|
Plagegeister aller Art und deren Bekämpfung: Polizei VirusWindows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
28.08.2012, 21:33 | #1 |
| Polizei Virus Hallo allerseits, Bei mir hat sich leider der Polizeivirus eingeschlichen. Es meldet sich eine Homepage mit der Aufforderung 100 Euro zu zahlen, der PC sei gesperrt. Auch erscheint ein Fenster für eine Webcam (war aber nicht angesteckt). Eine Google Suche hat mich auf Euer Board gebracht, insbesondere auf den Thread: http://www.trojaner-board.de/122709-...ch-webcam.html Dieser hat mir bereits sehr geholfen. An die Anleitung in Post 2 des Threads habe ich mich gehalten und Scans mit Malwarebyte's Anti-Malware und OTL durchgeführt, deren logs sich im Anhang befinden. Der PC läßt sich soweit wieder klaglos bedienen, nur bin ich nicht sicher ob der Virus bereits restlos verschwunden ist. Vielen Dank im Voraus, Flop |
29.08.2012, 03:48 | #2 |
/// Helfer-Team | Polizei VirusFixen mit OTL Lade (falls noch nicht vorhanden) OTL von Oldtimer herunter und speichere es auf Deinem Desktop (nicht woanders hin).
Code:
ATTFilter :OTL IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE:64bit: - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-21-347174285-2769994538-4012029961-1000\..\SearchScopes,DefaultScope = {9FC39920-3C60-4FBB-BD0C-07B4320D88DF} IE - HKU\S-1-5-21-347174285-2769994538-4012029961-1000\..\SearchScopes\{9FC39920-3C60-4FBB-BD0C-07B4320D88DF}: "URL" = http://www.google.at/search?q={searchTerms} IE - HKU\S-1-5-21-347174285-2769994538-4012029961-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 IE - HKU\S-1-5-21-347174285-2769994538-4012029961-1001\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A} IE - HKU\S-1-5-21-347174285-2769994538-4012029961-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0 FF - prefs.js..browser.search.useDBForOrder: true FF - prefs.js..browser.startup.homepage: "about:home" FF:64bit: - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\system32\Macromed\Flash\NPSWF64_11_3_300_271.dll File not found FF:64bit: - HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE: disabled File not found FF - HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE: disabled File not found O4 - HKU\S-1-5-21-347174285-2769994538-4012029961-1000..\Run: [] File not found O4 - HKU\S-1-5-19..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found O4 - HKU\S-1-5-20..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found O4 - HKU\S-1-5-21-347174285-2769994538-4012029961-1001..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5 O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3 O8:64bit: - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~2\MICROS~1\Office12\EXCEL.EXE/3000 File not found O8 - Extra context menu item: Nach Microsoft E&xel exportieren - res://C:\PROGRA~2\MICROS~1\Office12\EXCEL.EXE/3000 File not found O20:64bit: - HKLM Winlogon: VMApplet - (/pagefile) - File not found O20 - HKLM Winlogon: VMApplet - (/pagefile) - File not found O21:64bit: - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found. O27:64bit: - HKLM IFEO\hamachi-2-ui.exe: Debugger - C:\Program Files (x86)\TuneUp Utilities 2012\TUAutoReactivator64.exe (TuneUp Software) O27:64bit: - HKLM IFEO\taskmgr.exe: Debugger - C:\Program Files (x86)\TuneUp Utilities 2012\PMLauncher.exe (TuneUp Software) O27:64bit: - HKLM IFEO\vid.exe: Debugger - C:\Program Files (x86)\TuneUp Utilities 2012\TUAutoReactivator64.exe (TuneUp Software) O27 - HKLM IFEO\hamachi-2-ui.exe: Debugger - C:\Program Files (x86)\TuneUp Utilities 2012\TUAutoReactivator64.exe (TuneUp Software) O27 - HKLM IFEO\taskmgr.exe: Debugger - C:\Program Files (x86)\TuneUp Utilities 2012\PMLauncher.exe (TuneUp Software) O27 - HKLM IFEO\vid.exe: Debugger - C:\Program Files (x86)\TuneUp Utilities 2012\TUAutoReactivator64.exe (TuneUp Software) O32 - HKLM CDRom: AutoRun - 1 [2012.08.28 19:44:05 | 083,023,306 | ---- | M] () -- C:\ProgramData\nud0repor.pad :Files C:\Users\Florian\AppData\Local\{*} C:\ProgramData\*.exe C:\ProgramData\TEMP C:\Users\Florian\AppData\Local\Temp\*.exe C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\ctfmon.lnk %SystemRoot%\System32\*.tmp %SystemRoot%\SysWOW64\*.tmp ipconfig /flushdns /c :Commands [purity] [emptytemp]
Hinweis für Mitleser: Obiges OTL-Script ist ausschließlich für diesen User in dieser Situtation erstellt worden. Auf keinen Fall auf anderen Rechnern anwenden, das kann andere Systeme nachhaltig schädigen!
__________________ |
29.08.2012, 07:48 | #3 |
| Polizei Virus Hallo t'john!
__________________Danke für Deine Mühen. Das log file lautet wie folgt: Code:
ATTFilter All processes killed ========== OTL ========== HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found. HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! HKEY_USERS\S-1-5-21-347174285-2769994538-4012029961-1000\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! Registry key HKEY_USERS\S-1-5-21-347174285-2769994538-4012029961-1000\Software\Microsoft\Internet Explorer\SearchScopes\{9FC39920-3C60-4FBB-BD0C-07B4320D88DF}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9FC39920-3C60-4FBB-BD0C-07B4320D88DF}\ not found. HKU\S-1-5-21-347174285-2769994538-4012029961-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! HKEY_USERS\S-1-5-21-347174285-2769994538-4012029961-1001\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully! HKU\S-1-5-21-347174285-2769994538-4012029961-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully! Prefs.js: true removed from browser.search.useDBForOrder Prefs.js: "about:home" removed from browser.startup.homepage 64bit-Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@adobe.com/FlashPlayer\ deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@microsoft.com/GENUINE\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@microsoft.com/GENUINE\ deleted successfully. Registry value HKEY_USERS\S-1-5-21-347174285-2769994538-4012029961-1000\Software\Microsoft\Windows\CurrentVersion\Run\\ deleted successfully. Registry value HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\RunOnce\\mctadmin deleted successfully. Registry value HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\RunOnce\\mctadmin deleted successfully. Registry value HKEY_USERS\S-1-5-21-347174285-2769994538-4012029961-1001\Software\Microsoft\Windows\CurrentVersion\RunOnce\\mctadmin deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoActiveDesktop deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoActiveDesktopChanges deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorAdmin deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorUser deleted successfully. 64bit-Registry key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Nach Microsoft E&xel exportieren\ deleted successfully. Registry key HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\MenuExt\Nach Microsoft E&xel exportieren\ not found. 64bit-Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\VMApplet:/pagefile deleted successfully. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\VMApplet:/pagefile deleted successfully. 64bit-Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found. Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hamachi-2-ui.exe\ deleted successfully. C:\Program Files (x86)\TuneUp Utilities 2012\TUAutoReactivator64.exe moved successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\ deleted successfully. C:\Program Files (x86)\TuneUp Utilities 2012\PMLauncher.exe moved successfully. 64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vid.exe\ deleted successfully. File C:\Program Files (x86)\TuneUp Utilities 2012\TUAutoReactivator64.exe not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hamachi-2-ui.exe\ not found. File C:\Program Files (x86)\TuneUp Utilities 2012\TUAutoReactivator64.exe not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\ not found. File C:\Program Files (x86)\TuneUp Utilities 2012\PMLauncher.exe not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vid.exe\ not found. File C:\Program Files (x86)\TuneUp Utilities 2012\TUAutoReactivator64.exe not found. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! C:\ProgramData\nud0repor.pad moved successfully. ========== FILES ========== File\Folder C:\Users\Florian\AppData\Local\{*} not found. File\Folder C:\ProgramData\*.exe not found. File\Folder C:\ProgramData\TEMP not found. C:\Users\Florian\AppData\Local\Temp\nvStInst.exe moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\tmp folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\muffin folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\host folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\9 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\8 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\63 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\62 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\61 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\60 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\6 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\59 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\58 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\57 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\55 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\54 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\53 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\52 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\51 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\50 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\5 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\49 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\48 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\47 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\46 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\45 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\44 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\43 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\42 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\40 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\4 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\39 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\38 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\37 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\36 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\35 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\34 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\33 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\31 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\3 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\29 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\28 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\27 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\26 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\25 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\24 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\23 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\22 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\21 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\20 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\2 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\19 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\18 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\17 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\16 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\15 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\14 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\13 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\12 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\11 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\10 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\1 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\0 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0 folder moved successfully. C:\Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache folder moved successfully. File/Folder C:\Users\Florian\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ctfmon.lnk not found. File/Folder C:\Windows\System32\*.tmp not found. File/Folder C:\Windows\SysWOW64\*.tmp not found. < ipconfig /flushdns /c > Windows-IP-Konfiguration Der DNS-Aufl”sungscache wurde geleert. C:\Users\Florian\Desktop\cmd.bat deleted successfully. C:\Users\Florian\Desktop\cmd.txt deleted successfully. ========== COMMANDS ========== [EMPTYTEMP] User: All Users User: Default ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: Default User ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes User: Florian ->Temp folder emptied: 1559148 bytes ->Temporary Internet Files folder emptied: 748605893 bytes ->FireFox cache emptied: 320109002 bytes ->Flash cache emptied: 11602 bytes User: Install User: Public User: UpdatusUser ->Temp folder emptied: 0 bytes ->Temporary Internet Files folder emptied: 0 bytes %systemdrive% .tmp files removed: 0 bytes %systemroot% .tmp files removed: 0 bytes %systemroot%\System32 .tmp files removed: 0 bytes %systemroot%\System32 (64bit) .tmp files removed: 0 bytes %systemroot%\System32\drivers .tmp files removed: 0 bytes Windows Temp folder emptied: 10196867 bytes %systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 50434 bytes RecycleBin emptied: 0 bytes Total Files Cleaned = 1.030,00 mb OTL by OldTimer - Version 3.2.59.1 log created on 08292012_084146 Files\Folders moved on Reboot... C:\Users\Florian\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully. PendingFileRenameOperations files... Registry entries deleted on Reboot... |
29.08.2012, 20:16 | #4 |
/// Helfer-Team | Polizei Virus Sehr gut! Wie laeuft der Rechner? 1. Schritt Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten.danach: 2. Schritt Downloade Dir bitte AdwCleaner auf deinen Desktop.
|
30.08.2012, 07:04 | #5 |
| Polizei Virus Hallo t'john, Danke, der PC läuft schon wieder ganz gut. Hier sind die logs: Code:
ATTFilter Malwarebytes Anti-Malware 1.62.0.1300 www.malwarebytes.org Datenbank Version: v2012.08.29.09 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 9.0.8112.16421 Florian :: BRAIN [Administrator] 29.08.2012 22:36:08 mbam-log-2012-08-29 (22-36-08).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|) Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 809063 Laufzeit: 3 Stunde(n), 26 Minute(n), 45 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 0 (Keine bösartigen Objekte gefunden) (Ende) Code:
ATTFilter # AdwCleaner v1.801 - Logfile created 08/30/2012 at 08:01:47 # Updated 14/08/2012 by Xplode # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits) # User : Florian - BRAIN # Boot Mode : Normal # Running from : C:\Users\Florian\Desktop\adwcleaner.exe # Option [Search] ***** [Services] ***** ***** [Files / Folders] ***** File Found : C:\user.js ***** [Registry] ***** Key Found : HKCU\Software\Softonic Key Found : HKLM\SOFTWARE\Classes\AppID\escort.DLL Key Found : HKLM\SOFTWARE\Software [x64] Key Found : HKCU\Software\Softonic [x64] Key Found : HKLM\SOFTWARE\Classes\AppID\escort.DLL ***** [Registre - GUID] ***** Key Found : HKLM\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947} Key Found : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB} Key Found : HKLM\SOFTWARE\Classes\CLSID\{2EECD738-5844-4A99-B4B6-146BF802613B} Key Found : HKLM\SOFTWARE\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1} Key Found : HKLM\SOFTWARE\Classes\Interface\{813A22E0-3E2B-4188-9BDA-ECA9878B8D48} Key Found : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} [x64] Key Found : HKLM\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947} [x64] Key Found : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB} [x64] Key Found : HKLM\SOFTWARE\Classes\Interface\{813A22E0-3E2B-4188-9BDA-ECA9878B8D48} [x64] Key Found : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} ***** [Internet Browsers] ***** -\\ Internet Explorer v9.0.8112.16421 [OK] Registry is clean. -\\ Mozilla Firefox v14.0.1 (de) Profile name : default File : C:\Users\Florian\AppData\Roaming\Mozilla\Firefox\Profiles\6f078kmy.default\prefs.js Found : user_pref("extensions.BabylonToolbar_i.aflt", "babsst"); Found : user_pref("extensions.BabylonToolbar_i.babExt", ""); Found : user_pref("extensions.BabylonToolbar_i.babTrack", "affID=113480&tt=010712_7"); Found : user_pref("extensions.BabylonToolbar_i.hardId", "3c84d5e9000000000000001fd02093a0"); Found : user_pref("extensions.BabylonToolbar_i.id", "3c84d5e9000000000000001fd02093a0"); Found : user_pref("extensions.BabylonToolbar_i.instlDay", "15532"); Found : user_pref("extensions.BabylonToolbar_i.instlRef", "sst"); Found : user_pref("extensions.BabylonToolbar_i.prdct", "BabylonToolbar"); Found : user_pref("extensions.BabylonToolbar_i.prtnrId", "babylon"); Found : user_pref("extensions.BabylonToolbar_i.smplGrp", "none"); Found : user_pref("extensions.BabylonToolbar_i.srcExt", "ss"); Found : user_pref("extensions.BabylonToolbar_i.tlbrId", "tb9"); Found : user_pref("extensions.BabylonToolbar_i.vrsn", "1.5.3.17"); Found : user_pref("extensions.BabylonToolbar_i.vrsnTs", "1.5.3.1711:24:12"); Found : user_pref("extensions.BabylonToolbar_i.vrsni", "1.5.3.17"); ************************* AdwCleaner[R1].txt - [2901 octets] - [30/08/2012 08:01:47] ########## EOF - C:\AdwCleaner[R1].txt - [3029 octets] ########## |
30.08.2012, 19:07 | #6 |
/// Helfer-Team | Polizei Virus Sehr gut!
danach: Malware-Scan mit Emsisoft Anti-Malware Lade die Gratisversion von => Emsisoft Anti-Malware herunter und installiere das Programm. Lade über Jetzt Updaten die aktuellen Signaturen herunter. Wähle den Freeware-Modus aus. Wähle Detail Scan und starte über den Button Scan die Überprüfung des Computers. Am Ende des Scans nichts loeschen lassen!. Mit Klick auf Bericht speichern das Logfile auf dem Desktop speichern und hier in den Thread posten. Anleitung: http://www.trojaner-board.de/103809-...i-malware.html
__________________ --> Polizei Virus |
31.08.2012, 12:39 | #7 |
| Polizei Virus Hallo t'john! Dank Deiner Hilfe dürfte das Meiste schon bereinigt sein. Es wurden hauptsächlich von OTL verschobene Dateien angezeigt. AdwCleaner[S1].txt : Code:
ATTFilter # AdwCleaner v1.801 - Logfile created 08/31/2012 at 09:39:11 # Updated 14/08/2012 by Xplode # Operating system : Windows 7 Home Premium Service Pack 1 (64 bits) # User : Florian - BRAIN # Boot Mode : Normal # Running from : C:\Users\Florian\Desktop\adwcleaner.exe # Option [Delete] ***** [Services] ***** ***** [Files / Folders] ***** File Deleted : C:\user.js ***** [Registry] ***** Key Deleted : HKCU\Software\Softonic Key Deleted : HKLM\SOFTWARE\Classes\AppID\escort.DLL Key Deleted : HKLM\SOFTWARE\Software ***** [Registre - GUID] ***** Key Deleted : HKLM\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947} Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2EECD738-5844-4A99-B4B6-146BF802613B} Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E46C8196-B634-44A1-AF6E-957C64278AB1} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{813A22E0-3E2B-4188-9BDA-ECA9878B8D48} Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} [x64] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{813A22E0-3E2B-4188-9BDA-ECA9878B8D48} [x64] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5} ***** [Internet Browsers] ***** -\\ Internet Explorer v9.0.8112.16421 [OK] Registry is clean. -\\ Mozilla Firefox v14.0.1 (de) Profile name : default File : C:\Users\Florian\AppData\Roaming\Mozilla\Firefox\Profiles\6f078kmy.default\prefs.js C:\Users\Florian\AppData\Roaming\Mozilla\Firefox\Profiles\6f078kmy.default\user.js ... Deleted ! Deleted : user_pref("extensions.BabylonToolbar_i.aflt", "babsst"); Deleted : user_pref("extensions.BabylonToolbar_i.babExt", ""); Deleted : user_pref("extensions.BabylonToolbar_i.babTrack", "affID=113480&tt=010712_7"); Deleted : user_pref("extensions.BabylonToolbar_i.hardId", "3c84d5e9000000000000001fd02093a0"); Deleted : user_pref("extensions.BabylonToolbar_i.id", "3c84d5e9000000000000001fd02093a0"); Deleted : user_pref("extensions.BabylonToolbar_i.instlDay", "15532"); Deleted : user_pref("extensions.BabylonToolbar_i.instlRef", "sst"); Deleted : user_pref("extensions.BabylonToolbar_i.prdct", "BabylonToolbar"); Deleted : user_pref("extensions.BabylonToolbar_i.prtnrId", "babylon"); Deleted : user_pref("extensions.BabylonToolbar_i.smplGrp", "none"); Deleted : user_pref("extensions.BabylonToolbar_i.srcExt", "ss"); Deleted : user_pref("extensions.BabylonToolbar_i.tlbrId", "tb9"); Deleted : user_pref("extensions.BabylonToolbar_i.vrsn", "1.5.3.17"); Deleted : user_pref("extensions.BabylonToolbar_i.vrsnTs", "1.5.3.1711:24:12"); Deleted : user_pref("extensions.BabylonToolbar_i.vrsni", "1.5.3.17"); ************************* AdwCleaner[R1].txt - [3018 octets] - [30/08/2012 08:01:47] AdwCleaner[S1].txt - [2835 octets] - [31/08/2012 09:39:11] ########## EOF - C:\AdwCleaner[S1].txt - [2963 octets] ########## Code:
ATTFilter Emsisoft Anti-Malware - Version 6.6 Letztes Update: 31.08.2012 09:46:39 Scan Einstellungen: Scan Methode: Detail Scan Objekte: Rootkits, Speicher, Traces, C:\ Archiv Scan: An ADS Scan: An Scan Beginn: 31.08.2012 09:47:31 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\1f990287-4982aac7 -> b4a\b4a.class gefunden: Exploit.Java.CVE-2012-4681!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\1f990287-4982aac7 -> b4a\b4f.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\1f990287-4982aac7 -> b4a\b4b.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\1f990287-4982aac7 -> b4a\b4c.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\1f990287-4982aac7 -> b4a\b4d.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\1f990287-4982aac7 -> b4a\b4e.class gefunden: Exploit.Java.CVE-2012-4681!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\60ae98b8-49e5c986 -> h11a\h11e.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\60ae98b8-49e5c986 -> h11a\h11d.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\60ae98b8-49e5c986 -> h11a\h11b.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\4d4205e0-1166b90e -> b4a\b4e.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\60ae98b8-49e5c986 -> h11a\h11c.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\4d4205e0-1166b90e -> b4a\b4d.class gefunden: Win32.SuspectCrc!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\60ae98b8-49e5c986 -> h11a\h11a.class gefunden: Exploit.Java.CVE-2012!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\4d4205e0-1166b90e -> b4a\b4a.class gefunden: Win32.SuspectCrc!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\4d4205e0-1166b90e -> b4a\b4f.class gefunden: Exploit.Java.Blacole!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\4d4205e0-1166b90e -> b4a\b4c.class gefunden: Win32.SuspectCrc!E2 C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\4d4205e0-1166b90e -> b4a\b4b.class gefunden: Win32.SuspectCrc!E2 C:\Florian\Downloads\Win 7\mIRC\mirc635.exe gefunden: Riskware.Client-IRC.Win32.mIRC!E2 C:\Florian\1\ATI\ATI Neue Einteilung\FM Dateien\Arbeit an 8010W BACKUP\ATOMIKA 8010 PrA III Daten\8010 HD Backup\MS-DOS_6 (E)\ALTE-HD\NC\NC.EXE gefunden: Trojan.Win32.Agent!E1 Gescannt 1139698 Gefunden 19 Scan Ende: 31.08.2012 12:40:26 Scan Zeit: 2:52:55 |
31.08.2012, 19:49 | #8 |
/// Helfer-Team | Polizei Virus Sehr gut! Deinstalliere: Emsisoft Anti-Malware ESET Online Scanner Vorbereitung
|
03.09.2012, 11:24 | #9 |
| Polizei Virus Hallo t'john, Ich habe den ESET scan durchgeführt. log.txt : Code:
ATTFilter ESETSmartInstaller@High as downloader log: all ok # version=7 # OnlineScannerApp.exe=1.0.0.1 # OnlineScanner.ocx=1.0.0.6583 # api_version=3.0.2 # EOSSerial=585535e52f15d3429ea3ce452ad8c00a # end=finished # remove_checked=true # archives_checked=true # unwanted_checked=true # unsafe_checked=false # antistealth_checked=true # utc_time=2012-09-03 10:11:47 # local_time=2012-09-03 12:11:47 (+0100, Mitteleuropäische Sommerzeit) # country="Austria" # lang=1033 # osver=6.1.7601 NT Service Pack 1 # compatibility_mode=1792 16777215 100 0 5170444 5170444 0 0 # compatibility_mode=5893 16776574 100 94 5172971 98286667 0 0 # compatibility_mode=8192 67108863 100 0 222 222 0 0 # scanned=625909 # found=4 # cleaned=4 # scan_time=10289 C:\Florian\Downloads\Win 7\Game Booster\gb3-setup.exe a variant of Win32/Toolbar.Widgi application (cleaned by deleting - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\32\4d4205e0-1166b90e Java/Exploit.CVE-2012-1723.BI trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\56\60ae98b8-49e5c986 a variant of Java/Exploit.CVE-2012-1723.BH trojan (deleted - quarantined) 00000000000000000000000000000000 C C:\_OTL\MovedFiles\08292012_084146\C_Users\Florian\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\7\1f990287-4982aac7 Java/Exploit.CVE-2012-4681.B trojan (deleted - quarantined) 00000000000000000000000000000000 C |
03.09.2012, 20:27 | #10 |
/// Helfer-Team | Polizei Virus Java aktualisieren Dein Java ist nicht mehr aktuell. Älter Versionen enthalten Sicherheitslücken, die von Malware missbraucht werden können.
Dann so einstellen: http://www.trojaner-board.de/105213-...tellungen.html Danach poste (kopieren und einfuegen) mir, was du hier angezeigt bekommst: PluginCheck |
04.09.2012, 08:11 | #11 |
| Polizei Virus Hallo t'john, Danke Dir für den Hinweis. Java Version wurde nach Deinen Anweisungen erneuert und mehrfache Installationen beseitigt. Einstellungen wurden ebenfalls angepaßt. Der Plugin Check meldet, daß alle Plugins up-to-date sind: Code:
ATTFilter Firefox 14.0.1 ist aktuell Flash (11,4,402,265) ist aktuell. Java (1,7,0,7) ist aktuell. Adobe Reader 10,1,4,38 ist aktuell. Flop |
04.09.2012, 18:21 | #12 |
/// Helfer-Team | Polizei Virus Sehr gut! damit bist Du sauber und entlassen! adwCleaner entfernen
Tool-Bereinigung mit OTL Wir werden nun die CleanUp!-Funktion von OTL nutzen, um die meisten Programme, die wir zur Bereinigung installiert haben, wieder von Deinem System zu löschen.
Zurücksetzen der Sicherheitszonen Lasse die Sicherheitszonen wieder zurücksetzen, da diese manipuliert wurden um den Browser für weitere Angriffe zu öffnen. Gehe dabei so vor: http://www.trojaner-board.de/111805-...ecksetzen.html Systemwiederherstellungen leeren Damit der Rechner nicht mit einer infizierten Systemwiederherstellung erneut infiziert werden kann, muessen wir diese leeren. Dazu schalten wir sie einmal aus und dann wieder ein: Systemwiederherstellung deaktivieren Tutorial fuer Windows XP, Windows Vista, Windows 7 Danach wieder aktivieren. Aufräumen mit CCleaner Lasse mit CCleaner (Download) (Anleitung) Fehler in der
Lektuere zum abarbeiten: http://www.trojaner-board.de/90880-d...tallation.html http://www.trojaner-board.de/105213-...tellungen.html PluginCheck http://www.trojaner-board.de/96344-a...-rechners.html Secunia Online Software Inspector http://www.trojaner-board.de/71715-k...iendungen.html http://www.trojaner-board.de/83238-a...sschalten.html PC wird immer langsamer - was tun? |
06.09.2012, 08:42 | #13 |
| Polizei Virus Hallo t'john, Die tools sind entfernt und die links in meine Favoriten gewandert. Bleibt mir nur noch mich für die tolle Betreuung zu bedanken, ihr habt mir echt fantastisch ausgeholfen! Mit freundlichen Grüßen, Flop |
06.09.2012, 18:28 | #14 |
/// Helfer-Team | Polizei Virus wuensche eine virenfreie Zeit |
Themen zu Polizei Virus |
anhang, anleitung, anti-malware, aufforderung, bereits, board, durchgeführt, erschein, erscheint, euro, fenster, google, homepage, leitung, melde, meldet, nicht sicher, polizei, scans, suche, thread, threads, verschwunden, virus, webcam, zahlen |