| Speed9001 | 07.02.2016 13:49 | Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlaufdatum: 07.02.2016
Suchlaufzeit: 08:38:38
Protokolldatei:
Administrator: Ja
Version: 2.02.0.1024
Malware-Datenbank: v2016.02.07.01
Rootkit-Datenbank: v2016.01.20.01
Lizenz: Premium-Version
Malware-Schutz: Aktiviert
Schutz vor bösartigen Websites: Aktiviert
Selbstschutz: Deaktiviert
Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: Dom
Suchlauftyp: Benutzerdefinierter Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 719000
Abgelaufene Zeit: 2 Std., 6 Min., 25 Sek.
Speicher: Aktiviert
Start: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Aktiviert
Heuristik: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 1
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\dwm.exe, 3264, Löschen bei Neustart, [e8f54e0f4b4e2d09e303b856fd072ad6]
Module: 0
(keine bösartigen Elemente erkannt)
Registrierungsschlüssel: 52
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\APPID\{425F4ABF-B8E4-402D-9E49-06E494EB8DBF}, In Quarantäne, [efee8cd13a5f6ccaece38be27d85c23e],
PUP.Optional.VBates, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{425F4ABF-B8E4-402D-9E49-06E494EB8DBF}, In Quarantäne, [efee8cd13a5f6ccaece38be27d85c23e],
PUP.Optional.VBates, HKLM\SOFTWARE\CLASSES\WOW6432NODE\APPID\{425F4ABF-B8E4-402D-9E49-06E494EB8DBF}, In Quarantäne, [efee8cd13a5f6ccaece38be27d85c23e],
PUP.Optional.Elex, HKLM\SOFTWARE\CLASSES\TYPELIB\{8DD92279-9B04-4C6F-A862-EF3C24603804}, In Quarantäne, [9c41312c70290f27544c0d6091715ea2],
PUP.Optional.Elex, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{8DD92279-9B04-4C6F-A862-EF3C24603804}, In Quarantäne, [9c41312c70290f27544c0d6091715ea2],
PUP.Optional.Elex, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{8DD92279-9B04-4C6F-A862-EF3C24603804}, In Quarantäne, [9c41312c70290f27544c0d6091715ea2],
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\LABTECH.EXE, In Quarantäne, [5786e8759009310529cd13bed130f709],
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\LABTECH.EXE, In Quarantäne, [5786e8759009310529cd13bed130f709],
PUP.Optional.BrowserAir, HKLM\SOFTWARE\BrowserAir, In Quarantäne, [4598421b47521f17958e8070b151619f],
PUP.Optional.DownChecker, HKLM\SOFTWARE\downchecker, In Quarantäne, [22bba1bc7f1a46f0ffc98e620bf7669a],
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\LAYERS\VC32LDR , In Quarantäne, [d4091845b2e7241231f1a35c1ce730d0],
PUP.Optional.SearchProtect.AppFlsh, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\bvxvbxxvaa, Löschen bei Neustart, [b32a5eff4059d363d4671e24a85c8a76],
PUP.Optional.MyBrowser, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\IBUpd, Löschen bei Neustart, [5e7f6fee158403334344e6268b790bf5],
PUP.Optional.MyBrowser, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\IBUpd2, Löschen bei Neustart, [b52860fddfba9a9cd2e073d7d0341ae6],
PUP.Optional.Linkury, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP PATHS\Stpro.exe, In Quarantäne, [48953e1fb4e514222c8f55b70400936d],
PUP.Optional.DownChecker, HKLM\SOFTWARE\WOW6432NODE\downchecker, In Quarantäne, [7d606af373269f975f694ba5db2723dd],
PUP.Optional.Elex, HKLM\SOFTWARE\WOW6432NODE\ihpmserver, In Quarantäne, [6578174607920f2716827b92010337c9],
PUP.Optional.Linkury, HKLM\SOFTWARE\WOW6432NODE\mtLabtech, In Quarantäne, [5e7f401d7b1edb5b7db03b15679da15f],
PUP.Optional.MBot, HKLM\SOFTWARE\WOW6432NODE\MYBESTOFFERSTODAY, In Quarantäne, [e3fab7a6b4e5fa3c02dff7ed4fb406fa],
PUP.Optional.MySites123.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\mysites123Software, In Quarantäne, [33aa15487623c57177ef53998a78c33d],
PUP.Optional.OneSoftPerDay, HKLM\SOFTWARE\WOW6432NODE\ONESOFTPERDAY, In Quarantäne, [c914c69704956fc753e728c456ad21df],
PUP.Optional.SpaceSoundPro, HKLM\SOFTWARE\WOW6432NODE\SpaceSondPro, In Quarantäne, [8a5376e77227b0868fd630c9b84b936d],
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\IELNKSRCH, In Quarantäne, [33aaec7156431f179b18d6e9e3204ab6],
PUP.Optional.DeskBar, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\DeskBar_RASAPI32, In Quarantäne, [e3fadd80eaaff93db19e35d8a26254ac],
PUP.Optional.DeskBar, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\TRACING\DeskBar_RASMANCS, In Quarantäne, [11cc2d30aeeb3cfac6890d00e81c41bf],
PUP.Optional.Linkury, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SILENTPROCESSEXIT\Labtech.exe, In Quarantäne, [12cb45189603c07667c5e86872924fb1],
PUP.Optional.Linkury, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\APP PATHS\Stpro.exe, In Quarantäne, [2cb1d18c0594a294cbf0a06c9b698779],
PUP.Optional.MySearch123, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{7ADF667E-E14D-4D2C-827C-B0108F0D93BC}, In Quarantäne, [c11cb0ad97026bcb91e8aa93996bd22e],
PUP.Optional.Elex, HKLM\SOFTWARE\WOW6432NODE\RAYDLD, In Quarantäne, [4e8f5ffec7d2092db8fa6b84748e0af6],
PUP.Optional.Elex, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ihpmServer, In Quarantäne, [03da9fbe8f0ab2844b85e90459a98d73],
PUP.Optional.RelevantKnowledge, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\RelevantKnowledge, In Quarantäne, [1ac39ac3cecba195d64b27cbbe458f71],
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ROWUGOQO, In Quarantäne, [84596bf2613868ce5c732fbab44fa25e],
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WUCOTUSY, In Quarantäne, [b22b1f3e3960eb4b05ca0ddc778c40c0],
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ZUTUZUNI, In Quarantäne, [914cb2abeeab290da42be50456ada759],
PUP.Optional.Linkury, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\EVENTLOG\APPLICATION\Application Hosting, In Quarantäne, [18c52f2e287164d25f190cdfff03a759],
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{69684E3C-8CE0-46C2-B6ED-FAE033B0FCBD}, In Quarantäne, [d409e27b54450432e2ca467c679cb54b],
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{CEFCE10C-2F90-41CB-B072-3CDB8C15F670}, In Quarantäne, [8d5080dd5e3b86b066467a4821e21de3],
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{69684E3C-8CE0-46C2-B6ED-FAE033B0FCBD}, In Quarantäne, [15c80b520e8b2115e2ca289aaa590bf5],
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{CEFCE10C-2F90-41CB-B072-3CDB8C15F670}, In Quarantäne, [dc0149148f0af93d2884d0f2798a42be],
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{69684E3C-8CE0-46C2-B6ED-FAE033B0FCBD}, In Quarantäne, [9d40213c1e7bea4c9814348e5ca735cb],
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{CEFCE10C-2F90-41CB-B072-3CDB8C15F670}, In Quarantäne, [bf1ea4b99009af875656dae8f70cc739],
PUP.Optional.BrowserAir, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\BrowserAir, In Quarantäne, [15c879e4267387af6947f04a000429d7],
PUP.Optional.TrailerTime, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\APPDATALOW\SOFTWARE\TrailerTime, In Quarantäne, [d4090657bedb1c1abade0d3e59abb44c],
PUP.Optional.Komodia, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\INSTALLPATH\STATUS, In Quarantäne, [a23b3924871277bf853fa4a5cd37ba46],
PUP.Optional.Linkury.ShrtCln, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{IELNKSRCH}, In Quarantäne, [c91491ccd9c0989e3032ce2333cfa35d],
PUP.Optional.BrowserAir, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BrowserAir, In Quarantäne, [a03d9dc0ebae3bfbc871420a3bc958a8],
PUP.Optional.DeskCut, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MOZILLA\EXTENDS, In Quarantäne, [ae2f93ca3b5e9b9bb3fd4292cc37e11f],
PUP.Optional.OutBrowse, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\OB, In Quarantäne, [00dd4f0e0f8ace68c202cd1f7e85bf41],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\TUTORIALS\updatetutorialeshp, In Quarantäne, [15c8e17c0099e254a8d846b9e023e020],
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\{69684E3C-8CE0-46C2-B6ED-FAE033B0FCBD}, In Quarantäne, [bc2119440891979fecc021a154af8e72],
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\{CEFCE10C-2F90-41CB-B072-3CDB8C15F670}, In Quarantäne, [ae2f0c51ecadc274adff1ba7897a60a0],
PUP.Optional.BrowserAir, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\BrowserAir, In Quarantäne, [d20b302de2b72a0ca4cf8b2f679b08f8],
Registrierungswerte: 38
PUP.Optional.Trovi, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\APPCOMPATFLAGS\CUSTOM\LAYERS\VC32Ldr |{8a4d5a43-c64a-45ab-bdf4-804fe18ceafd}.sdb, 130992196231709222, In Quarantäne, [d4091845b2e7241231f1a35c1ce730d0]
PUP.Optional.Groover.BrwsrFlsh, HKLM\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|{94768FC1-F3F1-4A83-8A0F-CCE837F4350F}, C:\Program Files\groover060220160459\Firefox\{94768FC1-F3F1-4A83-8A0F-CCE837F4350F}.xpi, In Quarantäne, [b5282e2f1c7d1422d6da5969b251a759]
PUP.Optional.Groover.BrwsrFlsh, HKLM\SOFTWARE\MOZILLA\FIREFOX\EXTENSIONS|{723310B3-68BE-4539-8549-4481B2F8A0B8}, C:\Program Files\groover060220160748\Firefox\{723310B3-68BE-4539-8549-4481B2F8A0B8}.xpi, In Quarantäne, [32abc7965e3b62d400b03b8734cff60a]
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\ielnksrch|DisplayName, Search the web, In Quarantäne, [33aaec7156431f179b18d6e9e3204ab6]
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\ielnksrch|URL, hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}, In Quarantäne, [01dc3e1f8415bb7ba90b3b84ff04a957]
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHURL|Default, hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}, In Quarantäne, [5885fd601f7a1a1c169f358a7c870af6]
PUP.Optional.OneSoftPerDay, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|ospd_us_013010228, "C:\Program Files (x86)\ospd_us_013010228\ospd_us_013010228.exe", In Quarantäne, [4f8e19449702e155b3844d9fb44f56aa]
PUP.Optional.Groover.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|{94768FC1-F3F1-4A83-8A0F-CCE837F4350F}, C:\Program Files\groover060220160459\Firefox\{94768FC1-F3F1-4A83-8A0F-CCE837F4350F}.xpi, In Quarantäne, [904db5a8415864d2b7f9784a44bfed13]
PUP.Optional.Groover.BrwsrFlsh, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|{723310B3-68BE-4539-8549-4481B2F8A0B8}, C:\Program Files\groover060220160748\Firefox\{723310B3-68BE-4539-8549-4481B2F8A0B8}.xpi, In Quarantäne, [8459e875f2a71a1c30802f93be455ea2]
PUP.Optional.Elex, HKLM\SOFTWARE\WOW6432NODE\RAYDLD|dir, C:\Program Files (x86)\RayDld, In Quarantäne, [4e8f5ffec7d2092db8fa6b84748e0af6]
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\rowugoqo|ImagePath, C:\Users\Dom\AppData\Local\03000200-1454749379-0500-0006-000700080009\snsuCD90.tmp, In Quarantäne, [84596bf2613868ce5c732fbab44fa25e]
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\wucotusy|ImagePath, C:\Program Files (x86)\03000200-1454745702-0500-0006-000700080009\hnseEC66.tmp, In Quarantäne, [b22b1f3e3960eb4b05ca0ddc778c40c0]
PUP.Optional.MultiPlug, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\zutuzuni|ImagePath, C:\Program Files (x86)\03000200-1454745702-0500-0006-000700080009\jnsuC610.tmp, In Quarantäne, [914cb2abeeab290da42be50456ada759]
PUP.Optional.RelevantKnowledge, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{3652284C-5E66-4E1A-871A-9750BA314027}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Program Files (x86)\RelevantKnowledge\rlvknlg.exe|Name=rlvknlg.exe|, In Quarantäne, [ba234716a0f95fd7bec4e15a3aca8878]
PUP.Optional.RelevantKnowledge, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{E7A3D930-C326-466D-93DD-0162A1BD6571}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Program Files (x86)\RelevantKnowledge\rlvknlg.exe|Name=rlvknlg.exe|, In Quarantäne, [c21b1944c7d2d0660a7855e6a85cf40c]
PUP.Optional.RelevantKnowledge, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{86422A76-AC0B-4164-AD10-D2767106B329}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Public|App=C:\Program Files (x86)\RelevantKnowledge\rlvknlg.exe|Name=rlvknlg.exe|, In Quarantäne, [b726b3aa6b2e42f4582a62d958ac3fc1]
PUP.Optional.RelevantKnowledge, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{47446EC6-C8F2-468D-A350-F01EFA7E21E1}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Public|App=C:\Program Files (x86)\RelevantKnowledge\rlvknlg.exe|Name=rlvknlg.exe|, In Quarantäne, [7e5fbba22772a98dc0c268d339cbf907]
PUP.Optional.MaxDriverUpdater, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{878ACE18-A2F7-4F66-A3A3-B47D679133CF}, v2.10|Action=Allow|Active=TRUE|Dir=In|App=C:\Program Files (x86)\Max Driver Updater\maxdu.exe|Name=MaxDriverUpdater|, In Quarantäne, [84594d10d3c67abc066bcc726a9acc34]
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{69684E3C-8CE0-46C2-b6ED-FAE033B0FCBD}|Name, C:\Program Files\groover060220160748\Niohp.exe, In Quarantäne, [d409e27b54450432e2ca467c679cb54b]
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{CEFCE10C-2F90-41CB-b072-3CDB8C15F670}|Name, C:\Program Files\groover060220160459\Catpaul.exe, In Quarantäne, [8d5080dd5e3b86b066467a4821e21de3]
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{69684E3C-8CE0-46C2-b6ED-FAE033B0FCBD}|Name, C:\Program Files\groover060220160748\Niohp.exe, In Quarantäne, [15c80b520e8b2115e2ca289aaa590bf5]
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{CEFCE10C-2F90-41CB-b072-3CDB8C15F670}|Name, C:\Program Files\groover060220160459\Catpaul.exe, In Quarantäne, [dc0149148f0af93d2884d0f2798a42be]
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{69684E3C-8CE0-46C2-b6ED-FAE033B0FCBD}|Name, C:\Program Files\groover060220160748\Niohp.exe, In Quarantäne, [9d40213c1e7bea4c9814348e5ca735cb]
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{CEFCE10C-2F90-41CB-b072-3CDB8C15F670}|Name, C:\Program Files\groover060220160459\Catpaul.exe, In Quarantäne, [bf1ea4b99009af875656dae8f70cc739]
PUP.Optional.Linkury, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\ENVIRONMENT|SNF, C:\ProgramData\Labtechs\snp.sc, In Quarantäne, [6b72114c3663ef47d07ae5fede25cb35]
PUP.Optional.Linkury, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\ENVIRONMENT|SNP, hxxp://%66%65%65%64.%73%6E%61%70%64%6F.%63%6F%6D?publisher=APSFAM&co=DE&userid=2ef6e4b4-bc45-f7d3-9fea-e14931b1077e&searchtype=sc&installDate=06.02.2016&barcodeid=51126003&channelid=3&av=avira, In Quarantäne, [736a71ec3366c670f95292516c9753ad]
PUP.Optional.Komodia, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\INSTALLPATH\STATUS|FlowsurfCB, P, In Quarantäne, [a23b3924871277bf853fa4a5cd37ba46]
PUP.Optional.DeskBar, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|DeskBar.exe, 8888, In Quarantäne, [4796233a267368ce37f5bb8cbe4609f7]
PUP.Optional.Linkury.ShrtCln, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{ielnksrch}|DisplayName, Search the web, In Quarantäne, [c91491ccd9c0989e3032ce2333cfa35d]
PUP.Optional.Linkury.ShrtCln, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{ielnksrch}|URL, hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}, In Quarantäne, [8d5025389aff1d194b662996db2851af]
PUP.Optional.Linkury.ShrtCln, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHURL|Default, hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}, In Quarantäne, [6d70a0bdfe9bd066a60cb70807fc5aa6]
PUP.Optional.DeskCut, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MOZILLA\EXTENDS|appid, deskCutv2@gmail.com, In Quarantäne, [ae2f93ca3b5e9b9bb3fd4292cc37e11f]
PUP.Optional.OutBrowse, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\OB|monitype1, 2/6/16 9:0:32, In Quarantäne, [00dd4f0e0f8ace68c202cd1f7e85bf41]
PUP.Optional.OutBrowse, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\OB|monitype2, 2/6/16 9:0:32, In Quarantäne, [6f6e56078b0e023423a1608ce51eb24e]
PUP.Optional.OutBrowse, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\OB|monitype6, 2/6/16 9:5:3, In Quarantäne, [fae371ecadec63d3edd722ca38cb57a9]
PUP.Optional.OutBrowse, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\OB|monitype15, 2/6/16 9:7:22, In Quarantäne, [f5e83b221a7f979fc400bf2d47bc5fa1]
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\{69684E3C-8CE0-46C2-b6ED-FAE033B0FCBD}|Name, C:\Program Files\groover060220160748\Niohp.exe, In Quarantäne, [bc2119440891979fecc021a154af8e72]
PUP.Optional.Groover.BrwsrFlsh, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\{CEFCE10C-2F90-41CB-b072-3CDB8C15F670}|Name, C:\Program Files\groover060220160459\Catpaul.exe, In Quarantäne, [ae2f0c51ecadc274adff1ba7897a60a0]
Registrierungsdaten: 12
PUP.Optional.Linkury.ShrtCln, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {ielnksrch}, Gut: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Schlecht: ({ielnksrch}),Ersetzt,[f4e94b12f1a8d1653dae20b7b94b4bb5]
PUP.Optional.Linkury.ShrtCln, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Search Page, hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}),Ersetzt,[06d77ae39108fb3b4b9a2cab6f951ee2]
PUP.Optional.Linkury.ShrtCln, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Search Bar, hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}),Ersetzt,[1bc2f96410891422fbea05d2669e46ba]
PUP.Optional.Linkury.ShrtCln, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|SearchAssistant, hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}),Ersetzt,[d904421b990076c0f4f18255c143e719]
PUP.Optional.Linkury.ShrtCln, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCH|Default_Search_URL, hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}, Gut: (www.google.com), Schlecht: (hxxp://%66%65%65%64.%73%6F%6E%69%63-%73%65%61%72%63%68.%63%6F%6D/?p=mKO_AwFzXIpYRaHdGKBHPjjgDVuEYkO0QwfNRcg9t9R_r7QSPrcYrbIoE8jRnjA6ws4b-w8U2N6G7Esn7Tu3eIhcPrjJ2bwMfRa1AtcsnqAOZh1LFW9w_ZtJNYlzhZ1UGHGLJWZiC_cvdZaWRIi4mITfpDtJCu8Gm1xYYF1CboEDnWYeHVjdBg847-6zllEa&q={searchTerms}),Ersetzt,[19c495c819803402d6118354ef1542be]
PUP.Optional.Linkury.ShrtCln, HKU\S-1-5-21-1235700998-711781633-2637323769-1000\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {ielnksrch}, Gut: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Schlecht: ({ielnksrch}),Ersetzt,[924b61fc099048eece1af0e72bd903fd]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{2A0CA051-E15A-4939-8D32-89D1DD26A106}|NameServer, 104.197.191.4, Gut: (), Schlecht: (104.197.191.4),Ersetzt,[12cbe6776138cc6a123bc11be222d52b]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{3E2E42D7-2E89-460C-B08E-350755D98225}|NameServer, 104.197.191.4, Gut: (), Schlecht: (104.197.191.4),Ersetzt,[dd002637cfcab87ec28b8f4dd62e0af6]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{846ee342-7039-11de-9d20-806e6f6e6963}|NameServer, 104.197.191.4, Gut: (), Schlecht: (104.197.191.4),Ersetzt,[fedf1449aeebe74f2825ce0e7f854eb2]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{98BE0671-7976-4BAF-8258-EFCCADA692A5}|NameServer, 104.197.191.4, Gut: (), Schlecht: (104.197.191.4),Ersetzt,[3da09dc04257a98d76d703d9ee16bc44]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{F95E4EC2-A13B-4F79-B08D-35254E8D4413}|NameServer, 104.197.191.4, Gut: (), Schlecht: (104.197.191.4),Ersetzt,[ce0fbba2871252e4440925b7eb190ff1]
Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{FDD3E933-4486-4DB4-AB7E-B2FD291C8D90}|NameServer, 104.197.191.4, Gut: (), Schlecht: (104.197.191.4),Ersetzt,[805d104d831692a4222b726a0ff5ed13]
Ordner: 17
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\03000200-1454749379-0500-0006-000700080009, In Quarantäne, [c61796c7e7b21224ef32626d3fc48e72],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71, Löschen bei Neustart, [e8f54e0f4b4e2d09e303b856fd072ad6],
PUP.Optional.MarketScore, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RelevantKnowledge, In Quarantäne, [cf0e0e4f1c7d58de9ab14a5fbe44e11f],
PUP.Optional.BrowserAir, C:\Users\Dom\AppData\Local\BrowserAir, In Quarantäne, [d20b302de2b72a0ca4cf8b2f679b08f8],
PUP.Optional.BrowserAir, C:\Users\Dom\AppData\Local\BrowserAir\47.0.0.4, In Quarantäne, [d20b302de2b72a0ca4cf8b2f679b08f8],
PUP.Optional.BrowserAir, C:\Users\Dom\AppData\Local\BrowserAir\Application, In Quarantäne, [d20b302de2b72a0ca4cf8b2f679b08f8],
PUP.Optional.MaxDriverUpdater, C:\Users\Dom\AppData\Local\Temp\MAXDriverUpdater, In Quarantäne, [a538530a08913105d97e408e5ea4db25],
PUP.Optional.MBot, C:\Users\Dom\AppData\Local\mbot_de_014010228, In Quarantäne, [439ab1ac514893a3bb9e507ea161ad53],
PUP.Optional.MBot, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MYBESTOFFERSTODAY, In Quarantäne, [a736afae1b7eb086afac8846f210ae52],
PUP.Optional.OneSoftPerDay, C:\Users\Dom\AppData\Local\ospd_us_013010228, In Quarantäne, [ab32a2bb2d6c092d14b3eee44ab8e41c],
PUP.Optional.OneSoftPerDay, C:\Users\Dom\AppData\Local\ospd_us_013010228\Download, In Quarantäne, [ab32a2bb2d6c092d14b3eee44ab8e41c],
PUP.Optional.OneSoftPerDay, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ONESOFTPERDAY, In Quarantäne, [16c775e885145adcc108a42ec53dfb05],
PUP.Optional.VBates, C:\Users\Dom\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}, In Quarantäne, [706d66f78d0c74c22633e6fbf70b827e],
PUP.Optional.VBates, C:\Users\Dom\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}, In Quarantäne, [706d66f78d0c74c22633e6fbf70b827e],
PUP.Optional.VBates, C:\Users\Dom\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5, In Quarantäne, [706d66f78d0c74c22633e6fbf70b827e],
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Dom\AppData\Local\bvxvbxxvaa, In Quarantäne, [904dd885c2d77db9ad4f05df5aa8c23e],
PUP.Optional.Linkury.ShrtCln, C:\ProgramData\ApplicationHosting, In Quarantäne, [f3ea6cf18f0a46f04f4be50055ad0ff1],
Dateien: 100
PUP.Optional.Cherimoya, C:\WINDOWS\SYSTEM32\drivers\cherimoya.sys, Löschen bei Neustart, [2fed22167820da74dd6ffd68f375166b],
Trojan.FilePatch.DNSApi, C:\Windows\System32\dnsapi.dll, Ersetzen bei Neustart, [6302a732e50d4e55c861c731404eb823],
Trojan.FilePatch.DNSApi, C:\Windows\SysWOW64\dnsapi.dll, Ersetzen bei Neustart, [259986ab2a2dac5f0f5a8a9abada0bdc],
CrackTool.Agent, C:\Program Files (x86)\AE CS6 Free Release\App\Ae\Support Files\amtlib.dll, In Quarantäne, [508d56076b2e49ed177fa69fb44ed42c],
PUP.Optional.APNToolBar, C:\Program Files (x86)\FreeTime\FormatFactory\FFModules\Package\Ask\AskPIP_FF_.exe, In Quarantäne, [7568f8657722300656aa85b03bc65da3],
PUP.Optional.Linkury, C:\ProgramData\Labtech\Kinotcof.exe, In Quarantäne, [d607ee6f673260d6315ea0376e93cc34],
PUP.Optional.Linkury.ShrtCln, C:\ProgramData\Labtech\Labtech.exe, In Quarantäne, [5786e8759009310529cd13bed130f709],
PUP.Optional.Linkury, C:\ProgramData\Labtech\Tonfax.exe, In Quarantäne, [8855d28b1b7ed165f0a109ce24ddc739],
Adware.EoRezo, C:\Users\Dom\AppData\Local\mbot_de_014010228\upmbot_de_014010228.exe, In Quarantäne, [8f4e08554059dd59aea8edda13ee3ec2],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LQA503O\2MZoQC[1], In Quarantäne, [d10c530a8c0d70c6cecc0e5c4cb62cd4],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LQA503O\dl[1].htm, In Quarantäne, [bb22075602979d9932fb083809f932ce],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LQA503O\tiwr[1].exe, In Quarantäne, [6c71b9a44a4f7fb78415b5b5ef1328d8],
PUP.Optional.SoundPlus, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LQA503O\maxdriverupdater-installer[1].exe, In Quarantäne, [b52897c631689f97ec3d6b7ca75ad32d],
Adware.EoRezo, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LQA503O\setup_ospd_us[1].exe, In Quarantäne, [c01dc796772276c03ddf418db05142be],
PUP.Optional.Amonetize, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LQA503O\install[1].exe, In Quarantäne, [cc11203d6c2d0d29400d63750cf53cc4],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LQA503O\VOPackage[1].exe, In Quarantäne, [e1fcdb823465c76f6298e207966b12ee],
PUP.Optional.PCSpeedUp, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0LQA503O\pcspeedup[1].exe, In Quarantäne, [0fceeb72a3f61e18fad241f888790af6],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LYQ2FJH\4efece5b5586ee29871717baacdf4c7b[1].exe, In Quarantäne, [d30a6bf29900a591be086bffaa58c739],
PUP.Optional.Conduit, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LYQ2FJH\OrbiterInstaller[1].exe, In Quarantäne, [e8f5510c31685cda21cd08c280806d93],
Adware.EoRezo, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LYQ2FJH\setup_gmsd_de[1].exe, In Quarantäne, [54892b327b1e75c19587eee08d74a45c],
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LYQ2FJH\Setup[1].exe, In Quarantäne, [0ad3035a2178bf7793da268de41d2ed2],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LYQ2FJH\SFSetup[1].exe, In Quarantäne, [aa330c515f3a9a9c18322e3932d0f808],
PUP.Optional.Amonetize, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LYQ2FJH\Bundle_FlowsurfCB[1].exe, In Quarantäne, [2cb1560791080d290d203412fa07cc34],
Adware.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LYQ2FJH\v8e19A[1].exe, In Quarantäne, [06d70756d8c1bf7748c212b740c441bf],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LYQ2FJH\vDzANM[1].exe, In Quarantäne, [dc012d306633ef47f80d5c061de5fb05],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ZP93A3F\fswr[1].exe, In Quarantäne, [a934b8a5d8c176c08c3c5f0b9072c63a],
PUP.Optional.MorePowerfulCleaner, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ZP93A3F\MPC_3.2.9127.0113[1].exe, In Quarantäne, [0fce47168f0adf57849747980ef30cf4],
Adware.Imali, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ZP93A3F\SilentInstaller_dotnet4[1].exe, In Quarantäne, [29b4a0bdfc9d3afcf10c4017748c956b],
Adware.MaxDriver, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ZP93A3F\SpaceSondPro[1].exe, In Quarantäne, [d30a1f3ef3a69c9acd7b46879371c13f],
PUP.Optional.OutBrowse, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ZP93A3F\SPGeneric_2711[1].exe, In Quarantäne, [c81567f6f8a1ab8bc83923b81de3f30d],
PUP.Optional.SoundPlus, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YAI22RFX\soundplus-installer[1].exe, In Quarantäne, [f0ed2d30742520166ebb8c5ba9588977],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YAI22RFX\JOSrv[1].exe, In Quarantäne, [af2ec895d0c976c0fa0dcc96c2402cd4],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YAI22RFX\prepreinstaller_win[1].exe, In Quarantäne, [aa338fcec1d8c373986840a4c140ba46],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YAI22RFX\SearchUpdater[1].exe, In Quarantäne, [637a5b02465363d32e964488f311b44c],
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YAI22RFX\Stub[1].exe, In Quarantäne, [617cf36a6a2f9f97f07e575c2bd6ae52],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YAI22RFX\SU_Srv[1].exe, In Quarantäne, [78657edf0e8b8da907b0b627e21f38c8],
Adware.EoRezo, C:\Users\Dom\AppData\Local\ospd_us_013010228\upospd_us_013010228.exe, In Quarantäne, [fae383da821747ef98be8d3aaa57669a],
PUP.Optional.SoundPlusPro, C:\Users\Dom\AppData\Local\ospd_us_013010228\Download\wizzupdater.exe, In Quarantäne, [a83518450f8abf77f81b9bbf669afc04],
Trojan.Agent.VB, C:\Users\Dom\AppData\Local\Temp\setup2.exe, In Quarantäne, [8f4e8fce38616fc773d07a4c8b76847c],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Temp\nsa257F.tmp, In Quarantäne, [ab32bca1dcbda98d31fcfb450bf705fb],
PUP.Optional.CSDI, C:\Users\Dom\AppData\Local\Temp\F6NANSJSHY.exe, In Quarantäne, [a835d48905943afc1ce8d12d857fb749],
Trojan.Jaik, C:\Users\Dom\AppData\Local\Temp\Font__7226_il285200.exe, In Quarantäne, [1ebfe27bdabfe155e1180edc39c83dc3],
PUP.Optional.Wajam, C:\Users\Dom\AppData\Local\Temp\WWE_1.60.101.36.exe, In Quarantäne, [4d90fb627425a492801ec93419eb2cd4],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Temp\nsg483A.tmp, In Quarantäne, [1ac3d08dabee8fa768c52a16d032e719],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Temp\nsh629A.tmp, In Quarantäne, [27b6adb02772f541c7289b397c850000],
PUP.Optional.Amonetize, C:\Users\Dom\AppData\Local\Temp\nsw4AF5.tmp, In Quarantäne, [815c025bfd9c3006ab823313d32e06fa],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\Temp\nsw6407.tmp, In Quarantäne, [a63770ed3b5e46f0eab0e6844db58a76],
PUP.Optional.MorePowerfulCleaner, C:\Users\Dom\AppData\Local\Temp\nswEC82.tmp, In Quarantäne, [4e8f8ad360394de9ca51538c8978dd23],
Adware.ConvertAd, C:\Users\Dom\AppData\Local\Temp\nsx3448.tmp, In Quarantäne, [8855cb92c9d0db5be40e9a501de4fa06],
PUP.Optional.RelevantKnowledge, C:\Users\Dom\AppData\Local\Temp\rkinstaller.exe, In Quarantäne, [dffe530a2a6f5fd731f111d8d92bdb25],
PUP.Optional.RelevantKnowledge, C:\Users\Dom\AppData\Local\Temp\rkverify.exe, In Quarantäne, [8b52ce8f1e7bbf77ab6dc81afb09639d],
PUP.Optional.SearchProtect.AppFlsh, C:\Users\Dom\AppData\Local\Temp\nsb5565.tmp\SPTool.dll, In Quarantäne, [f8e560fd366349edb0bd0da66f9234cc],
PUP.Optional.SoundPlusPro, C:\Users\Dom\AppData\Local\Temp\509U9Y9QHU\testnextversion.exe, In Quarantäne, [7d602b321584df57a76c8bcfc83812ee],
PUP.Optional.SoundPlusPro, C:\Users\Dom\AppData\Local\Temp\Z0W6CRNOT0\testversion.exe, In Quarantäne, [a835f865702988ae14ff55059a6629d7],
Trojan.Jaik, C:\Users\Dom\AppData\Local\Temp\RarSFX0\keygen__7516_il735365.exe, In Quarantäne, [7e5f83dadebb83b33cbd38b2db26b34d],
HackTool.CheatEngine, C:\Users\Dom\Desktop\Games\Dying_Light\Dying Light V1.2.0 Trainer +12 MrAntiFun.EXE, In Quarantäne, [09d454098f0aeb4b21bb5cccf40c56aa],
PUP.Optional.InstallCore, C:\Users\Dom\Desktop\Games\Dying_Light\setup.exe, In Quarantäne, [1bc244197821d06697ebde7d2fd205fb],
RiskWare.Injector.DC, C:\Users\Dom\Desktop\Backups\RiptideMenu1.31.rar, In Quarantäne, [9d4015480f8a4cea84b249e17e83eb15],
PUP.Optional.RelevantKnowledge, C:\Windows\System32\rlls64.dll, In Quarantäne, [6a7365f8d7c274c245dd7d6c63a1ce32],
PUP.Optional.RelevantKnowledge, C:\Windows\SysWOW64\rlls.dll, In Quarantäne, [d10c6bf2851455e10a185891ff05fa06],
Trojan.Agent, C:\Windows\SysWOW64\rlls.dll, In Quarantäne, [77660d501c7d7fb7c20ab883c241728e],
Trojan.Agent, C:\Users\Dom\AppData\Local\Temp\rkinstaller.exe, In Quarantäne, [657868f557425dd9362594ad1de65ca4],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\03000200-1454749379-0500-0006-000700080009\Uninstall.exe, In Quarantäne, [c61796c7e7b21224ef32626d3fc48e72],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\03000200-1454749379-0500-0006-000700080009\pnsuCD93.exe, In Quarantäne, [c61796c7e7b21224ef32626d3fc48e72],
PUP.Optional.ConvertAd, C:\Users\Dom\AppData\Local\03000200-1454749379-0500-0006-000700080009\rnsuCD91.exe, In Quarantäne, [c61796c7e7b21224ef32626d3fc48e72],
PUP.Optional.Linkury.Gen, C:\Windows\SysWOW64\findit.xml, In Quarantäne, [924b37266c2d38fe3b424a9980834db3],
PUP.Optional.MyBrowser, C:\Windows\System32\Tasks\IBUpd, In Quarantäne, [835aa7b61287b383e99c45c7bb492dd3],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\dwm.exe, Löschen bei Neustart, [e8f54e0f4b4e2d09e303b856fd072ad6],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\libcurl-4.dl1, Löschen bei Neustart, [e8f54e0f4b4e2d09e303b856fd072ad6],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\libiconv-2.dl1, Löschen bei Neustart, [e8f54e0f4b4e2d09e303b856fd072ad6],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\libidn-11.dl1, Löschen bei Neustart, [e8f54e0f4b4e2d09e303b856fd072ad6],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\libintl-8.dl1, Löschen bei Neustart, [e8f54e0f4b4e2d09e303b856fd072ad6],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\libwinpthread-1.dl1, Löschen bei Neustart, [e8f54e0f4b4e2d09e303b856fd072ad6],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\msupdate.7z, In Quarantäne, [e8f54e0f4b4e2d09e303b856fd072ad6],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\msvcrt.dll, In Quarantäne, [e8f54e0f4b4e2d09e303b856fd072ad6],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\proxy.conf, In Quarantäne, [e8f54e0f4b4e2d09e303b856fd072ad6],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\msupdate71\zlib1.dl1, Löschen bei Neustart, [e8f54e0f4b4e2d09e303b856fd072ad6],
PUP.Optional.VBates.WnskRST, C:\Users\Dom\AppData\Local\Temp\groover060220160748_installer_1454745718.txt, In Quarantäne, [3ba28ad34d4ccf6715be4eeee024b24e],
PUP.Optional.SearchProtect.AppFlsh, C:\Windows\System32\Tasks\bvxvbxxvaa, In Quarantäne, [b7264e0f2772e155c95a0e346f950df3],
PUP.Optional.MyBrowser, C:\Windows\System32\Tasks\IBUpd2, In Quarantäne, [12cb97c6cacf74c21d939ab0f41046ba],
Trojan.FakeAlert, C:\Users\Dom\AppData\Local\Temp\Z0W6CRNOT0\testversion.exe, In Quarantäne, [e1fcb6a720799c9a3c2a084658acc33d],
PUP.Optional.MarketScore, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RelevantKnowledge\About RelevantKnowledge.lnk, In Quarantäne, [cf0e0e4f1c7d58de9ab14a5fbe44e11f],
PUP.Optional.MarketScore, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RelevantKnowledge\Member of GRID - Goodware Repository Information Database.lnk, In Quarantäne, [cf0e0e4f1c7d58de9ab14a5fbe44e11f],
PUP.Optional.MarketScore, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RelevantKnowledge\Privacy Policy and User License Agreement.lnk, In Quarantäne, [cf0e0e4f1c7d58de9ab14a5fbe44e11f],
PUP.Optional.MarketScore, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RelevantKnowledge\Support.lnk, In Quarantäne, [cf0e0e4f1c7d58de9ab14a5fbe44e11f],
PUP.Optional.MarketScore, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RelevantKnowledge\Uninstall Instructions.lnk, In Quarantäne, [cf0e0e4f1c7d58de9ab14a5fbe44e11f],
PUP.Optional.BrowserAir, C:\Users\Dom\AppData\Local\BrowserAir\Application\unins000.dat, In Quarantäne, [d20b302de2b72a0ca4cf8b2f679b08f8],
PUP.Optional.BrowserAir, C:\Users\Dom\AppData\Local\BrowserAir\Application\unins000.exe, In Quarantäne, [d20b302de2b72a0ca4cf8b2f679b08f8],
PUP.Optional.MBot, C:\Users\Dom\AppData\Local\mbot_de_014010228\upmbot_de_014010228.exe, In Quarantäne, [439ab1ac514893a3bb9e507ea161ad53],
PUP.Optional.MBot, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\MYBESTOFFERSTODAY\MyBestOffersToday.lnk, In Quarantäne, [a736afae1b7eb086afac8846f210ae52],
PUP.Optional.OneSoftPerDay, C:\Users\Dom\AppData\Local\ospd_us_013010228\upospd_us_013010228.exe, In Quarantäne, [ab32a2bb2d6c092d14b3eee44ab8e41c],
PUP.Optional.OneSoftPerDay, C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ONESOFTPERDAY\Onesoftperday.lnk, In Quarantäne, [16c775e885145adcc108a42ec53dfb05],
PUP.Optional.VBates, C:\Users\Dom\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\config.js, In Quarantäne, [706d66f78d0c74c22633e6fbf70b827e],
PUP.Optional.VBates, C:\Users\Dom\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\tree.js, In Quarantäne, [706d66f78d0c74c22633e6fbf70b827e],
PUP.Optional.VBates, C:\Users\Dom\AppData\LocalLow\{D2020D47-707D-4E26-B4D9-739C4F4C2E9A}\{FBC0652C-7B29-4FB6-8ADA-91F54B267AD4}\1.5\wlist.js, In Quarantäne, [706d66f78d0c74c22633e6fbf70b827e],
PUP.Optional.Linkury.ShrtCln, C:\ProgramData\ApplicationHosting\ApplicationHosting.exe, In Quarantäne, [f3ea6cf18f0a46f04f4be50055ad0ff1],
PUP.Optional.MorePowerfulCleaner, C:\Users\Dom\AppData\Roaming\Mozilla\Firefox\Profiles\b30g5a7z.default\prefs.js, Gut: (), Schlecht: (user_pref("browser.search.searchengine.iconURL", "hxxp://download.mpc.am/mpc/www/mpc.ico");), Ersetzt,[deff035a8a0fe1554898ea1b26dfee12]
PUP.Optional.MorePowerfulCleaner, C:\Users\Dom\AppData\Roaming\Mozilla\Firefox\Profiles\b30g5a7z.default\prefs.js, Gut: (), Schlecht: (ef("accessibility.typeaheadfind.flashBar", 0);
user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1454720293)), Ersetzt,[0ad3411c2f6a2f07598791746b9afa06]
PUP.Optional.MorePowerfulCleaner, C:\Users\Dom\AppData\Roaming\Mozilla\Firefox\Profiles\b30g5a7z.default\prefs.js, Gut: (), Schlecht: (user_pref("browser.search.searchengine.name", "MPC Safe Search ");), Ersetzt,[0bd22835227764d2a938ac59a85db34d]
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\fem\rik\ulivj.dat, In Quarantäne, [7a63db82b3e6221434b3e41ce124bd43],
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\qoa\cyn\pinmo.dat, In Quarantäne, [f9e4bda04950f640ae3999670005a15f],
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\seg\mik\govmo.dat, In Quarantäne, [cc11ee6f930693a350976f91aa5b2cd4],
Physische Sektoren: 0
(keine bösartigen Elemente erkannt)
(end) |