Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Windows-Recovery - Auswertung Malwarebytes' log-file

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML.

 
Alt 26.04.2011, 18:41   #17
Adjmal
 
Windows-Recovery - Auswertung Malwarebytes' log-file - Standard

Windows-Recovery - Auswertung Malwarebytes' log-file



Combo-Fix hat etwas länger gebraucht als erwartet, hier die log-Datei:


Combofix Logfile:
Code:
ATTFilter
ComboFix 11-04-25.03 - Adjmal 26.04.2011  18:55:55.2.2 - x86
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.49.1031.18.3070.2027 [GMT 2:00]
ausgeführt von:: c:\users\Adjmal\Desktop\cofi.exe
AV: AntiVir Desktop *Disabled/Updated* {090F9C29-64CE-6C6F-379C-5901B49A85B7}
SP: AntiVir Desktop *Disabled/Updated* {B26E7DCD-42F4-63E1-0D2C-6273CF1DCF0A}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
((((((((((((((((((((((((((((((((((((   Weitere Löschungen   ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Adjmal\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows Recovery
c:\users\Adjmal\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows Recovery\Uninstall Windows Recovery.lnk
c:\users\Adjmal\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows Recovery\Windows Recovery.lnk
c:\windows\system32\midas.dll
.
.
(((((((((((((((((((((((   Dateien erstellt von 2011-03-26 bis 2011-04-26  ))))))))))))))))))))))))))))))
.
.
2011-04-26 17:22 . 2011-04-26 17:22	--------	d-----w-	c:\users\Adjmal\AppData\Local\temp
2011-04-26 17:22 . 2011-04-26 17:22	--------	d-----w-	c:\users\Default\AppData\Local\temp
2011-04-26 16:37 . 2011-04-26 16:37	--------	d-----w-	c:\program files\CCleaner
2011-04-26 13:14 . 2011-04-26 13:14	--------	d-----w-	c:\windows\Internet Logs
2011-04-26 12:26 . 2011-04-26 12:26	--------	d-----w-	C:\_OTL
2011-04-22 11:29 . 2011-04-18 07:15	7071056	----a-w-	c:\programdata\Microsoft\Windows Defender\Definition Updates\{5F634599-3E5F-4DDD-8BC2-653683590A67}\mpengine.dll
2011-04-22 11:26 . 2011-02-18 14:03	305152	----a-w-	c:\windows\system32\drivers\srv.sys
2011-04-22 11:25 . 2010-08-26 16:34	1696256	----a-w-	c:\windows\system32\gameux.dll
2011-04-22 11:24 . 2010-10-19 04:27	7680	----a-w-	c:\program files\Internet Explorer\iecompat.dll
2011-04-22 11:24 . 2010-12-14 14:49	1169408	----a-w-	c:\windows\system32\sdclt.exe
2011-04-22 11:24 . 2011-03-03 10:50	2409784	----a-w-	c:\program files\Windows Mail\OESpamFilter.dat
2011-04-22 11:24 . 2011-03-02 15:44	86528	----a-w-	c:\windows\system32\dnsrslvr.dll
2011-04-22 11:24 . 2009-05-04 09:59	25088	----a-w-	c:\windows\system32\dnscacheugc.exe
2011-04-22 11:20 . 2010-12-17 15:45	2067968	----a-w-	c:\windows\system32\mstscax.dll
2011-04-22 11:20 . 2010-12-17 13:54	677888	----a-w-	c:\windows\system32\mstsc.exe
2011-04-21 21:24 . 2010-12-20 16:09	38224	----a-w-	c:\windows\system32\drivers\mbamswissarmy.sys
2011-04-21 21:24 . 2011-04-22 07:27	--------	d-----w-	c:\program files\Malwarebytes' Anti-Malware
2011-04-21 21:24 . 2010-12-20 16:08	20952	----a-w-	c:\windows\system32\drivers\mbam.sys
2011-04-14 17:06 . 2011-04-14 17:06	681980	----a-w-	c:\windows\unins000.exe
2011-04-13 22:17 . 2011-04-13 22:17	--------	d-----w-	c:\program files\WinSCP
2011-03-31 09:36 . 2005-04-03 21:02	69714	----a-w-	c:\program files\Common Files\InstallShield\Professional\RunTime\11\00\Intel32\ctor.dll
2011-03-31 09:36 . 2005-04-03 21:01	274432	----a-w-	c:\program files\Common Files\InstallShield\Professional\RunTime\11\00\Intel32\iscript.dll
2011-03-31 09:36 . 2005-04-03 21:00	184320	----a-w-	c:\program files\Common Files\InstallShield\Professional\RunTime\11\00\Intel32\iuser.dll
2011-03-31 09:36 . 2005-04-03 20:59	5632	----a-w-	c:\program files\Common Files\InstallShield\Professional\RunTime\11\00\Intel32\DotNetInstaller.exe
2011-03-31 09:36 . 2011-03-31 09:36	331908	----a-w-	c:\program files\Common Files\InstallShield\Professional\RunTime\11\00\Intel32\setup.dll
2011-03-31 09:36 . 2011-03-31 09:36	200836	----a-w-	c:\program files\Common Files\InstallShield\Professional\RunTime\11\00\Intel32\iGdi.dll
2011-03-31 09:36 . 2005-04-03 21:02	753664	----a-w-	c:\program files\Common Files\InstallShield\Professional\RunTime\11\00\Intel32\iKernel.dll
2011-03-31 09:36 . 2011-03-31 09:47	--------	d-----w-	c:\users\Adjmal\AppData\Local\Oblivion
.
.
.
((((((((((((((((((((((((((((((((((((   Find3M Bericht   ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2011-04-26 13:05 . 2008-03-27 04:23	45056	----a-w-	c:\windows\system32\acovcnt.exe
2011-02-18 15:28 . 2010-08-03 15:27	46592	----a-w-	c:\windows\system32\vsutil_loc0407.dll
2011-02-02 16:11 . 2010-03-03 19:34	222080	------w-	c:\windows\system32\MpSigStub.exe
.
.
((((((((((((((((((((((((((((   Autostartpunkte der Registrierung   ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt. 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1]
@="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}]
2010-10-06 23:36	94208	----a-w-	c:\users\Adjmal\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2]
@="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}]
2010-10-06 23:36	94208	----a-w-	c:\users\Adjmal\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3]
@="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}]
2010-10-06 23:36	94208	----a-w-	c:\users\Adjmal\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt4]
@="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}]
2010-10-06 23:36	94208	----a-w-	c:\users\Adjmal\AppData\Roaming\Dropbox\bin\DropboxExt.14.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2007-10-24 178712]
"IaNvSrv"="c:\program files\Intel\Intel Matrix Storage Manager\OROM\IaNvSrv\IaNvSrv.exe" [2007-10-24 33304]
"ATKMEDIA"="c:\program files\ASUS\ATK Media\DMEDIA.EXE" [2006-11-02 61440]
"PowerForPhone"="c:\program files\P4P\P4P.exe" [2007-07-19 778240]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2007-03-02 857648]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2010-03-02 282792]
"SMSERIAL"="c:\program files\Motorola\SMSERIAL\sm56hlpr.exe" [2009-10-26 1458176]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-472831092-3239663077-2024563750-1000]
"EnableNotificationsRef"=dword:00000001
.
R2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [2010-03-18 130384]
R3 BthAvrcp;Bluetooth-AVRCP-Profil;c:\windows\system32\DRIVERS\BthAvrcp.sys [2008-03-27 12800]
R3 netr73;Belkin Wireless 54G USB Network Adapter Driver for Vista;c:\windows\system32\DRIVERS\netr73.sys [2010-12-26 464384]
R3 nosGetPlusHelper;getPlus(R) Helper 3004;c:\windows\System32\svchost.exe [2008-01-19 21504]
R3 PTV337.X86;Mini DigitalTV USB, Service X86;c:\windows\system32\DRIVERS\PTV337.X86.SYS [2007-01-26 197120]
R3 RTL8192su;%RTL8192su.DeviceDesc.DispName%;c:\windows\system32\DRIVERS\RTL8192su.sys [2010-01-06 528896]
R3 UXDCMN;UXDCMN;f:\winstress\UXDCMN.SYS [x]
R3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\Microsoft.NET\Framework\v4.0.30319\WPF\WPFFontCache_v0400.exe [2010-03-18 753504]
S0 iaNvStor;Intel(R) Turbo Memory Controller;c:\windows\system32\DRIVERS\iaNvStor.sys [2007-10-02 220696]
S0 lullaby;lullaby;c:\windows\system32\DRIVERS\lullaby.sys [2007-09-26 15416]
S0 sptd;sptd;c:\windows\System32\Drivers\sptd.sys [2008-09-15 717296]
S1 PersonalSecureDrive;PersonalSecureDrive;c:\windows\System32\drivers\psd.sys [2007-01-23 39080]
S2 AntiVirSchedulerService;Avira AntiVir Planer;c:\program files\Avira\AntiVir Desktop\sched.exe [2010-02-24 135336]
S3 AtcL001;NDIS Miniport Driver for Atheros L1 Gigabit Ethernet Controller;c:\windows\system32\DRIVERS\l160x86.sys [2007-10-31 46592]
S3 DCamUSBET;USB2.0 1.3M UVC WebCam;c:\windows\system32\DRIVERS\etDevice.sys [2007-09-06 474624]
S3 FiltUSBET;ET USB Device Lower Filter;c:\windows\system32\DRIVERS\etFilter.sys [2007-10-15 206336]
S3 NETw5v32;Intel(R) Wireless WiFi Link der Serie 5000 Adaptertreiber für Windows Vista 32-Bit;c:\windows\system32\DRIVERS\NETw5v32.sys [2010-05-31 6638080]
S3 ScanUSBET;ET USB Still Image Capture Device;c:\windows\system32\DRIVERS\etScan.sys [2007-09-06 6656]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
bthsvcs	REG_MULTI_SZ   	BthServ
LocalServiceAndNoImpersonation	REG_MULTI_SZ   	FontCache
nosGetPlusHelper	REG_MULTI_SZ   	nosGetPlusHelper
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
2007-06-20 10:47	451872	----a-w-	c:\program files\Common Files\LightScribe\LSRunOnce.exe
.
Inhalt des "geplante Tasks" Ordners
.
2011-04-26 c:\windows\Tasks\Security Platform Backup Schedule.job
- c:\program files\Infineon\Security Platform Software\SpBackupWz.exe [2007-02-22 14:25]
.
.
------- Zusätzlicher Suchlauf -------
.
uStart Page = hxxp://www.asus.com
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office12\EXCEL.EXE/3000
TCP: {FFF563BE-96A9-48D1-AC7F-7AD798F076DA} = 141.2.22.74,141.2.149.10
FF - ProfilePath - c:\users\Adjmal\AppData\Roaming\Mozilla\Firefox\Profiles\xp51cri5.default\
FF - prefs.js: browser.startup.homepage - about:blank
FF - prefs.js: keyword.URL - hxxp://www.google.com/search?ie=UTF-8&oe=UTF-8&sourceid=navclient&gfns=1&q=
FF - Ext: Default: {972ce4c6-7e08-4474-a285-3208198ce6fd} - c:\program files\Mozilla Firefox\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0007-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0013-ABCDEFFEDCBA}
FF - Ext: Java Console: {CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA} - c:\program files\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0018-ABCDEFFEDCBA}
FF - Ext: DownThemAll!: {DDC359D1-844A-42a7-9AA1-88A850A938A8} - %profile%\extensions\{DDC359D1-844A-42a7-9AA1-88A850A938A8}
FF - Ext: Adblock Plus: {d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d} - %profile%\extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - %profile%\extensions\{20a82645-c095-46ed-80e3-08825760534b}
FF - Ext: Adobe DLM (powered by getPlus(R)): {E2883E8F-472F-4fb0-9522-AC9BF37916A7} - %profile%\extensions\{E2883E8F-472F-4fb0-9522-AC9BF37916A7}
FF - Ext: Microsoft .NET Framework Assistant: {20a82645-c095-46ed-80e3-08825760534b} - c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension
.
- - - - Entfernte verwaiste Registrierungseinträge - - - -
.
HKLM-Run-F5D7050v3 - c:\program files\Belkin\F5D7050v3\Belkinwcui.exe
AddRemove-uTorrent - c:\programme\uTorrent\uTorrent.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, hxxp://www.gmer.net
Rootkit scan 2011-04-26 19:22
Windows 6.0.6002 Service Pack 2 NTFS
.
Scanne versteckte Prozesse... 
.
Scanne versteckte Autostarteinträge... 
.
Scanne versteckte Dateien... 
.
Scan erfolgreich abgeschlossen
versteckte Dateien: 0
.
**************************************************************************
.
--------------------- Gesperrte Registrierungsschluessel ---------------------
.
[HKEY_USERS\S-1-5-21-472831092-3239663077-2024563750-1000\Software\SecuROM\!CAUTION! NEVER A OR CHANGE ANY KEY*]
"??"=hex:88,43,1e,33,81,e0,da,ad,d5,7e,9d,fe,0c,2a,31,1d,c6,2a,a3,1d,27,e4,1e,
   69,90,33,49,a4,a1,a8,40,71,2f,93,a6,8b,12,4e,20,3c,b7,ca,19,05,48,88,b0,e4,\
"??"=hex:98,c2,0e,3d,28,ee,3a,ec,c7,4c,ae,29,82,08,f2,32
.
[HKEY_USERS\S-1-5-21-472831092-3239663077-2024563750-1000\Software\SecuROM\License information*]
"datasecu"=hex:f2,a5,d3,ae,0d,62,e3,25,c2,65,5f,10,81,6b,c5,ec,5e,60,b1,22,d1,
   25,22,d0,af,d3,f6,05,02,93,4f,c1,ee,dd,86,d1,96,67,27,84,a5,66,e3,f6,bb,56,\
"rkeysecu"=hex:47,bf,b1,7e,1a,6f,67,49,31,fe,78,19,fb,32,64,fc
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10l_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil10l_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A483C63A-CDBC-426E-BF93-872502E8144E}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}]
@Denied: (A 2) (Everyone)
@="IFlashBroker4"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E3F2C3CB-5EB8-4A04-B22C-7E3B4B6AF30F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:00000042
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{0f385822-16d4-4f33-aa5e-cdc8140f9354}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:4f000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{1e55942e-3cfe-47b8-8d67-7612b849ef76}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:4c000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{2b53cafa-eaa2-4158-88ed-a071f166f873}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:52000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{2c59ae3a-1a65-4182-af62-f1591bced283}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:42000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{2fc8346d-2c20-4f1c-9a7d-eb9fa3e622ec}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:10001de0
"Dhcpv6State"=dword:00000000
"NameServer"=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{43348fe0-a7b3-4d78-a84a-93785fa6b03b}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:48000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{4a997ef6-c959-4f10-bd16-d63d5725c385}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:0d001fc6
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{52653b22-3d52-4987-a360-225107ab45ad}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:110018f3
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{567e355e-b591-4df3-957e-b32e580b5c47}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:4f000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{584f5d9a-8770-420e-bc90-db7674e51d11}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:54000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{906bb0d9-1d8d-4c49-ae6d-f2041148da72}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:4a000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{9c642153-bfe0-4511-a0b6-e778ddd5ea9e}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:07001422
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{a4b76af8-ad50-4f4a-9c2f-68fa2743c2d2}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:2e020054
"Dhcpv6State"=dword:00000000
"NameServer"=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{a7dbe194-5abf-428c-861f-ff382a0b3b1d}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:53000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{b1990ff7-f0d2-4ba5-9073-0a28c8813ad6}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:09001fc6
"Dhcpv6State"=dword:00000000
"NameServer"=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{bff69559-80f6-4949-9db8-29b3b5f41d25}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:4c001de0
"Dhcpv6State"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{c991291e-5b9a-4cd0-8873-ee154e7d7e45}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:0c0018f3
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{ee1085d6-3184-480e-a56b-e57765ff9926}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:43000000
"Dhcpv6State"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{f50c0996-5b4a-4c6a-a322-6e991d4caa0e}]
@DACL=(02 0000)
"Dhcpv6Iaid"=dword:06001422
"Dhcpv6State"=dword:00000000
.
Zeit der Fertigstellung: 2011-04-26  19:26:42
ComboFix-quarantined-files.txt  2011-04-26 17:26
.
Vor Suchlauf: 17 Verzeichnis(se), 45.292.052.480 Bytes frei
Nach Suchlauf: 19 Verzeichnis(se), 45.505.036.288 Bytes frei
.
- - End Of File - - 4675EC30AD11CFE9E60B27DA4AB42C9C
         
--- --- ---
__________________


 

Themen zu Windows-Recovery - Auswertung Malwarebytes' log-file
anleitung, anti-malware, appdata, auswertung, browser, cache, cmd.exe, desktop, disabletaskmgr, entfernen, explorer, firefox, foren, jar_cache, log-file, m.exe, malwarebytes, microsoft, mozilla, passwörter, riskware.tool.ck, roaming, rootkit.dropper, software, surfen, symbol, temp, trojan.fakealert, trojaner, version, windows recovery, ändern




Ähnliche Themen: Windows-Recovery - Auswertung Malwarebytes' log-file


  1. Farbar Recovery Scan-Logfile Auswertung?
    Log-Analyse und Auswertung - 01.04.2014 (14)
  2. Malwarebytes Log Auswertung
    Log-Analyse und Auswertung - 20.06.2013 (1)
  3. Auswertung Malwarebytes
    Log-Analyse und Auswertung - 05.03.2013 (7)
  4. Malwarebytes und Otl Auswertung
    Log-Analyse und Auswertung - 30.12.2012 (2)
  5. File Restore / File Recovery - bin ich wieder clean?
    Plagegeister aller Art und deren Bekämpfung - 03.11.2012 (1)
  6. File Recovery
    Plagegeister aller Art und deren Bekämpfung - 18.10.2012 (38)
  7. File Recovery Virus
    Plagegeister aller Art und deren Bekämpfung - 24.09.2012 (19)
  8. File Recovery entfernen
    Log-Analyse und Auswertung - 14.09.2012 (10)
  9. File recovery in der Taskleiste + System error message
    Plagegeister aller Art und deren Bekämpfung - 11.09.2012 (22)
  10. File Recovery Virus eingefangen
    Log-Analyse und Auswertung - 11.09.2012 (1)
  11. File Recovery entfernen
    Anleitungen, FAQs & Links - 11.07.2012 (2)
  12. Malwarebytes auswertung
    Log-Analyse und Auswertung - 27.02.2012 (6)
  13. "Windows Recovery" mit Malwarebytes entfernt -- Notebook evtl. noch nicht sauber?
    Log-Analyse und Auswertung - 25.06.2011 (18)
  14. Windows Recovery entfernt- Problem mit Google Suche - Malwarebytes Logfiles
    Log-Analyse und Auswertung - 16.04.2011 (9)
  15. Auswertung Malwarebytes
    Log-Analyse und Auswertung - 31.05.2010 (5)
  16. malwarebytes auswertung?
    Plagegeister aller Art und deren Bekämpfung - 27.08.2008 (9)
  17. HiJack Log-File, Malwarebytes Log File und DSS, bitte um Rat!:-(
    Log-Analyse und Auswertung - 17.06.2008 (2)

Zum Thema Windows-Recovery - Auswertung Malwarebytes' log-file - Combo-Fix hat etwas länger gebraucht als erwartet, hier die log-Datei: Combofix Logfile: Code: Alles auswählen Aufklappen ATTFilter ComboFix 11-04-25.03 - Adjmal 26.04.2011 18:55:55.2.2 - x86 Microsoft® Windows Vista™ Home Premium - Windows-Recovery - Auswertung Malwarebytes' log-file...
Archiv
Du betrachtest: Windows-Recovery - Auswertung Malwarebytes' log-file auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.