240 Benutzer online
30. Juni 2025, 07:16:27

Windows Community



 Antworten / AufrufeThemen mit dem Stichwort registry-keys
1
Antworten
3835
Aufrufe
Cant logon to WindowsXP, deleted some registry keys
Begonnen von chloec42
13. September 2010, 19:38:10
I use Malwarebytes Antimalware regularly http://www.malwarebytes.org/mbam.php and havent had an infection found

in about a year.
Yesterday i scanned after about a month and i saw 12 infections !

MBAM said it could not clean a few infections:

==============
Malwarebytes' Anti-Malware 1.44
Database version: 3510
Windows 5.1.2600 Service Pack 2
Internet Explorer Unknown

9/11/2010 11:19:49 PM
mbam-log-2010-09-11 (23-19-49).txt

Scan type: Quick Scan
Objects scanned: 94917
Time elapsed: 2 minute(s), 49 second(s)

Memory Processes Infected: 0
Memory Modules Infected: 0
Registry Keys Infected: 2
Registry Values Infected: 2
Registry Data Items Infected: 3
Folders Infected: 1
Files Infected: 4

Memory Processes Infected:
(No malicious items detected)

Memory Modules Infected:
(No malicious items detected)

Registry Keys Infected:
HKEY_USERS\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6}

(Backdoor.Bot) -> Quarantined and deleted successfully.
HKEY_USERS\S-1-5-18\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{43bf8cd1-c5d5-2230-7bb2-98f22c2b7dc6}

(Backdoor.Bot) -> Quarantined and deleted successfully.

Registry Values Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mp3_audio_codec (Spyware.Zbot) -> Quarantined and

deleted successfully.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Network\uid (Malware.Trace) -> Quarantined and

deleted successfully.

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Spyware.Zbot) -> Data: c:

\windows\system32\sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Spyware.Zbot) -> Data:

system32\sdra64.exe -> Delete on reboot.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit (Hijack.Userinit) -> Bad: (C:

\WINDOWS\system32\userinit.exe,C:\WINDOWS\system32\sdra64.exe,) Good: (Userinit.exe) -> Quarantined and deleted

successfully.

Folders Infected:
C:\WINDOWS\system32\lowsec (Stolen.data) -> Delete on reboot.

Files Infected:
C:\WINDOWS\system32\lowsec\local.ds (Stolen.data) -> Delete on reboot.
C:\WINDOWS\system32\lowsec\user.ds (Stolen.data) -> Delete on reboot.
C:\WINDOWS\system32\lowsec\user.ds.lll (Stolen.data) -> Quarantined and deleted successfully.
C:\WINDOWS\system32\sdra64.exe (Spyware.Zbot) -> Delete on reboot.
=======================

So i thought of manually removing the infected Registry keys. (Something i've done many times before)

While I was at
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\
I saw a key named 'Special Accounts', it looked fishy to my paranoid eyes. Had some 'strange' values in it, None

corresponding to my Username (Administrator) or Guest. 3 were somewhat random letters with a ~, and one was '

search assistant'. Looked like malware remains of some kind, so, i deleted them all.

After that i rebooted, the welcome screen showed up (usually straightaway shows me desktop since there is just one

user 'Administrator') with the only user 'Administrator'. When i click it, it shows 'loading your personal

settings' for a second. Then it reads 'saving your settings' and stays at the logon screen. Repeated it for 10

times. Restarted and repeated. Shut Down and repeated. Always same result.

Then i tried the 'Last Know good configuration' in statup options. Still same result.
Tried 'Safe Mode' starts loading then breaks at 'unable to load NTFS.dll'
'Safe mode with networking' same logon screen and same one second login and return to logon screen.

I dont know how to login. Can someone please help. Is there a way to remotely add the keys back to my registry. Or

some way to correct this problem?

Thanks and Regards

[u]guptavis [/u]

win7win7 useruser windowswindows 20112011 registerregister toolstools anzeigenanzeigen daemondaemon keyskeys livelive registryregistry administratoradministrator 4564579645645796 registry eintrag windowsregistry eintrag windows umgehenumgehen 4834088948340889 vista registry bertechtigungvista registry bertechtigung internetseiteninternetseiten 5216434052164340 leere registry entfernenleere registry entfernen administrativeadministrative toshibatoshiba 5698801156988011 registry keyregistry key 20102010 20072007 6172594861725948 vista registry kann  nichtvista registry kann nicht besitzerbesitzer
9
Antworten
24777
Aufrufe
Wie Registry Schlüssel löschen?
Begonnen von warrant
09. Mai 2008, 09:12:48
Hallo - Ich möchte Registryeinträge löschen für die ich scheinbar keine Berechtigung habe  ??!!

Der Grund hierfür ist. Vor kurzem wurde mein DVD Laufwerk getauscht, da wahrscheinjlich falsche Firmware installiert wurde?? - um auf Nummer sicher zu gehen hat man auch das Laufwerk Kabel ausgetauscht.

Nun besteht weiterhin das Problem das der PC manchmal beim booten hängen bleibt, oder auch mal das ein falsches Laufwerk erkannt wird - dann funktioniert natürlich keine Schreib/Lesefunktion.

Gibt es ein Tool das die Berechtigung umgehen kann

In der Registry sieht das so aus: (der mittlere Sclüssel ist mein DVD Laufwerk / 1. und 3. Eintrag sollen gelöscht werden)

Danke für Antworten