Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Windows Recovery eingefangen

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML.

Antwort
Alt 22.04.2011, 14:46   #1
Cerize
 
Windows Recovery eingefangen - Standard

Windows Recovery eingefangen



All processes killed
========== OTL ==========
Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\ deleted successfully.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully!
File not found.
File move failed. E:\Autorun.exe scheduled to be moved on reboot.
File move failed. E:\autorun.csf scheduled to be moved on reboot.
File move failed. E:\autorun.inf scheduled to be moved on reboot.
File move failed. E:\autorun.obj scheduled to be moved on reboot.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{012b89e0-f0ec-11de-b6dd-002197c731a9}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{012b89e0-f0ec-11de-b6dd-002197c731a9}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{012b89e0-f0ec-11de-b6dd-002197c731a9}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{012b89e0-f0ec-11de-b6dd-002197c731a9}\ not found.
File I:\setup.exe AUTORUN=1 not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b904d9b2-aec1-11df-9074-002197c731a9}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b904d9b2-aec1-11df-9074-002197c731a9}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b904d9b2-aec1-11df-9074-002197c731a9}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b904d9b2-aec1-11df-9074-002197c731a9}\ not found.
File F:\setup.exe AUTORUN=1 not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{bda1c17a-a769-11de-8759-806e6f6e6963}\ deleted successfully.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bda1c17a-a769-11de-8759-806e6f6e6963}\ not found.
Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{bda1c17a-a769-11de-8759-806e6f6e6963}\ not found.
Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{bda1c17a-a769-11de-8759-806e6f6e6963}\ not found.
File move failed. E:\Autorun.exe scheduled to be moved on reboot.
C:\Users\Dustin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows Recovery folder moved successfully.
C:\ProgramData\~45080328 moved successfully.
C:\ProgramData\~45080328r moved successfully.
C:\Users\Dustin\Desktop\Windows Recovery.lnk moved successfully.
C:\ProgramData\45080328 moved successfully.
ADS C:\ProgramData\TEMP:E36F5B57 deleted successfully.
ADS C:\ProgramData\TEMP:4F636E25 deleted successfully.
ADS C:\ProgramData\TEMP:580E04D8 deleted successfully.
ADS C:\ProgramData\TEMP:8AB6C1D7 deleted successfully.
ADS C:\ProgramData\TEMP:C95B63DA deleted successfully.
========== COMMANDS ==========
File move failed. C:\Windows\System32\drivers\etc\Hosts scheduled to be moved on reboot.
HOSTS file reset successfully

[EMPTYTEMP]

User: Administrator
->Temp folder emptied: 34826 bytes
->Temporary Internet Files folder emptied: 140070 bytes
->FireFox cache emptied: 15029602 bytes
->Flash cache emptied: 75 bytes

User: All Users

User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 33170 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: Dustin
->Temp folder emptied: 3809090728 bytes
->Temporary Internet Files folder emptied: 51298631 bytes
->Java cache emptied: 14789971 bytes
->FireFox cache emptied: 113268025 bytes
->Flash cache emptied: 169987 bytes

User: Public

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 1610800 bytes
%systemroot%\System32 (64bit) .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 58243649 bytes
%systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 33170 bytes
RecycleBin emptied: 54714893 bytes

Total Files Cleaned = 3.928,00 mb


OTL by OldTimer - Version 3.2.22.3 log created on 04222011_153914

Files\Folders moved on Reboot...
File move failed. E:\Autorun.exe scheduled to be moved on reboot.
File move failed. E:\autorun.csf scheduled to be moved on reboot.
File move failed. E:\autorun.inf scheduled to be moved on reboot.
File move failed. E:\autorun.obj scheduled to be moved on reboot.
File move failed. C:\Windows\System32\drivers\etc\Hosts scheduled to be moved on reboot.
C:\Windows\temp\mcmsc_9nl27oZDKSmdbv0 moved successfully.
File\Folder C:\Windows\temp\mcmsc_D2W0u7rEkMcvbHe not found!
File\Folder C:\Windows\temp\mcmsc_Ylmc7ulUjyoVfVd not found!
C:\Windows\temp\sqlite_e21HXBnryeaRP7l moved successfully.
C:\Windows\temp\sqlite_Qtpan8TI1FJmbL4 moved successfully.
C:\Windows\temp\sqlite_RTaItkUlVt4RlWR moved successfully.
File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VRK8BPDO\desktop.ini scheduled to be moved on reboot.
File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TIEAQGLW\desktop.ini scheduled to be moved on reboot.
File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JRFRCPEJ\desktop.ini scheduled to be moved on reboot.
File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EW8ZM52A\desktop.ini scheduled to be moved on reboot.
File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini scheduled to be moved on reboot.
File move failed. C:\Windows\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini scheduled to be moved on reboot.

Registry entries deleted on Reboot...



hoffe ich habs richtig gemacht

Antwort

Themen zu Windows Recovery eingefangen
64-bit, alternate, audacity, bho, bonjour, converter, desktop, diner dash, error, excel, flash player, google, helper.exe, home, install.exe, league of legends, location, logfile, microsoft office word, mp3, object, office 2007, oldtimer, otl.exe, phishing, plug-in, popup, problem, programm, realtek, saver, searchplugins, security, security update, senden, shell32.dll, shortcut, siteadvisor, software, start menu, super, svchost.exe, syswow64, t-mobile, teamspeak, vista, windows




Ähnliche Themen: Windows Recovery eingefangen


  1. File Recovery Virus eingefangen
    Log-Analyse und Auswertung - 11.09.2012 (1)
  2. Data Recovery Malware eingefangen und gemäß Anleitung hier bekämpft
    Log-Analyse und Auswertung - 06.11.2011 (1)
  3. Windows XP Recovery GAU
    Plagegeister aller Art und deren Bekämpfung - 18.06.2011 (15)
  4. Windows Recovery
    Log-Analyse und Auswertung - 10.06.2011 (20)
  5. windows xp recovery eingefangen!!
    Plagegeister aller Art und deren Bekämpfung - 03.06.2011 (7)
  6. Windows 7 recovery
    Log-Analyse und Auswertung - 24.05.2011 (9)
  7. Windows Recovery eingefangen!
    Log-Analyse und Auswertung - 18.05.2011 (37)
  8. Trojaner eingefangen: Windows Recovery
    Log-Analyse und Auswertung - 10.05.2011 (20)
  9. Windows Recovery eingefangen
    Log-Analyse und Auswertung - 09.05.2011 (24)
  10. Windows Recovery auf PC
    Log-Analyse und Auswertung - 08.05.2011 (6)
  11. Windows Recovery Trojaner eingefangen
    Log-Analyse und Auswertung - 08.05.2011 (1)
  12. Windows recovery eingefangen
    Log-Analyse und Auswertung - 04.05.2011 (31)
  13. Windows Recovery
    Log-Analyse und Auswertung - 04.05.2011 (7)
  14. Windows Recovery? TR/Kazy.mekml.1 eingefangen laut AntiVir!
    Log-Analyse und Auswertung - 30.04.2011 (6)
  15. Windows Recovery eingefangen - OTL Logs angefügt
    Log-Analyse und Auswertung - 27.04.2011 (1)
  16. Windows recovery
    Log-Analyse und Auswertung - 26.04.2011 (13)
  17. Windows Recovery :(
    Plagegeister aller Art und deren Bekämpfung - 24.04.2011 (1)

Zum Thema Windows Recovery eingefangen - All processes killed ========== OTL ========== Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\ deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! File not found. File move failed. E:\Autorun.exe scheduled to be moved on reboot. - Windows Recovery eingefangen...
Archiv
Du betrachtest: Windows Recovery eingefangen auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.