ops sry, da war ich wohl zu schnell Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlaufdatum: 23.09.2016
Suchlaufzeit: 12:53
Protokolldatei: mbam.txt
Administrator: Ja
Version: 2.2.1.1043
Malware-Datenbank: v2016.09.23.05
Rootkit-Datenbank: v2016.08.15.01
Lizenz: Testversion
Malware-Schutz: Aktiviert
Schutz vor bösartigen Websites: Aktiviert
Selbstschutz: Deaktiviert
Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: Werkstatt1
Suchlauftyp: Bedrohungssuchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 414094
Abgelaufene Zeit: 12 Min., 50 Sek.
Speicher: Aktiviert
Start: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Aktiviert
Heuristik: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 3
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\Roaming\Jubidyimf\Jubidyimf.exe, 1820, Löschen bei Neustart, [0889571ecdcd61d58e5bf0e99e63bc44]
PUP.Optional.VBates.WnskRST, C:\Users\Werkstatt1\AppData\Roaming\Jubidyimf\Igucce.exe, 2980, Löschen bei Neustart, [ccc5e590e3b7e94d31bdc61419e89e62]
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\Roaming\Jubidyimf\Tovso.exe, 2992, Löschen bei Neustart, [3f52db9a9901af877d6cd208748d728e]
Module: 1
PUP.Optional.VBates.WnskRST, C:\Users\Werkstatt1\AppData\Roaming\Jubidyimf\Igucce.dll, Löschen bei Neustart, [eaa762138218999d09e4bf1be918966a],
Registrierungsschlüssel: 12
PUP.Optional.VBates, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Jamcuojpa, In Quarantäne, [0889571ecdcd61d58e5bf0e99e63bc44],
PUP.Optional.CornerSunshine, HKLM\SOFTWARE\CLIENTS\Corner Sunshine, In Quarantäne, [eba692e39a0038fec9fe9a44bb4908f8],
PUP.Optional.WizzCaster, HKLM\SOFTWARE\MICROSOFT\TRACING\wizzcaster_RASAPI32, In Quarantäne, [7b164233faa0072ff813d42ad3300cf4],
PUP.Optional.WizzCaster, HKLM\SOFTWARE\MICROSOFT\TRACING\wizzcaster_RASMANCS, In Quarantäne, [8d04f97c1882e74f838836c84eb5dc24],
PUP.Optional.Ghokswa.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{6E4C0A65-FCBA-4303-88F5-82435F946ACE}, Löschen bei Neustart, [a6ebb5c04d4d54e2f2dee21524df7090],
PUP.Optional.Ghokswa, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{D4665332-7A61-47B3-80E6-7894D6BBB76C}, Löschen bei Neustart, [bad7b7bed0ca3ef8faed9f17f11325db],
PUP.Optional.Ghokswa, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{F930CCD0-60DD-4265-9EB7-B124951257AC}, Löschen bei Neustart, [f1a00a6b2476320487600ea815efa35d],
PUP.Optional.Ghokswa, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\ceQeekgBrowserUpdateCore, Löschen bei Neustart, [c0d187eec2d8ed4920c82f874eb6db25],
PUP.Optional.Ghokswa, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\ceQeekgBrowserUpdateUA, Löschen bei Neustart, [95fc2b4a3a60dd59e107e9cd709402fe],
PUP.Optional.Ghokswa.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\ceQeekgCheckTask, Löschen bei Neustart, [ddb4086d930790a6933e81760bf8a858],
PUP.Optional.YesSearches.YSSRHS1, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}, In Quarantäne, [c5cc3d385b3fc274c6486742a95b639d],
PUP.Optional.CornerSunshine, HKLM\SOFTWARE\WOW6432NODE\CLIENTS\Corner Sunshine, In Quarantäne, [2a67f283178340f6487f39a5c04457a9],
Registrierungswerte: 9
PUP.Optional.Ghokswa.Gen, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{6E4C0A65-FCBA-4303-88F5-82435F946ACE}|Path, \ceQeekgCheckTask, Löschen bei Neustart, [a6ebb5c04d4d54e2f2dee21524df7090]
PUP.Optional.Ghokswa, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{D4665332-7A61-47B3-80E6-7894D6BBB76C}|Path, \ceQeekgBrowserUpdateCore, Löschen bei Neustart, [bad7b7bed0ca3ef8faed9f17f11325db]
PUP.Optional.Ghokswa, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{F930CCD0-60DD-4265-9EB7-B124951257AC}|Path, \ceQeekgBrowserUpdateUA, Löschen bei Neustart, [f1a00a6b2476320487600ea815efa35d]
PUP.Optional.YesSearches.YSSRHS1, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|hp, hxxp://www.yessearches.com/?ts=AHEpBnYqCH8tA0..&v=20160301&uid=C1A4413EFB1295D104F951B520FD32A7&ptid=ism&mode=ffsengext, In Quarantäne, [c5cc3d385b3fc274c6486742a95b639d]
PUP.Optional.YesSearches.YSSRHS1, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|tab, hxxp://www.yessearches.com/?ts=AHEpBnYqCH8tA0..&v=20160301&uid=C1A4413EFB1295D104F951B520FD32A7&ptid=ism&mode=ffsengext, In Quarantäne, [2d64a4d1861439fd9b731198bc4819e7]
PUP.Optional.YesSearches.YSSRHS1, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|sp, hxxp://www.yessearches.com/chrome.php?uid=C1A4413EFB1295D104F951B520FD32A7&ptid=ism&q={searchTerms}&ts=AHEpBnYqCH8tA0..&v=20160301&mode=ffsengext, In Quarantäne, [840d1d588614b77f5faf6445ec1842be]
PUP.Optional.YesSearches.YSSRHS1, HKLM\SOFTWARE\MOZILLA\FIREFOX\{EB52F1AB-3C2B-424F-9794-833C687025CF}|surl, hxxp://www.yessearches.com/chrome.php?uid=C1A4413EFB1295D104F951B520FD32A7&ptid=ism&ts=AHEpBnYqCH8tA0..&v=20160301&mode=ffexttoolbar&q=, In Quarantäne, [7b16b0c57b1f2511729cf4b5887cb749]
PUP.Optional.LuckyBrowse, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{D5B598AF-369D-47A3-931D-CF6F1EDE8D75}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\Program Files (x86)\LuckyBrowse\app\LuckyBrowse.exe|Name=LuckyBrowse|, In Quarantäne, [21708ce9eeac2c0ac089c22b0cf7669a]
PUP.Optional.LuckyBrowse, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{41937FEF-9C11-46F7-9AA6-05ABA07D0203}, v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\Program Files (x86)\LuckyBrowse\app\LuckyBrowse.exe|Name=LuckyBrowse|, In Quarantäne, [50411065118962d4d4759b52f70c3dc3]
Registrierungsdaten: 2
PUP.Optional.Qone8, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Gut: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Schlecht: ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Ersetzt,[f0a1b9bc7b1f5adc8a3d354153b17b85]
PUP.Optional.Qone8, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {33BB0A4E-99AF-4226-BDF6-49120163DE86}, Gut: ({0633EE93-D776-472f-A0FF-E1416B8B2E3A}), Schlecht: ({33BB0A4E-99AF-4226-BDF6-49120163DE86}),Ersetzt,[652c96df8a102a0c586f7303e81c9769]
Ordner: 18
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\LocalLow\Company\Product\1.0, In Quarantäne, [20712f46b4e659ddd46c03c1fd0615eb],
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\LocalLow\Company\Product, In Quarantäne, [20712f46b4e659ddd46c03c1fd0615eb],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.IDSCProduct, C:\Program Files\SpaceSoundPro, In Quarantäne, [f1a0185d386271c5ac1d9631dc26659b],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow0039CF98, In Quarantäne, [048d294c0e8cb3832ac3b513e51d946c],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow003E0C98, In Quarantäne, [7918195c5e3cbe78c32aecdce61cf50b],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00530DE0, In Quarantäne, [cdc4aec72d6dd462e40918b0ca38ff01],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow005888E0, In Quarantäne, [c0d1383dc0da5bdb5f8e527662a0649c],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow005A67A8, In Quarantäne, [7a1714615149ac8a1fce0dbbde249868],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow007E3520, In Quarantäne, [662b3c391b7f25113eafeeda649e619f],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow007E77E8, In Quarantäne, [60313f3651495ed88e5f09bf659d6c94],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00825628, In Quarantäne, [632eb9bc168437ff27c67c4c956d52ae],
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\LocalLow007CB440, In Quarantäne, [e8a9462f504a54e2d815b81050b2f40c],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow0000000000183498, In Quarantäne, [454cc4b1009a3bfbd61801c7956dbf41],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00000000002A6098, In Quarantäne, [99f8bbbad3c7a4927975e7e15ea4857b],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00000000003DC998, In Quarantäne, [e2af9fd60397de586d818d3b62a018e8],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00000000003F2AA8, In Quarantäne, [632ed4a1495170c62dc1ecdc649ec040],
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\LocalLow0000000000433D98, In Quarantäne, [bdd4b2c3c5d549ed7975b7117e8431cf],
Dateien: 122
Trojan.FilePatch.DNSApi, C:\Windows\System32\dnsapi.dll, Ersetzen bei Neustart, [d62a429b5ad34bd12ba1b2d204459757],
Trojan.FilePatch.DNSApi, C:\Windows\SysWOW64\dnsapi.dll, Ersetzen bei Neustart, [3a5c78358c1d4e313c076720a151ce9e],
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\Roaming\Jubidyimf\Jubidyimf.exe, Löschen bei Neustart, [0889571ecdcd61d58e5bf0e99e63bc44],
PUP.Optional.VBates.WnskRST, C:\Users\Werkstatt1\AppData\Roaming\Jubidyimf\Igucce.exe, Löschen bei Neustart, [ccc5e590e3b7e94d31bdc61419e89e62],
PUP.Optional.VBates.WnskRST, C:\Users\Werkstatt1\AppData\Roaming\Jubidyimf\Igucce.dll, Löschen bei Neustart, [eaa762138218999d09e4bf1be918966a],
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\Roaming\Jubidyimf\Tovso.exe, Löschen bei Neustart, [3f52db9a9901af877d6cd208748d728e],
PUP.Optional.VBates.WnskRST, C:\Users\Werkstatt1\AppData\Roaming\Jubidyimf\Tovso.dll, Löschen bei Neustart, [8c05f3826832c96df5f70fcb629fd030],
PUP.Optional.Tuto4PC, C:\Program Files\SpaceSoundPro\uninstaller.exe, In Quarantäne, [325f78fd762459dd4c4e796f0400cb35],
PUP.Optional.Tuto4PC, C:\Program Files\SpaceSoundPro\UninstallerCaster.exe, In Quarantäne, [167bfe77eab00f27e8b28761e0242bd5],
PUP.Optional.Tuto4PC, C:\Users\Werkstatt1\AppData\Local\Temp\meH6UUWj2T.exe, In Quarantäne, [fc958ce9efab91a51f7bdc0c12f2738d],
PUP.Optional.PennyBee, C:\Users\Werkstatt1\AppData\Local\Temp\HsCK0PHzvp.exe, In Quarantäne, [335e175eb6e4270faa76f38421e0847c],
Trojan.Agent, C:\Users\Werkstatt1\AppData\Local\Temp\I1zkGZNVVD.exe, In Quarantäne, [1978e88d4159e15547c28a1b11f01ce4],
PUP.Optional.CheckOffer, C:\Users\Werkstatt1\AppData\Local\Temp\InstallMonetizer.exe, In Quarantäne, [523f63128f0b171feb07a566b34e2dd3],
PUP.Optional.Amonetize, C:\Users\Werkstatt1\AppData\Local\Temp\sdf30AB.exe, In Quarantäne, [c3cec6afabefb581a447dfedf60b857b],
PUP.Optional.Amonetize, C:\Users\Werkstatt1\AppData\Local\Temp\sdf5149.exe, In Quarantäne, [4e43264f4456e74f72796d5f09f808f8],
PUP.Optional.Tuto4PC, C:\Users\Werkstatt1\AppData\Local\Temp\NQZDP0LMX7.exe, In Quarantäne, [236e3d3864367abcf895698706fe14ec],
PUP.Optional.PCSpeedUp, C:\Users\Werkstatt1\AppData\Local\Temp\jAZodt5nCd.exe, In Quarantäne, [cac7482d871365d148961616d22f1ce4],
PUP.Optional.IDSCProduct, C:\Users\Werkstatt1\AppData\Local\Temp\MTIB0B1CJI.exe, In Quarantäne, [fa9725509604df57f418164c5ba93dc3],
Trojan.Agent, C:\Users\Werkstatt1\AppData\Local\Temp\lAmcIc1ktp.exe, In Quarantäne, [266b0c69366465d118b506c659ab9f61],
PUP.Optional.Tuto4PC, C:\Users\Werkstatt1\AppData\Local\Temp\B7PTNE6Y7V\testnextversion.exe, In Quarantäne, [266b0471a5f51e18c4c9ea06a95b3ac6],
PUP.Optional.CheckOffer, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\nsCBHTML5.dll, In Quarantäne, [6130cfa63f5b2c0a2bc78f7c27da6799],
PUP.Optional.EoRezo.Generic, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\setup_dpcc_en.exe, In Quarantäne, [098823523268d462682e11b300017b85],
PUP.Optional.Wajam, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\wajam_install.exe, In Quarantäne, [7120b1c4d1c90a2cd99d9a11a55cee12],
Adware.Qksee, C:\Users\Werkstatt1\AppData\Local\Temp\ist297C.tmp\qkseeSvc.exe, In Quarantäne, [1f72373e7c1e44f2994da3bb51af8d73],
PUP.Optional.Ghokswa, C:\Users\Werkstatt1\AppData\Local\Temp\ist53D5.tmp\tools\chdod.exe, In Quarantäne, [c0d17ff6e4b6d2643d96753662a2669a],
Spyware.PasswordStealer, C:\Users\Werkstatt1\AppData\Local\Temp\ist53D5.tmp\tools\qksee\qkseeSvc.exe, In Quarantäne, [dcb5e4918c0e072f3f79d001eb1956aa],
PUP.Optional.Ghokswa, C:\Users\Werkstatt1\AppData\Local\Temp\ist5B3F.tmp\tools\chdada.exe, In Quarantäne, [236e86ef6a30e74f15beaa01f1135ea2],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\ist90B6.tmp\dzkcmjw.exe, In Quarantäne, [6130b7be9cfeea4cfc4b5a997391af51],
PUP.Optional.Ghokswa, C:\Users\Werkstatt1\AppData\Local\Temp\ist90B6.tmp\tools\chr.exe, In Quarantäne, [cac7383d4e4c1125647b545758ac956b],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\ist90B6.tmp\tools\Exnvd.exe, In Quarantäne, [ff92fd788d0d4beb2a1dfcf7857f38c8],
Trojan.Downloader, C:\Users\Werkstatt1\AppData\Local\Temp\ist9A0D.tmp\tools\saber.exe, In Quarantäne, [9bf61d58c4d690a6156ed411f410be42],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\ist9A0D.tmp\tools\yaczjf.exe, In Quarantäne, [dab7274ecccee1550a1cd2186e93da26],
Adware.Ghokswa.Generic, C:\Users\Werkstatt1\AppData\Local\Temp\istF21D.tmp\tools\chxzq.exe, In Quarantäne, [e7aaf87d6c2ec571484eddfc3bc9cb35],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF21D.tmp\tools\nnvvdd.exe, In Quarantäne, [ff923a3b8a10c373a383c2285fa29868],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF21D.tmp\tools\qksee\myuser.exe, In Quarantäne, [bfd29dd89ffb96a05fc705e5d32e6c94],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF21E.tmp\box.exe, In Quarantäne, [c7ca462f2773072fd77007eccf3551af],
Trojan.AdLoad.CN, C:\Users\Werkstatt1\AppData\Local\Temp\istF21E.tmp\tools\ch.exe, In Quarantäne, [e0b1a9cc7d1d35011a39cff2d82cee12],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF21E.tmp\tools\yacjg.exe, In Quarantäne, [4a477afba5f50d291631b2417a8afd03],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF3F1.tmp\tools\qksee\qkdl.exe, In Quarantäne, [89087302b3e7ce68631ea82a0cf551af],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF3F1.tmp\tools\qksee\qkdup.exe, In Quarantäne, [98f9462f2b6f46f0dda4af23a85901ff],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF3F1.tmp\tools\qksee\qksee.exe, In Quarantäne, [7819caab4456ff3784fd4e8439c8e020],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF3F1.tmp\tools\qksee\qkseeSvc.exe, In Quarantäne, [6031adc87d1d45f1dea3bd15897805fb],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF3F1.tmp\tools\qksee\uninstall.exe, In Quarantäne, [d9b84035bedcff37dfa2825056ab0ef2],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF9CD.tmp\boxffch.exe, In Quarantäne, [d8b9c1b4f3a7ec4a7ffdc7de35cf13ed],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF9CD.tmp\tools\fflike.exe, In Quarantäne, [7f121a5b0c8e0c2afc86525333d1e818],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istF9CD.tmp\tools\midnvd.exe, In Quarantäne, [1081b5c0cdcd999d0c3b866db05408f8],
Adware.Qksee, C:\Users\Werkstatt1\AppData\Local\Temp\istFBB2.tmp\qksee\qkseeSvc.exe, In Quarantäne, [3c5501744e4ca393994d28362bd5c838],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istFD19.tmp\dzkcmjw.exe, In Quarantäne, [e5ac91e481199d9986c1a053c63e09f7],
PUP.Optional.Elex, C:\Users\Werkstatt1\AppData\Local\Temp\istFD19.tmp\tools\Exnvd.exe, In Quarantäne, [cbc6660f82188babe463c13245bf7d83],
PUP.Optional.Tuto4PC, C:\Users\Werkstatt1\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\adv_229.exe, In Quarantäne, [bad73e3752486cca277334b40400b24e],
PUP.Optional.Offerware, C:\Users\Werkstatt1\AppData\Local\Temp\f9626892-7a78-3199-abd2-97bbce96297b\Extracted\adv_109.exe, In Quarantäne, [e0b1e78e8f0bec4a3076a0e8e51c718f],
PUP.Optional.Tuto4PC, C:\Users\Werkstatt1\AppData\Local\Temp\TZRWVV37KX\advance.exe, In Quarantäne, [e4adbdb85446082e1974c52bbd474db3],
PUP.Optional.Tuto4PC, C:\Users\Werkstatt1\AppData\Local\Temp\YOR2BIVIQ1\advance.exe, In Quarantäne, [840dbcb9acee3df9325b767afc08e61a],
PUP.Optional.Tuto4PC, C:\Users\Werkstatt1\AppData\Local\Temp\YOR2BIVIQ1\win.exe, In Quarantäne, [692890e5069483b32b6202ee37cd58a8],
Adware.PennyBee.WnskRST, C:\Windows\Temp\bobca\Cofdiri.din, In Quarantäne, [355c314445554aecffe3664c0ef3ee12],
Trojan.Addrop, C:\Windows\Temp\bobca\Fiuhpa.exe, In Quarantäne, [bbd63c39debc90a6c20447990001768a],
PUP.Optional.Elex, C:\Windows\Temp\ist3EA0.tmp\tools\qks.exe, In Quarantäne, [8b06d89dc6d41d192ef88d5d6998fb05],
PUP.Optional.Elex, C:\Windows\Temp\ist5240.tmp\tools\qks.exe, In Quarantäne, [0c85690cd6c4d2640f17e00a54adb848],
PUP.Optional.Elex, C:\Windows\Temp\istCAE1.tmp\tools\qks.exe, In Quarantäne, [345dfa7b524864d21b0b03e7b44dd12f],
PUP.Optional.Elex, C:\Windows\Temp\istDC9C.tmp\tools\qks.exe, In Quarantäne, [6829fb7a7921e254998d18d222df17e9],
PUP.Optional.PCKeeper, C:\Users\Werkstatt1\Downloads\PCKeeper Installer.exe, In Quarantäne, [385974019dfd8caa096e6e24d62e45bb],
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, In Quarantäne, [20712f46b4e659ddd46c03c1fd0615eb],
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, In Quarantäne, [20712f46b4e659ddd46c03c1fd0615eb],
PUP.Optional.Elex, C:\Program Files (x86)\SSFK.exe, In Quarantäne, [5f3279fc1b7f6ec8380ec5217a898977],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\OfferScreen_576.html, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\Offer3.zip, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\blowfish.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\ComputerUpdaterSetupIM.exe, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\FirstResult.txt, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\GetVersion.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\header.bmp, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\inner.png, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\installog.txt, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\logoWajam.png, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\manlib.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\Math.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\nsDialogs.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\nsExec.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\nsisunz.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\Offer1.zip, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\Offer2.zip, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\Offer4.zip, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\Offer5.zip, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\OfferScreen_38.html, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\OfferScreen_600.html, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\OfferScreen_735.html, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\OfferScreen_744.html, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\registry.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\response.txt, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\SecondResult.txt, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\serlib.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\System.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.OfferScreen, C:\Users\Werkstatt1\AppData\Local\Temp\nstF160.tmp\UserInfo.dll, In Quarantäne, [b6dbb0c55a40b680ddd59a59fc079b65],
PUP.Optional.Ghokswa.Gen, C:\Windows\System32\Tasks\ceQeekgCheckTask, In Quarantäne, [9ff2de978812ae885677c63107fc04fc],
PUP.Optional.NiceSearches, C:\Users\Werkstatt1\AppData\Roaming\Mozilla\Firefox\Profiles\pnhghcex.default\searchplugins\nice-.xml, In Quarantäne, [3f52195c267453e3c372e714cb383fc1],
PUP.Optional.Ghokswa, C:\Windows\System32\Tasks\ceQeekgBrowserUpdateCore, In Quarantäne, [bdd40570009a5fd724c5b6001ce832ce],
PUP.Optional.Ghokswa, C:\Windows\System32\Tasks\ceQeekgBrowserUpdateUA, In Quarantäne, [96fb77fedfbb89ad6485a80e35cf9e62],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow0039CF98\00356C70, In Quarantäne, [048d294c0e8cb3832ac3b513e51d946c],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow003E0C98\00376C70, In Quarantäne, [7918195c5e3cbe78c32aecdce61cf50b],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00530DE0\004E6C38, In Quarantäne, [cdc4aec72d6dd462e40918b0ca38ff01],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow005888E0\00536C38, In Quarantäne, [c0d1383dc0da5bdb5f8e527662a0649c],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow005A67A8\00546CE0, In Quarantäne, [7a1714615149ac8a1fce0dbbde249868],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow007E3520\00786C70, In Quarantäne, [662b3c391b7f25113eafeeda649e619f],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow007E77E8\007A6C70, In Quarantäne, [60313f3651495ed88e5f09bf659d6c94],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00825628\007C6C70, In Quarantäne, [632eb9bc168437ff27c67c4c956d52ae],
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\LocalLow007CB440\00796C70, In Quarantäne, [e8a9462f504a54e2d815b81050b2f40c],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow0000000000183498\0000000000166308, In Quarantäne, [454cc4b1009a3bfbd61801c7956dbf41],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00000000002A6098\00000000002AADF8, In Quarantäne, [99f8bbbad3c7a4927975e7e15ea4857b],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00000000003DC998\00000000003C6308, In Quarantäne, [e2af9fd60397de586d818d3b62a018e8],
PUP.Optional.VBates, C:\Users\Alle\AppData\LocalLow00000000003F2AA8\00000000003D6308, In Quarantäne, [632ed4a1495170c62dc1ecdc649ec040],
PUP.Optional.VBates, C:\Users\Werkstatt1\AppData\LocalLow0000000000433D98\00000000003F5B08, In Quarantäne, [bdd4b2c3c5d549ed7975b7117e8431cf],
PUP.Optional.FastStart, C:\Users\Werkstatt1\AppData\Roaming\Mozilla\Firefox\Profiles\pnhghcex.default\prefs.js, Gut: (), Schlecht: (faststartff@gmail.com), Ersetzt,[2a6753224753ce681d94227de4206d93]
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\tor\cor\uhird.dat, In Quarantäne, [236e0c69cdcdef47585a8514dd27ff01],
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (107.178.247.130 connect.facebook.net), Ersetzt,[355c6a0bf3a7f5415d3d2a733dc7d22e]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (.facebook.net
107.178.255.88 www.go), Ersetzt,[d9b8d1a4772394a2207a524bc242c23e]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (107.178.248.130 static.doubleclick.net), Ersetzt,[e2af0a6b5149cd695645fca18e76c040]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (.facebook.net
107.178.255.88 www.goog), Ersetzt,[157c50257d1da1957922415c986c13ed]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (107.178.255.88 www.google-analytics.com), Ersetzt,[97fae194534761d53666722b18ec6f91]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (nalytics.com
107.178.255.88 www.s), Ersetzt,[3d546213d6c4a492c8d476270df7d52b]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (gle-analytics.com
107.178.255), Ersetzt,[abe60d681e7c48eeb6e6396481838f71]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (.google-analytics.com
107.178.255.88 w), Ersetzt,[652c4e27a6f492a4524a5746e51fa858]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (nalytics.com
107.178.255.88 www.statcounte), Ersetzt,[424f02734e4cc571801c326b4bb91fe1]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (tics.com
107.178.255.88 www.statco), Ersetzt,[8908cea7aded70c6debe465724e07789]
Hijack.Host, C:\Windows\System32\drivers\etc\hosts, Gut: (), Schlecht: (er.com
107.178.255.88 ssl.google-analy), Ersetzt,[f99830458a103df9b2ea8d10986cd030]
Physische Sektoren: 0
(keine bösartigen Elemente erkannt)
(end) |