![]() |
|
Log-Analyse und Auswertung: Bitte um HiJackThis Logfile auswertungWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() | #4 |
![]() | ![]() Bitte um HiJackThis Logfile auswertung Alles gemacht.. hier die LOG-Files Virtumundobegone [04/27/2008, 21:54:46] - VirtumundoBeGone v1.5 ( "C:\Dokumente und Einstellungen\Claudia\Eigene Dateien\Downloads\VirtumundoBeGone.exe" ) [04/27/2008, 21:54:54] - Detected System Information: [04/27/2008, 21:54:54] - Windows Version: 5.1.2600, Service Pack 2 [04/27/2008, 21:54:54] - Current Username: Administrator (Admin) [04/27/2008, 21:54:54] - Windows is in SAFE mode with Networking. [04/27/2008, 21:54:54] - Searching for Browser Helper Objects: [04/27/2008, 21:54:54] - BHO 1: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} (Adobe PDF Reader) [04/27/2008, 21:54:54] - BHO 2: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} (SSVHelper Class) [04/27/2008, 21:54:54] - Finished Searching Browser Helper Objects [04/27/2008, 21:54:54] - Finishing up... [04/27/2008, 21:54:54] - Nothing found! Exiting... Anti-Malware Malwarebytes' Anti-Malware 1.11 Datenbank Version: 690 Scan Art: Komplett Scan (C:\|D:\|E:\|F:\|G:\|H:\|I:\|J:\|K:\|) Objekte gescannt: 201149 Scan Dauer: 1 hour(s), 15 minute(s), 39 second(s) Infizierte Speicher Prozesse: 0 Infizierte Speicher Module: 0 Infizierte Registrierungsschlüssel: 14 Infizierte Registrierungswerte: 0 Infizierte Datei Objekte der Registrierung: 0 Infizierte Verzeichnisse: 0 Infizierte Dateien: 38 Infizierte Speicher Prozesse: (Keine Malware Objekte gefunden) Infizierte Speicher Module: (Keine Malware Objekte gefunden) Infizierte Registrierungsschlüssel: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{daed9266-8c28-4c1c-8b58-5c66eff1d302} (Search.Hijack) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Explorer Bars\{1e0de227-5ce4-4ea3-ab0c-8b03e1aa76bc} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{2e9937fc-cf2f-4f56-af54-5a6a3dd375cc} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\Interface\{741de825-a6f0-4497-9aa6-8023cf9b0fff} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{56256a51-b582-467e-b8d4-7786eda79ae0} (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\MediaHoldings (Adware.PlayMP3Z) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Trymedia Systems (Adware.Trymedia) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Online Add-on (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Audio-Video Enhance (Trojan.Zlob) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\MyWebSearch (Adware.MyWebSearch) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Fun Web Products (Adware.MyWebSearch) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: (Keine Malware Objekte gefunden) Infizierte Datei Objekte der Registrierung: (Keine Malware Objekte gefunden) Infizierte Verzeichnisse: (Keine Malware Objekte gefunden) Infizierte Dateien: C:\Dokumente und Einstellungen\Leon-Maria\Eigene Dateien\S0n5t1g35\CONTERSTRIKE\Hackz\RoyalHack v1.0d\Public-1d.exe (Backdoor.Bot) -> Quarantined and deleted successfully. C:\QooBox\Quarantine\C\Programme\Uninstall Fun Web Products.dll.vir (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\QooBox\Quarantine\C\Programme\MyWebSearch\bar\1.bin\MWSOEMON.EXE.vir (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\QooBox\Quarantine\C\Programme\MyWebSearch\bar\1.bin\MWSOESTB.DLL.vir (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249268.scr (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249269.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249276.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249277.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249278.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249279.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249280.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249281.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249282.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249283.SCR (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249284.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249285.DLL (Adware.MyWeb.FunWeb) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249286.EXE (Adware.MyWeb.FunWeb) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249287.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249288.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249289.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249291.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249292.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249293.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249294.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249296.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249297.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249298.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249299.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249300.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249301.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249302.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP563\A0249303.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP565\A0249949.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP565\A0249950.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP565\A0249951.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP566\A0250000.EXE (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP566\A0250001.DLL (Adware.MyWebSearch) -> Quarantined and deleted successfully. C:\System Volume Information\_restore{1CC24EE3-6149-44AA-B0F4-D8BF1DF28234}\RP566\A0250003.dll (Adware.MyWebSearch) -> Quarantined and deleted successfully. HIJACKTHIS Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 23:59:50, on 27.04.2008 Platform: Windows XP SP2 (WinNT 5.01.2600) MSIE: Internet Explorer v7.00 (7.00.6000.16640) Boot mode: Normal Running processes: C:\WINDOWS\System32\smss.exe C:\WINDOWS\system32\winlogon.exe C:\WINDOWS\system32\services.exe C:\WINDOWS\system32\lsass.exe C:\WINDOWS\system32\svchost.exe C:\Programme\Windows Defender\MsMpEng.exe C:\WINDOWS\System32\svchost.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\spoolsv.exe C:\Programme\Avira\AntiVir PersonalEdition Classic\avguard.exe C:\WINDOWS\Explorer.EXE C:\Programme\a-squared Free\a2service.exe C:\Programme\Avira\AntiVir PersonalEdition Classic\sched.exe C:\WINDOWS\System32\svchost.exe C:\Programme\Canon\IJPLM\IJPLMSVC.EXE C:\Programme\Gemeinsame Dateien\LightScribe\LSSrvc.exe C:\WINDOWS\system32\nvsvc32.exe C:\WINDOWS\system32\svchost.exe C:\WINDOWS\system32\ctfmon.exe C:\Programme\Mozilla Firefox\firefox.exe C:\Programme\OpenOffice.org 2.2\program\soffice.exe C:\Programme\OpenOffice.org 2.2\program\soffice.BIN C:\Programme\Trend Micro\HijackThis\HijackThis.exe O2 - BHO: Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\AcroIEHelper.dll O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Programme\Java\jre1.6.0_05\bin\ssv.dll O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\WINDOWS\system32\NvCpl.dll,NvStartup O4 - HKCU\..\Run: [ctfmon.exe] C:\WINDOWS\system32\ctfmon.exe O23 - Service: a-squared Free Service (a2free) - Emsi Software GmbH - C:\Programme\a-squared Free\a2service.exe O23 - Service: AntiVir PersonalEdition Classic Planer (AntiVirScheduler) - Avira GmbH - C:\Programme\Avira\AntiVir PersonalEdition Classic\sched.exe O23 - Service: AntiVir PersonalEdition Classic Guard (AntiVirService) - Avira GmbH - C:\Programme\Avira\AntiVir PersonalEdition Classic\avguard.exe O23 - Service: Firebird Server - MAGIX Instance (FirebirdServerMAGIXInstance) - MAGIX® - C:\Programme\MAGIX\Common\Database\bin\fbserver.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe O23 - Service: PIXMA Extended Survey Program (IJPLMSVC) - Unknown owner - C:\Programme\Canon\IJPLM\IJPLMSVC.EXE O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Programme\Gemeinsame Dateien\LightScribe\LSSrvc.exe O23 - Service: NVIDIA Display Driver Service (NVSvc) - NVIDIA Corporation - C:\WINDOWS\system32\nvsvc32.exe O23 - Service: Remote Packet Capture Protocol v.0 (experimental) (rpcapd) - CACE Technologies - C:\Programme\WinPcap\rpcapd.exe -- End of file - 2809 bytes Schon einmal lieben Dank, für die Bemühungen :aplaus: Gruß shame ![]() |
Themen zu Bitte um HiJackThis Logfile auswertung |
add-on, adobe, antivir, application, askbar, auswerten, avira, bho, canon, defender, downloader, drivers, einstellungen, email, google, helfen, hijack, hijackthis, hijackthis logfile, hkus\s-1-5-18, immer wieder, internet, internet explorer, keine ahnung, logfile, magix, monitor, object, rundll, shockwave, software, symantec, system, trojaner, urlsearchhook, windows, windows defender, windows xp |