PrinzNoldi | 29.03.2016 00:44 | Mbam: Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlaufdatum: 28.03.2016
Suchlaufzeit: 18:32
Protokolldatei: mbam.txt
Administrator: Ja
Version: 2.2.1.1043
Malware-Datenbank: v2016.03.28.06
Rootkit-Datenbank: v2016.03.12.01
Lizenz: Kostenlose Version
Malware-Schutz: Deaktiviert
Schutz vor bösartigen Websites: Deaktiviert
Selbstschutz: Deaktiviert
Betriebssystem: Windows 10
CPU: x64
Dateisystem: NTFS
Benutzer: Anne
Suchlauftyp: Bedrohungssuchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 381291
Abgelaufene Zeit: 33 Min., 19 Sek.
Speicher: Aktiviert
Start: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Aktiviert
Heuristik: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 0
(keine bösartigen Elemente erkannt)
Module: 0
(keine bösartigen Elemente erkannt)
Registrierungsschlüssel: 31
PUP.Optional.DownloadProtect, HKLM\SOFTWARE\CLASSES\DPBHO.DownloadProtect, In Quarantäne, [2afc672603964ee89ad3d2f9a260e21e],
PUP.Optional.DownloadProtect, HKLM\SOFTWARE\CLASSES\DPBHO.DownloadProtect.1, In Quarantäne, [6db9810cdebba492125b6f5c0af84eb2],
PUP.Optional.DownloadProtect, HKLM\SOFTWARE\WOW6432NODE\CLASSES\DPBHO.DownloadProtect, In Quarantäne, [6db9810cdebba492125b6f5c0af84eb2],
PUP.Optional.DownloadProtect, HKLM\SOFTWARE\WOW6432NODE\CLASSES\DPBHO.DownloadProtect.1, In Quarantäne, [6db9810cdebba492125b6f5c0af84eb2],
PUP.Optional.DownloadProtect, HKLM\SOFTWARE\CLASSES\WOW6432NODE\DPBHO.DownloadProtect, In Quarantäne, [6db9810cdebba492125b6f5c0af84eb2],
PUP.Optional.DownloadProtect, HKLM\SOFTWARE\CLASSES\WOW6432NODE\DPBHO.DownloadProtect.1, In Quarantäne, [6db9810cdebba492125b6f5c0af84eb2],
PUP.Optional.CloudScout, HKLM\SOFTWARE\5da059a482fd494db3f252126fbc3d5b, In Quarantäne, [cd594e3f2e6b2511fbc43c10af556d93],
PUP.Optional.Yahoo, HKLM\SOFTWARE\WajaIntEn, In Quarantäne, [64c21f6ec4d52e0899782b1904008f71],
PUP.Optional.PCSpeedUp, HKLM\SOFTWARE\CLASSES\PCSU.Registry, In Quarantäne, [32f41e6f8f0aa98dd413f23a5ba9e719],
PUP.Optional.PCSpeedUp, HKLM\SOFTWARE\CLASSES\PCSU.Registry.1, In Quarantäne, [9c8ac9c40f8a82b4a6412804897b22de],
PUP.Optional.PCSpeedUp, HKLM\SOFTWARE\WOW6432NODE\CLASSES\PCSU.Registry, In Quarantäne, [5cca0b823366e94de106c666f90bd927],
PUP.Optional.PCSpeedUp, HKLM\SOFTWARE\WOW6432NODE\CLASSES\PCSU.Registry.1, In Quarantäne, [61c5226bfd9c0432edfa9c9025df9b65],
PUP.Optional.SystemSpeedup, HKLM\SOFTWARE\WOW6432NODE\SYSTWEAK\ssd, In Quarantäne, [be683c5196031125c75bd968d92a8c74],
PUP.Optional.WindowsMangerProtect, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\EVENTLOG\APPLICATION\WindowsMangerProtect, In Quarantäne, [9d89afdeb4e5fc3aed5951f2c341c937],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\.DEFAULT\SOFTWARE\MICROSOFT\INTERNET EXPLORER\INTERNETREGISTRY\REGISTRY\USER\S-1-5-18\SOFTWARE\shopperz180220161542, In Quarantäne, [a87e3954e1b8f83e04aa35519074659b],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}, In Quarantäne, [73b35e2fbddc4beb8edb9b67b1538d73],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}, In Quarantäne, [81a5761772279d9927428f73699b10f0],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}, In Quarantäne, [73b3b5d850496dc9e88118ea11f3649c],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}, In Quarantäne, [a97d1f6e7722082e87e28280d0344fb1],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}, In Quarantäne, [f82e5d301d7c63d3bcadc24050b4af51],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}, In Quarantäne, [aa7c751834658caa076259a91be9fa06],
PUP.Optional.BrowserAir, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\CLIENTS\STARTMENUINTERNET\BrowserAir.2H3K3LJQFMHA6EQTGSW7JJJUHA, In Quarantäne, [83a3028b4e4b6ec8dbba7ed02fd5916f],
PUP.Optional.Komodia, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\INSTALLPATH\STATUS, In Quarantäne, [f3335a331683c2740612b5d30df714ec],
PUP.Optional.Tuto4PC, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\MICROSOFT\IDSC, In Quarantäne, [39ed3d508a0f46f0b1de424a21e3b24e],
PUP.Optional.BrowserAir, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\APP PATHS\BrowserAir.exe, In Quarantäne, [2204b0ddc9d0d2646a28dd8e3dc7a55b],
PUP.Optional.SystemSpeedup, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\SYSTWEAK\ssd, In Quarantäne, [d254dcb15e3b8aacea370e33ed161fe1],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}, In Quarantäne, [dd4992fbc6d3a6903a2fc43e64a039c7],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}, In Quarantäne, [6bbbabe25544b581d79257ab4fb5c53b],
PUP.Optional.BrowserAir, HKU\S-1-5-21-126686584-4194447623-4113615898-1001_Classes\BrowserAir.2H3K3LJQFMHA6EQTGSW7JJJUHA, In Quarantäne, [f92dff8e57423ef8bd02abcfe91be917],
PUP.Optional.VBates, HKU\S-1-5-21-126686584-4194447623-4113615898-1001_Classes\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}, In Quarantäne, [5fc727669cfd74c2f50f7420f311dc24],
PUP.Optional.VBates, HKU\S-1-5-21-126686584-4194447623-4113615898-1001_Classes\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}, In Quarantäne, [27ffb6d76534b97dcb39f0a407fd16ea],
Registrierungswerte: 16
PUP.Optional.MBot, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|mbot_en_037050240, In Quarantäne, [39ed414cdfba0d295bd4f82c3ec65ea2],
Adware.EoRezo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|sun3, In Quarantäne, [c0666924e2b7290dfa43edaa699bef11],
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}|Name, C:\Program Files\shopperz180220161542\Sogia.exe, In Quarantäne, [73b35e2fbddc4beb8edb9b67b1538d73]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-18\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}|Name, C:\Program Files\shopperz170220161606\Otivg.exe, In Quarantäne, [81a5761772279d9927428f73699b10f0]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}|Name, C:\Program Files\shopperz180220161542\Sogia.exe, In Quarantäne, [73b3b5d850496dc9e88118ea11f3649c]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-19\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}|Name, C:\Program Files\shopperz170220161606\Otivg.exe, In Quarantäne, [a97d1f6e7722082e87e28280d0344fb1]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}|Name, C:\Program Files\shopperz180220161542\Sogia.exe, In Quarantäne, [f82e5d301d7c63d3bcadc24050b4af51]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-20\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}|Name, C:\Program Files\shopperz170220161606\Otivg.exe, In Quarantäne, [aa7c751834658caa076259a91be9fa06]
PUP.Optional.Komodia, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\INSTALLPATH\STATUS|FlowsurfCB, S, In Quarantäne, [f3335a331683c2740612b5d30df714ec]
PUP.Optional.Tuto4PC, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\MICROSOFT\IDSC|partner, tuto, In Quarantäne, [39ed3d508a0f46f0b1de424a21e3b24e]
PUP.Optional.DeskBar, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN\FEATURECONTROL\FEATURE_BROWSER_EMULATION|DeskBar.exe, 8888, In Quarantäne, [2402f19cd1c8b680fd86483dd03453ad]
PUP.Optional.BrowserAir, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\REGISTEREDAPPLICATIONS|BrowserAir.2H3K3LJQFMHA6EQTGSW7JJJUHA, Software\Clients\StartMenuInternet\BrowserAir.2H3K3LJQFMHA6EQTGSW7JJJUHA\Capabilities, In Quarantäne, [e1452469702958de5f2aaee69c68f30d]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}|Name, C:\Program Files\shopperz180220161542\Sogia.exe, In Quarantäne, [dd4992fbc6d3a6903a2fc43e64a039c7]
PUP.Optional.Shopperz.BrwsrFlsh, HKU\S-1-5-21-126686584-4194447623-4113615898-1001\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}|Name, C:\Program Files\shopperz170220161606\Otivg.exe, In Quarantäne, [6bbbabe25544b581d79257ab4fb5c53b]
PUP.Optional.VBates, HKU\S-1-5-21-126686584-4194447623-4113615898-1001_Classes\SOFTWARE\{6A26CB9C-A487-455E-9E4F-C4C49D86711E}|Name, C:\Program Files\shopperz180220161542\Sogia.exe, In Quarantäne, [5fc727669cfd74c2f50f7420f311dc24]
PUP.Optional.VBates, HKU\S-1-5-21-126686584-4194447623-4113615898-1001_Classes\SOFTWARE\{9DF4DAC2-A3F5-4106-918C-9041A9857135}|Name, C:\Program Files\shopperz170220161606\Otivg.exe, In Quarantäne, [27ffb6d76534b97dcb39f0a407fd16ea]
Registrierungsdaten: 1
Trojan.DNSChanger.DNSRst, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer, 82.163.143.171 82.163.142.173, Gut: (8.8.8.8), Schlecht: (82.163.143.171 82.163.142.173),Ersetzt,[2204cebf4752a195e6a4ae7e20e553ad]
Ordner: 2
PUP.Optional.VBates, C:\Users\Anne\AppData\LocalLow\Company\Product\1.0, In Quarantäne, [42e4ccc17a1f280e89d4d778b351b24e],
PUP.Optional.VBates, C:\Users\Anne\AppData\LocalLow\Company\Product, In Quarantäne, [42e4ccc17a1f280e89d4d778b351b24e],
Dateien: 15
Rootkit.Komodia.PUA, C:\WINDOWS\SYSTEM32\drivers\bsdriver.sys, Löschen bei Neustart, [b317440fdc1afbd54301afc592c0092e],
PUP.Optional.Cherimoya, C:\WINDOWS\SYSTEM32\drivers\cherimoya.sys, Löschen bei Neustart, [fb54ae223aab947a013daf9d657aab19],
PUP.Optional.Wajam, C:\$Recycle.Bin\S-1-5-21-126686584-4194447623-4113615898-1001\$RUL62HD\68a2c9bd54c00c2025dac8ea48680bad.exe, In Quarantäne, [e83eb9d41e7b24126b193bd158aae51b],
PUP.Optional.Wajam, C:\$Recycle.Bin\S-1-5-21-126686584-4194447623-4113615898-1001\$RUL62HD\wajam_64.exe.patcher, In Quarantäne, [f72f711c62370531a1e363a920e2a55b],
PUP.Optional.Wajam, C:\$Recycle.Bin\S-1-5-21-126686584-4194447623-4113615898-1001\$RUL62HD\79070e8f0b7ed92bac14e15a86485c77.exe, In Quarantäne, [4fd73459cfcacb6b0a2bd38f16ea2dd3],
PUP.Optional.Bundler, C:\Users\Anne\Downloads\adobe_flash_setup (1).exe, In Quarantäne, [74b2622b0d8c06303714188e867b7d83],
PUP.Optional.BundleInstaller, C:\Users\Anne\Downloads\adobe_flash_setup (2).exe.ma7utmm.partial, In Quarantäne, [170f24697e1bde58e2951452c33ddb25],
PUP.Optional.Bundler, C:\Users\Anne\Downloads\adobe_flash_setup.exe, In Quarantäne, [e145414c06938babd8734d59966b0cf4],
PUP.Optional.InstallCore, C:\Users\Anne\Downloads\HDVideoPlayer.exe, In Quarantäne, [36f05e2fc0d9b77f1773ff4fdb2ade22],
PUP.Optional.InstallCore, C:\Users\Anne\Downloads\JavaSetup.exe, In Quarantäne, [081ed1bcf9a0fb3bdd5e8480758d0bf5],
PUP.Optional.DownloadGuide, C:\Users\Anne\Downloads\spotify.exe, In Quarantäne, [75b1c2cb8f0a0d29700f9843e31ebf41],
PUP.Optional.DownloadGuide, C:\Users\Anne\Downloads\wlsetup-all_CB-DL-Manager.exe, In Quarantäne, [6cba25689108bc7a86f88b50ce336b95],
PUP.Optional.VBates, C:\Users\Anne\AppData\LocalLow\Company\Product\1.0\localStorageIE.txt, In Quarantäne, [42e4ccc17a1f280e89d4d778b351b24e],
PUP.Optional.VBates, C:\Users\Anne\AppData\LocalLow\Company\Product\1.0\localStorageIE_backup.txt, In Quarantäne, [42e4ccc17a1f280e89d4d778b351b24e],
PUP.Optional.HijackHosts.Gen, C:\Windows\System32\nuwg\uun\kaby.dat, In Quarantäne, [9a8c711c72273cfad8943b1725e03bc5],
Physische Sektoren: 0
(keine bösartigen Elemente erkannt)
(end) ESET: Code:
ESETSmartInstaller@High as downloader log:
all ok
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=2827a45a9b3da74cb138cda6814411cd
# end=init
# utc_time=2016-03-28 05:16:51
# local_time=2016-03-28 07:16:51 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# osver=6.2.9200 NT
Update Init
Update Download
Update Finalize
Updated modules version: 28787
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# EOSSerial=2827a45a9b3da74cb138cda6814411cd
# end=updated
# utc_time=2016-03-28 05:20:08
# local_time=2016-03-28 07:20:08 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# osver=6.2.9200 NT
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.7777
# api_version=3.1.1
# EOSSerial=2827a45a9b3da74cb138cda6814411cd
# engine=28787
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2016-03-28 07:09:16
# local_time=2016-03-28 09:09:16 (+0100, Mitteleuropäische Sommerzeit)
# country="Germany"
# lang=1031
# osver=6.2.9200 NT
# compatibility_mode_1='avast! Antivirus'
# compatibility_mode=788 16777213 100 98 281555 4762226 0 0
# compatibility_mode_1=''
# compatibility_mode=5893 16776574 100 94 3385894 22666168 0 0
# scanned=279604
# found=15
# cleaned=0
# scan_time=6548
sh=459601545826DFC0DFBA175137C054113D17E59D ft=1 fh=c10cfa83647247b7 vn="Variante von Win32/Wajam.AE evtl. unerwünschte Anwendung" ac=I fn="C:\$Recycle.Bin\S-1-5-21-126686584-4194447623-4113615898-1001\$RUL62HD\0d6d9f2a27bf4c9108ac0d9fb779658a.exe"
sh=FBF92E37C285C7F6F17B6D867DA0D09167EBF466 ft=1 fh=b64f1a60363e2d4c vn="Variante von Win32/Toolbar.Widgi evtl. unerwünschte Anwendung" ac=I fn="C:\Festplatte\80_Programme\asc5-setup.exe"
sh=3FE87D7D187E1F700A7E17CF6D9837A7F3E71110 ft=0 fh=0000000000000000 vn="Variante von Win32/Toolbar.Conduit.P evtl. unerwünschte Anwendung" ac=I fn="C:\Festplatte\80_Programme\Ashampoo WinOptimizer 8.8.01 Multi.rar"
sh=3AC65557957ACAFC4A7F5B84E984299CF9D15442 ft=1 fh=1c0bdd046de72b6b vn="Variante von Win32/AdkDLLWrapper.A evtl. unerwünschte Anwendung" ac=I fn="C:\Festplatte\80_Programme\BitTorrent781.exe"
sh=E4901FD48C5C8C4B3522EBAC1585726A69B62A65 ft=1 fh=3fb25972aa01d397 vn="Variante von Win32/Toolbar.Conduit.AI evtl. unerwünschte Anwendung" ac=I fn="C:\Festplatte\80_Programme\Ashampoo Registry Cleaner 1.00 with reg key and keygen\ashampoo_registry_cleaner_1.00_9607.exe"
sh=171030DB3BBD3E75A793AD46532C13FC7BADA5EA ft=1 fh=cca812cc5a6d51e8 vn="Variante von Win32/Toolbar.Conduit.P evtl. unerwünschte Anwendung" ac=I fn="C:\Festplatte\80_Programme\Ashampoo WinOptimizer 8.8.01 Multi\SETuP\ashampoo_winoptimizer_8_8.0.1_8637.exe"
sh=410FD5AEE8704758A7D623A3DED972D6D8409BE8 ft=1 fh=09537a53c2648fae vn="Variante von Win32/Toolbar.Conduit.P evtl. unerwünschte Anwendung" ac=I fn="C:\Festplatte\80_Programme\Ashampoo.HDD.Control.2.v2.08-TE\ashampoo_hdd_control_2_2.07_sm.exe"
sh=9138D8BA1A4445001ECBD145EE8083EB74B03BC8 ft=0 fh=0000000000000000 vn="LNK/Agent.CH Trojaner" ac=I fn="C:\Festplatte\80_Programme\Microsoft.Office.2010.Professional.Plus.GERMAN.x86.x64\Firstload.de - Dein Gratis UseNext Account.URL"
sh=B88028FDCB7621085206F8CE8524CF42BF9D1E0B ft=0 fh=0000000000000000 vn="Variante von Win32/Systweak.L evtl. unerwünschte Anwendung" ac=I fn="C:\Festplatte\80_Programme\WinZip Pro 17.0 Build 10381 x86x64+Key - Lz0\WinZip Pro 17.0 Build 10381 (x64)\winzip170-64.msi"
sh=F0A5DFA317991EEADF7FF7340812C9F2ABD63E98 ft=0 fh=0000000000000000 vn="Variante von Win32/Systweak.L evtl. unerwünschte Anwendung" ac=I fn="C:\Festplatte\80_Programme\WinZip Pro 17.0 Build 10381 x86x64+Key - Lz0\WinZip Pro 17.0 Build 10381 (x86)\winzip170-32.msi"
sh=0F5363D7EC1502CE4AD298C7B3B8EC776CED9E3C ft=1 fh=bf28f9153f80c234 vn="Variante von Win32/Adware.ConvertAd.AER.gen Anwendung" ac=I fn="C:\Program Files (x86)\AdwCleaner\FileQuarantine\C\Users\Anne\AppData\Local\0BF566D8-1455726429-11E4-B57F-68F7284DC946\pnsd309C.exe.vir"
sh=6CEB7D5FAA0137115B3A6292EF63260002B981FC ft=0 fh=0000000000000000 vn="Variante von Win32/Speedchecker.A evtl. unerwünschte Anwendung" ac=I fn="C:\Program Files (x86)\AdwCleaner\FileQuarantine\C\Users\Anne\AppData\Local\Microsoft\Silverlight\OutOfBrowser\Speedchecker.PCSpeedUp\application.xap.vir"
sh=C1515799C5063A5CAAD8CAB51725104041B7D5C1 ft=1 fh=bae9daf254c5bb84 vn="Variante von Win64/Systweak.A evtl. unerwünschte Anwendung" ac=I fn="C:\Program Files (x86)\AdwCleaner\FileQuarantine\C\WINDOWS\SysNative\roboot64.exe.vir"
sh=53EC44F887DEDD887C4B7C6748CFC8532F007967 ft=1 fh=a525b0610a585d74 vn="Variante von Win32/DownloadSponsor.C evtl. unerwünschte Anwendung" ac=I fn="C:\Users\Anne\Downloads\Thunderbird - CHIP-Installer (1).exe"
sh=70EF17AC848FB6BA13EB36A66F01E2F8487B90B1 ft=1 fh=bae9f992828dd43c vn="Variante von Win32/DownloadSponsor.C evtl. unerwünschte Anwendung" ac=I fn="C:\Users\Anne\Downloads\Thunderbird - CHIP-Installer.exe" |