![]() |
| |||||||
Mülltonne: Malware Trojaner Windows 10Windows 7 Beiträge, die gegen unsere Regeln verstoßen haben, solche, die die Welt nicht braucht oder sonstiger Müll landet hier in der Mülltonne... |
| | #1 |
| | Malware Trojaner Windows 10 hallo meine lieben ich hab warscheinlich einen Trojaner auf dem laptop anbei der scan von malwarebytes Code:
ATTFilter Malwarebytes
www.malwarebytes.com
-Protokolldetails-
Scan-Datum: 20.07.19
Scan-Zeit: 18:56
Protokolldatei: 5f225b5a-ab0f-11e9-b07a-9829a64251ff.json
-Softwaredaten-
Version: 3.8.3.2965
Komponentenversion: 1.0.613
Version des Aktualisierungspakets: 1.0.11644
Lizenz: Testversion
-Systemdaten-
Betriebssystem: Windows 10 (Build 18362.239)
CPU: x64
Dateisystem: NTFS
Benutzer: DESKTOP-M826EE6\baris
-Scan-Übersicht-
Scan-Typ: Bedrohungs-Scan
Scan gestartet von: Manuell
Ergebnis: Abgeschlossen
Gescannte Objekte: 324020
Erkannte Bedrohungen: 319
In die Quarantäne verschobene Bedrohungen: 319
Abgelaufene Zeit: 4 Min., 15 Sek.
-Scan-Optionen-
Speicher: Aktiviert
Start: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Heuristik: Aktiviert
PUP: Erkennung
PUM: Erkennung
-Scan-Details-
Prozess: 1
Trojan.Agent, C:\PROGRAMDATA\MICROSOFT\WINDOWS\POWER\POWERSVC.EXE, In Quarantäne, [442], [537387],1.0.11644
Modul: 2
Trojan.Agent, C:\PROGRAMDATA\MICROSOFT\WINDOWS\POWER\POWERSVC.EXE, In Quarantäne, [442], [537387],1.0.11644
Adware.Neoreklami.TskLnk, C:\PROGRAM FILES (X86)\OXBKZRKCYRI\OXBKZRKCYRI.DLL, In Quarantäne, [918], [664066],1.0.11644
Registrierungsschlüssel: 28
Trojan.Clicker, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\csrss, In Quarantäne, [3202], [431499],1.0.11644
Trojan.Clicker, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{5B25669B-DAB0-4B47-A7B7-137B55D66882}, In Quarantäne, [3202], [431499],1.0.11644
Trojan.Clicker, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\LOGON\{5B25669B-DAB0-4B47-A7B7-137B55D66882}, In Quarantäne, [3202], [431499],1.0.11644
Trojan.Agent, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\PowerSvc, In Quarantäne, [442], [537387],1.0.11644
PUP.Optional.1Bbot, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\1BTC Software, In Quarantäne, [3478], [584329],1.0.11644
PUP.Optional.Reimage, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\LOCAL APPWIZARD-GENERATED APPLICATIONS\Fixer - Windows Problem Relief., In Quarantäne, [354], [709541],1.0.11644
Trojan.CrthRazy, HKLM\SOFTWARE\WOW6432NODE\Machiner, In Quarantäne, [3134], [676882],1.0.11644
Adware.Linkury.ACMB1, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SILENTPROCESSEXIT\Polygen.exe, In Quarantäne, [822], [568551],1.0.11644
PUP.Optional.InlogOptimizer, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\Inlog Optimizer 3.1, In Quarantäne, [3075], [698978],1.0.11644
Trojan.MalPack, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\RubusFund 2.0, In Quarantäne, [553], [631644],1.0.11644
Adware.Neoreklami.TskLnk, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\oxbKZRKcyri, In Quarantäne, [918], [664066],1.0.11644
Adware.Neoreklami.TskLnk, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{BD9CD269-9019-4C06-B3BB-5EA453013F0D}, In Quarantäne, [918], [664066],1.0.11644
Adware.Neoreklami.TskLnk, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\BOOT\{BD9CD269-9019-4C06-B3BB-5EA453013F0D}, In Quarantäne, [918], [664066],1.0.11644
Adware.Neoreklami.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\oxbKZRKcyri, In Quarantäne, [918], [-1],0.0.0
Adware.Neoreklami.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{BD9CD269-9019-4C06-B3BB-5EA453013F0D}, In Quarantäne, [918], [-1],0.0.0
Adware.Neoreklami.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Boot\{BD9CD269-9019-4C06-B3BB-5EA453013F0D}, In Quarantäne, [918], [-1],0.0.0
Adware.DotDo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\haddock-herediahaddock-heredia, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{09C8858E-B2D6-4A17-A9B5-C1AD161CE56B}, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{09C8858E-B2D6-4A17-A9B5-C1AD161CE56B}, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\resetsresets, In Quarantäne, [5886], [702079],1.0.11644
Adware.DotDo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{20530CE3-BFE1-4E75-A363-6D18FACA3A66}, In Quarantäne, [5886], [702079],1.0.11644
Adware.DotDo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{20530CE3-BFE1-4E75-A363-6D18FACA3A66}, In Quarantäne, [5886], [702079],1.0.11644
Adware.DotDo.Generic.TskLnk, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\jacobsjacobs, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{38B94FF0-D692-4934-9DAE-B019E448036E}, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{38B94FF0-D692-4934-9DAE-B019E448036E}, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\jacobsjacobs, In Quarantäne, [11732], [-1],0.0.0
Adware.DotDo.Generic.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{38B94FF0-D692-4934-9DAE-B019E448036E}, In Quarantäne, [11732], [-1],0.0.0
Adware.DotDo.Generic.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{38B94FF0-D692-4934-9DAE-B019E448036E}, In Quarantäne, [11732], [-1],0.0.0
Registrierungswert: 20
PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|APPINIT_DLLS, In Quarantäne, [840], [-1],0.0.0
PUP.Optional.Linkury.ACMB1, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS|APPINIT_DLLS, In Quarantäne, [840], [-1],0.0.0
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHURL|DEFAULT, In Quarantäne, [840], [259988],1.0.11644
Trojan.BitCoinMiner, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{A197FA80-D42F-4ED5-9863-A4B6DD4F8093}, In Quarantäne, [564], [446017],1.0.11644
Trojan.ProxyAgent.Generic, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|PRIJOX, In Quarantäne, [6430], [519676],1.0.11644
PUP.Optional.CloudNet, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{897E2280-E7CE-4A8D-A469-FD64C3C1906E}, In Quarantäne, [6054], [446028],1.0.11644
Trojan.Agent, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|COLDTREE, In Quarantäne, [442], [196479],1.0.11644
Trojan.Clicker, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{5B25669B-DAB0-4B47-A7B7-137B55D66882}|PATH, In Quarantäne, [3202], [431497],1.0.11644
PUP.Optional.DownloadProtectExtension, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|{794EEA08-C150-41AE-8353-330834D42588}, In Quarantäne, [7109], [237883],1.0.11644
PUP.Optional.DownloadProtectExtension, HKLM\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|{794EEA08-C150-41AE-8353-330834D42588}, In Quarantäne, [7109], [237883],1.0.11644
Trojan.Agent, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\POWERSVC|IMAGEPATH, In Quarantäne, [442], [537386],1.0.11644
Adware.DotDo.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Dilorenzo, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Invisibly, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Generic, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Interrelation, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic.TskLnk, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Seelye, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Override, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Chanel, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Penman, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|pinup, In Quarantäne, [11732], [694457],1.0.11644
Registrierungsdaten: 5
Adware.SonicSearch, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHURL|DEFAULT, Ersetzt, [13295], [693611],1.0.11644
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|SEARCH PAGE, Ersetzt, [840], [293485],1.0.11644
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|SEARCH BAR, Ersetzt, [840], [293485],1.0.11644
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|SEARCHASSISTANT, Ersetzt, [840], [293485],1.0.11644
PUP.Optional.Linkury.ACMB1, HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCH|DEFAULT_SEARCH_URL, Ersetzt, [840], [293486],1.0.11644
Daten-Stream: 0
(keine bösartigen Elemente erkannt)
Ordner: 177
PUP.Optional.DownloadProtect, C:\WINDOWS\INSTALLER\{4F7F1A23-967D-4EAB-B7FF-50AE5DFCDE10}, In Quarantäne, [64], [237878],1.0.11644
PUP.Optional.CloudNet, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\CSRSS, In Quarantäne, [6054], [448845],1.0.11644
Adware.Csdimonetize.E, C:\PROGRAM FILES\Windows Portable Devices\44UZCIM1KQ2OOWDQ6ZN5ZT3OWZLIZH, In Quarantäne, [5098], [650310],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\ElectronCash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\InfiniteCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\DigitalCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\ElectrumLTC, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\GoldCoinGLD, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\FlorinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\MultiDoge, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\PrimeCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\TerraCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\Anoncoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\DashCore, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\Electrum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\Ethereum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\FreiCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\Litecoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\MegaCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\NameCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\BBQCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\Bitcoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\DevCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\MinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\Exodus, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\Franko, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\IOCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\IxCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\YACoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\Zcash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\71NZUCOK9D7L14GUSGZDB7E8T\files\Wallets\JAXX, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\PROGRAMDATA\71NZUCOK9D7L14GUSGZDB7E8T\FILES\Wallets, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\ElectronCash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\InfiniteCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\DigitalCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\ElectrumLTC, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\GoldCoinGLD, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\FlorinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\MultiDoge, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\PrimeCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\TerraCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\Anoncoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\DashCore, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\Electrum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\Ethereum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\FreiCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\Litecoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\MegaCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\NameCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\BBQCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\Bitcoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\DevCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\MinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\Exodus, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\Franko, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\IOCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\IxCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\YACoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\Zcash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\895ZYPHM73Q2SS1YP4PPPQCKQ\files\Wallets\JAXX, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\PROGRAMDATA\895ZYPHM73Q2SS1YP4PPPQCKQ\FILES\Wallets, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\ElectronCash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\InfiniteCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\DigitalCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\ElectrumLTC, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\GoldCoinGLD, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\FlorinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\MultiDoge, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\PrimeCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\TerraCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\Anoncoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\DashCore, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\Electrum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\Ethereum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\FreiCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\Litecoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\MegaCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\NameCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\BBQCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\Bitcoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\DevCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\MinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\Exodus, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\Franko, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\IOCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\IxCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\YACoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\Zcash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\CXIWU89V7AABU63ZJMUVYMHUE\files\Wallets\JAXX, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\PROGRAMDATA\CXIWU89V7AABU63ZJMUVYMHUE\FILES\Wallets, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\ElectronCash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\InfiniteCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\DigitalCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\ElectrumLTC, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\GoldCoinGLD, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\FlorinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\MultiDoge, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\PrimeCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\TerraCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\Anoncoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\DashCore, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\Electrum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\Ethereum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\FreiCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\Litecoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\MegaCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\NameCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\BBQCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\Bitcoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\DevCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\MinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\Exodus, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\Franko, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\IOCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\IxCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\YACoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\Zcash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\INUHADDO3YDLG3LE2ZQJGA2O5\files\Wallets\JAXX, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\PROGRAMDATA\INUHADDO3YDLG3LE2ZQJGA2O5\FILES\Wallets, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\ElectronCash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\InfiniteCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\DigitalCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\ElectrumLTC, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\GoldCoinGLD, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\FlorinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\MultiDoge, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\PrimeCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\TerraCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\Anoncoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\DashCore, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\Electrum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\Ethereum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\FreiCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\Litecoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\MegaCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\NameCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\BBQCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\Bitcoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\DevCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\MinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\Exodus, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\Franko, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\IOCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\IxCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\YACoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\Zcash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\KN8UGEFKI133YV59JE3TMSU2J\files\Wallets\JAXX, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\PROGRAMDATA\KN8UGEFKI133YV59JE3TMSU2J\FILES\Wallets, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\ElectronCash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\InfiniteCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\DigitalCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\ElectrumLTC, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\GoldCoinGLD, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\FlorinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\MultiDoge, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\PrimeCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\TerraCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\Anoncoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\DashCore, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\Electrum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\Ethereum, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\FreiCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\Litecoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\MegaCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\NameCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\BBQCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\Bitcoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\DevCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\MinCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\Exodus, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\Franko, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\IOCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\IxCoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\YACoin, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\Zcash, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\ProgramData\SOA2T50ZSLZ7H9GWAHF6GEJ6W\files\Wallets\JAXX, In Quarantäne, [818], [697276],1.0.11644
Spyware.StolenData.E, C:\PROGRAMDATA\SOA2T50ZSLZ7H9GWAHF6GEJ6W\FILES\Wallets, In Quarantäne, [818], [697276],1.0.11644
Datei: 86
PUP.Optional.DownloadProtect, C:\WINDOWS\INSTALLER\{4F7F1A23-967D-4EAB-B7FF-50AE5DFCDE10}\cdfnlpccmemgemfcacccobilkoibkiddorx, In Quarantäne, [64], [237878],1.0.11644
PUP.Optional.DownloadProtect, C:\Windows\Installer\{4F7F1A23-967D-4EAB-B7FF-50AE5DFCDE10}\xdfnlpccmemgemfcacccobilkoibkiddoml, In Quarantäne, [64], [237878],1.0.11644
Adware.Linkury.Generic, C:\USERS\BARIS\APPDATA\LOCAL\NOAH.DAT, In Quarantäne, [3737], [404865],1.0.11644
Adware.Linkury.Generic, C:\USERS\BARIS\APPDATA\ROAMING\Microsoft\Windows\Recent\uninstall_temp.lnk, In Quarantäne, [3737], [404862],1.0.11644
Adware.Linkury.Generic, C:\USERS\BARIS\APPDATA\LOCAL\UNINSTALL_TEMP.ICO, In Quarantäne, [3737], [404862],1.0.11644
Adware.Linkury.Generic, C:\USERS\BARIS\APPDATA\LOCAL\MD.XML, In Quarantäne, [3737], [404866],1.0.11644
Adware.Linkury.Generic, C:\USERS\BARIS\APPDATA\LOCAL\Lighting.tst, In Quarantäne, [3737], [404871],1.0.11644
Adware.Linkury.Generic, C:\USERS\BARIS\APPDATA\LOCAL\Sing-Ing.tst, In Quarantäne, [3737], [404871],1.0.11644
Adware.Linkury.Generic, C:\USERS\BARIS\APPDATA\LOCAL\AGENT.DAT, In Quarantäne, [3737], [404872],1.0.11644
Trojan.Clicker, C:\WINDOWS\SYSTEM32\TASKS\CSRSS, In Quarantäne, [3202], [431499],1.0.11644
Adware.Linkury.Generic, C:\WINDOWS\SYSWOW64\CONFIG\SYSTEMPROFILE\APPDATA\LOCAL\SHA.DB, In Quarantäne, [3737], [709582],1.0.11644
Adware.Linkury.Generic, C:\USERS\BARIS\APPDATA\LOCAL\SHA.DB, In Quarantäne, [3737], [709581],1.0.11644
PUP.Optional.CloudNet, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\CSRSS\CLOUDNET.EXE, In Quarantäne, [6054], [448845],1.0.11644
PUP.Optional.CloudNet, C:\Users\baris\AppData\Local\Temp\csrss\mikrotikapiscan.exe, In Quarantäne, [6054], [448845],1.0.11644
PUP.Optional.CloudNet, C:\Users\baris\AppData\Local\Temp\csrss\scheduled.exe, In Quarantäne, [6054], [448845],1.0.11644
PUP.Optional.CloudNet, C:\Users\baris\AppData\Local\Temp\csrss\updateprofile-0321.exe, In Quarantäne, [6054], [448845],1.0.11644
Adware.Csdimonetize.E, C:\PROGRAM FILES\Windows Portable Devices\44UZCIM1KQ2OOWDQ6ZN5ZT3OWZLIZH\Kenessey.txt, In Quarantäne, [5098], [650310],1.0.11644
Adware.Csdimonetize.E, C:\Program Files\Windows Portable Devices\44UZCIM1KQ2OOWDQ6ZN5ZT3OWZLIZH\3Np26MLhXa.exe.config, In Quarantäne, [5098], [650310],1.0.11644
Adware.Csdimonetize.E, C:\Program Files\Windows Portable Devices\44UZCIM1KQ2OOWDQ6ZN5ZT3OWZLIZH\hDç95_tsRf.exe.config, In Quarantäne, [5098], [650310],1.0.11644
Adware.Csdimonetize.E, C:\Program Files\Windows Portable Devices\44UZCIM1KQ2OOWDQ6ZN5ZT3OWZLIZH\ljZ+f8mçz#.exe.config, In Quarantäne, [5098], [650310],1.0.11644
Adware.Csdimonetize.E, C:\Program Files\Windows Portable Devices\44UZCIM1KQ2OOWDQ6ZN5ZT3OWZLIZH\UpdateInstall.exe.config, In Quarantäne, [5098], [650310],1.0.11644
Trojan.Agent, C:\PROGRAMDATA\MICROSOFT\WINDOWS\POWER\POWERSVC.EXE, In Quarantäne, [442], [537387],1.0.11644
PUP.Optional.Conduit, C:\USERS\BARIS\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\EEAXLM7T.DEFAULT\PREFS.JS, Ersetzt, [207], [301520],1.0.11644
PUP.Optional.Conduit, C:\USERS\BARIS\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\EEAXLM7T.DEFAULT\PREFS.JS, Ersetzt, [207], [303091],1.0.11644
Adware.Linkury.Generic, C:\USERS\BARIS\APPDATA\LOCAL\CONFIG.XML, In Quarantäne, [3737], [404859],1.0.11644
PUP.Optional.Conduit, C:\USERS\BARIS\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\LBYULARE.DEFAULT-RELEASE-1\PREFS.JS, Ersetzt, [207], [301520],1.0.11644
PUP.Optional.Conduit, C:\USERS\BARIS\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\LBYULARE.DEFAULT-RELEASE-1\PREFS.JS, Ersetzt, [207], [303091],1.0.11644
Adware.Neoreklami.TskLnk, C:\WINDOWS\SYSTEM32\TASKS\oxbKZRKcyri, In Quarantäne, [918], [664066],1.0.11644
Adware.Neoreklami.TskLnk, C:\PROGRAM FILES (X86)\OXBKZRKCYRI\OXBKZRKCYRI.DLL, In Quarantäne, [918], [664066],1.0.11644
Adware.Neoreklami.TskLnk, C:\WINDOWS\SYSTEM32\TASKS\oxbKZRKcyri, In Quarantäne, [918], [-1],0.0.0
PUP.Optional.Conduit, C:\USERS\BARIS\APPDATA\ROAMING\MOZILLA\FIREFOX\PROFILES\2ONNNRKV.DEFAULT-RELEASE\PREFS.JS, Ersetzt, [207], [301520],1.0.11644
Adware.Linkury.TskLnk, C:\WINDOWS\SYSWOW64\CONFIG\SYSTEMPROFILE\APPDATA\LOCAL\INSTALLATIONCONFIGURATION.XML, In Quarantäne, [14615], [444922],1.0.11644
Adware.DotDo.Generic, C:\WINDOWS\SYSTEM32\TASKS\haddock-herediahaddock-heredia, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic, C:\USERS\BARIS\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\brounbroun.lnk, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic, C:\PROGRAM FILES (X86)\OVERHYPED\PATERNO.EXE, In Quarantäne, [5886], [512320],1.0.11644
Adware.DotDo.Generic, C:\WINDOWS\SYSTEM32\TASKS\resetsresets, In Quarantäne, [5886], [702079],1.0.11644
Adware.DotDo.Generic, C:\PROGRAM FILES (X86)\MUSIAL\PINERO.EXE, In Quarantäne, [5886], [702079],1.0.11644
Adware.DotDo.Generic.TskLnk, C:\WINDOWS\SYSTEM32\TASKS\jacobsjacobs, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, C:\USERS\BARIS\APPDATA\ROAMING\MICROSOFT\WINDOWS\START MENU\PROGRAMS\STARTUP\broun.lnk, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, C:\PROGRAM FILES (X86)\SURREALISTS\THROUGHPUT.EXE, In Quarantäne, [11732], [694457],1.0.11644
Adware.DotDo.Generic.TskLnk, C:\WINDOWS\SYSTEM32\TASKS\jacobsjacobs, In Quarantäne, [11732], [-1],0.0.0
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\ROAMING\UYKSFVVVIG.EXE, In Quarantäne, [7899], [710255],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\ROAMING\MPXGNMYVUO.EXE, In Quarantäne, [7899], [710255],1.0.11644
Adware.DotDo.Generic, C:\DOCUMENTS AND SETTINGS\PUBLIC\Desktop\Firefox.lnk, Löschen bei Neustart, [5886], [702092],1.0.11644
Adware.DotDo.Generic, C:\PROGRAMDATA\Microsoft\Windows\Start Menu\Programs\Firefox.lnk, In Quarantäne, [5886], [702092],1.0.11644
Adware.DotDo.Generic, C:\USERS\PUBLIC\Desktop\Firefox.lnk, Löschen bei Neustart, [5886], [702092],1.0.11644
Adware.DotDo.Generic, C:\PROGRAM FILES\MOZILLA FIREFOX\FIREFOX.EXE, Löschen bei Neustart, [5886], [702092],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\ROAMING\CJSTHTG, In Quarantäne, [7899], [710255],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\2OOB1XB0.4MV\WCINSTALLER.EXE, In Quarantäne, [0], [392686],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\XEO2WRVK.VS4\KOSKOS.EXE, In Quarantäne, [7899], [710255],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\YAS0L1DK.0JD\TASKHS.EXE, In Quarantäne, [7899], [710255],1.0.11644
Trojan.MalPack.VB, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\EHIFJ.EXE, In Quarantäne, [757], [709787],1.0.11644
Trojan.MalPack.VB, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\JLDWK.EXE, In Quarantäne, [757], [709787],1.0.11644
Trojan.MalPack.VB, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\POZ.EXE, In Quarantäne, [757], [709787],1.0.11644
Adware.ProxyGate, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\0QPPVO3W.B0D\01.EXE.EXE, In Quarantäne, [7947], [707446],1.0.11644
Adware.ProxyGate, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\CHWEFW0W.TYY\01.EXE.EXE, In Quarantäne, [7947], [707446],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\KDFOHWGF.BPT\PRIVACYTOOLS.EXE, In Quarantäne, [7899], [710255],1.0.11644
Adware.ProxyGate, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\M5LNVHH5.ISC\01.EXE.EXE, In Quarantäne, [7947], [707446],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\AUWYIXU2.SWL\PRIVACYTOOLS.EXE, In Quarantäne, [7899], [710255],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\JAZT1DRR.QCZ\TASKHS.EXE, In Quarantäne, [7899], [710255],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\TM4PQLUN.1RL\PRIVACYTOOLS.EXE, In Quarantäne, [7899], [710255],1.0.11644
Trojan.MalPack.VB, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\K8GCDK.EXE, In Quarantäne, [757], [709787],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\ALNDRPKQ.KOZ\PRIVACYTOOLS.EXE, In Quarantäne, [7899], [710255],1.0.11644
Adware.ProxyGate, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\0JF4ESLY.JPC\01.EXE.EXE, In Quarantäne, [7947], [707446],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\2QDU1GQG.AET\PRIVACYTOOLS.EXE, In Quarantäne, [7899], [710255],1.0.11644
Adware.ProxyGate, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\JS3OU5QG.XJ1\01.EXE.EXE, In Quarantäne, [7947], [707446],1.0.11644
RiskWare.VMProtect, C:\USERS\BARIS\DOWNLOADS\OCTOSNIFF_INSTALL.EXE, In Quarantäne, [7739], [702821],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\YZANY5SU.CM5\WCINSTALLER.EXE, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\1AG0G0EB.Q3K\WCINSTALLER.EXE, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\5BANIGUC.YDY\WCINSTALLER.EXE, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\0ZRLTLTS.BSW\WCINSTALLER.EXE, In Quarantäne, [0], [392686],1.0.11644
Trojan.MalPack.GS, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\QBP332KH.RX1\TASKHS.EXE, In Quarantäne, [7899], [710255],1.0.11644
Adware.ProxyGate, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\Y0NNSYLE.XF5\01.EXE.EXE, In Quarantäne, [7947], [707446],1.0.11644
Trojan.MalPack.VB, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\BENS.EXE, In Quarantäne, [757], [709787],1.0.11644
Spyware.Agent.AutoIt, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\E470.TMP.EXE, In Quarantäne, [10091], [708869],1.0.11644
Trojan.MalPack.VB, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\1AL.EXE, In Quarantäne, [757], [709787],1.0.11644
Trojan.MalPack.VB, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\JZ9H.EXE, In Quarantäne, [757], [709787],1.0.11644
Trojan.MalPack.VB, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\PPN99S.EXE, In Quarantäne, [757], [709787],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\WEBCOMPANION.ZIP.OLD.132078655781877249, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\GIKULBOJ.AVK\WCINSTALLER.EXE, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\LWOLW50N.W5J\WCINSTALLER.EXE, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\QKTKO32X.I4X\WCINSTALLER.EXE, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\WJB0BJPJ.TZF\WCINSTALLER.EXE, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\ROAMING\MICROSOFT\INTERNET EXPLORER\QUICK LAUNCH\User Pinned\TaskBar\OctoSniff.lnk, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\DOWNLOADS\OCTOSNIFF.EXE, In Quarantäne, [0], [392686],1.0.11644
Generic.Malware/Suspicious, C:\USERS\BARIS\APPDATA\LOCAL\TEMP\WEBCOMPANION.ZIP.OLD.132078670564872394, In Quarantäne, [0], [392686],1.0.11644
Physischer Sektor: 0
(keine bösartigen Elemente erkannt)
WMI: 0
(keine bösartigen Elemente erkannt)
(end)
Geändert von cosinus (22.07.2019 um 08:12 Uhr) Grund: code tags |
| | #2 | |
| /// TB-Ausbilder ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Malware Trojaner Windows 10![]() Mein Name ist Matthias und ich werde dir bei der Analyse und der eventuell notwendigen Bereinigung deines Computers helfen. ![]() Für alle Hilfesuchenden! Was muss ich vor der Eröffnung eines Themas beachten? Zitat:
|
| | #3 |
| | Malware Trojaner Windows 10 Hallo Matthias !
__________________Du kannst mich auch gerne Baris nennen es freut mich sehr sehr sehr doll von dir zu hören ! Ich danke dir bereits im Voraus Wenn notwendig erreichst mich per WhatsApp auch unter der Nummer 0176 218 388 01 Lg Baris |
| | #4 |
| /// TB-Ausbilder ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Malware Trojaner Windows 10 Servus Baris, sobald du die benötigten Informationen gepostet hast (mehr dazu siehe meine letzte Antwort), können wir starten. |
| | #5 |
| | Malware Trojaner Windows 10 Hallo Die ganzen 6 Punkte ? Lg Baris |
| | #6 |
| /// TB-Ausbilder ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Malware Trojaner Windows 10 Einfach alles aufmerksam lesen und die entsprechenden Informationen bereitstellen. Sonst kann dir hier niemand helfen. |
| | #7 |
| | Malware Trojaner Windows 10 Ja hey Also durchgelesen hab ich mir alles. Lg Baris |
| | #8 |
| /// TB-Ausbilder ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Malware Trojaner Windows 10 Dann poste bitte die geforderten Logdateien. |
| | #9 |
| | Malware Trojaner Windows 10Code:
ATTFilter Zusätzliches Untersuchungsergebnis von Farbar Recovery Scan Tool (x64) Version: 15-07-2019 01
durchgeführt von baris (25-07-2019 08:15:02)
Gestartet von C:\Users\baris\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\TempState\Downloads
Windows 10 Home Version 1903 18362.239 (X64) (2019-07-16 11:18:38)
Start-Modus: Normal
==========================================================
==================== Konten: =============================
Administrator (S-1-5-21-3126919406-1894036365-1143836582-500 - Administrator - Disabled)
baris (S-1-5-21-3126919406-1894036365-1143836582-1001 - Administrator - Enabled) => C:\Users\baris
DefaultAccount (S-1-5-21-3126919406-1894036365-1143836582-503 - Limited - Disabled)
Gast (S-1-5-21-3126919406-1894036365-1143836582-501 - Limited - Disabled)
WDAGUtilityAccount (S-1-5-21-3126919406-1894036365-1143836582-504 - Limited - Disabled)
==================== Sicherheits-Center ========================
(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er entfernt.)
AV: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AV: Malwarebytes (Enabled - Up to date) {23007AD3-69FE-687C-2629-D584AFFAF72B}
AS: Windows Defender (Enabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
==================== Installierte Programme ======================
(Nur Adware-Programme mit dem Zusatz "Hidden" können in die Fixlist aufgenommen werden, um sie sichtbar zu machen. Die Adware-Programme sollten manuell deinstalliert werden.)
6b264507-ba91-4d85-86c9-1e827315cbe0 (HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\6b264507-ba91-4d85-86c9-1e827315cbe0) (Version: - ÀltîÑIîud)
AnyDesk (HKLM-x32\...\AnyDesk) (Version: ad 5.1.2 - philandro Software GmbH)
Apple Application Support (32-Bit) (HKLM-x32\...\{9F7041CB-8398-4691-B8CB-0D52273BB3D9}) (Version: 7.4 - Apple Inc.)
Apple Application Support (64-Bit) (HKLM\...\{6E7DF4EE-1976-4215-9D81-755AFC95687D}) (Version: 7.4 - Apple Inc.)
Apple Mobile Device Support (HKLM\...\{BA2A6DBB-B09A-43D8-84F3-21C1537B47D9}) (Version: 12.2.0.15 - Apple Inc.)
Apple Software Update (HKLM-x32\...\{52D87F32-70E4-4348-8148-C0B9F35B1314}) (Version: 2.3.0.177 - Apple Inc.)
ASTRO Command Center (HKLM-x32\...\{2ECCE840-C4B1-4538-8A19-48DC2ADD010B}) (Version: 1.0.195 - Astro Gaming)
Bonjour (HKLM\...\{56DDDFB8-7F79-4480-89D5-25E1F52AB28F}) (Version: 3.1.0.1 - Apple Inc.)
Cronus PRO 1.21 (HKLM-x32\...\Cronus PRO) (Version: 1.21 - CronusMAX Team)
Free YouTube To MP3 Converter (HKLM-x32\...\Free YouTube To MP3 Converter_is1) (Version: 4.1.94.416 - Digital Wave Ltd)
iTunes (HKLM\...\{D2C7871C-C4D8-45AC-89FD-D7F304B87277}) (Version: 12.9.4.102 - Apple Inc.)
Logitech Gaming Software 9.02 (HKLM\...\Logitech Gaming Software) (Version: 9.02.65 - Logitech Inc.)
Malwarebytes Version 3.8.3.2965 (HKLM\...\{35065F43-4BB2-439A-BFF7-0F1014F2E0CD}_is1) (Version: 3.8.3.2965 - Malwarebytes)
Microsoft OneDrive (HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\OneDriveSetup.exe) (Version: 19.103.0527.0003 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.61030 (HKLM-x32\...\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}) (Version: 11.0.61030.0 - Microsoft Corporation)
Microsoft Visual C++ 2013 Redistributable (x64) - 12.0.30501 (HKLM-x32\...\{050d4fc8-5d48-4b8f-8972-47c82c46020f}) (Version: 12.0.30501.0 - Microsoft Corporation)
Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (HKLM-x32\...\{f65db027-aff3-4070-886a-0d87064aabb1}) (Version: 12.0.30501.0 - Microsoft Corporation)
Microsoft Visual C++ 2015 Redistributable (x64) - 14.0.24212 (HKLM-x32\...\{323dad84-0974-4d90-a1c1-e006c7fdbb7d}) (Version: 14.0.24212.0 - Microsoft Corporation)
Microsoft Visual C++ 2015 Redistributable (x86) - 14.0.24212 (HKLM-x32\...\{462f63a8-6347-4894-a1b3-dbfe3a4c981d}) (Version: 14.0.24212.0 - Microsoft Corporation)
Mozilla Firefox 68.0 (x64 de) (HKLM\...\Mozilla Firefox 68.0 (x64 de)) (Version: 68.0 - Mozilla)
Mozilla Maintenance Service (HKLM\...\MozillaMaintenanceService) (Version: 67.0 - Mozilla)
OctoSniff (HKLM-x32\...\{5432F4CF-9B16-4A35-B2CE-771668F0706E}_is1) (Version: 3.0.5.0 - Octolus)
OctoVPN 1.4.2.0 (HKLM-x32\...\{FED0E425-C72A-4FC3-B897-C184457D3F11}_is1) (Version: 1.4.2.0 - OctoVPN)
OctoVPN 1.4.4.1 (HKLM-x32\...\{FED0E425-C72A-4FC3-B897-C184457D3F11}}_is1) (Version: 1.4.4.1 - OctoVPN)
OpenVPN 2.4.7-I603 (HKLM\...\OpenVPN) (Version: 2.4.7-I603 - OpenVPN Technologies, Inc.)
PuTTY release 0.71 (64-bit) (HKLM\...\{B27534DB-4F72-4F49-A3AD-5EC1B6901E5E}) (Version: 0.71.0.0 - Simon Tatham)
Realtek Card Reader (HKLM-x32\...\{5BC2B5AB-80DE-4E83-B8CF-426902051D0A}) (Version: 10.0.15063.21299 - Realtek Semiconductor Corp.)
Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.8555 - Realtek Semiconductor Corp.)
Sky Go 1.4.10.0 (HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\com.bskyb.skygoplayer_is1) (Version: 1.4.10.0 - Sky)
Spybot - Search & Destroy (HKLM-x32\...\{B4092C6D-E886-4CB2-BA68-FE5A99D31DE7}_is1) (Version: 2.7.64.0 - Safer-Networking Ltd.)
TAP-Windows 9.21.2 (HKLM\...\TAP-Windows) (Version: 9.21.2 - )
TeamViewer 14 (HKLM-x32\...\TeamViewer) (Version: 14.3.4730 - TeamViewer)
Vulkan Run Time Libraries 1.0.54.1 (HKLM\...\VulkanRT1.0.54.1) (Version: 1.0.54.1 - LunarG, Inc.) Hidden
Vulkan Run Time Libraries 1.0.54.1 (HKLM\...\VulkanRT1.0.54.1-2) (Version: 1.0.54.1 - LunarG, Inc.) Hidden
Web Companion (HKLM-x32\...\{b1a61e92-38f6-4d61-85bb-d46689133937}) (Version: 4.7.1987.3881 - Lavasoft)
WinPcap 4.1.3 (HKLM-x32\...\WinPcapInst) (Version: 4.1.0.2980 - Riverbed Technology, Inc.)
WinRAR 5.71 (64-bit) (HKLM\...\WinRAR archiver) (Version: 5.71.0 - win.rar GmbH)
Packages:
=========
Candy Crush Friends -> C:\Program Files\WindowsApps\king.com.CandyCrushFriends_1.15.13.0_x86__kgqvnymyfvs32 [2019-06-27] (king.com)
Candy Crush Saga -> C:\Program Files\WindowsApps\king.com.CandyCrushSaga_1.1550.4.0_x86__kgqvnymyfvs32 [2019-07-15] (king.com)
Instagram -> C:\Program Files\WindowsApps\Facebook.InstagramBeta_41.1788.50991.0_x86__8xx8rvfyw5nnt [2019-05-30] (Instagram)
Mail und Kalender -> C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe [2019-07-09] (Microsoft Corporation) [MS Ad]
Microsoft Advertising SDK for XAML -> C:\Program Files\WindowsApps\microsoft.advertising.xaml_10.1811.1.0_x64__8wekyb3d8bbwe [2019-05-30] (Microsoft Corporation) [MS Ad]
Microsoft Advertising SDK for XAML -> C:\Program Files\WindowsApps\microsoft.advertising.xaml_10.1811.1.0_x86__8wekyb3d8bbwe [2019-05-30] (Microsoft Corporation) [MS Ad]
Microsoft Solitaire Collection -> C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.6132.0_x64__8wekyb3d8bbwe [2019-06-17] (Microsoft Studios) [MS Ad]
MSN Wetter -> C:\Program Files\WindowsApps\Microsoft.BingWeather_4.28.10351.0_x64__8wekyb3d8bbwe [2019-05-30] (Microsoft Corporation) [MS Ad]
Netflix -> C:\Program Files\WindowsApps\4DF9E0F8.Netflix_6.93.478.0_x64__mcm4njqhnhss8 [2019-06-27] (Netflix, Inc.)
Player for YouTube 4k HD -> C:\Program Files\WindowsApps\14733AzonaMedia.TubePlayforYouTube_1.1.9.0_x64__qvfagqdtyz68p [2019-06-24] (Azona Media) [MS Ad]
Twitter -> C:\Program Files\WindowsApps\9E2F88E3.Twitter_6.1.4.1000_neutral__wgeqdkkx372wm [2019-07-11] (Twitter Inc.)
==================== Benutzerdefinierte CLSID (Nicht auf der Ausnahmeliste): ==========================
(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)
ContextMenuHandlers1: [SDECon32] -> {44176360-2BBF-4EC1-93CE-384B8681A0BC} => C:\Program Files (x86)\Spybot - Search & Destroy 2\SDECon64.dll [2018-03-23] (Safer-Networking Ltd. -> Safer-Networking Ltd.)
ContextMenuHandlers1: [SDECon64] -> {44176360-2BBF-4EC1-93CE-384B8681A0BC} => C:\Program Files (x86)\Spybot - Search & Destroy 2\SDECon64.dll [2018-03-23] (Safer-Networking Ltd. -> Safer-Networking Ltd.)
ContextMenuHandlers1: [WinRAR] -> {B41DB860-64E4-11D2-9906-E49FADC173CA} => C:\Program Files\WinRAR\rarext.dll [2019-04-27] (win.rar GmbH -> Alexander Roshal)
ContextMenuHandlers1-x32: [WinRAR32] -> {B41DB860-8EE4-11D2-9906-E49FADC173CA} => C:\Program Files\WinRAR\rarext32.dll [2019-04-27] (win.rar GmbH -> Alexander Roshal)
ContextMenuHandlers3: [MBAMShlExt] -> {57CE581A-0CB6-4266-9CA0-19364C90A0B3} => C:\Program Files\Malwarebytes\Anti-Malware\mbshlext.dll [2019-06-26] (Malwarebytes Corporation -> Malwarebytes)
ContextMenuHandlers5: [igfxcui] -> {3AB1675A-CCFF-11D2-8B20-00A0C93CB1F4} => -> Keine Datei
ContextMenuHandlers5: [igfxDTCM] -> {9B5F5829-A529-4B12-814A-E81BCB8D93FC} => C:\WINDOWS\System32\DriverStore\FileRepository\igdlh64.inf_amd64_ab736fe7f232ee1e\igfxDTCM.dll [2017-11-13] (Microsoft Windows Hardware Compatibility Publisher -> Intel Corporation)
ContextMenuHandlers5: [NvCplDesktopContext] -> {3D1975AF-48C6-4f8e-A182-BE0E08FA86A9} => C:\WINDOWS\system32\nvshext.dll [2017-12-19] (NVIDIA Corporation -> NVIDIA Corporation)
ContextMenuHandlers6: [MBAMShlExt] -> {57CE581A-0CB6-4266-9CA0-19364C90A0B3} => C:\Program Files\Malwarebytes\Anti-Malware\mbshlext.dll [2019-06-26] (Malwarebytes Corporation -> Malwarebytes)
ContextMenuHandlers6: [SDECon32] -> {44176360-2BBF-4EC1-93CE-384B8681A0BC} => C:\Program Files (x86)\Spybot - Search & Destroy 2\SDECon64.dll [2018-03-23] (Safer-Networking Ltd. -> Safer-Networking Ltd.)
ContextMenuHandlers6: [SDECon64] -> {44176360-2BBF-4EC1-93CE-384B8681A0BC} => C:\Program Files (x86)\Spybot - Search & Destroy 2\SDECon64.dll [2018-03-23] (Safer-Networking Ltd. -> Safer-Networking Ltd.)
ContextMenuHandlers6: [WinRAR] -> {B41DB860-64E4-11D2-9906-E49FADC173CA} => C:\Program Files\WinRAR\rarext.dll [2019-04-27] (win.rar GmbH -> Alexander Roshal)
ContextMenuHandlers6-x32: [WinRAR32] -> {B41DB860-8EE4-11D2-9906-E49FADC173CA} => C:\Program Files\WinRAR\rarext32.dll [2019-04-27] (win.rar GmbH -> Alexander Roshal)
==================== Verknüpfungen & WMI ========================
(Die Einträge können gelistet werden, um sie zurückzusetzen oder zu entfernen.)
==================== Geladene Module (Nicht auf der Ausnahmeliste) ==============
2018-04-06 20:29 - 2018-04-06 20:29 - 002286747 _____ (The OpenSSL Project, hxxp://www.openssl.org/) [Datei ist nicht signiert] C:\Program Files\Logitech Gaming Software\LIBEAY32.dll
2018-04-06 20:29 - 2018-04-06 20:29 - 000416627 _____ (The OpenSSL Project, hxxp://www.openssl.org/) [Datei ist nicht signiert] C:\Program Files\Logitech Gaming Software\ssleay32.dll
==================== Alternate Data Streams (Nicht auf der Ausnahmeliste) =========
(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird nur der ADS entfernt.)
AlternateDataStreams: C:\Windows:{4B9A1497-0817-47C4-9612-D6A1C53ACF57} [26]
AlternateDataStreams: C:\Windows:{DA6227CB-326B-4B4D-9A81-04B61F1538DD} [26]
==================== Abgesicherter Modus (Nicht auf der Ausnahmeliste) ===================
(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Der Wert "AlternateShell" wird wiederhergestellt.)
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MBAMService => ""="Service"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\MBAMService => ""="Service"
==================== Verknüpfungen (Nicht auf der Ausnahmeliste) ===============
(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird der Registryeintrag auf den Standardwert zurückgesetzt oder entfernt.)
==================== Internet Explorer Vertrauenswürdig/Eingeschränkt ===============
(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt.)
IE trusted site: HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\localhost -> localhost
==================== Hosts Inhalt: ===============================
(Wenn benötigt kann der Hosts: Schalter in die Fixlist aufgenommen werden um die Hosts Datei zurückzusetzen.)
2019-05-30 00:58 - 2019-07-17 21:31 - 000000000 _____ C:\WINDOWS\system32\drivers\etc\hosts
2019-06-16 00:41 - 2019-07-24 22:26 - 000000445 _____ C:\WINDOWS\system32\drivers\etc\hosts.ics
192.168.137.1 DESKTOP-M826EE6.mshome.net # 2024 7 1 22 20 26 58 671
==================== Andere Bereiche ============================
(Aktuell gibt es keinen automatisierten Fix für diesen Bereich.)
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\Control Panel\Desktop\\Wallpaper -> C:\Users\baris\OneDrive\Bilder\_CHH7854.jpg
DNS Servers: 192.168.2.1
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System => (ConsentPromptBehaviorAdmin: 0) (ConsentPromptBehaviorUser: 3) (EnableLUA: 1)
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer => (SmartScreenEnabled: Off)
Windows Firewall ist aktiviert.
==================== MSCONFIG/TASK MANAGER Deaktivierte Einträge ==
Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er entfernt.
HKLM\...\StartupApproved\StartupFolder: => "AnyDesk.lnk"
HKLM\...\StartupApproved\Run: => "SecurityHealth"
HKLM\...\StartupApproved\Run: => "Dilorenzo"
HKLM\...\StartupApproved\Run: => "Shudders"
HKLM\...\StartupApproved\Run: => "Seelye"
HKLM\...\StartupApproved\Run: => "Reimage"
HKLM\...\StartupApproved\Run32: => "Invisibly"
HKLM\...\StartupApproved\Run32: => "Lawrence"
HKLM\...\StartupApproved\Run32: => "Override"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\StartupFolder: => "brounbroun.lnk"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\StartupFolder: => "broun.lnk"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\StartupFolder: => "kntd.exe"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "Interrelation"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "Generic"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "prijox"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "pinup"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "Snowplow"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "Penman"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "Cavour"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "Chanel"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "ColdTree"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "hDç95_tsRf.exe"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "territorially"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "vidnotifier.exe"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "OctoVPN"
HKU\S-1-5-21-3126919406-1894036365-1143836582-1001\...\StartupApproved\Run: => "OPENVPN-GUI"
==================== Firewall Regeln (Nicht auf der Ausnahmeliste) ===============
(Wenn ein Eintrag in die Fixlist aufgenommen wird, wird er aus der Registry entfernt. Die Datei wird nicht verschoben solange sie nicht separat aufgelistet wird.)
FirewallRules: [{50E2E24F-F230-4691-ACFA-47C40ADE5DFD}] => (Allow) C:\WINDOWS\system32\rundll32.exe (Microsoft Windows -> Microsoft Corporation)
FirewallRules: [TCP Query User{A8091B85-FE88-4B3E-8AAA-E06950DC88EF}C:\program files\logitech gaming software\lcore.exe] => (Allow) C:\program files\logitech gaming software\lcore.exe (Logitech Inc -> Logitech Inc.)
FirewallRules: [UDP Query User{49BBA7F2-4A6D-48FF-B7D0-6455BF093A7C}C:\program files\logitech gaming software\lcore.exe] => (Allow) C:\program files\logitech gaming software\lcore.exe (Logitech Inc -> Logitech Inc.)
FirewallRules: [{F8C5BC74-7D7A-4641-B4D4-EC4FD85C23B0}] => (Block) C:\program files\logitech gaming software\lcore.exe (Logitech Inc -> Logitech Inc.)
FirewallRules: [{55A0F899-B147-4399-9D3D-DC0D0F88BBA0}] => (Block) C:\program files\logitech gaming software\lcore.exe (Logitech Inc -> Logitech Inc.)
FirewallRules: [{CB1ACA4D-D924-4233-802D-8661D8F8C714}] => (Allow) C:\Windows\System32\rundll32.exe (Microsoft Windows -> Microsoft Corporation)
FirewallRules: [{49F2D001-EDCD-4C16-9E24-CADE15FD5C3D}] => (Allow) C:\Windows\System32\rundll32.exe (Microsoft Windows -> Microsoft Corporation)
FirewallRules: [{F227BAB6-47DC-4DDC-8BDF-EB03C44E439C}] => (Allow) C:\Program Files (x86)\AnyDesk\AnyDesk.exe (philandro Software GmbH -> )
FirewallRules: [{F5FCDAB1-1A25-4BB4-A944-9FE105B34687}] => (Allow) C:\Program Files (x86)\AnyDesk\AnyDesk.exe (philandro Software GmbH -> )
FirewallRules: [{2FA9D21B-ABD4-42E0-91F0-78123AD1FD16}] => (Allow) C:\Program Files (x86)\AnyDesk\AnyDesk.exe (philandro Software GmbH -> )
FirewallRules: [{32FBD849-0629-4E79-B112-981EB4830750}] => (Allow) C:\Program Files (x86)\AnyDesk\AnyDesk.exe (philandro Software GmbH -> )
FirewallRules: [{DC5F3745-102F-4A87-90A0-72EFAA3565D2}] => (Allow) C:\Program Files (x86)\AnyDesk\AnyDesk.exe (philandro Software GmbH -> )
FirewallRules: [{7D1A2229-CA1E-4BE0-A55E-E34C94CD96A5}] => (Allow) C:\Program Files (x86)\AnyDesk\AnyDesk.exe (philandro Software GmbH -> )
FirewallRules: [{1D1E8A14-7148-4178-8311-D48317A4BC39}] => (Allow) %systemroot%\system32\alg.exe (Microsoft Windows -> Microsoft Corporation)
FirewallRules: [{B3D4CC51-6CB7-44AA-A161-5E7D2135E4A9}] => (Allow) %systemroot%\system32\alg.exe (Microsoft Windows -> Microsoft Corporation)
FirewallRules: [{0303F0A7-08B7-424F-8AC0-04A851A4558B}] => (Allow) %systemroot%\system32\alg.exe (Microsoft Windows -> Microsoft Corporation)
FirewallRules: [{2BCAB901-C515-4C37-BED4-5BCE1902E320}] => (Allow) %systemroot%\system32\alg.exe (Microsoft Windows -> Microsoft Corporation)
FirewallRules: [{3C8AE815-1B74-48A6-A4A6-16A332EBA3AF}] => (Allow) %systemroot%\system32\alg.exe (Microsoft Windows -> Microsoft Corporation)
FirewallRules: [{408D1D41-4C45-4AB4-9030-DE88CE5F8AF6}] => (Allow) %systemroot%\system32\alg.exe (Microsoft Windows -> Microsoft Corporation)
FirewallRules: [{1E6E5BF6-A1FE-4551-A366-A4401AE9DA6F}] => (Allow) %systemroot%\system32\alg.exe (Microsoft Windows -> Microsoft Corporation)
StandardProfile\AuthorizedApplications: [C:\Program Files (x86)\Spybot - Search & Destroy 2\SDTray.exe] => Enabled:Spybot - Search & Destroy tray access
StandardProfile\AuthorizedApplications: [C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe] => Enabled:Spybot-S&D 2 Scanner Service
StandardProfile\AuthorizedApplications: [C:\Program Files (x86)\Spybot - Search & Destroy 2\SDUpdate.exe] => Enabled:Spybot-S&D 2 Updater
StandardProfile\AuthorizedApplications: [C:\Program Files (x86)\Spybot - Search & Destroy 2\SDUpdSvc.exe] => Enabled:Spybot-S&D 2 Background update service
==================== Wiederherstellungspunkte =========================
17-07-2019 00:31:25 Windows Update
==================== Fehlerhafte Geräte im Gerätemanager =============
==================== Fehlereinträge in der Ereignisanzeige: =========================
Applikationsfehler:
==================
Error: (07/24/2019 11:05:04 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: 740: DNSServiceBrowse 467b0543._sub._apple-mobdev2._tcp.local.
Error: (07/24/2019 11:05:04 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: 740: Could not write data to client because of error - aborting connection
Error: (07/24/2019 11:05:04 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: send_msg ERROR: failed to write 112 of 112 bytes to fd 740 errno 10053 (Eine bestehende Verbindung wurde softwaregesteuert
durch den Hostcomputer abgebrochen.)
Error: (07/24/2019 07:38:05 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Local Hostname DESKTOP-M826EE6.local already in use; will try DESKTOP-M826EE6-2.local instead
Error: (07/24/2019 07:38:05 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: mDNSCoreReceiveResponse: ProbeCount 2; will deregister 4 DESKTOP-M826EE6.local. Addr 192.168.2.104
Error: (07/24/2019 07:38:05 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: mDNSCoreReceiveResponse: Received from 192.168.2.104:5353 16 DESKTOP-M826EE6.local. AAAA 2003:00E4:1F18:B981:FD39:37FC:DD4E:486C
Error: (07/24/2019 07:38:05 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: mDNSCoreReceiveResponse: Resetting to Probing: 16 DESKTOP-M826EE6.local. AAAA FE80:0000:0000:0000:FD39:37FC:DD4E:486C
Error: (07/24/2019 07:38:05 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: mDNSCoreReceiveResponse: Received from 192.168.2.104:5353 16 DESKTOP-M826EE6.local. AAAA 2003:00E4:1F18:B981:FD39:37FC:DD4E:486C
Systemfehler:
=============
Error: (07/25/2019 12:45:35 AM) (Source: DCOM) (EventID: 10010) (User: DESKTOP-M826EE6)
Description: Der Server "{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}" konnte innerhalb des angegebenen Zeitabschnitts mit DCOM nicht registriert werden.
Error: (07/25/2019 12:45:35 AM) (Source: DCOM) (EventID: 10010) (User: DESKTOP-M826EE6)
Description: Der Server "{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}" konnte innerhalb des angegebenen Zeitabschnitts mit DCOM nicht registriert werden.
Error: (07/25/2019 12:45:35 AM) (Source: DCOM) (EventID: 10010) (User: DESKTOP-M826EE6)
Description: Der Server "{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}" konnte innerhalb des angegebenen Zeitabschnitts mit DCOM nicht registriert werden.
Error: (07/25/2019 12:45:35 AM) (Source: DCOM) (EventID: 10010) (User: DESKTOP-M826EE6)
Description: Der Server "{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}" konnte innerhalb des angegebenen Zeitabschnitts mit DCOM nicht registriert werden.
Error: (07/25/2019 12:45:35 AM) (Source: DCOM) (EventID: 10010) (User: DESKTOP-M826EE6)
Description: Der Server "{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}" konnte innerhalb des angegebenen Zeitabschnitts mit DCOM nicht registriert werden.
Error: (07/24/2019 11:26:38 PM) (Source: DCOM) (EventID: 10010) (User: DESKTOP-M826EE6)
Description: Der Server "{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}" konnte innerhalb des angegebenen Zeitabschnitts mit DCOM nicht registriert werden.
Error: (07/22/2019 06:02:48 PM) (Source: Service Control Manager) (EventID: 7031) (User: )
Description: Der Dienst "Zwischenablage-Benutzerdienst_778f24d" wurde unerwartet beendet. Dies ist bereits 1 Mal vorgekommen. Folgende Korrekturmaßnahmen werden in 3000 Millisekunden durchgeführt: Neustart des Diensts.
Error: (07/21/2019 12:56:54 AM) (Source: DCOM) (EventID: 10010) (User: DESKTOP-M826EE6)
Description: Der Server "{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}" konnte innerhalb des angegebenen Zeitabschnitts mit DCOM nicht registriert werden.
Windows Defender:
===================================
Date: 2019-07-17 21:36:46.037
Description:
Windows Defender Antivirus hat Schadsoftware oder andere potenziell unerwünschte Software erkannt.
Weitere Informationen:
https://go.microsoft.com/fwlink/?linkid=37020&name=BrowserModifier:Win32/Linkhortry&threatid=234930&enterprise=0
Name: BrowserModifier:Win32/Linkhortry
ID: 234930
Schweregrad: Hoch
Kategorie: Browserveränderer
Pfad: file:_C:\Users\baris\AppData\Local\Temp\6071156\ic-0.2bc239f60b226c.exe; file:_C:\Users\baris\AppData\Local\Temp\ehzinwo2.tpb\APSF360dev.exe; file:_C:\Users\baris\AppData\Local\Temp\lrj4ly4j.yin\APSF360dev.exe; folder:_c:\users\baris\appdata\local\temp\ehzinwo2.tpb\; folder:_c:\users\baris\appdata\local\temp\lrj4ly4j.yin\
Erkennungsursprung: Lokaler Computer
Erkennungstype: Konkret
Erkennungsquelle: Echtzeitschutz
Benutzer: DESKTOP-M826EE6\baris
Prozessname: C:\Users\baris\AppData\Local\Temp\W9TRU135TB\W9TR.exe
Sicherheitsversion: AV: 1.297.1248.0, AS: 1.297.1248.0, NIS: 0.0.0.0
Modulversion: AM: 1.1.16100.4, NIS: 0.0.0.0
Date: 2019-07-17 21:36:13.543
Description:
Windows Defender Antivirus hat Schadsoftware oder andere potenziell unerwünschte Software erkannt.
Weitere Informationen:
https://go.microsoft.com/fwlink/?linkid=37020&name=BrowserModifier:Win32/Linkhortry&threatid=234930&enterprise=0
Name: BrowserModifier:Win32/Linkhortry
ID: 234930
Schweregrad: Hoch
Kategorie: Browserveränderer
Pfad: file:_C:\Users\baris\AppData\Local\Temp\6071156\ic-0.2bc239f60b226c.exe; file:_C:\Users\baris\AppData\Local\Temp\ehzinwo2.tpb\APSF360dev.exe; file:_C:\Users\baris\AppData\Local\Temp\lrj4ly4j.yin\APSF360dev.exe
Erkennungsursprung: Lokaler Computer
Erkennungstype: Konkret
Erkennungsquelle: Echtzeitschutz
Benutzer: DESKTOP-M826EE6\baris
Prozessname: C:\Users\baris\AppData\Local\Temp\W9TRU135TB\W9TR.exe
Sicherheitsversion: AV: 1.297.1248.0, AS: 1.297.1248.0, NIS: 0.0.0.0
Modulversion: AM: 1.1.16100.4, NIS: 0.0.0.0
Date: 2019-07-17 21:36:03.348
Description:
Windows Defender Antivirus hat Schadsoftware oder andere potenziell unerwünschte Software erkannt.
Weitere Informationen:
https://go.microsoft.com/fwlink/?linkid=37020&name=BrowserModifier:Win32/Linkhortry&threatid=234930&enterprise=0
Name: BrowserModifier:Win32/Linkhortry
ID: 234930
Schweregrad: Hoch
Kategorie: Browserveränderer
Pfad: file:_c:\users\baris\appdata\local\temp\6071156\Dgubwhumsh.exe; file:_c:\users\baris\appdata\local\temp\6071156\dlreport; file:_c:\users\baris\appdata\local\temp\6071156\ic-0.021ceb3557eb2c.exe; file:_C:\Users\baris\AppData\Local\Temp\6071156\ic-0.2bc239f60b226c.exe; file:_c:\users\baris\appdata\local\temp\6071156\ic-0.36b2c906097f98.exe; file:_c:\users\baris\appdata\local\temp\6071156\ic-0.43c67b9e4c6e88.exe; file:_c:\users\baris\appdata\local\temp\6071156\ic-0.4cdb2331bddb08.exe; file:_c:\users\baris\appdata\local\temp\6071156\ic-0.518f945d7444a.exe; file:_c:\users\baris\appdata\local\temp\6071156\ic-0.89c2f9fb6a056.exe; file:_c:\users\baris\appdata\local\temp\6071156\ic-0.cbb08622ff3df.exe; file:_c:\users\baris\appdata\local\temp\6071156\RunBoosterSetup64_3231.exe; folder:_c:\users\baris\appdata\local\temp\6071156\; process:_pid:7028,ProcessStart:132078655236685515
Erkennungsursprung: Lokaler Computer
Erkennungstype: Konkret
Erkennungsquelle: Echtzeitschutz
Benutzer: DESKTOP-M826EE6\baris
Prozessname: C:\Users\baris\AppData\Local\Temp\Rar$EXa3992.35187\CommView For WiFi Crack Updated Keys June 2019.exe
Sicherheitsversion: AV: 1.297.1248.0, AS: 1.297.1248.0, NIS: 0.0.0.0
Modulversion: AM: 1.1.16100.4, NIS: 0.0.0.0
Date: 2019-07-17 21:35:10.314
Description:
Windows Defender Antivirus hat Schadsoftware oder andere potenziell unerwünschte Software erkannt.
Weitere Informationen:
https://go.microsoft.com/fwlink/?linkid=37020&name=Adware:Win64/RunBooster&threatid=245169&enterprise=0
Name: Adware:Win64/RunBooster
ID: 245169
Schweregrad: Hoch
Kategorie: Adware
Pfad: file:_C:\Users\baris\AppData\Local\Temp\6071156\RunBoosterSetup64_3231.exe
Erkennungsursprung: Lokaler Computer
Erkennungstype: Konkret
Erkennungsquelle: Echtzeitschutz
Benutzer: DESKTOP-M826EE6\baris
Prozessname: C:\Users\baris\AppData\Local\Temp\Rar$EXa3992.35187\CommView For WiFi Crack Updated Keys June 2019.exe
Sicherheitsversion: AV: 1.297.1248.0, AS: 1.297.1248.0, NIS: 0.0.0.0
Modulversion: AM: 1.1.16100.4, NIS: 0.0.0.0
Date: 2019-07-17 21:34:48.139
Description:
Windows Defender Antivirus hat Schadsoftware oder andere potenziell unerwünschte Software erkannt.
Weitere Informationen:
https://go.microsoft.com/fwlink/?linkid=37020&name=Trojan:Win32/MonClon&threatid=2147740260&enterprise=0
Name: Trojan:Win32/MonClon
ID: 2147740260
Schweregrad: Schwerwiegend
Kategorie: Trojaner
Pfad: file:_C:\Users\baris\AppData\Local\Temp\6071156\ic-0.36b2c906097f98.exe
Erkennungsursprung: Lokaler Computer
Erkennungstype: Konkret
Erkennungsquelle: Echtzeitschutz
Benutzer: DESKTOP-M826EE6\baris
Prozessname: C:\Users\baris\AppData\Local\Temp\Rar$EXa3992.35187\CommView For WiFi Crack Updated Keys June 2019.exe
Sicherheitsversion: AV: 1.297.1248.0, AS: 1.297.1248.0, NIS: 0.0.0.0
Modulversion: AM: 1.1.16100.4, NIS: 0.0.0.0
CodeIntegrity:
===================================
Date: 2019-07-20 19:51:33.466
Description:
Windows is unable to verify the image integrity of the file \Device\HarddiskVolume3\Program Files (x86)\Spybot - Search & Destroy 2\SDWSCSvc.exe because file hash could not be found on the system. A recent hardware or software change might have installed a file that is signed incorrectly or damaged, or that might be malicious software from an unknown source.
Date: 2019-07-20 18:59:39.460
Description:
Windows blocked file \Device\HarddiskVolume3\Windows\System32\scrobj.dll which has been disallowed for protected processes.
Date: 2019-07-20 18:59:39.392
Description:
Windows blocked file \Device\HarddiskVolume3\Windows\System32\scrobj.dll which has been disallowed for protected processes.
Date: 2019-07-20 18:59:39.298
Description:
Windows blocked file \Device\HarddiskVolume3\Windows\System32\scrobj.dll which has been disallowed for protected processes.
Date: 2019-07-20 18:59:39.226
Description:
Windows blocked file \Device\HarddiskVolume3\Windows\System32\scrobj.dll which has been disallowed for protected processes.
Date: 2019-07-20 18:59:39.153
Description:
Windows blocked file \Device\HarddiskVolume3\Windows\System32\scrobj.dll which has been disallowed for protected processes.
Date: 2019-07-20 18:59:20.189
Description:
Windows blocked file \Device\HarddiskVolume3\Windows\System32\scrobj.dll which has been disallowed for protected processes.
Date: 2019-07-20 18:59:12.679
Description:
Windows blocked file \Device\HarddiskVolume3\Windows\System32\scrobj.dll which has been disallowed for protected processes.
==================== Speicherinformationen ===========================
BIOS: Insyde Corp. V1.10 08/22/2017
Motherboard: KBL Charmander_KL
Prozessor: Intel(R) Core(TM) i5-7200U CPU @ 2.50GHz
Prozentuale Nutzung des RAM: 43%
Installierter physikalischer RAM: 8067.6 MB
Verfügbarer physikalischer RAM: 4556.29 MB
Summe virtueller Speicher: 9987.6 MB
Verfügbarer virtueller Speicher: 6384.92 MB
==================== Laufwerke ================================
Drive c: (Acer) (Fixed) (Total:237.35 GB) (Free:169.48 GB) NTFS
\\?\Volume{26817bcd-d999-4c2b-aea9-6cb726dfbdb3}\ (Recovery) (Fixed) (Total:1 GB) (Free:0.52 GB) NTFS
\\?\Volume{bba47be7-a925-4e45-86e9-32beab07d274}\ (ESP) (Fixed) (Total:0.09 GB) (Free:0.04 GB) FAT32
==================== MBR & Partitionstabelle ==================
========================================================
Disk: 0 (Size: 238.5 GB) (Disk ID: CCC65ED7)
Partition: GPT.
==================== Ende von Addition.txt ============================
ich hab es hier hochgeladen https://workupload.com/file/7y9Pmpgb lg baris |
| | #10 | ||
| /// TB-Ausbilder ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Malware Trojaner Windows 10Zitat:
Das ist nicht ein Ort, von dem aus FRST gestartet werden sollte. Zitat:
|
| | #11 |
| /// TB-Ausbilder ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() | Malware Trojaner Windows 10 Fehlende Rückmeldung Dieses Thema wurde aus meinen Abos gelöscht. Somit bekomme ich keine Benachrichtigung über neue Antworten. Solltest Du das Thema erneut brauchen, schicke uns bitte eine Erinnerung inklusive Link zum Thema. Hinweis: Das Verschwinden der Symptome bedeutet nicht, dass Dein Rechner schon sauber ist. Jeder andere bitte hier klicken und ein eigenes Thema erstellen! |
| Themen zu Malware Trojaner Windows 10 |
| appdata, askbar, boot, c:\windows, csrss, explorer, firefox, gen, install, internet, internet explorer, löschen, malware, microsoft, mozilla, neustart, problem, quarantäne, roaming, scan, services, system32, temp, trojaner, windows, windows problem |