraus für eure mühe schlumpfi |
25.07.2012, 01:51 | #2 |
/// Helfer-Team | Polizei Virus Österreich vom 23. Juli 2012Fixen mit OTL Lade (falls noch nicht vorhanden) OTL von Oldtimer herunter und speichere es auf Deinem Desktop (nicht woanders hin).
Code:
ATTFilter :OTL SRV - File not found [Disabled | Stopped] -- %SystemRoot%\System32\hidserv.dll -- (HidServ) SRV - File not found [On_Demand | Stopped] -- %SystemRoot%\System32\appmgmts.dll -- (AppMgmt) SRV - [2012.07.19 10:06:13 | 000,113,120 | ---- | M] (Mozilla Foundation) [On_Demand | Stopped] -- C:\Programme\Mozilla Maintenance Service\maintenanceservice.exe -- (MozillaMaintenance) SRV - [2012.07.10 20:14:07 | 004,419,392 | ---- | M] () [Auto | Stopped] -- c:\programme\gemeinsame dateien\akamai/netsession_win_4f7fccd.dll -- (Akamai) DRV - File not found [Kernel | On_Demand | Stopped] -- -- (WDICA) DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRFRAME) DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDRELI) DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDFRAME) DRV - File not found [Kernel | On_Demand | Stopped] -- -- (PDCOMP) DRV - File not found [Kernel | System | Stopped] -- -- (PCIDump) DRV - File not found [Kernel | System | Stopped] -- -- (lbrtfdc) DRV - File not found [Kernel | System | Stopped] -- -- (i2omgmt) DRV - File not found [Kernel | System | Stopped] -- -- (Changer) IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant = http://www.google.com/ie IE - HKLM\..\SearchScopes,DefaultScope = {6A1806CD-94D4-4689-BA73-E35EA1EA9990} IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://search.live.com/results.aspx?q={searchTerms}&src={referrer:source?} IE - HKLM\..\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}: "URL" = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&sourceid=ie7 FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=: File not found FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=3: C:\Programme\Google\Update\1.3.21.115\npGoogleUpdate3.dll (Google Inc.) FF - HKLM\Software\MozillaPlugins\@tools.google.com/Google Update;version=9: C:\Programme\Google\Update\1.3.21.115\npGoogleUpdate3.dll (Google Inc.) O2 - BHO: (Babylon toolbar helper) - {2EECD738-5844-4a99-B4B6-146BF802613B} - C:\Programme\BabylonToolbar\BabylonToolbar\1.5.3.17\bh\BabylonToolbar.dll (Babylon BHO) O3 - HKLM\..\Toolbar: (Babylon Toolbar) - {98889811-442D-49dd-99D7-DC866BE87DBC} - C:\Programme\BabylonToolbar\BabylonToolbar\1.5.3.17\BabylonToolbarTlbr.dll (Babylon Ltd.) O4 - HKLM..\Run: [lufylxptjgdgbov] C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\lufylxpt.exe () O4 - HKLM..\Run: [ortcms] rundll32.exe "C:\Dokumente und Einstellungen\Besitzer\Anwendungsdaten\ortcms.dll",FIsHTMLFile File not found O4 - HKLM..\Run: [XSECVA] C:\Dokumente und Einstellungen\Besitzer\Anwendungsdaten\xsecva\xsecva.exe -s File not found O4 - Startup: C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\Adobe Gamma Loader.lnk = C:\Programme\Gemeinsame Dateien\Adobe\Calibration\Adobe Gamma Loader.exe (Adobe Systems, Inc.) O4 - Startup: C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\Erinnerungen in Microsoft Works-Kalender.lnk = C:\Programme\Gemeinsame Dateien\Microsoft Shared\Works Shared\WkCalRem.exe (Microsoft® Corporation) O4 - Startup: C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\Nikon Monitor.lnk = C:\Programme\Gemeinsame Dateien\Nikon\Monitor\NkMonitor.exe (Nikon Corporation) O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: HonorAutoRunSetting = 1 O7 - HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145 O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.) O32 - HKLM CDRom: AutoRun - 1 [4 C:\WINDOWS\System32\*.tmp files -> C:\WINDOWS\System32\*.tmp -> ] [2012.07.23 20:43:24 | 000,057,344 | ---- | M] () -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\lufylxpt.exe @Alternate Data Stream - 147 bytes -> C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TEMP:AC57032B [2012.07.24 16:09:18 | 000,000,884 | ---- | M] () -- C:\WINDOWS\tasks\Adobe Flash Player Updater.job [2012.07.24 16:02:51 | 000,212,641 | ---- | M] () -- C:\WINDOWS\System32\nvapps.xml [2012.07.24 16:02:49 | 000,001,086 | ---- | M] () -- C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job [2012.07.24 09:35:11 | 000,001,090 | ---- | M] () -- C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job [2012.07.23 20:43:30 | 000,000,000 | ---D | C] -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\ghzctkxbjbwjmkq [2012.07.23 20:43:32 | 000,000,051 | ---- | M] () -- C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\nzvxipvgbobkhhy :Files C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\lufylxpt.exe C:\WINDOWS\tasks\Adobe Flash Player Updater.job C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job ipconfig /flushdns /c :Commands [purity] [emptytemp] [emptyflash]
Hinweis für Mitleser: Obiges OTL-Script ist ausschließlich für diesen User in dieser Situtation erstellt worden. Auf keinen Fall auf anderen Rechnern anwenden, das kann andere Systeme nachhaltig schädigen!
__________________ |
25.07.2012, 09:40 | #3 |
| Polizei Virus Österreich vom 23. Juli 2012 wow vielen dank, das doofe polizeifenster ist weg!
__________________hier das logfile: Code:
ATTFilter All processes killed ========== OTL ========== Service HidServ stopped successfully! Service HidServ deleted successfully! File %SystemRoot%\System32\hidserv.dll not found. Service AppMgmt stopped successfully! Service AppMgmt deleted successfully! File %SystemRoot%\System32\appmgmts.dll not found. Service MozillaMaintenance stopped successfully! Service MozillaMaintenance deleted successfully! C:\Programme\Mozilla Maintenance Service\maintenanceservice.exe moved successfully. Service Akamai stopped successfully! Service Akamai deleted successfully! c:\programme\gemeinsame dateien\akamai/netsession_win_4f7fccd.dll moved successfully. Service WDICA stopped successfully! Service WDICA deleted successfully! Service PDRFRAME stopped successfully! Service PDRFRAME deleted successfully! Service PDRELI stopped successfully! Service PDRELI deleted successfully! Service PDFRAME stopped successfully! Service PDFRAME deleted successfully! Service PDCOMP stopped successfully! Service PDCOMP deleted successfully! Service PCIDump stopped successfully! Service PCIDump deleted successfully! Service lbrtfdc stopped successfully! Service lbrtfdc deleted successfully! Service i2omgmt stopped successfully! Service i2omgmt deleted successfully! Service Changer stopped successfully! Service Changer deleted successfully! HKLM\SOFTWARE\Microsoft\Internet Explorer\Search\\SearchAssistant| /E : value set successfully! HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{6A1806CD-94D4-4689-BA73-E35EA1EA9990}\ not found. Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@Apple.com/iTunes,version=\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@tools.google.com/Google Update;version=3\ deleted successfully. C:\Programme\Google\Update\1.3.21.115\npGoogleUpdate3.dll moved successfully. Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@tools.google.com/Google Update;version=9\ deleted successfully. File C:\Programme\Google\Update\1.3.21.115\npGoogleUpdate3.dll not found. Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2EECD738-5844-4a99-B4B6-146BF802613B}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2EECD738-5844-4a99-B4B6-146BF802613B}\ deleted successfully. C:\Programme\BabylonToolbar\BabylonToolbar\1.5.3.17\bh\BabylonToolbar.dll moved successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{98889811-442D-49dd-99D7-DC866BE87DBC} deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{98889811-442D-49dd-99D7-DC866BE87DBC}\ deleted successfully. C:\Programme\BabylonToolbar\BabylonToolbar\1.5.3.17\BabylonToolbarTlbr.dll moved successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\lufylxptjgdgbov deleted successfully. C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\lufylxpt.exe moved successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\ortcms deleted successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\XSECVA deleted successfully. C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\Adobe Gamma Loader.lnk moved successfully. C:\Programme\Gemeinsame Dateien\Adobe\Calibration\Adobe Gamma Loader.exe moved successfully. C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\Erinnerungen in Microsoft Works-Kalender.lnk moved successfully. C:\Programme\Gemeinsame Dateien\Microsoft Shared\Works Shared\WkCalRem.exe moved successfully. C:\Dokumente und Einstellungen\All Users\Startmenü\Programme\Autostart\Nikon Monitor.lnk moved successfully. C:\Programme\Gemeinsame Dateien\Nikon\Monitor\NkMonitor.exe moved successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\HonorAutoRunSetting deleted successfully. Registry value HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun deleted successfully. Starting removal of ActiveX control {E2883E8F-472F-4FB0-9522-AC9BF37916A7} C:\WINDOWS\Downloaded Program Files\gp.inf not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! C:\WINDOWS\System32\CONFIG.TMP deleted successfully. C:\WINDOWS\System32\SET2D4.tmp deleted successfully. C:\WINDOWS\System32\SET2D8.tmp deleted successfully. C:\WINDOWS\System32\SET2E0.tmp deleted successfully. File C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\lufylxpt.exe not found. ADS C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\TEMP:AC57032B deleted successfully. C:\WINDOWS\tasks\Adobe Flash Player Updater.job moved successfully. C:\WINDOWS\system32\nvapps.xml moved successfully. C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job moved successfully. C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job moved successfully. C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\ghzctkxbjbwjmkq folder moved successfully. C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\nzvxipvgbobkhhy moved successfully. ========== FILES ========== File\Folder C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\lufylxpt.exe not found. File\Folder C:\WINDOWS\tasks\Adobe Flash Player Updater.job not found. File\Folder C:\WINDOWS\tasks\GoogleUpdateTaskMachineCore.job not found. File\Folder C:\WINDOWS\tasks\GoogleUpdateTaskMachineUA.job not found. < ipconfig /flushdns /c > Windows-IP-Konfiguration Ein interner Fehler ist aufgetreten: Die Anforderung wird nicht unterstützt. Wenden Sie sich an den Microsoft Software Service, um weitere Hilfe zu erhalten. Zusätzliche Informationen: Der Hostname konnte nicht abgefragt werden. C:\Dokumente und Einstellungen\Administrator\Desktop\cmd.bat deleted successfully. C:\Dokumente und Einstellungen\Administrator\Desktop\cmd.txt deleted successfully. ========== COMMANDS ========== [EMPTYTEMP] User: Administrator ->Temp folder emptied: 180224 bytes ->Temporary Internet Files folder emptied: 110333 bytes ->Opera cache emptied: 240 bytes User: All Users User: Besitzer User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: LocalService ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 33170 bytes User: NetworkService ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 329126880 bytes User: neu ->Temp folder emptied: 3421 bytes ->Temporary Internet Files folder emptied: 33430 bytes User: Kinder ->Temp folder emptied: 67541209 bytes ->Temporary Internet Files folder emptied: 57763776 bytes ->Java cache emptied: 0 bytes ->FireFox cache emptied: 1138369675 bytes ->Apple Safari cache emptied: 42415104 bytes ->Opera cache emptied: 19366311 bytes ->Flash cache emptied: 13545 bytes %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 2134333 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32\dllcache .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 70263699 bytes RecycleBin emptied: 14302976 bytes Total Files Cleaned = 1.661,00 mb [EMPTYFLASH] User: Administrator User: All Users User: Besitzer User: Default User User: LocalService User: NetworkService User: neu User: Kinder ->Flash cache emptied: 0 bytes Total Flash Files Cleaned = 0,00 mb OTL by OldTimer - Version 3.2.54.1 log created on 07252012_102312 Files\Folders moved on Reboot... PendingFileRenameOperations files... Registry entries deleted on Reboot... jetzt lass ich grade Malwarebytes laufen so, jetzt nach über 5 stunden ist Malwarebytes fertig 2 funde gab es - soll ich die löschen? oder sind die automatisch in quarantäne? Code:
ATTFilter Malwarebytes Anti-Malware 1.62.0.1300 www.malwarebytes.org Database version: v2012.07.25.01 Windows XP Service Pack 3 x86 FAT32 Internet Explorer 8.0.6001.18702 Besitzer :: edited-776E0CAA30 [administrator] 25.07.2012 10:34:20 mbam-log-2012-07-25 (16-25-22).txt Scan type: Full scan (C:\|E:\|) Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM Scan options disabled: P2P Objects scanned: 522924 Time elapsed: 5 hour(s), 36 minute(s), 57 second(s) Memory Processes Detected: 0 (No malicious items detected) Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 0 (No malicious items detected) Registry Values Detected: 0 (No malicious items detected) Registry Data Items Detected: 0 (No malicious items detected) Folders Detected: 0 (No malicious items detected) Files Detected: 2 C:\System Volume Information\_restore{1F315BC6-A808-4275-AD98-77BBF849F465}\RP874\A0139934.exe (Trojan.Winlock.P) -> No action taken. C:\_OTL\MovedFiles\07252012_102312\C_Dokumente und Einstellungen\All Users\Anwendungsdaten\lufylxpt.exe (Trojan.Winlock.P) -> No action taken. (end) |
25.07.2012, 15:47 | #4 |
/// Helfer-Team | Polizei Virus Österreich vom 23. Juli 2012 Sehr gut! 1. Schritt Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten.danach: 2. Schritt Downloade Dir bitte AdwCleaner auf deinen Desktop.
|
25.07.2012, 16:26 | #5 |
| Polizei Virus Österreich vom 23. Juli 2012 hier die logdatei vom adwcleaner Code:
ATTFilter # AdwCleaner v1.703 - Logfile created 07/25/2012 at 17:20:41 # Updated 20/07/2012 by Xplode # Operating system : Microsoft Windows XP Service Pack 3 (32 bits) # User : Besitzer - edited-776E0CAA30 # Running from : C:\Dokumente und Einstellungen\Besitzer\Desktop\adwcleaner.exe # Option [Search] ***** [Services] ***** ***** [Files / Folders] ***** Folder Found : C:\DOKUME~1\Besitzer\LOKALE~1\Temp\BabylonToolbar Folder Found : C:\Dokumente und Einstellungen\Besitzer\Anwendungsdaten\Babylon Folder Found : C:\Dokumente und Einstellungen\Besitzer\Anwendungsdaten\BabylonToolbar Folder Found : C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Babylon Folder Found : C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Tarma Installer Folder Found : C:\Programme\BabylonToolbar Folder Found : C:\Programme\Yontoo File Found : C:\Programme\Mozilla Firefox\searchplugins\babylon.xml ***** [Registry] ***** Key Found : HKCU\Software\BabylonToolbar Key Found : HKLM\SOFTWARE\Babylon Key Found : HKLM\SOFTWARE\BabylonToolbar Key Found : HKLM\SOFTWARE\Classes\AppID\escort.DLL Key Found : HKLM\SOFTWARE\Classes\AppID\escortApp.DLL Key Found : HKLM\SOFTWARE\Classes\AppID\escortEng.DLL Key Found : HKLM\SOFTWARE\Classes\AppID\escorTlbr.DLL Key Found : HKLM\SOFTWARE\Classes\AppID\esrv.EXE Key Found : HKLM\SOFTWARE\Classes\AppID\YontooIEClient.DLL Key Found : HKLM\SOFTWARE\Classes\b Key Found : HKLM\SOFTWARE\Classes\Babylon.dskBnd Key Found : HKLM\SOFTWARE\Classes\Babylon.dskBnd.1 Key Found : HKLM\SOFTWARE\Classes\bbylnApp.appCore Key Found : HKLM\SOFTWARE\Classes\bbylnApp.appCore.1 Key Found : HKLM\SOFTWARE\Classes\escort.escortIEPane Key Found : HKLM\SOFTWARE\Classes\escort.escortIEPane.1 Key Found : HKLM\SOFTWARE\Classes\escort.escrtBtn.1 Key Found : HKLM\SOFTWARE\Classes\esrv.BabylonESrvc Key Found : HKLM\SOFTWARE\Classes\esrv.BabylonESrvc.1 Key Found : HKLM\SOFTWARE\Classes\YontooIEClient.Api Key Found : HKLM\SOFTWARE\Classes\YontooIEClient.Api.1 Key Found : HKLM\SOFTWARE\Classes\YontooIEClient.Layers Key Found : HKLM\SOFTWARE\Classes\YontooIEClient.Layers.1 Key Found : HKLM\SOFTWARE\Google\Chrome\Extensions\niapdbllcanepiiimjjndipklodoedlc Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\BabylonToolbar Key Found : HKLM\SOFTWARE\Tarma Installer ***** [Registre - GUID] ***** Key Found : HKLM\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947} Key Found : HKLM\SOFTWARE\Classes\AppID\{35C1605E-438B-4D64-AAB1-8885F097A9B1} Key Found : HKLM\SOFTWARE\Classes\AppID\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921} Key Found : HKLM\SOFTWARE\Classes\AppID\{B12E99ED-69BD-437C-86BE-C862B9E5444D} Key Found : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB} Key Found : HKLM\SOFTWARE\Classes\AppID\{CFDAFE39-20CE-451D-BD45-A37452F39CF0} Key Found : HKLM\SOFTWARE\Classes\AppID\{D7EE8177-D51E-4F89-92B6-83EA2EC40800} Key Found : HKLM\SOFTWARE\Classes\CLSID\{10DE7085-6A1E-4D41-A7BF-9AF93E351401} Key Found : HKLM\SOFTWARE\Classes\CLSID\{291BCCC1-6890-484A-89D3-318C928DAC1B} Key Found : HKLM\SOFTWARE\Classes\CLSID\{7E84186E-B5DE-4226-8A66-6E49C6B511B4} Key Found : HKLM\SOFTWARE\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D} Key Found : HKLM\SOFTWARE\Classes\CLSID\{97F2FF5B-260C-4CCF-834A-2DDA4E29E39E} Key Found : HKLM\SOFTWARE\Classes\CLSID\{A3F2A195-0D11-463b-96BB-D2FF1B7490A1} Key Found : HKLM\SOFTWARE\Classes\CLSID\{B8276A94-891D-453C-9FF3-715C042A2575} Key Found : HKLM\SOFTWARE\Classes\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE} Key Found : HKLM\SOFTWARE\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1} Key Found : HKLM\SOFTWARE\Classes\CLSID\{ECD0ECC6-DCA4-4013-A915-12355AB70999} Key Found : HKLM\SOFTWARE\Classes\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} Key Found : HKLM\SOFTWARE\Classes\CLSID\{FE9271F2-6EFD-44B0-A826-84C829536E93} Key Found : HKLM\SOFTWARE\Classes\CLSID\{FFB9ADCB-8C79-4C29-81D3-74D46A93D370} Key Found : HKLM\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401} Key Found : HKLM\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5} Key Found : HKLM\SOFTWARE\Classes\Interface\{44C3C1DB-2127-433C-98EC-4C9412B5FC3A} Key Found : HKLM\SOFTWARE\Classes\Interface\{4D5132DD-BB2B-4249-B5E0-D145A8C982E1} Key Found : HKLM\SOFTWARE\Classes\Interface\{706D4A4B-184A-4434-B331-296B07493D2D} Key Found : HKLM\SOFTWARE\Classes\Interface\{8BE10F21-185F-4CA0-B789-9921674C3993} Key Found : HKLM\SOFTWARE\Classes\Interface\{94C0B25D-3359-4B10-B227-F96A77DB773F} Key Found : HKLM\SOFTWARE\Classes\Interface\{B0B75FBA-7288-4FD3-A9EB-7EE27FA65599} Key Found : HKLM\SOFTWARE\Classes\Interface\{B173667F-8395-4317-8DD6-45AD1FE00047} Key Found : HKLM\SOFTWARE\Classes\Interface\{B32672B3-F656-46E0-B584-FE61C0BB6037} Key Found : HKLM\SOFTWARE\Classes\Interface\{BFE569F7-646C-4512-969B-9BE3E580D393} Key Found : HKLM\SOFTWARE\Classes\Interface\{C2434722-5C85-4CA0-BA69-1B67E7AB3D68} Key Found : HKLM\SOFTWARE\Classes\Interface\{C2996524-2187-441F-A398-CD6CB6B3D020} Key Found : HKLM\SOFTWARE\Classes\Interface\{E047E227-5342-4D94-80F7-CFB154BF55BD} Key Found : HKLM\SOFTWARE\Classes\Interface\{E3F79BE9-24D4-4F4D-8C13-DF2C9899F82E} Key Found : HKLM\SOFTWARE\Classes\Interface\{E77EEF95-3E83-4BB8-9C0D-4A5163774997} Key Found : HKLM\SOFTWARE\Classes\TypeLib\{35C1605E-438B-4D64-AAB1-8885F097A9B1} Key Found : HKLM\SOFTWARE\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921} Key Found : HKLM\SOFTWARE\Classes\TypeLib\{6E8BF012-2C85-4834-B10A-1B31AF173D70} Key Found : HKLM\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967} Key Found : HKLM\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800} Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8375D9C8-634F-4ECB-8CF5-C7416BA5D542} Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{2EECD738-5844-4A99-B4B6-146BF802613B} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{98889811-442D-49DD-99D7-DC866BE87DBC} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2EECD738-5844-4A99-B4B6-146BF802613B} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{98889811-442D-49DD-99D7-DC866BE87DBC} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} ***** [Internet Browsers] ***** -\\ Internet Explorer v8.0.6001.18702 [HKCU\Software\Microsoft\Internet Explorer\Main - Start Page] = hxxp://search.babylon.com/?affID=110819&babsrc=HP_ss&mntrId=1c0f1dee000000000000002522182a97 [HKLM\SOFTWARE\Microsoft\Internet Explorer\AboutURls - Tabs] = hxxp://search.babylon.com/?affID=110819&babsrc=NT_ss&mntrId=1c0f1dee000000000000002522182a97 -\\ Opera v12.0.1467.0 File : C:\Dokumente und Einstellungen\Besitzer\Anwendungsdaten\Opera\Opera\operaprefs.ini [OK] File is clean. File : C:\Dokumente und Einstellungen\Kinder\Anwendungsdaten\Opera\Opera\operaprefs.ini [OK] File is clean. File : C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\Opera\Opera\operaprefs.ini [OK] File is clean. ************************* AdwCleaner[R1].txt - [7901 octets] - [25/07/2012 17:20:41] ########## EOF - C:\AdwCleaner[R1].txt - [8029 octets] ########## |
25.07.2012, 16:35 | #6 |
/// Helfer-Team | Polizei Virus Österreich vom 23. Juli 2012 Sehr gut!
danach: Malware-Scan mit Emsisoft Anti-Malware Lade die Gratisversion von => Emsisoft Anti-Malware herunter und installiere das Programm. Lade über Jetzt Updaten die aktuellen Signaturen herunter. Wähle den Freeware-Modus aus. Wähle Detail Scan und starte über den Button Scan die Überprüfung des Computers. Am Ende des Scans nichts loeschen lassen!. Mit Klick auf Bericht speichern das Logfile auf dem Desktop speichern und hier in den Thread posten. Anleitung: http://www.trojaner-board.de/103809-...i-malware.html
__________________ --> Polizei Virus Österreich vom 23. Juli 2012 |
25.07.2012, 17:35 | #7 |
| Polizei Virus Österreich vom 23. Juli 2012Code:
ATTFilter # AdwCleaner v1.703 - Logfile created 07/25/2012 at 18:27:55 # Updated 20/07/2012 by Xplode # Operating system : Microsoft Windows XP Service Pack 3 (32 bits) # User : Besitzer - edited-776E0CAA30 # Running from : C:\Dokumente und Einstellungen\Besitzer\Desktop\adwcleaner.exe # Option [Delete] ***** [Services] ***** ***** [Files / Folders] ***** Folder Deleted : C:\DOKUME~1\Besitzer\LOKALE~1\Temp\BabylonToolbar Folder Deleted : C:\Dokumente und Einstellungen\Besitzer\Anwendungsdaten\Babylon Folder Deleted : C:\Dokumente und Einstellungen\Besitzer\Anwendungsdaten\BabylonToolbar Folder Deleted : C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Babylon Folder Deleted : C:\Dokumente und Einstellungen\All Users\Anwendungsdaten\Tarma Installer Folder Deleted : C:\Programme\BabylonToolbar Folder Deleted : C:\Programme\Yontoo File Deleted : C:\Programme\Mozilla Firefox\searchplugins\babylon.xml ***** [Registry] ***** Key Deleted : HKCU\Software\BabylonToolbar Key Deleted : HKLM\SOFTWARE\Babylon Key Deleted : HKLM\SOFTWARE\BabylonToolbar Key Deleted : HKLM\SOFTWARE\Classes\AppID\escort.DLL Key Deleted : HKLM\SOFTWARE\Classes\AppID\escortApp.DLL Key Deleted : HKLM\SOFTWARE\Classes\AppID\escortEng.DLL Key Deleted : HKLM\SOFTWARE\Classes\AppID\escorTlbr.DLL Key Deleted : HKLM\SOFTWARE\Classes\AppID\esrv.EXE Key Deleted : HKLM\SOFTWARE\Classes\AppID\YontooIEClient.DLL Key Deleted : HKLM\SOFTWARE\Classes\b Key Deleted : HKLM\SOFTWARE\Classes\Babylon.dskBnd Key Deleted : HKLM\SOFTWARE\Classes\Babylon.dskBnd.1 Key Deleted : HKLM\SOFTWARE\Classes\bbylnApp.appCore Key Deleted : HKLM\SOFTWARE\Classes\bbylnApp.appCore.1 Key Deleted : HKLM\SOFTWARE\Classes\escort.escortIEPane Key Deleted : HKLM\SOFTWARE\Classes\escort.escortIEPane.1 Key Deleted : HKLM\SOFTWARE\Classes\escort.escrtBtn.1 Key Deleted : HKLM\SOFTWARE\Classes\esrv.BabylonESrvc Key Deleted : HKLM\SOFTWARE\Classes\esrv.BabylonESrvc.1 Key Deleted : HKLM\SOFTWARE\Classes\YontooIEClient.Api Key Deleted : HKLM\SOFTWARE\Classes\YontooIEClient.Api.1 Key Deleted : HKLM\SOFTWARE\Classes\YontooIEClient.Layers Key Deleted : HKLM\SOFTWARE\Classes\YontooIEClient.Layers.1 Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\niapdbllcanepiiimjjndipklodoedlc Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B} Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\BabylonToolbar Key Deleted : HKLM\SOFTWARE\Tarma Installer ***** [Registre - GUID] ***** Key Deleted : HKLM\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947} Key Deleted : HKLM\SOFTWARE\Classes\AppID\{35C1605E-438B-4D64-AAB1-8885F097A9B1} Key Deleted : HKLM\SOFTWARE\Classes\AppID\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921} Key Deleted : HKLM\SOFTWARE\Classes\AppID\{B12E99ED-69BD-437C-86BE-C862B9E5444D} Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB} Key Deleted : HKLM\SOFTWARE\Classes\AppID\{CFDAFE39-20CE-451D-BD45-A37452F39CF0} Key Deleted : HKLM\SOFTWARE\Classes\AppID\{D7EE8177-D51E-4F89-92B6-83EA2EC40800} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{10DE7085-6A1E-4D41-A7BF-9AF93E351401} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{291BCCC1-6890-484A-89D3-318C928DAC1B} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{7E84186E-B5DE-4226-8A66-6E49C6B511B4} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{97F2FF5B-260C-4CCF-834A-2DDA4E29E39E} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{A3F2A195-0D11-463b-96BB-D2FF1B7490A1} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B8276A94-891D-453C-9FF3-715C042A2575} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{ECD0ECC6-DCA4-4013-A915-12355AB70999} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FE9271F2-6EFD-44B0-A826-84C829536E93} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FFB9ADCB-8C79-4C29-81D3-74D46A93D370} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{44C3C1DB-2127-433C-98EC-4C9412B5FC3A} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4D5132DD-BB2B-4249-B5E0-D145A8C982E1} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{706D4A4B-184A-4434-B331-296B07493D2D} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{8BE10F21-185F-4CA0-B789-9921674C3993} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{94C0B25D-3359-4B10-B227-F96A77DB773F} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B0B75FBA-7288-4FD3-A9EB-7EE27FA65599} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B173667F-8395-4317-8DD6-45AD1FE00047} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B32672B3-F656-46E0-B584-FE61C0BB6037} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BFE569F7-646C-4512-969B-9BE3E580D393} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C2434722-5C85-4CA0-BA69-1B67E7AB3D68} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C2996524-2187-441F-A398-CD6CB6B3D020} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E047E227-5342-4D94-80F7-CFB154BF55BD} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E3F79BE9-24D4-4F4D-8C13-DF2C9899F82E} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E77EEF95-3E83-4BB8-9C0D-4A5163774997} Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{35C1605E-438B-4D64-AAB1-8885F097A9B1} Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921} Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{6E8BF012-2C85-4834-B10A-1B31AF173D70} Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D372567D-67C1-4B29-B3F0-159B52B3E967} Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800} Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8375D9C8-634F-4ECB-8CF5-C7416BA5D542} Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9} Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{2EECD738-5844-4A99-B4B6-146BF802613B} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{98889811-442D-49DD-99D7-DC866BE87DBC} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2EECD738-5844-4A99-B4B6-146BF802613B} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{98889811-442D-49DD-99D7-DC866BE87DBC} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8} ***** [Internet Browsers] ***** -\\ Internet Explorer v8.0.6001.18702 Replaced : [HKCU\Software\Microsoft\Internet Explorer\Main - Start Page] = hxxp://search.babylon.com/?affID=110819&babsrc=HP_ss&mntrId=1c0f1dee000000000000002522182a97 --> hxxp://www.google.com Replaced : [HKLM\SOFTWARE\Microsoft\Internet Explorer\AboutURls - Tabs] = hxxp://search.babylon.com/?affID=110819&babsrc=NT_ss&mntrId=1c0f1dee000000000000002522182a97 --> hxxp://www.google.com -\\ Opera v12.0.1467.0 File : C:\Dokumente und Einstellungen\Besitzer\Anwendungsdaten\Opera\Opera\operaprefs.ini [OK] File is clean. File : C:\Dokumente und Einstellungen\Kinder\Anwendungsdaten\Opera\Opera\operaprefs.ini [OK] File is clean. File : C:\Dokumente und Einstellungen\Administrator\Anwendungsdaten\Opera\Opera\operaprefs.ini [OK] File is clean. ************************* AdwCleaner[R1].txt - [8030 octets] - [25/07/2012 17:20:41] AdwCleaner[S1].txt - [8209 octets] - [25/07/2012 18:27:55] ########## EOF - C:\AdwCleaner[S1].txt - [8337 octets] ########## RUNDLL beim Ausführen von "C:\WINDOWS\system32\NvCpl.dll, NvStartup" ist eine Ausnahme aufgetreten. |
25.07.2012, 17:42 | #8 |
/// Helfer-Team | Polizei Virus Österreich vom 23. Juli 2012 Bitte Malwarebytes & Emsisoft Log posten! |
25.07.2012, 17:45 | #9 |
| Polizei Virus Österreich vom 23. Juli 2012 hier der log von malwarebytes Code:
ATTFilter Malwarebytes Anti-Malware 1.62.0.1300 www.malwarebytes.org Database version: v2012.07.25.01 Windows XP Service Pack 3 x86 Internet Explorer 8.0.6001.18702 Besitzer :: edited-776E0CAA30 [administrator] 25.07.2012 10:34:20 mbam-log-2012-07-25 (10-34-20).txt Scan type: Full scan (C:\|E:\|) Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM Scan options disabled: P2P Objects scanned: 522924 Time elapsed: 5 hour(s), 36 minute(s), 57 second(s) Memory Processes Detected: 0 (No malicious items detected) Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 0 (No malicious items detected) Registry Values Detected: 0 (No malicious items detected) Registry Data Items Detected: 0 (No malicious items detected) Folders Detected: 0 (No malicious items detected) Files Detected: 2 C:\System Volume Information\_restore{1F315BC6-A808-4275-AD98-77BBF849F465}\RP874\A0139934.exe (Trojan.Winlock.P) -> Quarantined and deleted successfully. C:\_OTL\MovedFiles\07252012_102312\C_Dokumente und Einstellungen\All Users\Anwendungsdaten\lufylxpt.exe (Trojan.Winlock.P) -> Quarantined and deleted successfully. (end) |
25.07.2012, 17:52 | #10 |
/// Helfer-Team | Polizei Virus Österreich vom 23. Juli 2012 Bitte neues MBAM Log erstellen! |
25.07.2012, 18:01 | #11 |
| Polizei Virus Österreich vom 23. Juli 2012 soll das mbam log ein vollscan oder ein quickscan sein? |
25.07.2012, 18:02 | #12 |
/// Helfer-Team | Polizei Virus Österreich vom 23. Juli 2012 Voll natuerlich! |
26.07.2012, 09:22 | #13 |
| Polizei Virus Österreich vom 23. Juli 2012 jetzt endlich kann ich die logs aufwarten emsisoft Code:
ATTFilter Emsisoft Anti-Malware - Version 6.6 Letztes Update: 26.07.2012 00:37:31 Scan Einstellungen: Scan Methode: Detail Scan Objekte: Rootkits, Speicher, Traces, C:\, E:\ Archiv Scan: An ADS Scan: An Scan Beginn: 26.07.2012 00:38:17 Value: hkey_current_user\software\gamehouse\bigislandblends --> normalexit gefunden: Trace.Registry.gamefiesta big island blends!E1 Value: hkey_current_user\software\gamehouse\bigislandblends --> volumefx gefunden: Trace.Registry.gamefiesta big island blends!E1 Value: hkey_current_user\software\gamehouse\bigislandblends --> volumemusic gefunden: Trace.Registry.gamefiesta big island blends!E1 C:\Dokumente und Einstellungen\Besitzer\Lokale Einstellungen\Temp\jar_cache8873005987722553507.tmp -> Mac.class gefunden: Exploit.Java.CVE-2012!E2 C:\Dokumente und Einstellungen\Besitzer\Lokale Einstellungen\Temp\jar_cache8873005987722553507.tmp -> a.class gefunden: Exploit.Java.CVE-2012!E2 C:\Dokumente und Einstellungen\Besitzer\Lokale Einstellungen\Temp\jar_cache8873005987722553507.tmp -> SecretKey.class gefunden: Exploit.Java.CVE-2012!E2 C:\Dokumente und Einstellungen\Besitzer\Lokale Einstellungen\Temp\YontooIEClient.dll gefunden: Adware.Win32.Yontoo.AMN!E1 C:\Dokumente und Einstellungen\Besitzer\Lokale Einstellungen\Temp\is87173921\MyBabylonTB.exe gefunden: Riskware.Win32.Toolbar.Babylon.AMN!E1 E:\Programme\Zylom Games\Cake Mania Deluxe\cakemania.exe gefunden: Trojan-Downloader.Agent!E2 E:\Dokumente und Einstellungen\****\Anwendungsdaten\Thunderbird\Profiles\8xzm65ys.default\Mail\Local Folders\Trash -> WU_FILE_ff16.zip gefunden: Trojan.Win32.Bredolab!E2 E:\Dokumente und Einstellungen\****\Anwendungsdaten\Thunderbird\Profiles\8xzm65ys.default\Mail\Local Folders\Trash -> WU_FILE_ff16.zip -> WU_FILE_ff16.exe gefunden: Trojan.Win32.Bredolab!E2 Gescannt 720138 Gefunden 11 Scan Ende: 26.07.2012 04:47:46 Scan Zeit: 4:09:29 E:\Dokumente und Einstellungen\****\Anwendungsdaten\Thunderbird\Profiles\8xzm65ys.default\Mail\Local Folders\Trash -> WU_FILE_ff16.zip Quarantäne Trojan.Win32.Bredolab!E2 E:\Programme\Zylom Games\Cake Mania Deluxe\cakemania.exe Quarantäne Trojan-Downloader.Agent!E2 C:\Dokumente und Einstellungen\Besitzer\Lokale Einstellungen\Temp\is87173921\MyBabylonTB.exe Quarantäne Riskware.Win32.Toolbar.Babylon.AMN!E1 C:\Dokumente und Einstellungen\Besitzer\Lokale Einstellungen\Temp\YontooIEClient.dll Quarantäne Adware.Win32.Yontoo.AMN!E1 C:\Dokumente und Einstellungen\Besitzer\Lokale Einstellungen\Temp\jar_cache8873005987722553507.tmp -> Mac.class Quarantäne Exploit.Java.CVE-2012!E2 Value: hkey_current_user\software\gamehouse\bigislandblends --> normalexit Quarantäne Trace.Registry.gamefiesta big island blends!E1 Value: hkey_current_user\software\gamehouse\bigislandblends --> volumefx Quarantäne Trace.Registry.gamefiesta big island blends!E1 Value: hkey_current_user\software\gamehouse\bigislandblends --> volumemusic Quarantäne Trace.Registry.gamefiesta big island blends!E1 Quarantäne 8 und mbam: Code:
ATTFilter Malwarebytes Anti-Malware 1.62.0.1300 www.malwarebytes.org Database version: v2012.07.26.03 Windows XP Service Pack 3 x86 NTFS Internet Explorer 8.0.6001.18702 Besitzer :: edited-776E0CAA30 [administrator] 26.07.2012 05:11:49 mbam-log-2012-07-26 (05-11-49).txt Scan type: Full scan (C:\|E:\|) Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM Scan options disabled: P2P Objects scanned: 497228 Time elapsed: 4 hour(s), 4 minute(s), 30 second(s) Memory Processes Detected: 0 (No malicious items detected) Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 0 (No malicious items detected) Registry Values Detected: 0 (No malicious items detected) Registry Data Items Detected: 0 (No malicious items detected) Folders Detected: 0 (No malicious items detected) Files Detected: 0 (No malicious items detected) (end) |
26.07.2012, 10:22 | #14 |
/// Helfer-Team | Polizei Virus Österreich vom 23. Juli 2012 Sehr gut! Lasse die Funde loeschen, dann: Deinstalliere: Emsisoft Anti-Malware ESET Online Scanner Vorbereitung
|
26.07.2012, 15:29 | #15 |
| Polizei Virus Österreich vom 23. Juli 2012 schockierenderweiser hat der eset wieder 4 dateien gefunden die angeblich von anderen schon gelöscht wurden und ich kann die logdatei nicht finden.. nachtrag,.. doch gefunden: Code:
ATTFilter ESETSmartInstaller@High as downloader log: all ok # version=7 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6583 # api_version=3.0.2 # EOSSerial=55b5b7a455d2ef48bbb495f815b4ab51 # end=finished # remove_checked=true # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2012-07-26 02:10:01 # local_time=2012-07-26 04:10:01 (+0100, Westeuropäische Sommerzeit) # country="Germany" # lang=1033 # osver=5.1.2600 NT Service Pack 3 # compatibility_mode=1792 16777191 100 0 24288579 24288579 0 0 # compatibility_mode=8192 67108863 100 0 510 510 0 0 # scanned=244711 # found=4 # cleaned=4 # scan_time=8961 C:\Dokumente und Einstellungen\Besitzer\Lokale Einstellungen\Temp\65344107-BAB0-7891-A2D8-B3A42C39DCD5\Latest\MyBabylonTB.exe Win32/Toolbar.Babylon application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\07252012_102312\C_Dokumente und Einstellungen\All Users\Anwendungsdaten\ghzctkxbjbwjmkq\main.html HTML/Ransom.B trojan (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\07252012_102312\C_Programme\BabylonToolbar\BabylonToolbar\1.5.3.17\BabylonToolbarTlbr.dll Win32/Toolbar.Babylon application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\07252012_102312\C_Programme\BabylonToolbar\BabylonToolbar\1.5.3.17\bh\BabylonToolbar.dll Win32/Toolbar.Babylon application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C |
Themen zu Polizei Virus Österreich vom 23. Juli 2012 |
abgesicherten, adware, andere, anderen, antivirus, avira, bezahlung, code, computer, dateien, erkannt, euro, gelöscht, gestern, hoffe, juli 2012, konnte, laptop, löschen, modus, nicht löschen, polizei virus, polizei-virus, quarantäne, sekunden, ukash virus, virus, windows, yontoo, Österreich |