![]() |
|
Log-Analyse und Auswertung: Brauche Hilfe beim Auswerten von HiJackThis LogfileWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() |
|
![]() | #1 |
| ![]() Brauche Hilfe beim Auswerten von HiJackThis Logfile Hi, ich habe mir warscheinlich irgendwelche Viren eingefangen.Wenn ich IE 7 Starte kommt oben eine Nachricht das Viren oder so hätte und soll auf die angezeigte Seite gehen. Leider kenne ich mich nicht gut aus mit sowas habe mal so ein Logfile erstellt.Bitte um überprüfung. Logfile of Trend Micro HijackThis v2.0.2 Scan saved at 18:43:40, on 29.03.2008 Platform: Windows Vista (WinNT 6.00.1904) MSIE: Internet Explorer v7.00 (7.00.6000.16609) Boot mode: Normal Running processes: C:\Windows\system32\Dwm.exe C:\Windows\Explorer.EXE C:\Windows\system32\taskeng.exe C:\ProgramData\onerungj\exgfsfif.exe C:\Program Files\Windows Defender\MSASCui.exe C:\Program Files\Sigmatel\C-Major Audio\WDM\sttray.exe C:\Program Files\Java\jre1.6.0\bin\jusched.exe C:\Program Files\Windows Media Player\wmplayer.exe C:\Windows\System32\ico.exe C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe C:\Program Files\Common Files\Intel\IntelDH\NMS\Support\IntelHCTAgent.exe C:\Program Files\Intel\IntelDH\CCU\CCU_TrayIcon.exe C:\Program Files\avmwlanstick\WLanGUI.exe C:\Program Files\ICQLite\ICQLite.exe C:\Windows\System32\rundll32.exe C:\Program Files\Windows Media Player\WMPSideShowGadget.exe C:\Program Files\Windows Mail\WindowsMailGadget.exe C:\Windows\System32\Ctxfihlp.exe C:\Windows\System32\rundll32.exe C:\Windows\SYSTEM32\CTXFISPI.EXE C:\Program Files\Common Files\Symantec Shared\ccApp.exe C:\Windows\ehome\ehtray.exe C:\Program Files\Windows Mail\WinMail.exe C:\Program Files\Windows Sidebar\sidebar.exe C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe C:\Program Files\Microsoft Office\Office\FINDFAST.EXE C:\Program Files\Microsoft Office\Office\OSA.EXE C:\Program Files\Windows Sidebar\sidebar.exe C:\Windows\ehome\ehmsas.exe C:\Program Files\Intel\IntelDH\CCU\CCU_Engine.exe C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe C:\Program Files\Internet Explorer\IEUser.exe C:\Program Files\Trend Micro\HijackThis\HijackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.t-online.de/ R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://www.google.de/ig/dell?hl=de&client=dell-row&channel=de&ibd=4071103 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Window Title = Internet Explorer bereitgestellt von Dell R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O1 - Hosts: ::1 localhost O2 - BHO: Adobe PDF Reader - {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelper.dll O2 - BHO: (no name) - {1E8A6170-7264-4D0F-BEAE-D42A53123C75} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.7\NppBho.dll O2 - BHO: Skype add-on (mastermind) - {22BF413B-C6D2-4d91-82A9-A0F997BA588C} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll O2 - BHO: GNX Bingo - {72C7F75B-B10B-4477-A687-EF10300DE5DD} - C:\Windows\kdftlboerfg.dll O2 - BHO: SSVHelper Class - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\Program Files\Java\jre1.6.0\bin\ssv.dll O2 - BHO: Browser Address Error Redirector - {CA6319C0-31B7-401E-A518-A07C3DB8F777} - C:\Program Files\Dell\BAE\BAE.dll O3 - Toolbar: Norton-Symbolleiste anzeigen - {90222687-F593-4738-B738-FBEE9C7B26DF} - C:\Program Files\Common Files\Symantec Shared\coShared\Browser\1.7\UIBHO.dll O4 - HKLM\..\Run: [Windows Defender] %ProgramFiles%\Windows Defender\MSASCui.exe -hide O4 - HKLM\..\Run: [SigmatelSysTrayApp] C:\Program Files\SigmaTel\C-Major Audio\WDM\sttray.exe O4 - HKLM\..\Run: [SunJavaUpdateSched] "c:\Program Files\Java\jre1.6.0\bin\jusched.exe" O4 - HKLM\..\Run: [PMX Daemon] ICO.EXE O4 - HKLM\..\Run: [VolPanel] "C:\Program Files\Creative\Sound Blaster X-Fi\Volume Panel\VolPanlu.exe" /r O4 - HKLM\..\Run: [UpdReg] C:\Windows\UpdReg.EXE O4 - HKLM\..\Run: [IAAnotif] "C:\Program Files\Intel\Intel Matrix Storage Manager\Iaanotif.exe" O4 - HKLM\..\Run: [dscactivate] c:\dell\dsca.exe 3 O4 - HKLM\..\Run: [Adobe Reader Speed Launcher] "C:\Program Files\Adobe\Reader 8.0\Reader\Reader_sl.exe" O4 - HKLM\..\Run: [NMSSupport] "C:\Program Files\Common Files\Intel\IntelDH\NMS\Support\IntelHCTAgent.exe" /startup O4 - HKLM\..\Run: [CCUTRAYICON] "C:\Program Files\Intel\IntelDH\CCU\CCU_TrayIcon.exe" O4 - HKLM\..\Run: [AVMWlanClient] C:\Program Files\avmwlanstick\wlangui.exe O4 - HKLM\..\Run: [ICQ Lite] "C:\Program Files\ICQLite\ICQLite.exe" -minimize O4 - HKLM\..\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit O4 - HKLM\..\Run: [Symantec PIF AlertEng] "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe" /a /m "C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\AlertEng.dll" O4 - HKLM\..\Run: [CTxfiHlp] CTXFIHLP.EXE O4 - HKLM\..\Run: [ccApp] "C:\Program Files\Common Files\Symantec Shared\ccApp.exe" O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe O4 - HKCU\..\Run: [Sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - HKCU\..\Run: [ISUSPM] "C:\Program Files\Common Files\InstallShield\UpdateService\ISUSPM.exe" -scheduler O4 - HKCU\..\RunOnce: [ICQ Lite] C:\Program Files\ICQLite\ICQLite.exe -trayboot O4 - HKLM\..\Policies\Explorer\Run: [lMklRKFGIf] C:\ProgramData\onerungj\exgfsfif.exe O4 - Global Startup: HP Digital Imaging Monitor.lnk = C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe O4 - Global Startup: Microsoft-Indexerstellung.lnk = C:\Program Files\Microsoft Office\Office\FINDFAST.EXE O4 - Global Startup: Office-Start.lnk = C:\Program Files\Microsoft Office\Office\OSA.EXE O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - c:\Program Files\Java\jre1.6.0\bin\npjpi160.dll O9 - Extra 'Tools' menuitem: Sun Java Konsole - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - c:\Program Files\Java\jre1.6.0\bin\npjpi160.dll O9 - Extra button: Skype - {77BF5300-1474-4EC7-9980-D32B190E9B07} - C:\Program Files\Skype\Toolbars\Internet Explorer\SkypeIEPlugin.dll O9 - Extra button: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\PartyGaming\PartyPoker\RunApp.exe O9 - Extra 'Tools' menuitem: PartyPoker.com - {B7FE5D70-9AA2-40F1-9C6B-12A255F085E1} - C:\Programs\PartyGaming\PartyPoker\RunApp.exe O9 - Extra button: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Program Files\ICQLite\ICQLite.exe O9 - Extra 'Tools' menuitem: ICQ Lite - {B863453A-26C3-4e1f-A54D-A2CD196348E9} - C:\Program Files\ICQLite\ICQLite.exe O13 - Gopher Prefix: O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL O21 - SSODL: DrvDrv - {aec5f294-fe38-4a70-89bf-77dfc597d821} - C:\Windows\Installer\{aec5f294-fe38-4a70-89bf-77dfc597d821}\DrvDrv.dll O21 - SSODL: vbgtorfd - {9C599004-FF8A-4820-94A5-1B3428090920} - C:\Windows\vbgtorfd.dll O21 - SSODL: dwnrpofk - {98CBB664-F7CD-4BC0-AD0A-1511034A370A} - C:\Windows\dwnrpofk.dll O23 - Service: Intel(R) Alert Service (AlertService) - Intel(R) Corporation - C:\Program Files\Intel\IntelDH\CCU\AlertService.exe O23 - Service: AVM WLAN Connection Service - AVM Berlin - C:\Program Files\avmwlanstick\WlanNetService.exe O23 - Service: ccEvtMgr - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe O23 - Service: ccSetMgr - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe O23 - Service: Symantec Lic NetConnect service (CLTNetCnService) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe O23 - Service: COM Host (comHost) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\VAScanner\comHost.exe O23 - Service: Intel(R) DHTrace Controller (DHTRACE) - Intel(R) Corporation - C:\Program Files\Common Files\Intel\IntelDH\bin\DHTraceController.exe O23 - Service: DQLWinService - Unknown owner - C:\Program Files\Common Files\Intel\IntelDH\NMS\AdpPlugins\DQLWinService.exe O23 - Service: DSBrokerService - Unknown owner - C:\Program Files\DellSupport\brkrsvc.exe O23 - Service: Intel(R) Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe O23 - Service: Intel(R) Software Services Manager (ISSM) - Intel(R) Corporation - C:\Program Files\Intel\IntelDH\Intel Media Server\Media Server\bin\ISSM.exe O23 - Service: LiveUpdate - Symantec Corporation - C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE O23 - Service: LiveUpdate Notice Service Ex (LiveUpdate Notice Ex) - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\ccSvcHst.exe O23 - Service: LiveUpdate Notice Service - Symantec Corporation - C:\Program Files\Common Files\Symantec Shared\PIF\{B8E1DD85-8582-4c61-B58F-2F227FCA9A08}\PIFSvc.exe O23 - Service: Intel(R) Viiv(TM) Media Server (M1 Server) - Unknown owner - C:\Program Files\Intel\IntelDH\Intel Media Server\Media Server\bin\mediaserver.exe O23 - Service: Intel(R) Application Tracker (MCLServiceATL) - Intel(R) Corporation - C:\Program Files\Intel\IntelDH\Intel Media Server\Shells\MCLServiceATL.exe O23 - Service: Intel(R) NMSCore (NMSCore) - Intel(R) Corporation - C:\Program Files\Common Files\Intel\IntelDH\NMS\NMSCore\NMSCore.exe O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe O23 - Service: Intel(R) Quality Manager (QualityManager) - Intel(R) Corporation - C:\Program Files\Intel\IntelDH\Intel Media Server\Media Server\bin\qualitymanager.exe O23 - Service: Intel(R) Remoting Service (Remote UI Service) - Intel(R) Corporation - C:\Program Files\Intel\IntelDH\Intel Media Server\Shells\Remote UI Service.exe O23 - Service: RoxMediaDB9 - Sonic Solutions - C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\RoxMediaDB9.exe O23 - Service: SigmaTel Audio Service (STacSV) - SigmaTel, Inc. - C:\Windows\system32\STacSV.exe O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files\Common Files\Steam\SteamService.exe O23 - Service: stllssvr - MicroVision Development, Inc. - C:\Program Files\Common Files\SureThing Shared\stllssvr.exe O23 - Service: Symantec Core LC - Unknown owner - C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe -- End of file - 10993 bytes |
![]() | #2 | |
Administrator > Competence Manager | ![]() Brauche Hilfe beim Auswerten von HiJackThis LogfileHallo Nevon und ![]() Dateien Online überprüfen lassen:
Zitat:
Malwarebytes' Anti-Malware
__________________ |
![]() | #3 |
| ![]() Brauche Hilfe beim Auswerten von HiJackThis Logfile Erstmal vielen Dank für die Hilfe!
__________________So hier sind die 4 Ergebnisse von den Virustotal: 1. AhnLab-V3 - - - AntiVir - - TR/BHO.Agent.221184 Authentium - - - AVG - - Downloader.Zlob.AAQ BitDefender - - - CAT-QuickHeal - - AdWare.Vapsup.cue (Not a Virus) ClamAV - - - DrWeb - - - eSafe - - - eTrust-Vet - - Win32/Pripecs!generic Ewido - - - FileAdvisor - - - Fortinet - - - F-Prot - - - F-Secure - - - Ikarus - - Trojan.BHO.Agent.221184 Kaspersky - - - McAfee - - - Microsoft - - Trojan:Win32/Zlob.ZWY NOD32v2 - - - Norman - - - Panda - - - Prevx1 - - Downloader.Drev.A Rising - - Trojan.Clicker.Win32.Agent.ypq Sophos - - Mal/Emogen-AC Sunbelt - - - Symantec - - - TheHacker - - - VBA32 - - suspected of Downloader.Zlob.8 VirusBuster - - - Webwasher-Gateway - - Trojan.BHO.Agent.221184 weitere Informationen MD5: b4b5077332df453ff8150283f527c6d0 SHA1: 588f2862c7eb3328310227219c26c505bc8b835c SHA256: 8a8db287f55b0fcad1d0949d97f153653c49da49510592a468a132bd7b210b03 SHA512: 51e6ff8ac9d71e00e05101f329124ae766534719500fa10e3b15dbedfbd7f8e5 159f7313b2c1f5c36342c522edd19fb1ebc1018114d557c48fc08dd3e82c20a9 2. Antivirus Version letzte aktualisierung Ergebnis AhnLab-V3 2008.3.29.0 2008.03.29 - AntiVir 7.6.0.78 2008.03.28 - Authentium 4.93.8 2008.03.30 - Avast 4.7.1098.0 2008.03.29 - AVG 7.5.0.516 2008.03.29 - BitDefender 7.2 2008.03.30 - CAT-QuickHeal 9.50 2008.03.28 - ClamAV 0.92.1 2008.03.30 - DrWeb 4.44.0.09170 2008.03.30 - eSafe 7.0.15.0 2008.03.18 - eTrust-Vet 31.3.5653 2008.03.29 - Ewido 4.0 2008.03.29 - F-Prot 4.4.2.54 2008.03.30 - F-Secure 6.70.13260.0 2008.03.29 - FileAdvisor 1 2008.03.30 - Fortinet 3.14.0.0 2008.03.30 - Ikarus T3.1.1.20 2008.03.30 - Kaspersky 7.0.0.125 2008.03.30 - McAfee 5262 2008.03.28 - Microsoft 1.3301 2008.03.28 - NOD32v2 2984 2008.03.29 - Norman 5.80.02 2008.03.28 - Panda 9.0.0.4 2008.03.29 - Prevx1 V2 2008.03.30 - Rising 20.37.60.00 2008.03.30 - Sophos 4.28.0 2008.03.30 - Sunbelt 3.0.978.0 2008.03.18 - Symantec 10 2008.03.30 - TheHacker 6.2.92.258 2008.03.29 - VBA32 3.12.6.3 2008.03.25 - VirusBuster 4.3.26:9 2008.03.29 - Webwasher-Gateway 6.6.2 2008.03.30 - weitere Informationen File size: 168960 bytes MD5: bb07a5e61b32aaff2568d373b45a8c31 SHA1: 0ff4168d5f280b1452bf3294caf7425eeabf0933 PEiD: - 3. Antivirus Version letzte aktualisierung Ergebnis AhnLab-V3 2008.3.29.0 2008.03.29 - AntiVir 7.6.0.78 2008.03.28 TR/Crypt.XPACK.Gen Authentium 4.93.8 2008.03.29 - Avast 4.7.1098.0 2008.03.29 - AVG 7.5.0.516 2008.03.28 - BitDefender 7.2 2008.03.29 - CAT-QuickHeal 9.50 2008.03.28 Win32.Trojan.Obfuscated.gx.3 ClamAV 0.92.1 2008.03.29 - DrWeb 4.44.0.09170 2008.03.29 - eSafe 7.0.15.0 2008.03.18 suspicious Trojan/Worm eTrust-Vet 31.3.5653 2008.03.29 - Ewido 4.0 2008.03.29 - FileAdvisor 1 2008.03.29 - Fortinet 3.14.0.0 2008.03.29 - F-Prot 4.4.2.54 2008.03.28 - F-Secure 6.70.13260.0 2008.03.29 - Ikarus T3.1.1.20 2008.03.29 - Kaspersky 7.0.0.125 2008.03.29 - McAfee 5262 2008.03.28 - Microsoft 1.3301 2008.03.28 Trojan:Win32/Vundo.BH NOD32v2 2984 2008.03.29 - Norman 5.80.02 2008.03.28 - Panda 9.0.0.4 2008.03.29 Suspicious file Prevx1 V2 2008.03.29 - Rising 20.37.51.00 2008.03.29 - Sophos 4.28.0 2008.03.29 - Sunbelt 3.0.978.0 2008.03.18 - Symantec 10 2008.03.29 - TheHacker 6.2.92.258 2008.03.29 - VBA32 3.12.6.3 2008.03.25 - VirusBuster 4.3.26:9 2008.03.29 - Webwasher-Gateway 6.6.2 2008.03.29 Trojan.Crypt.XPACK.Gen weitere Informationen File size: 43520 bytes MD5: 46aa115c6c9a13bf5ec9be210a0d93fd SHA1: edbbde8b29bb104f32ad3590343db77518e0ce87 PEiD: UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser packers: UPX packers: UPX packers: UPX 4. AhnLab-V3 - - - AntiVir - - ADSPY/Agent.PB Authentium - - Possibly a new variant of W32/Adware-Vapsup!Maximus Avast - - Win32:Agent-LTS AVG - - Downloader.Zlob.ACS BitDefender - - - CAT-QuickHeal - - - ClamAV - - - DrWeb - - - eSafe - - - eTrust-Vet - - Win32/Pripecs!generic Ewido - - - FileAdvisor - - - Fortinet - - - F-Prot - - - F-Secure - - - Ikarus - - Virus.Win32.Agent.LTS Kaspersky - - - McAfee - - - Microsoft - - - NOD32v2 - - - Norman - - - Panda - - - Prevx1 - - - Rising - - Trojan.Clicker.Win32.Agent.ypr Sophos - - - Sunbelt - - - Symantec - - - TheHacker - - - VBA32 - - suspected of Downloader.Zlob.5 VirusBuster - - - Webwasher-Gateway - - Ad-Spyware.Agent.PB weitere Informationen MD5: 2f150e05e85173d2fc614cc82ef9b751 SHA1: 8fcd8e350324bee2cbc04dca509e359d72f67a04 SHA256: 0c4f6e1118585313dc0e2dc64f0c369fa921a5740f11539efc430c019e3d8e48 SHA512: 5be613c8f65ed825ef23dd69a8bf51864a6ba6f88a17f4b3fdfb283cc752c9d2 c15562116878977b6424a008c3148c64fa034b73b3ac8681283dd6034cb8a247 Hier ist noch der Bericht von Anti-Malware (Nach dem entfernen von den Viren stand bei Anti-Malware das nur wenige Viren nicht entfernt werden konnten.): Malwarebytes' Anti-Malware 1.09 Datenbank Version: 568 Scan Art: Komplett Scan (C:\|D:\|E:\|F:\|G:\|H:\|I:\|) Objekte gescannt: 156881 Scan Dauer: 24 minute(s), 29 second(s) Infizierte Speicher Prozesse: 0 Infizierte Speicher Module: 1 Infizierte Registrierungsschlüssel: 36 Infizierte Registrierungswerte: 4 Infizierte Datei Objekte der Registrierung: 0 Infizierte Verzeichnisse: 5 Infizierte Dateien: 17 Infizierte Speicher Prozesse: (Keine Malware Objekte gefunden) Infizierte Speicher Module: C:\Windows\kdftlboerfg.dll (Trojan.FakeAlert) -> Unloaded module successfully. Infizierte Registrierungsschlüssel: HKEY_CLASSES_ROOT\CLSID\{aec5f294-fe38-4a70-89bf-77dfc597d821} (Trojan.Alphabet) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{000000da-0786-4633-87c6-1aa7a4429ef1} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{0b682cc1-fb40-4006-a5dd-99edd3c9095d} (Fake.Dropped.Malware) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{54645654-2225-4455-44a1-9f4543d34545} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{0e1230f8-ea50-42a9-983c-d22abc2eeb4c} (Fake.Dropped.Malware) -> Delete on reboot. HKEY_CLASSES_ROOT\CLSID\{5c7f15e1-f31a-44fd-aa1a-2ec63aaffd3a} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Delete on reboot. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{9dd4258a-7138-49c4-8d34-587879a5c7a4} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Delete on reboot. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{b8c0220d-763d-49a4-95f4-61dfdec66ee6} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Delete on reboot. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c3bcc488-1ae7-11d4-ab82-0010a4ec2338} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Classes\HOL5_VXIEWER.FULL.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Classes\applications\accessdiver.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\fwbd (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\HolLol (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Inet Delivery (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Inet Delivery (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\mslagent (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Invictus (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Internet Explorertoolbar (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\mwc (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Golden Palace Casino PT (Trojan.DNSChanger) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Golden Palace Casino NEW (Trojan.DNSChanger) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{98cbb664-f7cd-4bc0-ad0a-1511034a370a} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{72c7f75b-b10b-4477-a687-ef10300de5dd} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{72c7f75b-b10b-4477-a687-ef10300de5dd} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\webvideo (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\CLSID\{9c599004-ff8a-4820-94a5-1b3428090920} (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Classes\qvdntlmw.bkra (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Classes\qvdntlmw.ToolBar.1 (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_CLASSES_ROOT\MSVPS.MSVPSApp (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\VideoPlugin (Trojan.Fakealert) -> Quarantined and deleted successfully. Infizierte Registrierungswerte: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\DrvDrv (Trojan.Alphabet) -> Quarantined and deleted successfully. HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{0656a137-b161-cadd-9777-e37a75727e78} (Fake.Dropped.Malware) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\dwnrpofk (Trojan.FakeAlert) -> Quarantined and deleted successfully. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\vbgtorfd (Trojan.FakeAlert) -> Quarantined and deleted successfully. Infizierte Datei Objekte der Registrierung: (Keine Malware Objekte gefunden) Infizierte Verzeichnisse: C:\Windows\Installer\{aec5f294-fe38-4a70-89bf-77dfc597d821} (Trojan.Alphabet) -> Quarantined and deleted successfully. C:\Windows\mslagent (Adware.EGDAccess) -> Quarantined and deleted successfully. C:\Program Files\akl (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Windows\system32smp (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\Inet Delivery (Fake.Dropped.Malware) -> Quarantined and deleted successfully. Infizierte Dateien: C:\Windows\Installer\{aec5f294-fe38-4a70-89bf-77dfc597d821}\DrvDrv.dll (Trojan.Alphabet) -> Quarantined and deleted successfully. C:\Windows\Web\def.htm (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Windows\mslagent\2_mslagent.dll (Adware.EGDAccess) -> Quarantined and deleted successfully. C:\Windows\mslagent\mslagent.exe (Adware.EGDAccess) -> Quarantined and deleted successfully. C:\Windows\mslagent\uninstall.exe (Adware.EGDAccess) -> Quarantined and deleted successfully. C:\Program Files\akl\akl.dll (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\akl\akl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\akl\uninstall.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\akl\unsetup.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Windows\system32smp\msrc.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\Inet Delivery\inetdl.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Program Files\Inet Delivery\intdel.exe (Fake.Dropped.Malware) -> Quarantined and deleted successfully. C:\Windows\rs.txt (Malware.Trace) -> Quarantined and deleted successfully. C:\Windows\dwnrpofk.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Windows\kdftlboerfg.dll (Trojan.FakeAlert) -> Delete on reboot. C:\Windows\norlatmx.exe (Trojan.FakeAlert) -> Quarantined and deleted successfully. C:\Windows\vbgtorfd.dll (Trojan.FakeAlert) -> Quarantined and deleted successfully. |
![]() | #4 |
Administrator > Competence Manager | ![]() Brauche Hilfe beim Auswerten von HiJackThis LogfileCCleaner Temporäre Dateien mit CCleaner bereinigen Download CCleaner und installiere ihn, (klicke die Toolbar weg!). Danach CCleaner starten und => unter options settings => german einstellen.
ComboFix
__________________ Anfragen per Email, Profil- oder privater Nachricht werden ignoriert! Hilfe gibts NUR im Forum! Stulti est se ipsum sapientem putare. |
![]() | #5 |
| ![]() Brauche Hilfe beim Auswerten von HiJackThis Logfile Habe alles soweit verstanden, außer einer Sache: Bei Reiter Windows unter WINDOWS EXPLORER und SYSTEM: soll ich da auch alles angekreuzt lassen? |
![]() | #6 | |
Administrator > Competence Manager | ![]() Brauche Hilfe beim Auswerten von HiJackThis LogfileZitat:
![]()
__________________ --> Brauche Hilfe beim Auswerten von HiJackThis Logfile |
![]() | #7 |
| ![]() Brauche Hilfe beim Auswerten von HiJackThis Logfile Sollte ich eigentlich bei SmitfraudFix auch in den abgesicherten Modus gehen und die Viren dort löschen? Hab nämlich nur einmal gescant. |
![]() | #8 |
| ![]() Brauche Hilfe beim Auswerten von HiJackThis Logfile Habe nochmal Anti_Malware lassen, er hat noch zwei Viren gefunden und beseitigt. Müsste jetzt wohl alles weg sein oder??? Außer das mit dem schwarzen Desktop muss ich jetzt noch hinbekommen. |
![]() |
Themen zu Brauche Hilfe beim Auswerten von HiJackThis Logfile |
add-on, adobe, application, auswerten, bho, brauche hilfe, browser, defender, dll, error, explorer, hijack, hijackthis, hijackthis logfile, ie 7, internet, internet explorer, logfile, programdata, rundll, server, software, stick, symantec, system, toolbars, tracker, viren, vista, windows, windows defender, windows sidebar |