"Securit圜heck.exe" opened "%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\KNHT6272\indexv2.php" with delete access "" opened "%TEMP%\Securit圜heck\Securit圜heck.exe" with delete access "%TEMP%\Securit圜heck\Securit圜heck.exe" marked "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ADO3AVS6\" for deletion "%TEMP%\Securit圜heck\Securit圜heck.exe" marked "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KNHT6272\2017022715465019764.jpg" for deletion "%TEMP%\Securit圜heck\Securit圜heck.exe" marked "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BPL0BFI3\jslibraries" for deletion "%TEMP%\Securit圜heck\Securit圜heck.exe" marked "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BPL0BFI3\bs-components.css" for deletion "%TEMP%\Securit圜heck\Securit圜heck.exe" marked "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QRW5BOH4\lu_hot_word.png" for deletion "%TEMP%\Securit圜heck\Securit圜heck.exe" marked "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QIJSVQWS\2017022714175786396.jpg" for deletion "%TEMP%\Securit圜heck\Securit圜heck.exe" marked "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BPL0BFI3\meversion" for deletion "%TEMP%\Securit圜heck\Securit圜heck.exe" marked "C:\Users\%USERNAME%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\KNHT6272\k.htm" for deletion "%TEMP%\Securit圜heck\Securit圜heck.exe" marked "%LOCALAPPDATA%\Microsoft\Windows\Temporary Internet Files\Content.IE5\KNHT6272\indexv2.php" for deletion Heuristic match: "Securit圜heck by glax24
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |