![]() |
| |||||||
Plagegeister aller Art und deren Bekämpfung: Ukash Polizei Virus eingefangen.Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
![]() |
| | #1 |
![]() ![]() | Ukash Polizei Virus eingefangen. Liebe Trojaner Ich habe mir einen Polizei Ukash Virus eingefangen. Mein System war blockiert, trotz mehrmaliges neu starten. Taskmanager ging nur einmal kurz Im Abgesicherten Modus habe ich zwei verdächtige .exe Dateien gefunden und gelöscht. Das Icon der Dateien war das Porsche oder Ferrari Logo, bin nicht sicher. Die Dateien habe ich leider nicht mehr, ich habe erst später in Eurem Forum die Freds über BKA Trojaner gefunden. Nach dem löschen der Datei konnte ich mich wieder anmelden. Ich bitte Euch mir die Log Dateien zu überprüfen, damit ich nicht noch irgendwelche Rest auf meiner Kiste habe. Danke vorweg vielmals für Eure Super Arbeit, ich habe andere Freds mit Ukash Virus gelesen, Ihr seit wirklich sehr professionell und sehr nett. - Fred "Für alle Hilfesuchenden! Was muss ich vor der Eröffnung eines Themas beachten?" durchgeführt. - Deffoger ausgeführt. - GMER hasn't found any system modification. - OTL ausgeführt. Log ist im Anhang. - Malewarebytes nicht gefunden - Emisoft nichts gefunden Danke vielmals. Liebe Grüsse Elena |
| | #2 |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Ukash Polizei Virus eingefangen.![]() Fixen mit OTL Lade (falls noch nicht vorhanden) OTL von Oldtimer herunter und speichere es auf Deinem Desktop (nicht woanders hin).
Code:
ATTFilter :OTL
MOD - D:\[TEMP]\gssxlhp4.exe ()
DRV:64bit: - (mbamchameleon) -- C:\Windows\SysNative\drivers\mbamchameleon.sys ()
IE:64bit: - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE:64bit: - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
IE - HKLM\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKLM\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1000\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1000\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1001\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1001\..\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}: "URL" = http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" = *.local
FF:64bit: - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\Windows\system32\Macromed\Flash\NPSWF64_11_3_300_270.dll File not found
FF:64bit: - HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE: disabled File not found
FF - HKLM\Software\MozillaPlugins\@Apple.com/iTunes,version=: File not found
FF - HKLM\Software\MozillaPlugins\@microsoft.com/GENUINE: disabled File not found
O4 - HKU\S-1-5-21-317556061-3663343374-862786278-1000..\Run: [AdobeBridge] File not found
O4 - HKU\S-1-5-19..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found
O4 - HKU\S-1-5-20..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found
O4 - HKU\S-1-5-21-317556061-3663343374-862786278-1001..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe File not found
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktop = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoActiveDesktopChanges = 1
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: EnableLUA = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: PromptOnSecureDesktop = 0
O7 - HKU\S-1-5-21-317556061-3663343374-862786278-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O7 - HKU\S-1-5-21-317556061-3663343374-862786278-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer: NoDriveTypeAutoRun = 145
O16:64bit: - DPF: {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B} http://appldnld.apple.com.edgesuite.net/content.info.apple.com/QuickTime/qtactivex/qtplugin.cab (Reg Error: Key error.)
O16:64bit: - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab (Java Plug-in 1.6.0_27)
O16:64bit: - DPF: {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab (Java Plug-in 1.6.0_27)
O16:64bit: - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_27-windows-i586.cab (Reg Error: Key error.)
O16 - DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-1_6_0_33-windows-i586.cab (Java Plug-in 10.5.1)
O16 - DPF: {CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_33-windows-i586.cab (Java Plug-in 1.6.0_33)
O16 - DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0_33-windows-i586.cab (Java Plug-in 10.5.1)
O20:64bit: - HKLM Winlogon: VMApplet - (/pagefile) - File not found
O20 - HKLM Winlogon: VMApplet - (/pagefile) - File not found
O21:64bit: - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
O32 - HKLM CDRom: AutoRun - 0
O33 - MountPoints2\{b8420078-1f60-11e1-bf04-005056c00008}\Shell - "" = AutoRun
O33 - MountPoints2\{b8420078-1f60-11e1-bf04-005056c00008}\Shell\AutoRun\command - "" = "H:\WD SmartWare.exe" autoplay=true
[2 C:\Windows\SysNative\*.tmp files -> C:\Windows\SysNative\*.tmp -> ]
[2012.07.13 16:03:32 | 000,001,996 | ---- | C] () -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Corel Painter 12.lnk
@Alternate Data Stream - 229 bytes -> C:\ProgramData\Temp:DD4DD9B9
@Alternate Data Stream - 118 bytes -> C:\ProgramData\Temp:04853F41
:Files
ipconfig /flushdns /c
:Commands
[purity]
[emptytemp]
[emptyflash]
Hinweis für Mitleser: Obiges OTL-Script ist ausschließlich für diesen User in dieser Situtation erstellt worden. Auf keinen Fall auf anderen Rechnern anwenden, das kann andere Systeme nachhaltig schädigen!
__________________ |
| | #3 |
![]() ![]() | Ukash Polizei Virus eingefangen. Danke t'john vielmals für Deine prompte Antwort.
__________________Sehr lieb von Dir. Hier die Log: Code:
ATTFilter All processes killed
========== OTL ==========
Service mbamchameleon stopped successfully!
Service mbamchameleon deleted successfully!
C:\Windows\SysNative\drivers\mbamchameleon.sys moved successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found.
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
Registry key HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found.
HKU\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKU\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyOverride| /E : value set successfully!
HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
Registry key HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\ not found.
HKU\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKU\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyOverride| /E : value set successfully!
64bit-Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@adobe.com/FlashPlayer\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@microsoft.com/GENUINE\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@Apple.com/iTunes,version=\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@microsoft.com/GENUINE\ deleted successfully.
Registry value HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Windows\CurrentVersion\Run\\AdobeBridge deleted successfully.
Registry value HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\RunOnce\\mctadmin deleted successfully.
Registry value HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\RunOnce\\mctadmin deleted successfully.
Registry value HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Windows\CurrentVersion\RunOnce\\mctadmin deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoActiveDesktop deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoActiveDesktopChanges deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorAdmin deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorUser deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\EnableLUA deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\PromptOnSecureDesktop deleted successfully.
Registry value HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun deleted successfully.
Registry value HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\\NoDriveTypeAutoRun deleted successfully.
Starting removal of ActiveX control {02BF25D5-8C17-4B23-BC80-D3488ABDDC6B}
C:\Windows\Downloaded Program Files\QTPlugin.inf moved successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{02BF25D5-8C17-4B23-BC80-D3488ABDDC6B}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{02BF25D5-8C17-4B23-BC80-D3488ABDDC6B}\ not found.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{02BF25D5-8C17-4B23-BC80-D3488ABDDC6B}\ not found.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{02BF25D5-8C17-4B23-BC80-D3488ABDDC6B}\ not found.
Starting removal of ActiveX control {8AD9C840-044E-11D1-B3E9-00805F499D93}
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_USERS\.DEFAULT\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1001\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found.
Starting removal of ActiveX control {CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_USERS\.DEFAULT\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1001\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}\ not found.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0027-ABCDEFFEDCBA}\ not found.
Starting removal of ActiveX control {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_USERS\.DEFAULT\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found.
Starting removal of ActiveX control {8AD9C840-044E-11D1-B3E9-00805F499D93}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{8AD9C840-044E-11D1-B3E9-00805F499D93}\ not found.
Starting removal of ActiveX control {CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_CURRENT_USER\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_USERS\.DEFAULT\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-0016-0000-0033-ABCDEFFEDCBA}\ not found.
Starting removal of ActiveX control {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution Units\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA}\ not found.
64bit-Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\VMApplet:/pagefile deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\VMApplet:/pagefile deleted successfully.
64bit-Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully.
64bit-Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\\WebCheck deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\ not found.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully!
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b8420078-1f60-11e1-bf04-005056c00008}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b8420078-1f60-11e1-bf04-005056c00008}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b8420078-1f60-11e1-bf04-005056c00008}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b8420078-1f60-11e1-bf04-005056c00008}\ not found.
File "H:\WD SmartWare.exe" autoplay=true not found.
C:\Windows\SysNative\761A.tmp deleted successfully.
C:\Windows\SysNative\D0B8.tmp deleted successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Corel Painter 12.lnk moved successfully.
ADS C:\ProgramData\Temp:DD4DD9B9 deleted successfully.
ADS C:\ProgramData\Temp:04853F41 deleted successfully.
========== FILES ==========
< ipconfig /flushdns /c >
Windows-IP-Konfiguration
Der DNS-Aufl”sungscache wurde geleert.
C:\Users\ICH\Desktop\cmd.bat deleted successfully.
C:\Users\ICH\Desktop\cmd.txt deleted successfully.
========== COMMANDS ==========
[EMPTYTEMP]
User: 1kn
->Temp folder emptied: 8223 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 41620 bytes
User: Administrator
User: All Users
User: Default
->Temp folder emptied: 8223 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 56478 bytes
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 0 bytes
User: ICH
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 8378203 bytes
->Java cache emptied: 53019324 bytes
->FireFox cache emptied: 0 bytes
->Flash cache emptied: 178423 bytes
User: Public
User: UpdatusUser
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32 (64bit) .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 371997 bytes
%systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 67832 bytes
RecycleBin emptied: 1222700474 bytes
Total Files Cleaned = 1'225.00 mb
[EMPTYFLASH]
User: 1kn
->Flash cache emptied: 0 bytes
User: Administrator
User: All Users
User: Default
->Flash cache emptied: 0 bytes
User: Default User
->Flash cache emptied: 0 bytes
User: ICH
->Flash cache emptied: 0 bytes
User: Public
User: UpdatusUser
Total Flash Files Cleaned = 0.00 mb
OTL by OldTimer - Version 3.2.56.0 log created on 08102012_231906
Files\Folders moved on Reboot...
File\Folder C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DD738A94-5C2A-45F5-90A4-232C5008DF27}.tmp not found!
File move failed. C:\Windows\temp\vmware-SYSTEM\vmauthd.log scheduled to be moved on reboot.
C:\Windows\temp\vmware-SYSTEM\vmware-usbarb-SYSTEM-1884.log moved successfully.
File\Folder C:\Windows\temp\hsperfdata_COMPUTER$\1960 not found!
C:\Windows\temp\FXSAPIDebugLogFile.txt moved successfully.
C:\Windows\temp\FXSTIFFDebugLogFile.txt moved successfully.
File\Folder C:\Windows\temp\jna6159258678350844225.dll not found!
PendingFileRenameOperations files...
File C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{DD738A94-5C2A-45F5-90A4-232C5008DF27}.tmp not found!
[2012.08.10 23:21:16 | 000,002,013 | ---- | M] () C:\Windows\temp\vmware-SYSTEM\vmauthd.log : Unable to obtain MD5
File C:\Windows\temp\vmware-SYSTEM\vmware-usbarb-SYSTEM-1884.log not found!
File C:\Windows\temp\hsperfdata_COMPUTER$\1960 not found!
File C:\Windows\temp\FXSAPIDebugLogFile.txt not found!
File C:\Windows\temp\FXSTIFFDebugLogFile.txt not found!
File C:\Windows\temp\jna6159258678350844225.dll not found!
Registry entries deleted on Reboot...
Elena |
| | #4 |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Ukash Polizei Virus eingefangen. Sehr gut! ![]() 1. Schritt Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten.danach: 2. Schritt Downloade Dir bitte AdwCleaner auf deinen Desktop.
|
| | #5 |
![]() ![]() | Ukash Polizei Virus eingefangen.Code:
ATTFilter Malwarebytes Anti-Malware 1.62.0.1300 www.malwarebytes.org Datenbank Version: v2012.08.11.03 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 9.0.8112.16421 ICH :: COMPUTER [Administrator] 11.08.2012 16:19:28 mbam-log-2012-08-11 (16-19-28).txt Art des Suchlaufs: Vollständiger Suchlauf (C:\|) Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 437985 Laufzeit: 35 Minute(n), 28 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungswerte: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 0 (Keine bösartigen Objekte gefunden) Infizierte Dateien: 0 (Keine bösartigen Objekte gefunden) (Ende) Code:
ATTFilter # AdwCleaner v1.800 - Logfile created 08/11/2012 at 16:59:26
# Updated 01/08/2012 by Xplode
# Operating system : Windows 7 Professional Service Pack 1 (64 bits)
# User : ICH - COMPUTER
# Running from : D:\[TEMP]\Antivirus\adwcleaner.exe
# Option [Search]
***** [Services] *****
***** [Files / Folders] *****
***** [Registry] *****
Key Found : HKCU\Software\Softonic
[x64] Key Found : HKCU\Software\Softonic
***** [Registre - GUID] *****
[x64] Key Found : HKLM\SOFTWARE\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5}
***** [Internet Browsers] *****
-\\ Internet Explorer v9.0.8112.16421
[OK] Registry is clean.
-\\ Mozilla Firefox v14.0.1 (de)
Profile name : 1kn [Profil par défaut]
File : D:\INSTALLATION PROGRAMME\INTERNET\_FIREFOX\Profile\_1kn\prefs.js
Found : user_pref("extensions.toolbar@ask.com.install-event-fired", true);
Profile name : DEV
File : D:\INSTALLATION PROGRAMME\INTERNET\_FIREFOX\Profile\_DEV\prefs.js
[OK] File is clean.
Profile name : TEMP
File : D:\INSTALLATION PROGRAMME\INTERNET\_FIREFOX\Profile\_TEMP\prefs.js
[OK] File is clean.
*************************
AdwCleaner[R1].txt - [1282 octets] - [10/08/2012 00:52:22]
AdwCleaner[R2].txt - [1352 octets] - [10/08/2012 14:55:08]
AdwCleaner[R3].txt - [1287 octets] - [11/08/2012 16:59:26]
########## EOF - C:\AdwCleaner[R3].txt - [1415 octets] ##########
|
| | #6 |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Ukash Polizei Virus eingefangen. Sehr gut! ![]()
danach: Malware-Scan mit Emsisoft Anti-Malware Lade die Gratisversion von => Emsisoft Anti-Malware herunter und installiere das Programm. Lade über Jetzt Updaten die aktuellen Signaturen herunter. Wähle den Freeware-Modus aus. Wähle Detail Scan und starte über den Button Scan die Überprüfung des Computers. Am Ende des Scans nichts loeschen lassen!. Mit Klick auf Bericht speichern das Logfile auf dem Desktop speichern und hier in den Thread posten. Anleitung: http://www.trojaner-board.de/103809-...i-malware.html
__________________ --> Ukash Polizei Virus eingefangen. |
| | #7 |
![]() ![]() | Ukash Polizei Virus eingefangen.Code:
ATTFilter # AdwCleaner v1.800 - Logfile created 08/11/2012 at 18:24:48
# Updated 01/08/2012 by Xplode
# Operating system : Windows 7 Professional Service Pack 1 (64 bits)
# User : ICH - COMPUTER
# Running from : D:\[TEMP]\Antivirus\adwcleaner.exe
# Option [Delete]
***** [Services] *****
***** [Files / Folders] *****
***** [Registry] *****
Key Deleted : HKCU\Software\Softonic
***** [Registre - GUID] *****
[x64] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5}
***** [Internet Browsers] *****
-\\ Internet Explorer v9.0.8112.16421
[OK] Registry is clean.
-\\ Mozilla Firefox v14.0.1 (de)
Profile name : 1kn [Profil par défaut]
File : D:\INSTALLATION PROGRAMME\INTERNET\_FIREFOX\Profile\_1kn\prefs.js
D:\INSTALLATION PROGRAMME\INTERNET\_FIREFOX\Profile\_1kn\user.js ... Deleted !
Deleted : user_pref("extensions.toolbar@ask.com.install-event-fired", true);
Profile name : DEV
File : D:\INSTALLATION PROGRAMME\INTERNET\_FIREFOX\Profile\_DEV\prefs.js
D:\INSTALLATION PROGRAMME\INTERNET\_FIREFOX\Profile\_DEV\user.js ... Deleted !
[OK] File is clean.
Profile name : TEMP
File : D:\INSTALLATION PROGRAMME\INTERNET\_FIREFOX\Profile\_TEMP\prefs.js
D:\INSTALLATION PROGRAMME\INTERNET\_FIREFOX\Profile\_TEMP\user.js ... Deleted !
[OK] File is clean.
*************************
AdwCleaner[R1].txt - [1282 octets] - [10/08/2012 00:52:22]
AdwCleaner[R2].txt - [1352 octets] - [10/08/2012 14:55:08]
AdwCleaner[R3].txt - [1412 octets] - [11/08/2012 16:59:26]
AdwCleaner[R4].txt - [1472 octets] - [11/08/2012 18:24:43]
AdwCleaner[S1].txt - [1616 octets] - [11/08/2012 18:24:48]
########## EOF - C:\AdwCleaner[S1].txt - [1744 octets] ##########
Code:
ATTFilter Emsisoft Anti-Malware - Version 6.6
Letztes Update: 11.08.2012 18:54:49
Scan Einstellungen:
Scan Methode: Eigener Scan
Objekte: Rootkits, Speicher, Traces, C:\
Archiv Scan: An
ADS Scan: An
Scan Beginn: 11.08.2012 21:54:47
C:\Program Files (x86)\Winamp\Plugins\Stereo Tool.exe gefunden: Trojan.Generic!E2
C:\Program Files (x86)\Bitvise WinSSHD\totermi32.exe gefunden: Trojan-Downloader.Win32.Razle!E2
Gescannt 671627
Gefunden 2
Scan Ende: 11.08.2012 22:10:44
Scan Zeit: 0:15:57
|
| | #8 |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Ukash Polizei Virus eingefangen. Sehr gut! ![]() Deinstalliere: Emsisoft Anti-Malware ESET Online Scanner Vorbereitung
|
| | #9 |
![]() ![]() | Ukash Polizei Virus eingefangen.Code:
ATTFilter C:\Users\ICH\AppData\Roaming\Utvena\ibeck.exe a variant of Win32/Kryptik.AJWX trojan
Operating memory multiple threats
Ich habe es auf File-Upload hochgeladen. hxxp://www.file-upload.net/download-4664858/ibeck.zip.html Im Google habe ich nichts über die Namen herausgefunden. Geändert von Elena Lauder (12.08.2012 um 15:52 Uhr) |
| | #10 |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Ukash Polizei Virus eingefangen. Nichts gutes. Wo kam die auf einmal her? Bist du rumgesurft mit dem Rechner? CustomScan mit OTL Lade Dir bitte OTL von Oldtimer herunter und speichere es auf Deinem Desktop. Falls schon vorhanden, bitte die ältere vorhandene Datei durch die neu heruntergeladene Datei ersetzen, damit du auch wirklich mit einer aktuellen Version von OTL arbeitest.
Code:
ATTFilter netsvcs
msconfig
safebootminimal
safebootnetwork
activex
drivers32
%ALLUSERSPROFILE%\Application Data\*.
%ALLUSERSPROFILE%\Application Data\*.exe /s
%APPDATA%\*.
%APPDATA%\*.exe /s
%SYSTEMDRIVE%\*.exe
/md5start
wininit.exe
userinit.exe
eventlog.dll
scecli.dll
netlogon.dll
cngaudit.dll
ws2ifsl.sys
sceclt.dll
ntelogon.dll
winlogon.exe
logevent.dll
user32.DLL
iaStor.sys
nvstor.sys
atapi.sys
IdeChnDr.sys
viasraid.sys
AGP440.sys
vaxscsi.sys
nvatabus.sys
viamraid.sys
nvata.sys
nvgts.sys
iastorv.sys
ViPrt.sys
eNetHook.dll
ahcix86.sys
KR10N.sys
nvstor32.sys
ahcix86s.sys
/md5stop
%systemroot%\system32\drivers\*.sys /lockedfiles
%systemroot%\System32\config\*.sav
%systemroot%\*. /mp /s
%systemroot%\system32\*.dll /lockedfiles
%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\*.*
%APPDATA%\*AcroIEH*.*
%APPDATA%\*.exe
%APPDATA%\*.tmp
CREATERESTOREPOINT
Code:
ATTFilter
ssdeep
3072:85ue87zLkwx9rC3uIUFetsA3ucIt0TsfonSfh+yduHeL4QRPHxEy1uDxm:Yt8Rxt8uHF6sAe/tvQSfh+yduHnyxEyn
TrID
Win32 Executable Generic (42.3%)
Win32 Dynamic Link Library (generic) (37.6%)
Generic Win/DOS Executable (9.9%)
DOS Executable Generic (9.9%)
Autodesk FLIC Image File (extensions: flc, fli, cel) (0.0%)
ExifTool
MIMEType.................: application/octet-stream
Subsystem................: Windows GUI
MachineType..............: Intel 386 or later, and compatibles
TimeStamp................: 2011:03:25 06:01:22+01:00
FileType.................: Win32 EXE
PEType...................: PE32
CodeSize.................: 0
LinkerVersion............: 12.0
EntryPoint...............: 0x1f66
InitializedDataSize......: 5120
SubsystemVersion.........: 5.1
ImageVersion.............: 0.0
OSVersion................: 5.1
UninitializedDataSize....: 0
Portable Executable structural information
Compilation timedatestamp.....: 2011-03-25 05:01:22
Target machine................: 0x14C (Intel 386 or later processors and compatible processors)
Entry point address...........: 0x00001F66
PE Sections...................:
Name Virtual Address Virtual Size Raw Size Entropy MD5
.text 4096 41451 41472 7.08 a9b83986779fa1b1a7d8ec97c74c0c58
.data 49152 341028 137728 7.09 adb68cad227f027a49b27d03e7a3fd9f
.rsrc 393216 2000 2048 3.60 dfcce71e478431c18941f078e6d0558d
.idata 397312 1846 2048 6.29 29c8b9ea803c99480d3b1d0a377008c0
.itext 401408 619 1024 3.79 6040269a4b998e830ac5ffeee0fdef75
PE Imports....................:
[[KERNEL32.dll]]
GetProcessHeap
[[USER32.dll]]
IsCharAlphaNumericA, GetDC
PE Exports....................:
_FounderNormal@444GPAUHINSTANCE__@@U_COMMPROP@@_J, _NormalLock@444GPAUHINSTANCE__@@U_COMMPROP@@_J, _NormalPointer@444GPAUHINSTANCE__@@U_COMMPROP@@_J, _NormalSpeed@444GPAUHINSTANCE__@@U_COMMPROP@@_J, _NormalWeight@444GPAUHINSTANCE__@@U_COMMPROP@@_J, _NormalXern@444GPAUHINSTANCE__@@U_COMMPROP@@_J, _NormalityCover@444GPAUHINSTANCE__@@U_COMMPROP@@_J, _NormalityQuan@444GPAUHINSTANCE__@@U_COMMPROP@@_J, _ReactNormal@444GPAUHINSTANCE__@@U_COMMPROP@@_J
Code:
ATTFilter
Antivirus
Result
Update
AntiVir
TR/ZAccessHL.A
20120812
Antiy-AVL
-
20120811
Avast
Win32:ZAccess-HL [Trj]
20120812
AVG
PSW.Generic10.HVS
20120812
BitDefender
Gen:Variant.Kazy.86304
20120812
ByteHero
-
20120723
CAT-QuickHeal
(Suspicious) - DNAScan
20120812
ClamAV
-
20120811
Commtouch
W32/Falab.F12.gen!Eldorado
20120811
Comodo
-
20120812
DrWeb
-
20120812
Emsisoft
Trojan.Win32.Yakes!IK
20120812
eSafe
-
20120812
ESET-NOD32
a variant of Win32/Kryptik.AJWX
20120812
F-Prot
W32/Falab.F12.gen!Eldorado
20120810
F-Secure
Gen:Variant.Kazy.86304
20120812
Fortinet
-
20120812
GData
Gen:Variant.Kazy.86304
20120812
Ikarus
Trojan.Win32.Yakes
20120812
Jiangmin
-
20120812
K7AntiVirus
-
20120810
Kaspersky
Trojan.Win32.Jorik.Zbot.ezc
20120812
McAfee
PWS-Zbot.gen.air
20120812
McAfee-GW-Edition
-
20120812
Microsoft
-
20120812
Norman
W32/Kryptik.BRM
20120812
nProtect
-
20120812
Panda
Suspicious file
20120812
PCTools
-
20120812
Rising
-
20120810
Sophos
-
20120812
SUPERAntiSpyware
-
20120811
Symantec
-
20120812
TheHacker
-
20120812
TotalDefense
-
20120812
TrendMicro
-
20120812
TrendMicro-HouseCall
-
20120812
VBA32
-
20120810
VIPRE
-
20120812
ViRobot
-
20120812
VirusBuster
-
20120811
|
| | #11 |
![]() ![]() | Ukash Polizei Virus eingefangen. Oje, keine Ahnung wie das passierte. |
| | #12 |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Ukash Polizei Virus eingefangen. Fixen mit OTL Lade (falls noch nicht vorhanden) OTL von Oldtimer herunter und speichere es auf Deinem Desktop (nicht woanders hin).
Code:
ATTFilter :OTL
IE:64bit: - HKLM\..\SearchScopes,DefaultScope =
IE - HKLM\..\SearchScopes,DefaultScope =
IE - HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1000\..\SearchScopes,DefaultScope = {0633EE93-D776-472f-A0FF-E1416B8B2E3A}
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1001\..\SearchScopes,DefaultScope =
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 0
IE - HKU\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyOverride" =
O4 - HKLM..\Run: [Acrobat Assistant 8.0] C:\Program Files (x86)\Adobe\Acrobat 10.0\Acrobat\Acrotray.exe (Adobe Systems Inc.)
O4 - HKLM..\Run: [Adobe Acrobat Speed Launcher] C:\Program Files (x86)\Adobe\Acrobat 10.0\Acrobat\Acrobat_sl.exe (Adobe Systems Incorporated)
O4 - HKLM..\Run: [AdobeCS6ServiceManager] C:\Program Files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe (Adobe Systems Incorporated)
O4 - HKU\S-1-5-21-317556061-3663343374-862786278-1000..\Run: [Quupaqyl] C:\Users\ICH\AppData\Roaming\Utvena\ibeck.exe File not found
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: EnableLUA = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 0
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: PromptOnSecureDesktop = 0
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2009.06.18 23:12:18 | 000,000,088 | ---- | M] () - H:\autorun.inf -- [ UDF ]
O33 - MountPoints2\{b8420078-1f60-11e1-bf04-005056c00008}\Shell - "" = AutoRun
O33 - MountPoints2\{b8420078-1f60-11e1-bf04-005056c00008}\Shell\AutoRun\command - "" = H:\WD SmartWare.exe -- [2009.10.14 23:28:45 | 003,271,968 | ---- | M] (Western Digital)
Drivers32: VIDC.FFDS - C:\Windows\SysWow64\ff_vfw.dll ()
[2012.08.11 01:49:05 | 000,000,000 | ---D | C] -- C:\ProgramData\vsosdk
:Files
C:\Users\ICH\AppData\Roaming\Utvena
ipconfig /flushdns /c
:Commands
[purity]
[emptytemp]
[emptyflash]
Hinweis für Mitleser: Obiges OTL-Script ist ausschließlich für diesen User in dieser Situtation erstellt worden. Auf keinen Fall auf anderen Rechnern anwenden, das kann andere Systeme nachhaltig schädigen! |
| | #13 |
![]() ![]() | Ukash Polizei Virus eingefangen.Code:
ATTFilter All processes killed
========== OTL ==========
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
HKU\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKU\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
HKU\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Internet Explorer\SearchScopes\\DefaultScope| /E : value set successfully!
HKU\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyEnable|dword:0 /E : value set successfully!
HKU\S-1-5-21-317556061-3663343374-862786278-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\\ProxyOverride| /E : value set successfully!
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\Acrobat Assistant 8.0 deleted successfully.
C:\Program Files (x86)\Adobe\Acrobat 10.0\Acrobat\Acrotray.exe moved successfully.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\Adobe Acrobat Speed Launcher deleted successfully.
C:\Program Files (x86)\Adobe\Acrobat 10.0\Acrobat\Acrobat_sl.exe moved successfully.
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\AdobeCS6ServiceManager deleted successfully.
C:\Program Files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe moved successfully.
Registry value HKEY_USERS\S-1-5-21-317556061-3663343374-862786278-1000\Software\Microsoft\Windows\CurrentVersion\Run\\Quupaqyl deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\EnableLUA deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\ConsentPromptBehaviorAdmin deleted successfully.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System\\PromptOnSecureDesktop deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully!
File move failed. H:\autorun.inf scheduled to be moved on reboot.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b8420078-1f60-11e1-bf04-005056c00008}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b8420078-1f60-11e1-bf04-005056c00008}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b8420078-1f60-11e1-bf04-005056c00008}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b8420078-1f60-11e1-bf04-005056c00008}\ not found.
File move failed. H:\WD SmartWare.exe scheduled to be moved on reboot.
Registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Drivers32\\VIDC.FFDS deleted successfully.
C:\Windows\SysWOW64\ff_vfw.dll moved successfully.
C:\ProgramData\vsosdk folder moved successfully.
========== FILES ==========
File\Folder C:\Users\ICH\AppData\Roaming\Utvena not found.
< ipconfig /flushdns /c >
Windows-IP-Konfiguration
Der DNS-Aufl”sungscache wurde geleert.
C:\Users\ICH\Desktop\cmd.bat deleted successfully.
C:\Users\ICH\Desktop\cmd.txt deleted successfully.
========== COMMANDS ==========
[EMPTYTEMP]
User: 1kn
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 0 bytes
User: Administrator
User: All Users
User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 0 bytes
User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
->Flash cache emptied: 0 bytes
User: ICH
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 461848658 bytes
->Java cache emptied: 0 bytes
->FireFox cache emptied: 0 bytes
->Flash cache emptied: 5409 bytes
User: Public
User: UpdatusUser
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes
%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32 (64bit) .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 505173 bytes
%systemroot%\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 33170 bytes
%systemroot%\system32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment folder emptied: 755 bytes
%systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 33170 bytes
RecycleBin emptied: 1940173704 bytes
Total Files Cleaned = 2'291.00 mb
[EMPTYFLASH]
User: 1kn
->Flash cache emptied: 0 bytes
User: Administrator
User: All Users
User: Default
->Flash cache emptied: 0 bytes
User: Default User
->Flash cache emptied: 0 bytes
User: ICH
->Flash cache emptied: 0 bytes
User: Public
User: UpdatusUser
Total Flash Files Cleaned = 0.00 mb
OTL by OldTimer - Version 3.2.57.0 log created on 08142012_002637
Files\Folders moved on Reboot...
File move failed. H:\autorun.inf scheduled to be moved on reboot.
File move failed. H:\WD SmartWare.exe scheduled to be moved on reboot.
File\Folder C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{840D1DAA-3E1E-4FD4-88F6-B04C3CE78804}.tmp not found!
File\Folder C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{46C6E9DF-6F10-493E-8DD7-3394BBC1738B}.tmp not found!
File\Folder C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{63B33691-CE73-4070-A191-6C8AF04C6226}.tmp not found!
File\Folder C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{66FEB3A7-FDCC-4DA8-B312-2DD6A2A31024}.tmp not found!
File\Folder C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{788554A5-B737-49B1-BFB1-C4E9BB123A0E}.tmp not found!
File\Folder C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A49F0DEC-92FE-40BF-993C-D9029FAC4E75}.tmp not found!
File move failed. C:\Windows\temp\vmware-SYSTEM\vmauthd.log scheduled to be moved on reboot.
C:\Windows\temp\vmware-SYSTEM\vmware-usbarb-SYSTEM-492.log moved successfully.
File\Folder C:\Windows\temp\hsperfdata_COMPUTER$\1728 not found!
File\Folder C:\Windows\temp\jna5294264831563543499.dll not found!
PendingFileRenameOperations files...
[2009.06.18 23:12:18 | 000,000,088 | ---- | M] () H:\autorun.inf : MD5=31D5D799A3B78AF52EA7D3E8C9096C78
[2009.10.14 23:28:45 | 003,271,968 | ---- | M] (Western Digital) H:\WD SmartWare.exe : MD5=7CE315DDE56D08DEBA13FA63154E14C4
File C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{840D1DAA-3E1E-4FD4-88F6-B04C3CE78804}.tmp not found!
File C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{46C6E9DF-6F10-493E-8DD7-3394BBC1738B}.tmp not found!
File C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{63B33691-CE73-4070-A191-6C8AF04C6226}.tmp not found!
File C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{66FEB3A7-FDCC-4DA8-B312-2DD6A2A31024}.tmp not found!
File C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{788554A5-B737-49B1-BFB1-C4E9BB123A0E}.tmp not found!
File C:\Users\ICH\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{A49F0DEC-92FE-40BF-993C-D9029FAC4E75}.tmp not found!
[2012.08.14 00:29:35 | 000,002,013 | ---- | M] () C:\Windows\temp\vmware-SYSTEM\vmauthd.log : Unable to obtain MD5
File C:\Windows\temp\vmware-SYSTEM\vmware-usbarb-SYSTEM-492.log not found!
File C:\Windows\temp\hsperfdata_COMPUTER$\1728 not found!
File C:\Windows\temp\jna5294264831563543499.dll not found!
Registry entries deleted on Reboot...
|
| | #14 |
| /// Helfer-Team ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Ukash Polizei Virus eingefangen. Sehr gut! ![]() Wie laeuft der Rechner? 1. Schritt Bitte einen Vollscan mit Malwarebytes Anti-Malware machen und Log posten.danach: 2. Schritt Downloade Dir bitte AdwCleaner auf deinen Desktop.
|
| | #15 |
![]() ![]() | Ukash Polizei Virus eingefangen. Der Rechner läuft eigentlich gut, ich hatte jetzt während dem ganzen entfernern keine Probleme bemerkt. Geändert von Elena Lauder (15.08.2012 um 11:11 Uhr) |
![]() |
| Themen zu Ukash Polizei Virus eingefangen. |
| abgesicherten, arbeit, beachten, blockiert, dateien, eingefangen, eröffnung, forum, found, gen, gmer, icon, kis, löschen, melde, modus, neu, nicht mehr, nichts, professionell, super, system, trotz, verdächtige, virus, wirklich |