![]() |
|
Plagegeister aller Art und deren Bekämpfung: Elex-Typ Viren wie Kyubey und Winsnare gefunden. Sie lassen sich jedoch nicht dauerhaft entfernen.Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
![]() | #1 |
![]() | ![]() Elex-Typ Viren wie Kyubey und Winsnare gefunden. Sie lassen sich jedoch nicht dauerhaft entfernen. Hallo, ich habe auf meinem Windows 10 System Virenfunde gemacht, die durch Malewarebytes und adware cleaner, mit dem Namen Elex kategorisiert wurden. Mein Windows Defender hat auch den Geist aufgegeben hat und die Realtime Protection ausgesetzt . Der Windows Defender gibt nach jedem Update oder Suchverlauf eine Fehlermeldung. Auch andere Virenscanner wie von Avast und AVG finden keine Bedrohungen mehr. Nun hat sich seit gestern auch der angebliche Google Chrome Browser installiert, er lässt sich aber nicht entfernen. Es sieht also so aus, als hätte ich auch einen Trojaner-Dropper. Ich kann nicht mehr sagen, wann ich mir diese Schadsoftware eingefangen habe, da sie wahrscheinlich schon lange unbemerkt auf meinem Rechner gewesen ist. Vielen Dank für jede Hilfe Lans Hier poste ich mal die Scanner-Logs, die Farber-Logs hab ich nur im Anhang gepostet. Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Suchlaufdatum: 2/11/2017 Suchlaufzeit: 16:22 Protokolldatei: 3.txt Administrator: Ja Version: 2.2.1.1043 Malware-Datenbank: v2017.02.11.04 Rootkit-Datenbank: v2016.11.20.01 Lizenz: Kostenlose Version Malware-Schutz: Deaktiviert Schutz vor bösartigen Websites: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 10 CPU: x64 Dateisystem: NTFS Benutzer: Medicus Suchlauftyp: Bedrohungssuchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 353090 Abgelaufene Zeit: 25 Min., 22 Sek. Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 0 (keine bösartigen Elemente erkannt) Module: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 0 (keine bösartigen Elemente erkannt) Registrierungswerte: 0 (keine bösartigen Elemente erkannt) Registrierungsdaten: 0 (keine bösartigen Elemente erkannt) Ordner: 0 (keine bösartigen Elemente erkannt) Dateien: 1 PUP.Optional.DownloadSponsor, C:\Users\Medicus\AppData\Local\Temp\DMR\dmr_72.exe, In Quarantäne, [37795051cadeae8833086c766b9524dc], Physische Sektoren: 0 (keine bösartigen Elemente erkannt) (end) Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Suchlaufdatum: 3/5/2017 Suchlaufzeit: 23:40 Protokolldatei: 4.txt Administrator: Ja Version: 2.2.1.1043 Malware-Datenbank: v2017.03.05.05 Rootkit-Datenbank: v2017.02.27.01 Lizenz: Kostenlose Version Malware-Schutz: Deaktiviert Schutz vor bösartigen Websites: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 10 CPU: x64 Dateisystem: NTFS Benutzer: Medicus Suchlauftyp: Bedrohungssuchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 359328 Abgelaufene Zeit: 23 Min., 51 Sek. Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 0 (keine bösartigen Elemente erkannt) Module: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 20 Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\e4766a966c84c91712966d767f19a4b3, In Quarantäne, [78f1b412f4b421155c646123e51b38c8], Adware.Elex.Generic, HKLM\SOFTWARE\CLASSES\CLSID\{B10A83E2-FFD7-11E6-B383-64006A5CFC23}, In Quarantäne, [85e46f579216201671f8995ba45c2fd1], Adware.Elex.Generic, HKLM\SOFTWARE\CLASSES\CLSID\{B10A83E2-FFD7-11E6-B383-64006A5CFC23}\INPROCSERVER32, In Quarantäne, [85e46f579216201671f8995ba45c2fd1], PUP.Optional.Wajam, HKLM\SOFTWARE\CLASSES\APPID\56BF5154-0B48-4ADB-902A-6C8B12E270D9, In Quarantäne, [3930e4e250587db91f280fa940c28c74], PUP.Optional.Wajam, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\56BF5154-0B48-4ADB-902A-6C8B12E270D9, In Quarantäne, [f079bd097a2ed75ff65144743bc703fd], PUP.Optional.Wajam, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\56BF5154-0B48-4ADB-902A-6C8B12E270D9, In Quarantäne, [432612b42b7db6808dba7f394db54fb1], PUP.Optional.AppTrailers, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\AppTrailers, In Quarantäne, [ce9bd8eeddcb2c0ab69ba9ce3bc531cf], Adware.Elex, HKLM\SOFTWARE\jhdbca, In Quarantäne, [ed7ca71f268238fe13871a8ebd43f907], PUP.Optional.Social2Search, HKLM\SOFTWARE\Socia2Sea Browser Enhancer, In Quarantäne, [11589a2c1098f640feb4972a45bb14ec], PUP.Optional.YesSearches, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{9B3D1FA3-EED7-4773-BA75-DF6AA016B3EF}, Löschen bei Neustart, [d099e5e1cade0b2bf4dd905452b0c040], Adware.Elex, HKLM\SOFTWARE\WOW6432NODE\jhdbca, In Quarantäne, [df8a0fb7a404c3730b8fc3e5b749da26], PUP.Optional.Social2Search, HKLM\SOFTWARE\WOW6432NODE\Socia2Sea Browser Enhancer, In Quarantäne, [c4a59e283276d85e2e84e7da14ec629e], Adware.Elex, HKLM\SOFTWARE\WOW6432NODE\{84416237-6490-494D-9AD6-4994DD978971}, In Quarantäne, [f574487ea3053ef8cc1c5c719f625fa1], PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{7BCAFB67-3DFB-4E4B-AB28-99FB9853866C}, In Quarantäne, [fa6fcbfb07a11a1cd43ff9ec8a7855ab], Adware.Sasquor.SPL, HKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\PRINT\PROVIDERS\7QS4X3EC, In Quarantäne, [c0a9cdf97e2a86b0e08deb9b8d731fe1], Adware.Elex, HKU\.DEFAULT\SOFTWARE\jhdbca, In Quarantäne, [50195d69cedaf640f5c0377028d87789], Adware.Elex, HKU\S-1-5-18\SOFTWARE\jhdbca, In Quarantäne, [0663c1056b3dc86e416d6e3a1ae6e818], PUP.Optional.Wajam, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\WajIEnhance, In Quarantäne, [0e5b0eb83c6ca5910959fca6867d2fd1], PUP.Optional.AppTrailers, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\APPDATALOW\SOFTWARE\AppTrailers, In Quarantäne, [b3b62e98dbcdc5718e2f5df6c33de51b], PUP.Optional.Tuto4PC, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\MICROSOFT\wewewe, In Quarantäne, [f178d8eee6c2de581ea4147456aa15eb], Registrierungswerte: 7 Adware.Tuto4PC, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|W8OJ7LTE52, "C:\Program Files\WSX0RM2ZZO\Q7F7JQSIU.exe", In Quarantäne, [4821b90d1296be78fa13c50c5ca418e8] Adware.Elex.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SHELLEXECUTEHOOKS|{B10A83E2-FFD7-11E6-B383-64006A5CFC23}, In Quarantäne, [85e46f579216201671f8995ba45c2fd1], PUP.Optional.YesSearches, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{9B3D1FA3-EED7-4773-BA75-DF6AA016B3EF}|Path, \Kiqitionloward Module, Löschen bei Neustart, [d099e5e1cade0b2bf4dd905452b0c040] PUP.Optional.DiskPower, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|DiskPower, "C:\Program Files (x86)\DiskP\DiskPower.exe", In Quarantäne, [a6c3b01693152313333f68d79b657a86] PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{7BCAFB67-3DFB-4E4B-AB28-99FB9853866C}|DisplayName, trotux - Uninstall, In Quarantäne, [fa6fcbfb07a11a1cd43ff9ec8a7855ab] Adware.Sasquor.SPL, HKLM\SYSTEM\CURRENTCONTROLSET\CONTROL\PRINT\PROVIDERS\7qs4x3ec|Name, C:\Program Files (x86)\Kiqitionloward Module\local64spl.dll, In Quarantäne, [c0a9cdf97e2a86b0e08deb9b8d731fe1] PUP.Optional.AppTrailers, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\AppTrailers.exe su, In Quarantäne, [89e04482dfc946f062343abad42c7987] Registrierungsdaten: 0 (keine bösartigen Elemente erkannt) Ordner: 7 PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AppTrailers, In Quarantäne, [e683bc0abaee3006cf9c959e2ad62fd1], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR, In Quarantäne, [bcad329426821323ff00508c6998ac54], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR\Downloads, In Quarantäne, [bcad329426821323ff00508c6998ac54], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR\Downloads\152e221a8bef8d2d13c58f995563a1a1, In Quarantäne, [bcad329426821323ff00508c6998ac54], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR\Downloads\152e221a8bef8d2d13c58f995563a1a1\3533bda4c65ccfbbc76d3b22854fd16c, In Quarantäne, [bcad329426821323ff00508c6998ac54], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales, In Quarantäne, [89e04482dfc946f062343abad42c7987], Dateien: 74 Adware.Wajam.Generic, C:\Windows\System32\drivers\e4766a966c84c91712966d767f19a4b3.sys, Löschen bei Neustart, [78f1b412f4b421155c646123e51b38c8], Adware.Tuto4PC, C:\Program Files\WSX0RM2ZZO\Q7F7JQSIU.exe, In Quarantäne, [4821b90d1296be78fa13c50c5ca418e8], Adware.Elex.Generic, C:\Users\Medicus\AppData\Roaming\Fserry\Fitesy.dll, Löschen bei Neustart, [85e46f579216201671f8995ba45c2fd1], Adware.Tuto4PC, C:\Program Files (x86)\DiskP\VJRJV02W4D2UHPR.exe, In Quarantäne, [7bee2e98b8f05dd93ad3e2ef867a6a96], Adware.Elex, C:\Program Files (x86)\Kiqitionloward Module\local64spl.dll, Löschen bei Neustart, [610800c6ebbdb28404d95c9b0bf50ef2], PUP.Optional.EoRezo, C:\Users\Medicus\AppData\Local\Temp\global_installer.exe, In Quarantäne, [0f5a6f57b8f0bf77043e271ddb251fe1], Adware.Tuto4PC, C:\Users\Medicus\AppData\Local\Temp\88I85CF.exe, In Quarantäne, [48217c4aabfdb3838f101ab5b8489f61], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Local\Temp\AppTrailers.9.1.10amt.exe, In Quarantäne, [bcade9dd5e4ab482262ba7d02bd50ef2], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\Uninstall.exe, In Quarantäne, [ce9bd8eeddcb2c0ab69ba9ce3bc531cf], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AppTrailers\AppTrailers.lnk, In Quarantäne, [e683bc0abaee3006cf9c959e2ad62fd1], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\AppTrailers\Uninstall.lnk, In Quarantäne, [e683bc0abaee3006cf9c959e2ad62fd1], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR\akwqiobxblsuefrw.dat, In Quarantäne, [bcad329426821323ff00508c6998ac54], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR\kuduuxlspxfilglz.dat, In Quarantäne, [bcad329426821323ff00508c6998ac54], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR\Downloads\152e221a8bef8d2d13c58f995563a1a1\3533bda4c65ccfbbc76d3b22854fd16c\1-klick-chip-setup.exe, In Quarantäne, [bcad329426821323ff00508c6998ac54], PUP.Optional.YesSearches, C:\Windows\System32\Tasks\Kiqitionloward Module, In Quarantäne, [2346b016ffa9cb6b24ac1cc861a1e51b], PUP.Optional.Wajam, C:\Users\Medicus\AppData\Local\Temp\wajam_install.exe, In Quarantäne, [65044581149467cf9cb78a18d42f05fb], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\AppTrailers.exe, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\ffmpegsumo.dll, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\icudtl.dat, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\nw.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\storage.json, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\hr.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\am.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\ar.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\bg.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\bn.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\ca.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\cs.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\da.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\de.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\el.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\en-GB.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\en-US.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\es-419.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\es.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\et.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\fa.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\fi.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\fil.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\fr.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\gu.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\hi.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\hu.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\id.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\it.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\iw.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\ja.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\kn.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\ko.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\lt.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\lv.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\ml.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\mr.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\ms.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\nl.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\no.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\pl.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\pt-BR.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\pt-PT.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\ro.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\ru.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\sk.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\sl.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\sr.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\sv.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\sw.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\ta.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\te.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\th.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\tr.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\uk.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\vi.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\zh-CN.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], PUP.Optional.AppTrailers, C:\Users\Medicus\AppData\Roaming\AppTrailers\locales\zh-TW.pak, In Quarantäne, [89e04482dfc946f062343abad42c7987], Physische Sektoren: 0 (keine bösartigen Elemente erkannt) (end) Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Suchlaufdatum: 3/6/2017 Suchlaufzeit: 16:51 Protokolldatei: malewarebytes.txt Administrator: Ja Version: 2.2.1.1043 Malware-Datenbank: v2017.03.06.06 Rootkit-Datenbank: v2017.02.27.01 Lizenz: Kostenlose Version Malware-Schutz: Deaktiviert Schutz vor bösartigen Websites: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 10 CPU: x64 Dateisystem: NTFS Benutzer: Medicus Suchlauftyp: Bedrohungssuchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 346144 Abgelaufene Zeit: 17 Min., 50 Sek. Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 0 (keine bösartigen Elemente erkannt) Module: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 13 Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\e4766a966c84c91712966d767f19a4b3, In Quarantäne, [d0fe9036535564d24779dda7c43c9e62], Adware.Elex.SHHKRST, HKLM\SOFTWARE\CLASSES\CLSID\{7F5D6A2C-FFD8-11E6-B984-64006A5CFC23}, In Quarantäne, [8945f5d170387cba79f120c48b759967], Adware.Elex.SHHKRST, HKLM\SOFTWARE\CLASSES\CLSID\{7F5D6A2C-FFD8-11E6-B984-64006A5CFC23}\INPROCSERVER32, In Quarantäne, [8945f5d170387cba79f120c48b759967], PUP.Optional.Wajam, HKLM\SOFTWARE\CLASSES\APPID\56BF5154-0B48-4ADB-902A-6C8B12E270D9, In Quarantäne, [547ad1f501a744f2b8796d4c5aa8af51], PUP.Optional.Wajam, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\56BF5154-0B48-4ADB-902A-6C8B12E270D9, In Quarantäne, [d9f59b2b8f19c86ee150b801bb4729d7], PUP.Optional.Wajam, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\56BF5154-0B48-4ADB-902A-6C8B12E270D9, In Quarantäne, [29a500c6a6026ec84ee36b4e60a23bc5], PUP.Optional.Social2Search, HKLM\SOFTWARE\Socia2Sea Browser Enhancer, In Quarantäne, [37974c7af5b31c1a961cdfe2946ca957], PUP.Optional.Social2Search.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\1CE69B235CDB5B8CA473823D2F81016D, In Quarantäne, [537bb511f2b66dc9e0a24595b251c040], PUP.Optional.Social2Search, HKLM\SOFTWARE\WOW6432NODE\Socia2Sea Browser Enhancer, In Quarantäne, [9737279fa20686b09121bc05817f9967], PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\trotuxSoftware, In Quarantäne, [2ba318ae3177a78fc838d28481817f81], Adware.Elex, HKLM\SOFTWARE\WOW6432NODE\{84416237-6490-494D-9AD6-4994DD978971}, In Quarantäne, [5b736066d7d1bf777462428c3bc6768a], PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{9F8F97EA-E904-4124-B16F-3975E11095CF}, In Quarantäne, [745a675f8820a78ffa031acb28dafa06], PUP.Optional.Wajam, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\WajIEnhance, In Quarantäne, [14ba4680a9ff13232f1da6fd659ee31d], Registrierungswerte: 3 Adware.Elex.SHHKRST, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\SHELLEXECUTEHOOKS|{7F5D6A2C-FFD8-11E6-B984-64006A5CFC23}, In Quarantäne, [8945f5d170387cba79f120c48b759967], PUP.Optional.Social2Search.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\1ce69b235cdb5b8ca473823d2f81016d|DisplayName, Social2Search, In Quarantäne, [537bb511f2b66dc9e0a24595b251c040] PUP.Optional.Trotux, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{9F8F97EA-E904-4124-B16F-3975E11095CF}|DisplayName, trotux - Uninstall, In Quarantäne, [745a675f8820a78ffa031acb28dafa06] Registrierungsdaten: 0 (keine bösartigen Elemente erkannt) Ordner: 3 PUP.Optional.FakeFFProfile, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\naweriweentcofise, In Quarantäne, [3a94d1f52d7b5ed8d3a41d9fa15fdf21], PUP.Optional.FakeFFProfile, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles, In Quarantäne, [3a94d1f52d7b5ed8d3a41d9fa15fdf21], PUP.Optional.FakeFFProfile, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\hlt46v0m.default, In Quarantäne, [3a94d1f52d7b5ed8d3a41d9fa15fdf21], Dateien: 10 Adware.Wajam.Generic, C:\Windows\System32\drivers\e4766a966c84c91712966d767f19a4b3.sys, Löschen bei Neustart, [d0fe9036535564d24779dda7c43c9e62], Adware.Elex.SHHKRST, C:\Users\Medicus\AppData\Roaming\Coezoward\Vitersestekadom.dll, Löschen bei Neustart, [8945f5d170387cba79f120c48b759967], PUP.Optional.FakeFFProfile, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\hlt46v0m.default\prefs.js, In Quarantäne, [3a94d1f52d7b5ed8d3a41d9fa15fdf21], PUP.Optional.FakeFFProfile, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\hlt46v0m.default\profiles.ini, In Quarantäne, [3a94d1f52d7b5ed8d3a41d9fa15fdf21], PUP.Optional.FakeFFProfile, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\hlt46v0m.default\search-metadata.json, In Quarantäne, [3a94d1f52d7b5ed8d3a41d9fa15fdf21], PUP.Optional.FakeFFProfile, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\naweriweentcofise\Profiles\hlt46v0m.default\search.json.mozlz4, In Quarantäne, [3a94d1f52d7b5ed8d3a41d9fa15fdf21], PUP.Optional.Trotux, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\Profiles\hlt46v0m.default\prefs.js, Gut: (), Schlecht: (user_pref("browser.newtab.url", "hxxp://www.trotux.com/?z=6b19634e9079c8ab9b6e6fag4z5b5b2b7g8o0mez9c&from=fss&uid=SAMSUNGXHM641JI_S23TJDQZ200369&type=hp");), Ersetzt,[f1dd20a6119710262a165be3a16347b9] PUP.Optional.Trotux, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\Profiles\hlt46v0m.default\prefs.js, Gut: (), Schlecht: (b4k5LthlQ==\":1,\"1vxIeO8nGaYPC/VpeBgmkw==\":1,\"YxIv+JNlCQZewRupbyXuYw==\":1,\"kDw1PuOwmg9ZZmbJtBZPrQ==\":1,\"+Q+qH4YqkEWtr81FZF5cCQ==\":1,\"3C2K3mXHRwx6xFNnMLK40A==\), Ersetzt,[0fbf695d03a5d85e59e7d26c14f0c739] PUP.Optional.Trotux, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\Profiles\hlt46v0m.default\prefs.js, Gut: (), Schlecht: (the application is running, * the changes will be overwritten when the application exits. * * To make a manual change to preferences, you can visit the URL about:config */ user_pr), Ersetzt,[def0ab1babfd84b2f24e5ee0ca3a926e] PUP.Optional.Trotux, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\Profiles\hlt46v0m.default\prefs.js, Gut: (), Schlecht: (ake a manual change to preferences, you can visit the URL about:config */ user_pref("accessibility.typeaheadfind", true); user_pref("accessibility.typeaheadfind.flashBar", 0); user_pre), Ersetzt,[e4ea1fa79e0ade5869d7a39b33d10cf4] Physische Sektoren: 0 (keine bösartigen Elemente erkannt) (end) Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Suchlaufdatum: 3/14/2017 Suchlaufzeit: 11:49 Protokolldatei: 5.txt Administrator: Ja Version: 2.2.1.1043 Malware-Datenbank: v2017.03.14.03 Rootkit-Datenbank: v2017.03.11.01 Lizenz: Kostenlose Version Malware-Schutz: Deaktiviert Schutz vor bösartigen Websites: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 10 CPU: x64 Dateisystem: NTFS Benutzer: Medicus Suchlauftyp: Bedrohungssuchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 347925 Abgelaufene Zeit: 12 Min., 36 Sek. Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 0 (keine bösartigen Elemente erkannt) Module: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 2 PUP.Optional.InstallCore, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\csastats, In Quarantäne, [16d524a52a7e16201a6f885ae61d2ed2], PUP.Optional.ProductSetup, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\PRODUCTSETUP, In Quarantäne, [737840894d5b20162d8ac9d99271936d], Registrierungswerte: 1 PUP.Optional.ProductSetup, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\PRODUCTSETUP|tb, 0N0U0L1F, In Quarantäne, [737840894d5b20162d8ac9d99271936d] Registrierungsdaten: 0 (keine bösartigen Elemente erkannt) Ordner: 0 (keine bösartigen Elemente erkannt) Dateien: 0 (keine bösartigen Elemente erkannt) Physische Sektoren: 0 (keine bösartigen Elemente erkannt) (end) Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Suchlaufdatum: 3/30/2017 Suchlaufzeit: 13:20 Protokolldatei: 6.txt Administrator: Ja Version: 2.2.1.1043 Malware-Datenbank: v2017.03.30.03 Rootkit-Datenbank: v2017.03.11.01 Lizenz: Kostenlose Version Malware-Schutz: Deaktiviert Schutz vor bösartigen Websites: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 10 CPU: x64 Dateisystem: NTFS Benutzer: Medicus Suchlauftyp: Bedrohungssuchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 351710 Abgelaufene Zeit: 21 Min., 51 Sek. Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 0 (keine bösartigen Elemente erkannt) Module: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 6 Adware.Elex, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7D75288E-EF4E-47A0-9A7B-0A3378996CF5}, Löschen bei Neustart, [6fbcf3dd9711c670dbd73c93af518878], Adware.Elex, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Milimili, Löschen bei Neustart, [58d3c20e1890f541b5c3309fab55fb05], Adware.Elex.SHHKRST, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Kyubey, In Quarantäne, [e645b61aaafe74c269e2d39f57aaca36], PUP.Optional.Elex, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WinSAPSvc, In Quarantäne, [9c8fd2fe3b6d4cea2c342f58a45c6799], Adware.Elex, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WINSNARE, In Quarantäne, [b4779e32139540f6631d0dde6f91748c], Adware.Elex, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\EVENTLOG\APPLICATION\WINSNARE, In Quarantäne, [9b9003cd9c0c87af84eb2da0e71a26da], Registrierungswerte: 1 Adware.Elex, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{7D75288E-EF4E-47A0-9A7B-0A3378996CF5}|Path, \Milimili, Löschen bei Neustart, [6fbcf3dd9711c670dbd73c93af518878] Registrierungsdaten: 0 (keine bösartigen Elemente erkannt) Ordner: 2 Adware.Elex, C:\Program Files (x86)\MIO, In Quarantäne, [200b11bf278165d19b60d0fe3cc4de22], Adware.Elex, C:\Program Files (x86)\MIO\loader, In Quarantäne, [200b11bf278165d19b60d0fe3cc4de22], Dateien: 3 PUP.Optional.FusionCore, C:\Users\Medicus\Downloads\PowerISO6-x64.exe, In Quarantäne, [e249795705a3c76fd7ff3a1cb64c19e7], Adware.Elex, C:\Program Files (x86)\MIO\MIO.exe, In Quarantäne, [200b11bf278165d19b60d0fe3cc4de22], Adware.Elex, C:\Windows\System32\Tasks\Milimili, In Quarantäne, [3af1ca06733547ef58d8e7eba55bbb45], Physische Sektoren: 0 (keine bösartigen Elemente erkannt) (end) Code:
ATTFilter Malwarebytes Anti-Malware www.malwarebytes.org Suchlaufdatum: 3/31/2017 Suchlaufzeit: 18:36 Protokolldatei: 7.txt Administrator: Ja Version: 2.2.1.1043 Malware-Datenbank: v2017.03.31.05 Rootkit-Datenbank: v2017.03.11.01 Lizenz: Kostenlose Version Malware-Schutz: Deaktiviert Schutz vor bösartigen Websites: Deaktiviert Selbstschutz: Deaktiviert Betriebssystem: Windows 10 CPU: x64 Dateisystem: NTFS Benutzer: Medicus Suchlauftyp: Bedrohungssuchlauf Ergebnis: Abgeschlossen Durchsuchte Objekte: 350713 Abgelaufene Zeit: 12 Min., 4 Sek. Speicher: Aktiviert Start: Aktiviert Dateisystem: Aktiviert Archive: Aktiviert Rootkits: Deaktiviert Heuristik: Aktiviert PUP: Aktiviert PUM: Aktiviert Prozesse: 1 PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter4.exe, 6900, Löschen bei Neustart, [9ff23e92c9df44f2249b5439718f6898] Module: 0 (keine bösartigen Elemente erkannt) Registrierungsschlüssel: 19 PUP.Optional.SpyHunter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\esgiguard, In Quarantäne, [68296e62e4c4171fdfe0c6c7857be21e], PUP.Optional.SpyHunter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SpyHunter 4 Service, In Quarantäne, [cec3ad23bbed9e98dce3f4996d93f10f], PUP.Optional.SpyHunter, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\SpyHunter, In Quarantäne, [870a537dc0e8d36361767e435aa61be5], Adware.Elex, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\FirefoxDL, In Quarantäne, [5e33c60a1e8a2a0c8ea8df78f012e020], PUP.Optional.SpyHunter, HKLM\SOFTWARE\ENIGMASOFTWAREGROUP\SpyHunter, In Quarantäne, [e4adebe5dbcd2e081b5e71fc8878827e], PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}, In Quarantäne, [8011567acadeda5cd6ae5e05a35e9a66], Adware.Elex, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{49D8984D-5ADD-4ACE-B87F-BD57347C14F2}, Löschen bei Neustart, [3b56834deabe02342189527d956b26da], PUP.Optional.SpyHunter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{79DA1A25-1C38-4D35-8C48-8F36D2E4704B}, Löschen bei Neustart, [39583f91f7b1de58ca328bebd42c9a66], Adware.Elex, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Milimili, In Quarantäne, [9ff22da36345300628485679ef11c937], PUP.Optional.SpyHunter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\SpyHunter4Startup, Löschen bei Neustart, [bad72fa18a1e54e2bd558edec8386799], PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\startpageing123Software, In Quarantäne, [207100d0911792a437c10163966b03fd], PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}, In Quarantäne, [860b517f3672bf77077d6ff404fd2ad6], Adware.Elex.SHHKRST, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Kyubey, In Quarantäne, [068b8749a602181ee260c9a908f9d32d], PUP.Optional.Elex, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WinSAPSvc, In Quarantäne, [f49d864a3573ab8b2c2d5631e02055ab], Adware.Elex, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WINSNARE, In Quarantäne, [870ab11f5e4a0e281e5b22c9dd23f709], PUP.Optional.SpyHunter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ESGSCANNER, In Quarantäne, [870a3f91792fcc6a743bb7b9966ab14f], Adware.Elex, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\EVENTLOG\APPLICATION\WINSNARE, In Quarantäne, [8011ad23a7012f0784e1c10c2dd46997], PUP.Optional.FFDownloader, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\FIREFOXDL, In Quarantäne, [eda4dbf551578aac92131b3321e114ec], PUP.Optional.StartPage.ShrtCln, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}, In Quarantäne, [8f026c64dbcd00365693aab71fe255ab], Registrierungswerte: 11 PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|DisplayName, startpageing123, In Quarantäne, [8011567acadeda5cd6ae5e05a35e9a66] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|URL, hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}, In Quarantäne, [9cf540907d2b5bdbc0c4f56e4fb27f81] Adware.Elex, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{49D8984D-5ADD-4ACE-B87F-BD57347C14F2}|Path, \Milimili, Löschen bei Neustart, [3b56834deabe02342189527d956b26da] PUP.Optional.SpyHunter, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{79DA1A25-1C38-4D35-8C48-8F36D2E4704B}|Path, \SpyHunter4Startup, Löschen bei Neustart, [39583f91f7b1de58ca328bebd42c9a66] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|DisplayName, startpageing123, In Quarantäne, [860b517f3672bf77077d6ff404fd2ad6] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|URL, hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}, In Quarantäne, [0a8710c0d7d1a591097ba1c2cd349868] PUP.Optional.SpyHunter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ESGIGUARD|ImagePath, \??\C:\Program Files\Enigma Software Group\SpyHunter\esgiguard.sys, In Quarantäne, [d9b81eb27b2d92a4a70970fdec14ee12] PUP.Optional.SpyHunter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ESGSCANNER|ImagePath, system32\DRIVERS\EsgScanner.sys, In Quarantäne, [870a3f91792fcc6a743bb7b9966ab14f] PUP.Optional.FFDownloader, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\FIREFOXDL|ImagePath, "C:\Users\Medicus\AppData\Local\Temp\1\QQBrowser.exe" -isvc, In Quarantäne, [eda4dbf551578aac92131b3321e114ec] PUP.Optional.StartPage.ShrtCln, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|DisplayName, startpageing123, In Quarantäne, [8f026c64dbcd00365693aab71fe255ab] PUP.Optional.StartPage.ShrtCln, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{33BB0A4E-99AF-4226-BDF6-49120163DE86}|URL, hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}, In Quarantäne, [731e7a56f1b7cd6939b04918629fd32d] Registrierungsdaten: 15 PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\CLIENTS\STARTMENUINTERNET\IEXPLORE.EXE\SHELL\OPEN\COMMAND, C:\Program Files\Internet Explorer\iexplore.exe hxxp://www.startpageing123.com/?type=sc&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360, Gut: (iexplore.exe), Schlecht: (C:\Program Files\Internet Explorer\iexplore.exe hxxp://www.startpageing123.com/?type=sc&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360),Ersetzt,[e7aabd131791d36345dccc978a77f709] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Default_Page_URL, hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360),Ersetzt,[0b86329eefb922144c32a0c1a160e020] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Default_Search_URL, hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}),Ersetzt,[98f9943c6741300689f5c79a946d8977] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Search Page, hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}),Ersetzt,[0988626e8e1a62d4532bacb5b34ef50b] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Start Page, hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360),Ersetzt,[b6db6769387055e17e00332e46bbef11] PUP.Optional.Qone8, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Gut: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Schlecht: ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Ersetzt,[bdd4e0f01f8978bee1c2b78b679db24e] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\CLIENTS\STARTMENUINTERNET\IEXPLORE.EXE\SHELL\OPEN\COMMAND, C:\Program Files\Internet Explorer\iexplore.exe hxxp://www.startpageing123.com/?type=sc&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360, Gut: (iexplore.exe), Schlecht: (C:\Program Files\Internet Explorer\iexplore.exe hxxp://www.startpageing123.com/?type=sc&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360),Ersetzt,[4051eae6b0f8e155bb667be86c958e72] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN|Default_Page_URL, hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360),Ersetzt,[d0c1ae22990fcb6b9ae4590825dc629e] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN|Default_Search_URL, hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}),Ersetzt,[880957798523082eadd1d68b629f60a0] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN|Search Page, hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/search/?type=ds&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360&q={searchTerms}),Ersetzt,[d0c14e82624642f43549b3ae60a11ae6] PUP.Optional.StartPage.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN|Start Page, hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360),Ersetzt,[1978f7d92a7e4aec4b33e27f57aa3fc1] PUP.Optional.Qone8, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Gut: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Schlecht: ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Ersetzt,[8b064090e9bf40f63d66c47e6b99d12f] PUP.Optional.StartPage.ShrtCln, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Start Page, hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360),Ersetzt,[2c6526aa119794a2703b075a2bd6e917] PUP.Optional.StartPage.ShrtCln, HKU\S-1-5-21-1853789797-2485788889-945615179-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Default_Page_URL, hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360, Gut: (www.google.com), Schlecht: (hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360),Ersetzt,[eaa7bb15179149ed24875011c33ee21e] PUP.Optional.StartPage.ShrtCln, HKU\S-1-5-21-1853789797-2485788889-945615179-1001_Classes\LOCAL SETTINGS\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APPCONTAINER\STORAGE\MICROSOFT.MICROSOFTEDGE_8WEKYB3D8BBWE\MICROSOFTEDGE\MAIN|HomeButtonPage, hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360, Gut: (hxxp://www.google.com), Schlecht: (hxxp://www.startpageing123.com/?type=hp&ts=1490970855&z=62c93b2459ec12f17ea43b2g3z7t6ectam8ebb7qac&from=che0812&uid=WDCXWD6401AALS-00L3B2_WD-WCASY384736047360),Ersetzt,[4051ba16891f6fc784ee67fd24dd46ba] Ordner: 23 PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\bin, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\extensions, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\features, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\VisualElements, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\defaults, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\defaults\pref, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\dictionaries, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\fonts, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\gmp-clearkey, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\gmp-clearkey\0.1, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\uninstall, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], Adware.Elex, C:\Program Files (x86)\MIO, In Quarantäne, [6f2227a901a7023437bcd8f637c9946c], Adware.Elex, C:\Windows\Temp\winsap_update, Löschen bei Neustart, [dab726aa2781f046bb897604a160eb15], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR, In Quarantäne, [4f428f413177b4829847e300e21f7090], Adware.Elex, C:\Users\Medicus\AppData\Local\Temp\1, In Quarantäne, [5e33c60a1e8a2a0c8ea8df78f012e020], PUP.Optional.SpyHunter, C:\Users\Medicus\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SpyHunter, In Quarantäne, [abe6d2fecfd91125228d620b48b825db], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter, Löschen bei Neustart, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Data, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\defs, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Log, Löschen bei Neustart, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\mon, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], Dateien: 195 PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter4.exe, Löschen bei Neustart, [9ff23e92c9df44f2249b5439718f6898], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\esgiguard.sys, Löschen bei Neustart, [68296e62e4c4171fdfe0c6c7857be21e], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\SH4Service.exe, In Quarantäne, [cec3ad23bbed9e98dce3f4996d93f10f], Adware.Elex, C:\Users\Medicus\AppData\Local\Temp\~bk223C.tmp, In Quarantäne, [3160d8f84662b284b6965a74758b37c9], PUP.Optional.DownloadSponsor, C:\Users\Medicus\AppData\Local\Temp\DMR\dmr_72.exe, In Quarantäne, [bed35c74d4d49a9c29ee253719e8ef11], PUP.Optional.SpyHunter, C:\Users\Medicus\Downloads\SpyHunter-Installer.exe, In Quarantäne, [48491ab610980135d205ffc253ad619f], PUP.Optional.WiperSoft, C:\Users\Medicus\Downloads\WiperSoft-installer.exe, In Quarantäne, [a1f0854b05a34fe7f1cd117c14ec8977], PUP.Optional.SpyHunter, C:\Users\Medicus\AppData\Roaming\Enigma Software Group\sh_installer.exe, In Quarantäne, [870a537dc0e8d36361767e435aa61be5], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\bin\FirefoxUpdate.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\bin\Firefox_crashreporter.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\bin\Firefox_crashreporterx64.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\Accessible.tlb, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\AccessibleMarshal.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-file-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-file-l1-2-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-file-l2-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-handle-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-heap-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-interlocked-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-libraryloader-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-localization-l1-2-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-memory-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-namedpipe-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-processenvironment-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-processthreads-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-profile-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-rtlsupport-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-string-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-synch-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-synch-l1-2-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-sysinfo-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-timezone-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-util-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-conio-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-convert-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-environment-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-filesystem-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-heap-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-console-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-datetime-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-debug-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-math-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-multibyte-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-private-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-process-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-runtime-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-stdio-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-string-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-time-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-utility-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\application.ini, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-errorhandling-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-core-processthreads-l1-1-1.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\api-ms-win-crt-locale-l1-1-0.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\freebl3.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\msvcp140.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\breakpadinjector.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\chrome.manifest, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\crashreporter.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\crashreporter.ini, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\d3dcompiler_47.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\dependentlibs.list, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\fbox.bin, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\Firefox.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\firefox.VisualElementsManifest.xml, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\freebl3.chk, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\IA2Marshal.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\lgpllibs.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\libEGL.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\libGLESv2.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\maintenanceservice.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\maintenanceservice_installer.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\minidump-analyzer.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\mozavcodec.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\mozavutil.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\mozglue.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\nss3.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\nssckbi.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\nssdbm3.chk, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\nssdbm3.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\omni.ja, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\platform.ini, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\plugin-container.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\plugin-hang-ui.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\precomplete, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\qipcap.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\removed-files, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\softokn3.chk, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\softokn3.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\ucrtbase.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\update-settings.ini, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\updater.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\updater.ini, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\vcruntime140.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\wow_helper.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\xul.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\@H99KV4DO-UCCF-9PFO-9ZLK-8RRP4FVOKD9O.xpi, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\blocklist.xml, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\chrome.manifest, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\crashreporter-override.ini, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\omni.ja, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\extensions\@E97YHOMI-FU8L-IM23-VUT9-RVDZT7M8XL8H.xpi, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}.xpi, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\features\aushelper@mozilla.org.xpi, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\features\e10srollout@mozilla.org.xpi, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\features\firefox@getpocket.com.xpi, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\features\webcompat@mozilla.org.xpi, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\VisualElements\VisualElements_150.png, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\browser\VisualElements\VisualElements_70.png, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\defaults\pref\channel-prefs.js, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\dictionaries\en-US.aff, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\dictionaries\en-US.dic, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\fonts\EmojiOneMozilla.ttf, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\gmp-clearkey\0.1\clearkey.dll, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\gmp-clearkey\0.1\clearkey.info, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.Ghokswa, C:\Program Files (x86)\Firefox\uninstall\helper.exe, In Quarantäne, [94fd1fb12e7ae45260e9e44dfa0645bb], PUP.Optional.SpyHunter, C:\Windows\System32\Tasks\SpyHunter4Startup, In Quarantäne, [434edcf42a7e3df961e70a5fca36da26], PUP.Optional.SpyHunter, C:\Users\Medicus\Desktop\SpyHunter.lnk, In Quarantäne, [b0e1b41cbbedf2447b1075f7916f9b65], Adware.Elex, C:\Program Files (x86)\MIO\MIO.exe, In Quarantäne, [6f2227a901a7023437bcd8f637c9946c], Adware.Elex, C:\Windows\System32\Tasks\Milimili, In Quarantäne, [cdc420b07f2980b6d850795936ca1ce4], PUP.Optional.StartPage.ShrtCln, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\Profiles\hlt46v0m.default\searchplugins\startpageing123.xml, In Quarantäne, [474a369ab2f6fe380a23055e738e8080], Adware.Elex, C:\Windows\Temp\winsap_update\Kyubey.exe, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\3, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\39.json, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\4, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\data.bin, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\DataBase, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\MIO.dll, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\MIO.exe, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\QQBrowser.exe, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\QQBrowserFrame.dll, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\RegKey.dll, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\simple.dat, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\SSS.dll, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\TTT.dll, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\WinSAP.dll, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\winsap_cf, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.Elex, C:\Windows\Temp\winsap_update\WinSnare.msi, In Quarantäne, [dab726aa2781f046bb897604a160eb15], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR\ndyidxcxoeyisten.dat, In Quarantäne, [4f428f413177b4829847e300e21f7090], Adware.ChinAd, C:\Users\Medicus\AppData\Local\Temp\DMR\dmr_72.exe, In Quarantäne, [4f428f413177b4829847e300e21f7090], Adware.Elex, C:\Users\Medicus\AppData\Local\Temp\1\QQBrowser.exe, In Quarantäne, [5e33c60a1e8a2a0c8ea8df78f012e020], Adware.Elex, C:\Users\Medicus\AppData\Local\Temp\1\QQBrowserFrame.dll, In Quarantäne, [5e33c60a1e8a2a0c8ea8df78f012e020], PUP.Optional.SpyHunter, C:\Windows\System32\drivers\EsgScanner.sys, In Quarantäne, [870a3f91792fcc6a743bb7b9966ab14f], PUP.Optional.FFDownloader, C:\Users\Medicus\AppData\Local\Temp\1\QQBrowser.exe, In Quarantäne, [eda4dbf551578aac92131b3321e114ec], PUP.Optional.SpyHunter, C:\Users\Medicus\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SpyHunter\SpyHunter Emergency Startup.lnk, In Quarantäne, [abe6d2fecfd91125228d620b48b825db], PUP.Optional.SpyHunter, C:\Users\Medicus\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SpyHunter\SpyHunter.lnk, In Quarantäne, [abe6d2fecfd91125228d620b48b825db], PUP.Optional.SpyHunter, C:\Users\Medicus\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SpyHunter\Uninstall.lnk, In Quarantäne, [abe6d2fecfd91125228d620b48b825db], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\German.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Brazilian.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Chinese(Simplified).lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Chinese(Traditional).lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Common.dll, Löschen bei Neustart, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\cos.dat, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Croatian.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Czech.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Danish.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Defman.dll, Löschen bei Neustart, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Dutch.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\English.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\EsgScanner.inf, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\EsgScanner.sys, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\ExecutionGuard.dll, Löschen bei Neustart, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Finnish.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\French.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\gil.dat, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Greek.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Indonesian.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Italian.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Japanese.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\license.txt, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Lithuanian.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\native.exe, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Norwegian.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Polish.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Portuguese.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\purl.dat, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Romanian.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Russian.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\safeol.dat, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\scanlog.log, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\shortcuts.txt, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\ShScanner.dll, Löschen bei Neustart, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Slovene.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Spanish.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\SpyHunter4.com, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\supportlog.txt, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Swedish.lng, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Data\dns.dat, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\defs\def.dat, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\Log\SpyHunter4_20170331_165421.log, Löschen bei Neustart, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\mon\autoexec.bat.bk, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\mon\hosts.bk, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\mon\system.ini.bk, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.SpyHunter, C:\Program Files\Enigma Software Group\SpyHunter\mon\win.ini.bk, In Quarantäne, [365b9a36d5d3b87e1334c0b19967c13f], PUP.Optional.StartPage.ShrtCln, C:\Users\Medicus\AppData\Roaming\Mozilla\Firefox\Profiles\hlt46v0m.default\prefs.js, Gut: (user_pref("browser.startup.homepage", "https://www.malwarebytes.org/restorebrowser/), Schlecht: (user_pref("browser.startup.homepage", "hxxp://www.startpageing), Ersetzt,[5e3387498325b581193d95cf17ea08f8] Physische Sektoren: 0 (keine bösartigen Elemente erkannt) (end) Geändert von Lans (01.04.2017 um 12:35 Uhr) |
Themen zu Elex-Typ Viren wie Kyubey und Winsnare gefunden. Sie lassen sich jedoch nicht dauerhaft entfernen. |
adware, avast, avg, browser, cleaner, defender, eingefangen, entfernen, gen, google, helper.exe, install.exe, installiert, lange, namen, nicht mehr, protection, rechner, scan, scanner, schadsoftware eingefangen, suchverlauf, system, update, viren, viren funde: elex/kyubey/winsnare/winsapsvc, virenscan, virenscanner, wahrscheinlich, windows |