Finalshare | 18.01.2015 19:19 | Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2015-01-18 18:51:02
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 SAMSUNG_HD103SI rev.1AG01118 931,51GB
Running: Gmer-19357.exe; Driver: C:\Users\******\AppData\Local\Temp\pxdiypow.sys
---- Kernel code sections - GMER 2.1 ----
INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 448 fffff80002bf9000 45 bytes [00, 00, 15, 02, 46, 69, 6C, ...]
INITKDBG C:\Windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 494 fffff80002bf902e 17 bytes [68, 00, 00, 00, 00, 00, 00, ...]
---- User code sections - GMER 2.1 ----
.text D:\Programme\AVAST Software\Avast\afwServ.exe[1664] C:\Windows\syswow64\kernel32.dll!SetUnhandledExceptionFilter 0000000074ef8791 8 bytes [31, C0, C2, 04, 00, 90, 90, ...]
.text D:\Programme\AVAST Software\Avast\afwServ.exe[1664] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000748c1465 2 bytes [8C, 74]
.text D:\Programme\AVAST Software\Avast\afwServ.exe[1664] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000748c14bb 2 bytes [8C, 74]
.text ... * 2
.text C:\Windows\SysWOW64\rundll32.exe[3584] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 26 00000000734e13c6 2 bytes [4E, 73]
.text C:\Windows\SysWOW64\rundll32.exe[3584] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 74 00000000734e13f6 2 bytes [4E, 73]
.text C:\Windows\SysWOW64\rundll32.exe[3584] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 257 00000000734e14ad 2 bytes [4E, 73]
.text C:\Windows\SysWOW64\rundll32.exe[3584] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathW + 303 00000000734e14db 2 bytes [4E, 73]
.text ... * 2
.text C:\Windows\SysWOW64\rundll32.exe[3584] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 79 00000000734e1577 2 bytes [4E, 73]
.text C:\Windows\SysWOW64\rundll32.exe[3584] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 175 00000000734e15d7 2 bytes [4E, 73]
.text C:\Windows\SysWOW64\rundll32.exe[3584] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 620 00000000734e1794 2 bytes [4E, 73]
.text C:\Windows\SysWOW64\rundll32.exe[3584] C:\Windows\SysWOW64\SHFOLDER.dll!SHGetFolderPathA + 921 00000000734e18c1 2 bytes [4E, 73]
.text D:\Programme\AVAST Software\Avast\AvastUI.exe[1248] C:\Windows\syswow64\kernel32.dll!SetUnhandledExceptionFilter 0000000074ef8791 8 bytes [31, C0, C2, 04, 00, 90, 90, ...]
.text D:\Programme\AVAST Software\Avast\AvastUI.exe[1248] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 00000000748c1465 2 bytes [8C, 74]
.text D:\Programme\AVAST Software\Avast\AvastUI.exe[1248] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000748c14bb 2 bytes [8C, 74]
.text ... * 2
.text C:\Program Files (x86)\Google\Drive\googledrivesync.exe[308] C:\Windows\syswow64\Psapi.dll!GetModuleInformation + 69 00000000748c1465 2 bytes [8C, 74]
.text C:\Program Files (x86)\Google\Drive\googledrivesync.exe[308] C:\Windows\syswow64\Psapi.dll!GetModuleInformation + 155 00000000748c14bb 2 bytes [8C, 74]
.text ... * 2
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationProcess 0000000076d31440 5 bytes JMP 0000000100220018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\kernel32.dll!CreateFileW 0000000076ad0d30 5 bytes JMP 0000000100230018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\kernel32.dll!RegCloseKey 0000000076ad40d0 5 bytes JMP 0000000100290018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\kernel32.dll!DeviceIoControl 0000000076ad5c80 5 bytes JMP 0000000100240018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\kernel32.dll!CreateFileA 0000000076ae1bc0 5 bytes JMP 0000000100270018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\kernel32.dll!RegDeleteValueW 0000000076aeffb0 5 bytes JMP 00000001002d0018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\kernel32.dll!RegFlushKey 0000000076b579f0 4 bytes JMP 00000001002a0018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\kernel32.dll!RegDeleteValueA 0000000076b58590 5 bytes JMP 00000001002c0018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\KERNELBASE.dll!IsDebuggerPresent 000007fefcd9b310 5 bytes JMP 000007ff7cdb0018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\ole32.dll!CoCreateInstance 000007fefda07490 5 bytes JMP 000007ff7da20018
.text C:\Program Files (x86)\K-Lite Codec Pack\MPC-HC64\mpc-hc64.exe[760] C:\Windows\system32\WINMM.dll!mixerSetControlDetails 000007fef9b94558 5 bytes JMP 000007ff79bb0018
---- Processes - GMER 2.1 ----
Library C:\Users\******\AppData\Local\Temp\_MEI42562\python27.dll (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308] (Python Core/Python Software Foundation)(2015-01-18 17:07:25) 000000001e000000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32api.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 000000001e8c0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\pywintypes27.dll (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 000000001e7a0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\pythoncom27.dll (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 0000000000300000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\_socket.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 0000000000240000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\_ssl.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 0000000010000000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32com.shell.shell.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 000000001e800000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\_hashlib.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 00000000004a0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wx._core_.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 0000000002fd0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wxbase294u_vc90.dll (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308] (wxWidgets for MSW/wxWidgets development team)(2015-01-18 17:07:25) 0000000003100000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wxbase294u_net_vc90.dll (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308] (wxWidgets for MSW/wxWidgets development team)(2015-01-18 17:07:25) 0000000000370000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wxmsw294u_core_vc90.dll (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308] (wxWidgets for MSW/wxWidgets development team)(2015-01-18 17:07:25) 00000000032f0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wxmsw294u_adv_vc90.dll (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308] (wxWidgets for MSW/wxWidgets development team)(2015-01-18 17:07:25) 0000000003790000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wx._gdi_.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 00000000039d0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wx._windows_.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 0000000004360000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wxmsw294u_html_vc90.dll (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308] (wxWidgets for MSW/wxWidgets development team)(2015-01-18 17:07:25) 0000000002800000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wx._controls_.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 00000000045c0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wx._misc_.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 00000000046d0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\pysqlite2._sqlite.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 0000000003aa0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\_elementtree.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 000000001d100000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\pyexpat.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 0000000001ff0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\_ctypes.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 000000001d1a0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32file.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 000000001ea10000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32security.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 000000001ec80000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\hashobjs_ext.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 0000000000790000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32gui.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 000000001ea40000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32event.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 000000001e9b0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32inet.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 000000001eaa0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32crypt.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 000000001e980000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wx._html2.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 00000000028a0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wxmsw294u_webview_vc90.dll (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308] (wxWidgets for MSW/wxWidgets development team)(2015-01-18 17:07:25) 0000000003b30000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\_multiprocessing.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 0000000005760000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32process.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:23) 000000001ebf0000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\unicodedata.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 0000000005770000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wx._wizard.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 0000000005850000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32pipe.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 000000001eb90000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32pdh.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 000000001eb60000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\select.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 0000000005830000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32profile.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:25) 000000001ec20000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\win32ts.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 000000001ed40000
Library C:\Users\******\AppData\Local\Temp\_MEI42562\wx._animate.pyd (*** suspicious ***) @ C:\Program Files (x86)\Google\Drive\googledrivesync.exe [308](2015-01-18 17:07:24) 0000000005900000
---- EOF - GMER 2.1 ---- Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlauf Datum: 18.01.2015
Suchlauf-Zeit: 15:34:29
Logdatei: Mbam.txt
Administrator: Ja
Version: 2.00.4.1028
Malware Datenbank: v2015.01.18.06
Rootkit Datenbank: v2015.01.14.01
Lizenz: Premium
Malware Schutz: Aktiviert
Bösartiger Webseiten Schutz: Aktiviert
Selbstschutz: Deaktiviert
Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: ******
Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 335193
Verstrichene Zeit: 26 Min, 39 Sek
Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Heuristik: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 0
(Keine schädliche Elemente erkannt)
Module: 0
(Keine schädliche Elemente erkannt)
Registrierungsschlüssel: 10
PUP.Optional.Booster.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}{d65a1a66}, In Quarantäne, [35a913e5c8c1d561c6732c67bb48e917],
PUP.Optional.CytiWeb.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Update Cyti Web, In Quarantäne, [3da1fafec9c073c39f07cda7f013cd33],
PUP.Optional.Multiplug, HKLM\SOFTWARE\CLASSES\TYPELIB\{E0D6077D-7186-48B2-A6C6-2F7C533E8CFF}, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, HKLM\SOFTWARE\CLASSES\INTERFACE\{0F19EF48-CB8C-416A-B84C-C33B02970632}, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, HKLM\SOFTWARE\CLASSES\INTERFACE\{382F6195-1B46-40D5-B9FD-0493263E6132}, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, HKLM\SOFTWARE\CLASSES\INTERFACE\{DFF50D27-9859-4F50-9BE1-A4CBFA102B9D}, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{0F19EF48-CB8C-416A-B84C-C33B02970632}, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{382F6195-1B46-40D5-B9FD-0493263E6132}, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{DFF50D27-9859-4F50-9BE1-A4CBFA102B9D}, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{E0D6077D-7186-48B2-A6C6-2F7C533E8CFF}, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
Registrierungswerte: 0
(Keine schädliche Elemente erkannt)
Registrierungsdaten: 0
(Keine schädliche Elemente erkannt)
Ordner: 1
PUP.Optional.Multiplug, C:\Program Files (x86)\youtubeadblocker, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
Dateien: 17
Trojan.Agent, C:\Program Files (x86)\Unisiallees\Unisiallees.exe, In Quarantäne, [b22ce3155c2d979fd0b22cd5ed15e11f],
PUP.Optional.MultiPlug.A, C:\Program Files (x86)\unissaLes\t3NmFtQ1HVPV4e.dll, In Quarantäne, [0cd223d5f693b3838b65f09b6e977e82],
Trojan.Agent, C:\Program Files (x86)\unissaLes\t3NmFtQ1HVPV4e.exe, In Quarantäne, [825c33c5a9e0999d7f034eb33ac86c94],
PUP.Optional.MultiPlug.A, C:\Program Files (x86)\youtubeadblocker\M2UmY6zdSbQain.dll, In Quarantäne, [449a906879107abc77790d7ebb4a936d],
Trojan.Agent, C:\Program Files (x86)\youtubeadblocker\M2UmY6zdSbQain.exe, In Quarantäne, [19c5a7510782f541057d6d944db532ce],
PUP.Optional.Somoto, C:\Users\******\AppData\Local\Temp\nsv80E7.tmp, In Quarantäne, [4e9050a82168cb6ba401ca3a55b0a957],
PUP.Optional.EZDownloader.A, C:\Users\******\AppData\Local\Temp\183ef9E\temp\EzDownloader_setup.exe, In Quarantäne, [46986890c0c9b77f3bbe1a052cd421df],
PUP.Optional.SupTab.A, C:\Users\******\AppData\Local\Temp\~dlF08B\~dljyb\tmp\STab_Down.exe, In Quarantäne, [9a4433c5f99043f392e485e009f7d729],
PUP.Optional.XTab.A, C:\Users\******\AppData\Local\Temp\~dlF08B\~dljyb\tmp\STab_v4.0.exe, In Quarantäne, [20be20d8177259dda1905fa7c43eec14], ,
PUP.Optional.OpenCandy, C:\Users\******\Downloads\DTLite4491-0356.exe, In Quarantäne, [8a5441b73a4ff5410e23e3dd759030d0],
PUP.Optional.Multiplug, C:\Program Files (x86)\youtubeadblocker\M2UmY6zdSbQain.dat, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, C:\Program Files (x86)\youtubeadblocker\M2UmY6zdSbQain.exe, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, C:\Program Files (x86)\youtubeadblocker\M2UmY6zdSbQain.tlb, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Multiplug, C:\Program Files (x86)\youtubeadblocker\M2UmY6zdSbQain.x64.dll, In Quarantäne, [aa345c9cd0b973c30d9977c4659ebf41],
PUP.Optional.Conduit.A, C:\Users\******\AppData\Local\Google\Chrome\User Data\Default\Preferences, Gut: (), Schlecht: ( "startup_urls": [ "hxxp://search.conduit.com/?ctid=CT3321902&octid=EB_ORIGINAL_CTID&SearchSource=55&CUI=&UM=4&UP=SPE3AE89D1-E528-4E97-95B9-ACBF17AB5DAF&SSPV=", "hxxp://home.sweetim.com/?crg=3.1010000.00000&barid={5B915C48-CFF3-4787-854E-BB128440C3BB}", "hxxp://www.google.com/", "hxxp://www.mystartsearch.com/?type=hp&ts=1421444508&from=wpc&uid=SAMSUNGXHD103SI_S1VSJ9DZ501731" ],), Ersetzt,[98467682a4e50a2c0c3bd6ff7095fb05]
Physische Sektoren: 0
(Keine schädliche Elemente erkannt)
(end) |