ktownmods | 28.08.2017 17:39 | Hi danke für deine Antwort also die Firma Axon Cable SIA sagt mir nichts!?
In Autoruns steht: Program32.exe Calendar Planner Example Axon Cable SIA c:\users\ktown\appdata\roaming\microsoft\windows\start menu\programs\startup\program32.exe 25.08.2017 23:45
Wenn ich die Datei öffne schmeißt mbam eine Datei C:\users\ktown\appdata\local\temp\System64.exe in die quarantäne aber die Datei Program32.exe bleibt bestehen!
Die Datei steht auch im Autostart bei Autoruns
Die Datei C:\Users\ktown\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Program32.exe [2017-08-27] (Axon Cable SIA) gibt im Virustotalscan das aus:
https://www.virustotal.com/de/file/ea6e6c13353e5f95070ca9305af3ea5ea4cf09d6a1d092447b28281d71a4b278/analysis/1503744147/
Fixlog.txt: Code:
Entferungsergebnis von Farbar Recovery Scan Tool (x64) Version: 20-08-2017
durchgeführt von ktown (28-08-2017 18:07:02) Run:1
Gestartet von C:\Users\ktown\Downloads\Mods
Geladene Profile: ktown (Verfügbare Profile: ktown)
Start-Modus: Normal
==============================================
fixlist Inhalt:
*****************
closeprocesses:
Folder: C:\Users\ktown\AppData\Roaming\tor
Folder: C:\Users\ktown\AppData\Roaming\Audio
Folder: C:\Users\ktown\AppData\Roaming\sound
emptytemp:
*****************
Prozesse erfolgreich geschlossen.
========================= Folder: C:\Users\ktown\AppData\Roaming\tor ========================
2017-08-27 22:23 - 2017-08-27 22:25 - 000020852 _____ () C:\Users\ktown\AppData\Roaming\tor\cached-certs
2017-08-27 22:23 - 2017-08-28 16:24 - 002119544 _____ () C:\Users\ktown\AppData\Roaming\tor\cached-microdesc-consensus
2017-08-27 22:29 - 2017-08-27 22:29 - 003723063 _____ () C:\Users\ktown\AppData\Roaming\tor\cached-microdescs
2017-08-27 22:23 - 2017-08-28 16:24 - 000388510 _____ () C:\Users\ktown\AppData\Roaming\tor\cached-microdescs.new
2017-08-27 22:22 - 2017-08-28 16:24 - 000000000 _____ () C:\Users\ktown\AppData\Roaming\tor\lock
2017-08-27 22:22 - 2017-08-28 16:25 - 000002087 _____ () C:\Users\ktown\AppData\Roaming\tor\state
====== Ende von Folder: ======
========================= Folder: C:\Users\ktown\AppData\Roaming\Audio ========================
2017-08-27 22:22 - 2017-08-27 22:22 - 000000068 ___SH () C:\Users\ktown\AppData\Roaming\Audio\.Identifier
2017-08-27 22:21 - 2017-08-27 22:21 - 000629760 ___SH () C:\Users\ktown\AppData\Roaming\Audio\Audio.exe
====== Ende von Folder: ======
========================= Folder: C:\Users\ktown\AppData\Roaming\sound ========================
2017-08-27 22:21 - 2017-08-27 22:21 - 002289152 ___SH () C:\Users\ktown\AppData\Roaming\sound\sound.exe
====== Ende von Folder: ======
=========== EmptyTemp: ==========
BITS transfer queue => 6578176 B
DOMStore, IE Recovery, AppCache, Feeds Cache, Thumbcache, IconCache => 40327451 B
Java, Flash, Steam htmlcache => 0 B
Windows/system/drivers => 47903778295 B
Edge => 8103454 B
Chrome => 426646644 B
Firefox => 0 B
Opera => 0 B
Temp, IE cache, history, cookies, recent:
Default => 0 B
Users => 0 B
ProgramData => 0 B
Public => 0 B
systemprofile => 128 B
systemprofile32 => 1132 B
LocalService => 8138 B
NetworkService => 40410 B
ktown => 3398360546 B
RecycleBin => 0 B
EmptyTemp: => 48.2 GB temporäre Dateien entfernt.
================================
Das System musste neu gestartet werden.
==== Ende von Fixlog 18:09:30 ==== Adwcleaner.txt: Code:
# AdwCleaner 7.0.1.0 - Logfile created on Mon Aug 28 16:16:05 2017
# Updated on 2017/05/08 by Malwarebytes
# Running on Windows 10 Pro (X64)
# Mode: clean
# Support: https://www.malwarebytes.com/support
***** [ Services ] *****
No malicious services deleted.
***** [ Folders ] *****
No malicious folders deleted.
***** [ Files ] *****
No malicious files deleted.
***** [ DLL ] *****
No malicious DLLs cleaned.
***** [ WMI ] *****
No malicious WMI cleaned.
***** [ Shortcuts ] *****
No malicious shortcuts cleaned.
***** [ Tasks ] *****
No malicious tasks deleted.
***** [ Registry ] *****
No malicious registry entries deleted.
***** [ Firefox (and derivatives) ] *****
No malicious Firefox entries deleted.
***** [ Chromium (and derivatives) ] *****
Plugin deleted: MyJDownloader Browser Extension -
*************************
::Tracing keys deleted
::Winsock settings cleared
::Image File Execution Options%s keys deleted
::Prefetch files deleted
::Proxy settings cleared
::TCP/IP settings cleared
::Firewall rules cleared
::IE policies deleted
::Chrome policies deleted
::Hosts file cleared
::Additional Actions: 0
*************************
C:/AdwCleaner/AdwCleaner[C0].txt - [1217 B] - [2017/8/28 15:3:58]
C:/AdwCleaner/AdwCleaner[S0].txt - [1101 B] - [2017/8/28 15:2:36]
C:/AdwCleaner/AdwCleaner[S1].txt - [1235 B] - [2017/8/28 16:15:30]
########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt ########## mbam.txt: Code:
Malwarebytes
www.malwarebytes.com
-Protokolldetails-
Scan-Datum: 28.08.17
Scan-Zeit: 18:21
Protokolldatei: 04866f1a-8c0d-11e7-a0a0-f832e4a07181.json
Administrator: Ja
-Softwaredaten-
Version: 3.2.2.2018
Komponentenversion: 1.0.188
Version des Aktualisierungspakets: 1.0.2674
Lizenz: Testversion
-Systemdaten-
Betriebssystem: Windows 10 (Build 15063.540)
CPU: x64
Dateisystem: NTFS
Benutzer: DESKTOP-S8K03BB\ktown
-Scan-Übersicht-
Scan-Typ: Bedrohungs-Scan
Ergebnis: Abgeschlossen
Gescannte Objekte: 395479
Erkannte Bedrohungen: 82
In die Quarantäne verschobene Bedrohungen: 82
Abgelaufene Zeit: 3 Min., 43 Sek.
-Scan-Optionen-
Speicher: Aktiviert
Start: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Heuristik: Aktiviert
PUP: Erkennung
PUM: Erkennung
-Scan-Details-
Prozess: 1
Trojan.Pseudo, C:\USERS\KTOWN\APPDATA\LOCAL\TEMP\SYSTEM64.EXE, In Quarantäne, [2627], [232650],1.0.2674
Modul: 1
Trojan.Pseudo, C:\USERS\KTOWN\APPDATA\LOCAL\TEMP\SYSTEM64.EXE, In Quarantäne, [2627], [232650],1.0.2674
Registrierungsschlüssel: 12
Spyware.Pony, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WSCRIPT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\WSCRIPT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\SVCHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\DLLHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\DLLHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CHROME.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\CHROME.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\IEXPLORE.EXE, In Quarantäne, [69], [429103],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\IEXPLORE.EXE, In Quarantäne, [69], [429103],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\EXPLORER.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS NT\CURRENTVERSION\IMAGE FILE EXECUTION OPTIONS\EXPLORER.EXE, In Quarantäne, [69], [429253],1.0.2674
Registrierungswert: 0
(keine bösartigen Elemente erkannt)
Registrierungsdaten: 0
(keine bösartigen Elemente erkannt)
Daten-Stream: 0
(keine bösartigen Elemente erkannt)
Ordner: 0
(keine bösartigen Elemente erkannt)
Datei: 68
Trojan.Pseudo, C:\USERS\KTOWN\APPDATA\LOCAL\TEMP\SYSTEM64.EXE, In Quarantäne, [2627], [232650],1.0.2674
Trojan.Agent.E.Generic, C:\USERS\KTOWN\APPDATA\ROAMING\SOUND.EXE, In Quarantäne, [1062], [354435],1.0.2674
Backdoor.Agent.E, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{23A1C90E-6B28-45F0-834B-28ACA2D2D339}\taskmgr.exe, In Quarantäne, [132], [362815],1.0.2674
Backdoor.Agent.E, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{8E73B611-6D21-4BA3-B993-163F23FD62A0}\taskmgr.exe, In Quarantäne, [132], [362815],1.0.2674
Backdoor.Agent.E, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{DC41174F-1316-4C73-AF54-50FAC2A2B0E6}\taskmgr.exe, In Quarantäne, [132], [362815],1.0.2674
Generic.Malware/Suspicious, C:\USERS\KTOWN\APPDATA\ROAMING\AUDIO\AUDIO.EXE, In Quarantäne, [0], [392686],1.0.2674
Generic.Malware/Suspicious, C:\USERS\KTOWN\APPDATA\ROAMING\SOUND\SOUND.EXE, In Quarantäne, [0], [392686],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{024A0432-A804-47A4-8817-A9BEE06E8910}\DEFENDER.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{1B6A2BD5-9186-40B7-AE0D-B50D1FF28920}\MICROSOFT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{139558E7-CDC1-429B-9102-1262B97B7B85}\TASKHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{2D494E5D-CB30-410A-8210-2A567D9ED826}\SERVICES.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{2FD7733B-8CF8-4F2B-8602-ED71387F0CE6}\ADOBE.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{43D1CE4D-90A7-47A6-8548-0F746D5FD623}\WUAUCLT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{46F48AEB-DB7C-47A0-B006-719CBDEF549D}\MICROSOFT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{58155E36-DBC6-417A-BDFF-B16C171553CB}\SYSTEM.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{6750A088-8B0E-4BD8-BD0E-86CC73025E01}\WSCRIPT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{5B63FCA5-5390-4F9D-A526-003B8B356D4F}\WERFAULT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{73DC0E34-2888-41FC-B2AC-A86201DA0FAD}\WINLOGON.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{69CE8F0F-5B53-42AD-8F26-02722D10B41B}\SVCHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{A8645507-B84A-4FD1-AC84-D7BEADA0C558}\SYSTEM.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{C83EFF28-A57A-4BBC-B695-426178168753}\DEFENDER.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{80A045C6-8219-45AE-B9D1-F57E829472C5}\SYSTEM.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{D8A391E8-547D-4F60-A4C9-7ADB37D4BF81}\SVCHOST.EXE, In Quarantäne, [69], [429103],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{94EE25A4-3009-46F4-82A2-80EDFCF8540A}\CSRSS.EXE, In Quarantäne, [69], [429103],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{EEF4FFCC-6844-428D-B69F-2AB0BAE9A03E}\WSCRIPT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{ADD3B04C-A1CD-403F-A495-4695B75F30FD}\SVCHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{CD3229B0-A69D-42D9-8C04-C73C7F9A8120}\WERFAULT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{17A3D445-3FD8-4749-B713-40D195E83059}\SVCHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{2FD1294D-BEB5-4F29-9955-FD7329AE71D8}\DLLHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{460E70F7-144D-4875-866B-C864BEC1AB98}\CSRSS.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{5A37934C-FFA9-4F56-80DF-9D31F8950B06}\SERVICES.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{68317946-D327-4210-817B-C0E827221C43}\WSCRIPT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{7BE4E157-B5F0-4B05-94E5-3862A9558DA8}\CHROME.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{93822BC0-2749-4A82-B29A-CBEDE201C0DA}\CONFIG.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{A91DDEBE-7B15-4F86-B500-257A1E332388}\JAVA.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{CBDFBAF8-299F-44AC-9DF3-F27FE98C7231}\CSRSS.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{D8FC2835-B597-4978-A0F5-F3C1E1D2FD2C}\WUAUCLT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{1E9F4759-67BE-4C02-ACE4-74F62187D259}\JAVA.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{3152A6D8-F373-4EC6-8003-AFB5B6FFE3FE}\ADOBE.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{482F908D-75BC-4E0F-AC08-29665CAA16CE}\INTERNET.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{5D0BE935-AAA1-4756-B798-9E2F41396BAB}\DLLHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{6B13E4C4-6BA4-429D-A987-432769D8414B}\CHROME.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{832C6928-C980-4B4C-853C-1FC87E0E9032}\DEFENDER.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{9B385A54-7A40-47F4-AEA3-1DA3D3F03849}\JAVA.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{B5EBD04C-8CDA-40BC-9B77-9EBA379BF202}\ADOBE.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{CD5FC2EA-1F10-46B3-AB08-A3444A6F3E86}\JAVA.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{DD3F0BEA-6038-4E6A-92C6-012D40B65DEC}\WSCRIPT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{07447B11-BD36-48EB-B4E9-E7F9BF5363B0}\DEFENDER.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{209CD171-D1F0-4F55-B654-41B51081028E}\DWM.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{40AB6665-68D5-496B-AFC0-BA8AF50C6919}\IEXPLORE.EXE, In Quarantäne, [69], [429103],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{4B29994D-7D11-48AA-BBD7-3D6F5972EB8C}\EXPLORER.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{6176FFB1-D968-4280-A148-EA629546F193}\WINLOGON.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{6B4EA066-4854-492E-840A-8C7C5736B832}\JAVA.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{8C851D31-2EDE-4F07-939D-5C8A5C69CDFF}\WUAUCLT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{A39D38FC-FBC7-48ED-882A-248539E8860C}\ADOBE.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{BA86BCA4-4096-428E-948B-1A43E316FCAD}\WINLOGON.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{CEE6B822-FD7E-4EFB-A7C8-019D405FC2C4}\MICROSOFT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{E49E6D4F-E95C-4D0C-8E10-1FA6E9F8BB5F}\EXPLORER.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{1070BD43-530B-4357-A9B8-3C56887B61F1}\WUAUCLT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{4320DDD4-600C-4A45-8177-E4F360433D85}\SYSTEM.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{566E0DA9-203E-496C-A5B0-8C825F39E577}\CSRSS.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{64CC78B0-D949-40FD-BA90-B2899E561F15}\CSRSS.EXE, In Quarantäne, [69], [429103],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{714C6B6F-2043-4925-A281-ABF548FD5CE4}\HKCMD.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{8D3989AA-3322-4AB5-A14A-057BE8DF64FC}\WINLOGON.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{A800E9B1-0658-4F46-9D76-93F432E60DEE}\JAVA.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{BF496574-6A87-4920-8310-A54F8096DF51}\WUAUCLT.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{D000F72B-49B8-4B73-A5C7-CD55D0A8DA8A}\TASKHOST.EXE, In Quarantäne, [69], [429253],1.0.2674
Spyware.Pony, C:\USERS\KTOWN\APPDATA\LOCAL\MICROSOFT\WINDOWS\{ECF6E036-3732-40A8-9AC2-4FDCA292811E}\CHROME.EXE, In Quarantäne, [69], [429253],1.0.2674
Physischer Sektor: 0
(keine bösartigen Elemente erkannt)
(end) |