|
Log-Analyse und Auswertung: file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.htmlWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
23.08.2012, 10:22 | #1 |
| file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html Hallo TB- Team, ich habe seit gestern regelmäßig eine Script Fehlermeldung von Avira erhalten(die klassische vonwegen ob die Seite weiter ausgeführt werden soll), in der Ecke unten rechts ist ständig eine "Meldung" von Avira mit 2 Buttons Ja/Nein und davor steht nur "alles löschen". Folgendes habe ich bisher unternommen: Viren Scan mit Avira: bleibt bei 87.8 Prozent hängen Defogger: siehe Anhang OTL-Scan: -"- und zuletzt gmer: -"- Habe auch versucht gleiches Online in den Foren zu finden, nur leider kam überall der Hinweis das das Problem individuell gelöst werden muss. (!?) In dem Anhang befinden sich die Logfiles und das Bild von der "Avira"-Meldung Vielen im Voraus schonmal Grüße seth |
24.08.2012, 16:35 | #2 |
/// Helfer-Team | file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.htmlFixen mit OTL Lade (falls noch nicht vorhanden) OTL von Oldtimer herunter und speichere es auf Deinem Desktop (nicht woanders hin).
Code:
ATTFilter :OTL IE:64bit: - HKLM\..\SearchScopes,DefaultScope = IE - HKLM\SOFTWARE\Microsoft\Internet Explorer\Search,SearchAssistant = IE - HKLM\..\URLSearchHook: {64ead72b-ffd4-4e01-aa3a-4c71665d73e4} - SOFTWARE\Classes\CLSID\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4}\InprocServer32 File not found IE - HKLM\..\SearchScopes,DefaultScope = IE - HKCU\..\URLSearchHook: {64ead72b-ffd4-4e01-aa3a-4c71665d73e4} - SOFTWARE\Classes\CLSID\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4}\InprocServer32 File not found IE - HKCU\..\SearchScopes,DefaultScope = IE - HKCU\..\SearchScopes\{8D4587B2-76D7-4791-AE8A-3A2C147CE313}: "URL" = http://www.google.de/search?q={searchTerms} IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local FF - prefs.js..network.proxy.type: 0 FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=: File not found O2 - BHO: (Conduit Engine) - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files (x86)\ConduitEngine\ConduitEngine.dll (Conduit Ltd.) O2 - BHO: (BittorrentBar_DE Toolbar) - {64ead72b-ffd4-4e01-aa3a-4c71665d73e4} - C:\Program Files (x86)\BittorrentBar_DE\tbBitt.dll File not found O3 - HKLM\..\Toolbar: (Conduit Engine) - {30F9B915-B755-4826-820B-08FBA6BD249D} - C:\Program Files (x86)\ConduitEngine\ConduitEngine.dll (Conduit Ltd.) O3 - HKLM\..\Toolbar: (BittorrentBar_DE Toolbar) - {64ead72b-ffd4-4e01-aa3a-4c71665d73e4} - C:\Program Files (x86)\BittorrentBar_DE\tbBitt.dll File not found O4 - HKLM..\Run: [] File not found O4 - HKLM..\Run: [VitaKeyPdtWzd] "C:\Program Files (x86)\Acer Bio Protection\PdtWzd.exe" File not found O4 - HKCU..\Run: [{3F73C6AC-826A-D0B0-9C49-280D370A5ECB}] C:\Users\Johannes\AppData\Roaming\Safi\xauvw.exe File not found O8:64bit: - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~2\MICROS~1\Office12\EXCEL.EXE/3000 File not found O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~2\MICROS~1\Office12\EXCEL.EXE/3000 File not found O9 - Extra Button: Quick-Launch Area - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files (x86)\Acer Bio Protection\PwdBank.exe File not found O9 - Extra 'Tools' menuitem : Quick-Launch Area - {10954C80-4F0F-11d3-B17C-00C0DFE39736} - C:\Program Files (x86)\Acer Bio Protection\PwdBank.exe File not found O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab (Reg Error: Key error.) O20 - Winlogon\Notify\spba: DllName - (Reg Error: Value error.) - Reg Error: Value error. File not found O32 - HKLM CDRom: AutoRun - 1 O33 - MountPoints2\{9836fc1b-ec95-11de-897f-001e68fd1f0d}\Shell - "" = AutoRun O33 - MountPoints2\{9836fc1b-ec95-11de-897f-001e68fd1f0d}\Shell\AutoRun\command - "" = G:\Setup.exe [2012.08.23 08:33:42 | 000,302,592 | ---- | M] () -- C:\Users\Johannes\Desktop\0bd2nc59.exe :Files C:\Users\Johannes\AppData\Local\{*} C:\ProgramData\*.exe C:\ProgramData\TEMP C:\Users\Johannes\AppData\Local\Temp\*.exe C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache ipconfig /flushdns /c :Commands [purity] [emptytemp]
Hinweis für Mitleser: Obiges OTL-Script ist ausschließlich für diesen User in dieser Situtation erstellt worden. Auf keinen Fall auf anderen Rechnern anwenden, das kann andere Systeme nachhaltig schädigen!
__________________ |
24.08.2012, 17:10 | #3 |
| file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html Hallo t´john,
__________________danke schonmal für die Hilfe! im folgenden der Inhalt der Logdatei des Fix von OTL Code:
ATTFilter All processes killed ========== OTL ========== HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! HKLM\SOFTWARE\Microsoft\Internet Explorer\Search\\SearchAssistant| /E : value set successfully! Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4} deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4}\ deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! Registry value HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4} deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4}\ not found. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{8D4587B2-76D7-4791-AE8A-3A2C147CE313}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8D4587B2-76D7-4791-AE8A-3A2C147CE313}\ not found. HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyOverride| /E : value set successfully! Prefs.js: 0 removed from network.proxy.type Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@Apple.com/iTunes,version=\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{30F9B915-B755-4826-820B-08FBA6BD249D}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{30F9B915-B755-4826-820B-08FBA6BD249D}\ deleted successfully. C:\Program Files (x86)\ConduitEngine\ConduitEngine.dll moved successfully. Registry key HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4}\ not found. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{30F9B915-B755-4826-820B-08FBA6BD249D} deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{30F9B915-B755-4826-820B-08FBA6BD249D}\ not found. File C:\Program Files (x86)\ConduitEngine\ConduitEngine.dll not found. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Toolbar\\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4} deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{64ead72b-ffd4-4e01-aa3a-4c71665d73e4}\ not found. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\ deleted successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\VitaKeyPdtWzd deleted successfully. Registry value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\{3F73C6AC-826A-D0B0-9C49-280D370A5ECB} deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{3F73C6AC-826A-D0B0-9C49-280D370A5ECB}\ not found. 64bit-Registry key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Nach Microsoft E&xel exportieren\ deleted successfully. Registry key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Nach Microsoft E&xel exportieren\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{10954C80-4F0F-11d3-B17C-00C0DFE39736}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{10954C80-4F0F-11d3-B17C-00C0DFE39736}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Extensions\{10954C80-4F0F-11d3-B17C-00C0DFE39736}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{10954C80-4F0F-11d3-B17C-00C0DFE39736}\ not found. Starting removal of ActiveX control {E2883E8F-472F-4FB0-9522-AC9BF37916A7} C:\Windows\Downloaded Program Files\gp.inf not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E2883E8F-472F-4FB0-9522-AC9BF37916A7}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\spba\ deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9836fc1b-ec95-11de-897f-001e68fd1f0d}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9836fc1b-ec95-11de-897f-001e68fd1f0d}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{9836fc1b-ec95-11de-897f-001e68fd1f0d}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9836fc1b-ec95-11de-897f-001e68fd1f0d}\ not found. File G:\Setup.exe not found. File C:\Users\Johannes\Desktop\0bd2nc59.exe not found. ========== FILES ========== File\Folder C:\Users\Johannes\AppData\Local\{*} not found. File\Folder C:\ProgramData\*.exe not found. File\Folder C:\ProgramData\TEMP not found. File\Folder C:\Users\Johannes\AppData\Local\Temp\*.exe not found. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\muffin folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\host folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\62 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\61 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\6 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\59 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\51 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\49 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\4 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\39 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\26 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\19 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\17 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache\6.0 folder moved successfully. C:\Users\Johannes\AppData\LocalLow\Sun\Java\Deployment\cache folder moved successfully. < ipconfig /flushdns /c > Windows-IP-Konfiguration Der DNS-Aufl”sungscache wurde geleert. C:\Users\Johannes\Desktop\cmd.bat deleted successfully. C:\Users\Johannes\Desktop\cmd.txt deleted successfully. ========== COMMANDS ========== [EMPTYTEMP] User: Administrator ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes ->Flash cache emptied: 0 bytes User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes ->Flash cache emptied: 0 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes ->Flash cache emptied: 0 bytes User: Johannes ->Temp folder emptied: 366154 bytes ->Temporary Internet Files folder emptied: 632033 bytes ->FireFox cache emptied: 79468244 bytes ->Apple Safari cache emptied: 0 bytes ->Flash cache emptied: 515 bytes User: Public %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 0 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32 (64bit) .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 3970119 bytes %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 33170 bytes RecycleBin emptied: 1079647517 bytes Total Files Cleaned = 1.110,00 mb OTL by OldTimer - Version 3.2.58.1 log created on 08242012_180243 Files\Folders moved on Reboot... C:\Users\Johannes\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully. PendingFileRenameOperations files... Registry entries deleted on Reboot... |
24.08.2012, 17:55 | #4 |
/// Helfer-Team | file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html Sehr gut! Wie laeuft der Rechner? 1. Schritt Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten.danach: 2. Schritt Downloade Dir bitte AdwCleaner auf deinen Desktop.
|
24.08.2012, 20:20 | #5 |
| file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html also PC läuft soweit so gut, seit dem neustart ist auch keine Meldung mehr aufgetaucht, lasse gerade Malwarebytes Anti-Malware die Vollsuche durchlaufen. Wie gesagt schonmal vielen Dank!!! Poste die Logs dann morgen. schönen Freitag Abend noch. |
24.08.2012, 20:55 | #6 |
/// Helfer-Team | file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html Alles klar.
__________________ --> file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html |
25.08.2012, 09:33 | #7 |
| file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html Guten Morgen, hier die Malwarebytes log, es waren 2 Funde dabei die mir aber glaub eher bekannt sind , hab sie jetzt trotzdem entfernt. Code:
ATTFilter Malwarebytes Anti-Malware 1.62.0.1300 www.malwarebytes.org Datenbank Version: v2012.08.24.06 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 8.0.7601.17514 Johannes :: JOHANNES-PC [Administrator] 24.08.2012 20:49:34 mbam-log-2012-08-24 (20-49-34).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|D:\|I:\|J:\|) Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 505271 Laufzeit: 3 Stunde(n), 17 Minute(n), 29 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 2 C:\Users\Public\Neuer Ordner\Crack\TeknoGods_MW2SP.exe (Backdoor.Agent.Gen) -> Erfolgreich gelöscht und in Quarantäne gestellt. D:\Spiele\Modern Warfare 2\TeknoGods_MW2SP.exe (Backdoor.Agent.Gen) -> Erfolgreich gelöscht und in Quarantäne gestellt. (Ende) Code:
ATTFilter # AdwCleaner v1.801 - Logfile created 08/25/2012 at 10:24:02 # Updated 14/08/2012 by Xplode # Operating system : Windows 7 Ultimate Service Pack 1 (64 bits) # User : Johannes - JOHANNES-PC # Boot Mode : Normal # Running from : C:\Users\Johannes\Desktop\adwcleaner.exe # Option [Search] ***** [Services] ***** ***** [Files / Folders] ***** Folder Found : C:\Users\Johannes\AppData\LocalLow\BittorrentBar_DE Folder Found : C:\Users\Johannes\AppData\LocalLow\Conduit Folder Found : C:\Users\Johannes\AppData\LocalLow\ConduitEngine Folder Found : C:\Users\Johannes\AppData\Roaming\OpenCandy Folder Found : C:\Program Files (x86)\Conduit Folder Found : C:\Program Files (x86)\ConduitEngine ***** [Registry] ***** [*] Key Found : HKLM\SOFTWARE\Classes\Toolbar.CT2849855 Key Found : HKCU\Software\AppDataLow\Software\Conduit Key Found : HKCU\Software\AppDataLow\Software\conduitEngine Key Found : HKCU\Software\AppDataLow\Toolbar Key Found : HKCU\Software\Ask.com.tmp Key Found : HKCU\Software\Softonic Key Found : HKLM\SOFTWARE\BittorrentBar_DE Key Found : HKLM\SOFTWARE\Classes\Conduit.Engine Key Found : HKLM\SOFTWARE\Conduit Key Found : HKLM\SOFTWARE\conduitEngine Key Found : HKLM\SOFTWARE\conduitEngine Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\conduitEngine [x64] Key Found : HKCU\Software\AppDataLow\Software\Conduit [x64] Key Found : HKCU\Software\AppDataLow\Software\conduitEngine [x64] Key Found : HKCU\Software\AppDataLow\Toolbar [x64] Key Found : HKCU\Software\Ask.com.tmp [x64] Key Found : HKCU\Software\Softonic [x64] Key Found : HKLM\SOFTWARE\Classes\Conduit.Engine ***** [Registre - GUID] ***** Key Found : HKLM\SOFTWARE\Classes\CLSID\{77A72905-B459-465B-BBAE-C9957D46DDAF} Key Found : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5A34B5FF-8F3B-41B0-B7A5-4FFACEB246D5} Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1A7F412F-D49D-415B-B515-8C93E3FCD530} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{77A72905-B459-465B-BBAE-C9957D46DDAF} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{30F9B915-B755-4826-820B-08FBA6BD249D} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64EAD72B-FFD4-4E01-AA3A-4C71665D73E4} Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{30F9B915-B755-4826-820B-08FBA6BD249D} [x64] Key Found : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} [x64] Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{30F9B915-B755-4826-820B-08FBA6BD249D} [x64] Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64EAD72B-FFD4-4E01-AA3A-4C71665D73E4} [x64] Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{30F9B915-B755-4826-820B-08FBA6BD249D} ***** [Internet Browsers] ***** -\\ Internet Explorer v8.0.7601.17514 [OK] Registry is clean. -\\ Mozilla Firefox v14.0.1 (de) Profile name : default File : C:\Users\Johannes\AppData\Roaming\Mozilla\Firefox\Profiles\piun9qzt.default\prefs.js [OK] File is clean. ************************* AdwCleaner[R1].txt - [3307 octets] - [25/08/2012 10:24:02] ########## EOF - C:\AdwCleaner[R1].txt - [3435 octets] ########## |
25.08.2012, 16:09 | #8 |
/// Helfer-Team | file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html Sehr gut!
danach: Malware-Scan mit Emsisoft Anti-Malware Lade die Gratisversion von => Emsisoft Anti-Malware herunter und installiere das Programm. Lade über Jetzt Updaten die aktuellen Signaturen herunter. Wähle den Freeware-Modus aus. Wähle Detail Scan und starte über den Button Scan die Überprüfung des Computers. Am Ende des Scans nichts loeschen lassen!. Mit Klick auf Bericht speichern das Logfile auf dem Desktop speichern und hier in den Thread posten. Anleitung: http://www.trojaner-board.de/103809-...i-malware.html |
25.08.2012, 18:01 | #9 |
| file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.htmlalso hier ist adwclean log: Code:
ATTFilter # AdwCleaner v1.801 - Logfile created 08/25/2012 at 18:08:09 # Updated 14/08/2012 by Xplode # Operating system : Windows 7 Ultimate Service Pack 1 (64 bits) # User : Johannes - JOHANNES-PC # Boot Mode : Normal # Running from : C:\Users\Johannes\Desktop\adwcleaner.exe # Option [Delete] ***** [Services] ***** ***** [Files / Folders] ***** Folder Deleted : C:\Users\Johannes\AppData\LocalLow\BittorrentBar_DE Folder Deleted : C:\Users\Johannes\AppData\LocalLow\Conduit Folder Deleted : C:\Users\Johannes\AppData\LocalLow\ConduitEngine Folder Deleted : C:\Users\Johannes\AppData\Roaming\OpenCandy Folder Deleted : C:\Program Files (x86)\Conduit Folder Deleted : C:\Program Files (x86)\ConduitEngine ***** [Registry] ***** [*] Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT2849855 Key Deleted : HKCU\Software\AppDataLow\Software\Conduit Key Deleted : HKCU\Software\AppDataLow\Software\conduitEngine Key Deleted : HKCU\Software\AppDataLow\Toolbar Key Deleted : HKCU\Software\Ask.com.tmp Key Deleted : HKCU\Software\Softonic Key Deleted : HKLM\SOFTWARE\BittorrentBar_DE Key Deleted : HKLM\SOFTWARE\Classes\Conduit.Engine Key Deleted : HKLM\SOFTWARE\Conduit Key Deleted : HKLM\SOFTWARE\conduitEngine Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\conduitEngine ***** [Registre - GUID] ***** Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{77A72905-B459-465B-BBAE-C9957D46DDAF} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{5A34B5FF-8F3B-41B0-B7A5-4FFACEB246D5} Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{1A7F412F-D49D-415B-B515-8C93E3FCD530} Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{77A72905-B459-465B-BBAE-C9957D46DDAF} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{30F9B915-B755-4826-820B-08FBA6BD249D} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{64EAD72B-FFD4-4E01-AA3A-4C71665D73E4} Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{30F9B915-B755-4826-820B-08FBA6BD249D} [x64] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} ***** [Internet Browsers] ***** -\\ Internet Explorer v8.0.7601.17514 [OK] Registry is clean. -\\ Mozilla Firefox v14.0.1 (de) Profile name : default File : C:\Users\Johannes\AppData\Roaming\Mozilla\Firefox\Profiles\piun9qzt.default\prefs.js C:\Users\Johannes\AppData\Roaming\Mozilla\Firefox\Profiles\piun9qzt.default\user.js ... Deleted ! [OK] File is clean. ************************* AdwCleaner[R1].txt - [3416 octets] - [25/08/2012 10:24:02] AdwCleaner[S1].txt - [2790 octets] - [25/08/2012 18:08:09] ########## EOF - C:\AdwCleaner[S1].txt - [2918 octets] ########## |
26.08.2012, 01:20 | #10 |
/// Helfer-Team | file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html Alles klar |
26.08.2012, 09:13 | #11 |
| file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html hier der Malware log: Code:
ATTFilter Emsisoft Anti-Malware - Version 6.6 Letztes Update: 25.08.2012 18:13:44 Scan Einstellungen: Scan Methode: Detail Scan Objekte: Rootkits, Speicher, Traces, C:\, D:\, J:\ Archiv Scan: An ADS Scan: An Scan Beginn: 25.08.2012 18:14:04 Value: hkey_current_user\software\partygaming\partypoker --> apppath gefunden: Trace.Registry.partypoker!E1 Value: hkey_current_user\software\partygaming --> oldcfformat gefunden: Trace.Registry.partypoker!E1 Value: hkey_current_user\software\partygaming\partypoker --> sl gefunden: Trace.Registry.partypoker!E1 Value: hkey_current_user\software\partygaming --> freshinstall gefunden: Trace.Registry.partypoker!E1 Value: hkey_current_user\software\partygaming\partypoker --> installstate gefunden: Trace.Registry.partypoker!E1 C:\w7ldr gefunden: HackTool.Win32.Gendows!E2 C:\Users\Public\Neuer Ordner\Crack\TeknoMW2.dll gefunden: Riskware.Crack.CoD!E2 D:\Spiele\World of Warcraft\WoW-2.1.0.6692-to-2.1.0.6729-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 D:\Spiele\World of Warcraft\WoW-2.1.0.6729-to-2.1.1.6739-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 D:\Spiele\World of Warcraft\WoW-2.1.0-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 D:\Spiele\World of Warcraft\WoW-2.1.1.6739-to-2.1.2.6803-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 D:\Spiele\World of Warcraft\WoW-2.1.2.6803-to-2.1.3.6898-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 D:\Spiele\World of Warcraft\Updater.exe gefunden: Trojan-PSW.Win32.Delf.AMN!E1 D:\Spiele\Modern Warfare 2\TeknoMW2.dll gefunden: Riskware.Crack.CoD!E2 J:\Spiele\World of Warcraft\WoW-2.1.0.6692-to-2.1.0.6729-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 J:\Spiele\World of Warcraft\WoW-2.1.0.6729-to-2.1.1.6739-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 J:\Spiele\World of Warcraft\WoW-2.1.0-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 J:\Spiele\World of Warcraft\WoW-2.1.1.6739-to-2.1.2.6803-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 J:\Spiele\World of Warcraft\Updater.exe gefunden: Trojan-PSW.Win32.Delf.AMN!E1 J:\Spiele\World of Warcraft\WoW-2.1.2.6803-to-2.1.3.6898-deDE-downloader.exe gefunden: Gen.Malware.Heur!E2 J:\Spiele\Red Alert 2\Keygen.exe gefunden: Riskware.Keygen.RedAlert2!E2 Gescannt 735334 Gefunden 21 Scan Ende: 25.08.2012 21:15:57 Scan Zeit: 3:01:53 |
27.08.2012, 00:17 | #12 |
/// Helfer-Team | file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html Die Benutzung von Cracks und Keygens ist illegal und verstoesst gegen unseren Kodex. Schon mal darueber nachgedacht, warum es Cracks gibt? Mit Cracks & Co installiert man sich Hintertueren auf dem Rechner. Kriminelle nutzen solche Rechner als Botnetz fuer ihre Machenschaften. Dein System ist als nicht vertrauenswuerdig einzustufen und du solltest keine sensiblen Sachen wie Homebanking an dem PC betreiben. Anleitungen zum Neuaufsetzen (bebildert) > Windows 7 neu aufsetzen > Vista > XP 1. Datenrettung:
2. Formatieren, Windows neu instalieren:
3. PC absichern: http://www.trojaner-board.de/96344-a...-rechners.html ich werde außerdem noch weitere punkte dazu posten. 4. alle Passwörter ändern! 5. nach PC Absicherung, die gesicherten Daten prüfen und falls sauber: zurückspielen. |
27.08.2012, 11:14 | #13 |
| file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html alles klar, dann mach ich das mal. vielen vielen dank für die mühen. |
27.08.2012, 18:19 | #14 |
/// Helfer-Team | file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html |
09.10.2012, 23:22 | #15 |
/// Helfer-Team | file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html Fehlende Rückmeldung Gibt es Probleme beim Abarbeiten obiger Anleitung? Um Kapazitäten für andere Hilfesuchende freizumachen, lösche ich dieses Thema aus meinen Benachrichtigungen. Solltest Du weitermachen wollen, schreibe mir eine PN oder eröffne ein neues Thema. http://www.trojaner-board.de/69886-a...-beachten.html Hinweis: Das Verschwinden der Symptome bedeutet nicht, dass Dein Rechner sauber ist. |
Themen zu file:///C:/ProgramData/Avira/AntiVir%20Desktop/IPM/IpmDocument.html |
ausgeführt, avira, befinden, bild, erhalte, fehlermeldung, file, foren, gelöst, gestern, gmer, hinweis, logfiles, löschen, online, problem, prozent, rechts, scan, schonmal, script, seite, versucht, überall, zuletzt |