BKDR_INJECT.BYF
Windows 2000, Windows XP, Windows Server 2003
Malware-Typ:
Backdoor
Zerstrerisch?:
Nein
Verschlsselt?:
In the wild::
Ja
Überblick
Löscht sich nach der Ausführung selbst.
Technische Details
Installation
Erstellt die folgenden Ordner:
- %User Profile%\Application Data\Aquwip
- %User Profile%\Microsoft\Address Book
(Hinweis: %User Profile% ist der Ordner für Benutzerprofile des aktuellen Benutzers, normalerweise C:\Windows\Profile\{Benutzername} unter Windows 98 und ME, C:\WINNT\Profile\{Benutzername} unter Windows NT und C:\Dokumente und Einstellungen\{Benutzername} unter Windows 2000, XP und Server 2003.)
Autostart-Technik
Fügt folgende Registrierungseinträge hinzu, um bei jedem Systemstart automatisch ausgeführt zu werden.
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
{C8B0FB29-AD41-AD40-5C09-405F58D6634D} = "%User Profile%\Aquwip\atzy.exe"
Andere Systemänderungen
Fügt die folgenden Registrierungsschlüssel hinzu:
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Privacy
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
HKEY_CURRENT_USER\Software\Microsoft\
WAB\WAB4\Wab File Name
Fügt die folgenden Registrierungseinträge hinzu:
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager
Server ID = "4"
HKEY_CURRENT_USER\Software\Microsoft\
WAB\WAB4
FirstRun = "1"
HKEY_CURRENT_USER\Identities\{8A24C031-62FE-4BF5-94F0-BFD4FBCD674B}
Identity Ordinal = "1"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
20j9050b = "eCFWBQ==?_CHAR(0x03)_?"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
1h9c0211 = "UyEjBYto?_CHAR(0x03)_?"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Explorer\Privacy
CleanCookies = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
20j9050b = "{random values}"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
20j9050b = "OCFWBQ==_CHAR(0x03)__CHAR(0x03)_o_CHAR(0x0C)_?rAU"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile
DisableNotifications = "1"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile\GloballyOpenPorts\
List
26071:UDP = "26071:UDP:*:Enabled:UDP 26071"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile
DisableNotifications = "0"
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\
Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile\GloballyOpenPorts\
List
20692:TCP = "20692:TCP:*:Enabled:TCP 20692"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
a9hebb3 = "/kRWBTE4rT8fWyjA?_CHAR(0x05)_?"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
29a35jae = "{random characters}"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
34a08fda = "{random values}"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
34a08fda = "{random characters}"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
29a35jae = "{random values}"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
1jbh8e5j = "{random values}"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
fjg907g = "{random values}"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
f7jahgh = "KSFWBeVorT8fWyjA55YokVzF+ZUQgd2Z4fz2YHrB/DZeriWp_CHAR(0x1B)_g_CHAR(0x0C)_??"
HKEY_CURRENT_USER\Software\Microsoft\
Ryguho
f7jahgh = "KSFWBeVorT8fWyjA55YokVzF+ZUQgd2Z4fz2YHrB/DZeriWp_CHAR(0x1B)_g??"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Server ID = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
LDAP Server ID = "1"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
LDAP Server ID = "2"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
LDAP Server ID = "3"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts
PreConfigVer = "4"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts
PreConfigVerNTDS = "1"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
Account Name = "Active Directory"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Server = "NULL"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Search Return = "64"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Timeout = "3c"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Authentication = "2"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Simple Search = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Bind DN = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Port = "cc4"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Resolve Flag = "1"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Secure Connection = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP User Name = "NULL"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Active Directory GC
LDAP Search Base = "NULL"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
Account Name = "Bigfoot Internet Directory Service"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
LDAP Server = "ldap.bigfoot.com"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
LDAP URL = "http://www.{BLOCKED}t.com"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
LDAP Search Return = "64"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
LDAP Timeout = "3c"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
LDAP Authentication = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
LDAP Simple Search = "1"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\Bigfoot
LDAP Logo = "%ProgramFiles%\Common Files\Services\bigfoot.bmp"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
Account Name = "VeriSign Internet Directory Service"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
LDAP Server = "directory.verisign.com"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
LDAP URL = "http://www.{BLOCKED}gn.com"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
LDAP Search Return = "64"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
LDAP Timeout = "3c"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
LDAP Authentication = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
LDAP Search Base = "NULL"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
LDAP Simple Search = "1"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\VeriSign
LDAP Logo = "%ProgramFiles%\Common Files\Services\verisign.bmp"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
Account Name = "WhoWhere Internet Directory Service"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
LDAP Server = "ldap.whowhere.com"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
LDAP URL = "http://www.{BLOCKED}re.com"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
LDAP Search Return = "64"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
LDAP Timeout = "3c"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
LDAP Authentication = "0"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
LDAP Simple Search = "1"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager\Accounts\WhoWhere
LDAP Logo = "%ProgramFiles%\Common Files\Services\whowhere.bmp"
HKEY_CURRENT_USER\Software\Microsoft\
Internet Account Manager
Default LDAP Account = "Active Directory GC"
HKEY_CURRENT_USER\Software\Microsoft\
WAB\WAB4
OlkContactRefresh = "0"
HKEY_CURRENT_USER\Software\Microsoft\
WAB\WAB4
OlkFolderRefresh = "0"
Ändert die folgenden Registrierungseinträge:
HKEY_CURRENT_USER\Identities
Identity Ordinal = "2"
(Note: The default value data of the said registry entry is 1.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\0
1609 = "0"
(Note: The default value data of the said registry entry is 1.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
1406 = "0"
(Note: The default value data of the said registry entry is 1.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\1
1609 = "0"
(Note: The default value data of the said registry entry is 1.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\2
1609 = "0"
(Note: The default value data of the said registry entry is 1.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
1406 = "0"
(Note: The default value data of the said registry entry is 3.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\3
1609 = "0"
(Note: The default value data of the said registry entry is 1.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\4
1406 = "0"
(Note: The default value data of the said registry entry is 3.)
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Internet Settings\
Zones\4
1609 = "0"
(Note: The default value data of the said registry entry is 1.)
Einschleusungsroutine
Schleust die folgenden Dateien ein:
- %User Profile%\Application Data\Aquwip
- %User Profile%\Aquwip\atzy.exe
- %Application Data%\ohedy.ekh
- %User Profile%\Address Book\Wilbert.wab
(Hinweis: %User Profile% ist der Ordner für Benutzerprofile des aktuellen Benutzers, normalerweise C:\Windows\Profile\{Benutzername} unter Windows 98 und ME, C:\WINNT\Profile\{Benutzername} unter Windows NT und C:\Dokumente und Einstellungen\{Benutzername} unter Windows 2000, XP und Server 2003.. %Application Data% ist der Ordner 'Anwendungsdaten' für den aktuellen Benutzer, normalerweise C:\Windows\Profile\{Benutzername}\Anwendungsdaten unter Windows 98 und ME, C:\WINNT\Profile\{Benutzername}\Anwendungsdaten unter Windows NT und C:\Dokumente und Einstellungen\{Benutzername}\Lokale Einstellungen\Anwendungsdaten unter Windows 2000, XP und Server 2003.)
Andere Details
Löscht sich nach der Ausführung selbst.
Lösungen
Step 1
Für Windows ME und XP Benutzer: Stellen Sie vor einer Suche sicher, dass die Systemwiederherstellung deaktiviert ist, damit der gesamte Computer durchsucht werden kann.
Step 2
Im abgesicherten Modus neu starten
Step 3
Diesen Registrierungsschlüssel löschen
Wichtig: Eine nicht ordnungsgemäße Bearbeitung der Windows Registrierung kann zu einer dauerhaften Fehlfunktion des Systems führen. Führen Sie diesen Schritt nur durch, wenn Sie mit der Vorgehensweise vertraut sind oder wenn Sie Ihren Systemadministrator um Unterstützung bitten können. Lesen Sie ansonsten zuerst diesen Microsoft Artikel, bevor Sie die Registrierung Ihres Computers ändern.
- In HKEY_CURRENT_USER\Software\Microsoft
- Ryguho
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer
- Privacy
- In HKEY_CURRENT_USER\Software\Microsoft
- Internet Account Manager
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager
- Accounts
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts
- Active Directory GC
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts
- Bigfoot
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts
- VeriSign
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts
- WhoWhere
- In HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4
- Wab File Name
Step 4
Diesen Registrierungswert löschen
Wichtig: Eine nicht ordnungsgemäße Bearbeitung der Windows Registrierung kann zu einer dauerhaften Fehlfunktion des Systems führen. Führen Sie diesen Schritt nur durch, wenn Sie mit der Vorgehensweise vertraut sind oder wenn Sie Ihren Systemadministrator um Unterstützung bitten können. Lesen Sie ansonsten zuerst diesen Microsoft Artikel, bevor Sie die Registrierung Ihres Computers ändern.
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- {C8B0FB29-AD41-AD40-5C09-405F58D6634D} = "%User Profile%\Aquwip\atzy.exe"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager
- Server ID = "4"
- In HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4
- FirstRun = "1"
- In HKEY_CURRENT_USER\Identities\{8A24C031-62FE-4BF5-94F0-BFD4FBCD674B}
- Identity Ordinal = "1"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- 20j9050b = "eCFWBQ==?_CHAR(0x03)_?"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- 1h9c0211 = "UyEjBYto?_CHAR(0x03)_?"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Privacy
- CleanCookies = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- 20j9050b = "{random values}"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- 20j9050b = "OCFWBQ==_CHAR(0x03)__CHAR(0x03)_o_CHAR(0x0C)_?rAU"
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
- DisableNotifications = "1"
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List
- 26071:UDP = "26071:UDP:*:Enabled:UDP 26071"
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile
- DisableNotifications = "0"
- In HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\GloballyOpenPorts\List
- 20692:TCP = "20692:TCP:*:Enabled:TCP 20692"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- a9hebb3 = "/kRWBTE4rT8fWyjA?_CHAR(0x05)_?"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- 29a35jae = "{random characters}"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- 34a08fda = "{random values}"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- 34a08fda = "{random characters}"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- 29a35jae = "{random values}"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- 1jbh8e5j = "{random values}"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- fjg907g = "{random values}"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- f7jahgh = "KSFWBeVorT8fWyjA55YokVzF+ZUQgd2Z4fz2YHrB/DZeriWp_CHAR(0x1B)_g_CHAR(0x0C)_??"
- In HKEY_CURRENT_USER\Software\Microsoft\Ryguho
- f7jahgh = "KSFWBeVorT8fWyjA55YokVzF+ZUQgd2Z4fz2YHrB/DZeriWp_CHAR(0x1B)_g??"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Server ID = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot
- LDAP Server ID = "1"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- LDAP Server ID = "2"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere
- LDAP Server ID = "3"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts
- PreConfigVer = "4"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts
- PreConfigVerNTDS = "1"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- Account Name = "Active Directory"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Server = "NULL"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Search Return = "64"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Timeout = "3c"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Authentication = "2"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Simple Search = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Bind DN = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Port = "cc4"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Resolve Flag = "1"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Secure Connection = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP User Name = "NULL"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Active Directory GC
- LDAP Search Base = "NULL"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot
- Account Name = "Bigfoot Internet Directory Service"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot
- LDAP Server = "ldap.bigfoot.com"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot
- LDAP URL = "http://www.{BLOCKED}t.com"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot
- LDAP Search Return = "64"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot
- LDAP Timeout = "3c"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot
- LDAP Authentication = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot
- LDAP Simple Search = "1"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\Bigfoot
- LDAP Logo = "%ProgramFiles%\Common Files\Services\bigfoot.bmp"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- Account Name = "VeriSign Internet Directory Service"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- LDAP Server = "directory.verisign.com"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- LDAP URL = "http://www.{BLOCKED}gn.com"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- LDAP Search Return = "64"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- LDAP Timeout = "3c"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- LDAP Authentication = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- LDAP Search Base = "NULL"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- LDAP Simple Search = "1"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\VeriSign
- LDAP Logo = "%ProgramFiles%\Common Files\Services\verisign.bmp"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere
- Account Name = "WhoWhere Internet Directory Service"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere
- LDAP Server = "ldap.whowhere.com"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere
- LDAP URL = "http://www.{BLOCKED}re.com"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere
- LDAP Search Return = "64"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere
- LDAP Timeout = "3c"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere
- LDAP Authentication = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere
- LDAP Simple Search = "1"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager\Accounts\WhoWhere
- LDAP Logo = "%ProgramFiles%\Common Files\Services\whowhere.bmp"
- In HKEY_CURRENT_USER\Software\Microsoft\Internet Account Manager
- Default LDAP Account = "Active Directory GC"
- In HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4
- OlkContactRefresh = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4
- OlkFolderRefresh = "0"
Step 5
Diesen geänderten Registrierungswert wiederherstellen
Wichtig: Eine nicht ordnungsgemäße Bearbeitung der Windows Registrierung kann zu einer dauerhaften Fehlfunktion des Systems führen. Führen Sie diesen Schritt nur durch, wenn Sie mit der Vorgehensweise vertraut sind oder wenn Sie Ihren Systemadministrator um Unterstützung bitten können. Lesen Sie ansonsten zuerst diesen Microsoft Artikel, bevor Sie die Registrierung Ihres Computers ändern.
- In HKEY_CURRENT_USER\Identities
- From: Identity Ordinal = "2"
To: Identity Ordinal = ""1""
- From: Identity Ordinal = "2"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0
- From: 1609 = "0"
To: 1609 = ""1""
- From: 1609 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
- From: 1406 = "0"
To: 1406 = ""1""
- From: 1406 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1
- From: 1609 = "0"
To: 1609 = ""1""
- From: 1609 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2
- From: 1609 = "0"
To: 1609 = ""1""
- From: 1609 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
- From: 1406 = "0"
To: 1406 = ""3""
- From: 1406 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
- From: 1609 = "0"
To: 1609 = ""1""
- From: 1609 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4
- From: 1406 = "0"
To: 1406 = ""3""
- From: 1406 = "0"
- In HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4
- From: 1609 = "0"
To: 1609 = ""1""
- From: 1609 = "0"
Step 6
Diese Dateien suchen und löschen
- %User Profile%\Application Data\Aquwip
- %User Profile%\Aquwip\atzy.exe
- %Application Data%\ohedy.ekh
- %User Profile%\Address Book\Wilbert.wab
Step 7
Diese Ordner suchen und löschen
- %User Profile%\Application Data\Aquwip
- %User Profile%\Microsoft\Address Book
Step 8
Führen Sie den Neustart im normalen Modus durch, und durchsuchen Sie Ihren Computer mit Ihrem Trend Micro Produkt nach Dateien, die als BKDR_INJECT.BYF entdeckt werden. Falls die entdeckten Dateien bereits von Ihrem Trend Micro Produkt gesäubert, gelöscht oder in Quarantäne verschoben wurden, sind keine weiteren Schritte erforderlich. Dateien in Quarantäne können einfach gelöscht werden. Auf dieser Knowledge-Base-Seite finden Sie weitere Informationen.
Nehmen Sie an unserer Umfrage teil