![]() |
|
Log-Analyse und Auswertung: win32.katusha.oWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() | #16 |
![]() ![]() | ![]() win32.katusha.o Ich hoffe mal das ich es richtig gemacht hab... Resultat ist... ========== OTL ========== Prefs.js: "BearShare Web Search" removed from browser.search.defaultenginename Prefs.js: "Search" removed from browser.search.defaultthis.engineName Prefs.js: "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT2269050&SearchSource=3&q={searchTerms}" removed from browser.search.defaulturl Prefs.js: "BearShare Web Search" removed from browser.search.order.1 Prefs.js: "Search" removed from browser.search.selectedEngine Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\MsgCenterExe deleted successfully. Registry value HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\SunJavaUpdateSched deleted successfully. Registry value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\SpybotSD TeaTimer deleted successfully. C:\Programme\Spybot - Search & Destroy\TeaTimer.exe moved successfully. Registry value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\\Uniblue RegistryBooster 2 deleted successfully. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom\\AutoRun|DWORD:1 /E : value set successfully! C:\autoexec.bat moved successfully. File move failed. E:\AUTORUN.inf scheduled to be moved on reboot. File not found. File move failed. E:\AutoRun.exe scheduled to be moved on reboot. File move failed. E:\AutoRunGUI.dll scheduled to be moved on reboot. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b65d4206-6194-11de-8226-0019db518a3f}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b65d4206-6194-11de-8226-0019db518a3f}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{b65d4206-6194-11de-8226-0019db518a3f}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{b65d4206-6194-11de-8226-0019db518a3f}\ not found. File M:\LaunchU3.exe -a not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d00ca5fe-f22e-11db-a252-806e6f6e6963}\ deleted successfully. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d00ca5fe-f22e-11db-a252-806e6f6e6963}\ not found. Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{d00ca5fe-f22e-11db-a252-806e6f6e6963}\ not found. Registry key HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{d00ca5fe-f22e-11db-a252-806e6f6e6963}\ not found. File move failed. E:\Madden08.exe scheduled to be moved on reboot. C:\Windows\System32\wsnmp32d.dll moved successfully. ADS C:\Windows:01131222C357D2C5 deleted successfully. ADS C:\ProgramData\TEMP:8AB6C1D7 deleted successfully. ========== COMMANDS ========== C:\Windows\System32\drivers\etc\Hosts moved successfully. HOSTS file reset successfully OTL by OldTimer - Version 3.2.23.0 log created on 06082011_133509 Files\Folders moved on Reboot... File move failed. E:\AUTORUN.inf scheduled to be moved on reboot. File move failed. E:\AutoRun.exe scheduled to be moved on reboot. File move failed. E:\AutoRunGUI.dll scheduled to be moved on reboot. File move failed. E:\Madden08.exe scheduled to be moved on reboot. Registry entries deleted on Reboot... |
Themen zu win32.katusha.o |
7-zip, adobe, antivir, bonjour, defender, desktop, error, explorer, extras.txt, firefox, flash player, home, install.exe, logfile, nss3.dll, ntdll.dll, oldtimer, otl.txt, plug-in, realtek, registry, safer networking, scan, sched.exe, security, shell32.dll, software, trojaner, trojaner eingefangen, usb, win32/spy.agent.ntn |