Zurück   Trojaner-Board > Malware entfernen > Plagegeister aller Art und deren Bekämpfung

Plagegeister aller Art und deren Bekämpfung: BKA-Trojaner

Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen.

Antwort
Alt 20.04.2012, 13:45   #31
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BKA-Trojaner - Standard

BKA-Trojaner



Ok. Starte Windows neu, lösch die alte combofix.exe, lade CF neu runter und führe CF nochmal aus
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 20.04.2012, 17:09   #32
Alimaus_1
 
BKA-Trojaner - Standard

BKA-Trojaner



also,hier ist die Datei
Gruß
Dani
Code:
ATTFilter
ComboFix 12-04-20.03 - Manuela 20.04.2012  17:46:55.3.1 - x86
Microsoft Windows XP Home Edition  5.1.2600.3.1252.49.1031.18.511.267 [GMT 2:00]
ausgeführt von:: c:\dokumente und einstellungen\Manuela\Desktop\ComboFix.exe
AV: avast! Antivirus *Disabled/Updated* {7591DB91-41F0-48A3-B128-1A293FD8233D}
.
.
(((((((((((((((((((((((   Dateien erstellt von 2012-03-20 bis 2012-04-20  ))))))))))))))))))))))))))))))
.
.
2012-04-18 09:05 . 2012-04-18 09:05	--------	d-----w-	c:\programme\Microsoft
2012-04-17 18:19 . 2012-04-17 18:19	--------	d-----w-	C:\_OTL
2012-04-15 15:43 . 2012-04-15 15:43	--------	d-----w-	c:\programme\ESET
2012-04-12 13:50 . 2012-04-12 13:50	50477	----a-w-	c:\programme\Defogger.exe
2012-04-05 17:47 . 2012-04-05 17:47	--------	d-----w-	c:\dokumente und einstellungen\All Users\Anwendungsdaten\GameXzone
2012-04-04 17:59 . 2012-04-04 17:59	--------	d-----w-	c:\dokumente und einstellungen\Manuela\Anwendungsdaten\Twilight Games
2012-04-03 20:42 . 2012-04-03 20:42	--------	d-----w-	c:\dokumente und einstellungen\Manuela\Anwendungsdaten\JaiboGames
2012-04-03 18:17 . 2012-04-03 18:17	--------	d-----w-	c:\dokumente und einstellungen\Manuela\Anwendungsdaten\Mariaglorum
2012-04-03 12:18 . 2012-04-03 12:32	--------	d-----w-	c:\dokumente und einstellungen\Manuela\Anwendungsdaten\QuickStoresToolbar
2012-04-03 11:39 . 2012-04-03 11:43	--------	d-----w-	c:\programme\Gemeinsame Dateien\System Shared
2012-04-03 11:38 . 2011-10-26 12:12	228664	----a-w-	c:\windows\system32\wdrvtd32.dll
2012-04-03 11:38 . 2011-10-21 13:50	2250640	----a-w-	c:\windows\system32\cchservice.exe
2012-04-02 14:30 . 2012-04-02 14:31	--------	d-----w-	c:\dokumente und einstellungen\Manuela\Anwendungsdaten\Kingdom of Seven Seals
2012-04-02 14:30 . 2012-04-02 14:30	--------	d-----w-	c:\dokumente und einstellungen\All Users\Anwendungsdaten\boost_interprocess
2012-04-01 10:19 . 2012-04-01 10:19	--------	d-----w-	c:\windows\system32\AGEIA
2012-04-01 10:18 . 2012-04-01 10:18	--------	d-----w-	c:\programme\Gemeinsame Dateien\Wise Installation Wizard
2012-03-31 13:52 . 2008-07-30 04:20	238088	----a-w-	c:\windows\system32\xactengine3_2.dll
2012-03-31 13:52 . 2008-07-10 09:01	467984	----a-w-	c:\windows\system32\d3dx10_39.dll
2012-03-31 13:52 . 2008-07-10 09:00	1493528	----a-w-	c:\windows\system32\D3DCompiler_39.dll
2012-03-31 13:52 . 2008-07-10 09:00	3851784	----a-w-	c:\windows\system32\D3DX9_39.dll
2012-03-29 14:46 . 2012-03-29 14:46	--------	d-----w-	c:\dokumente und einstellungen\Manuela\Anwendungsdaten\DieselPuppet
2012-03-26 09:47 . 2012-03-26 09:47	--------	d-----w-	c:\dokumente und einstellungen\Manuela\Anwendungsdaten\LittleGamesCompany
2012-03-26 09:47 . 2012-03-26 09:47	--------	d-----w-	c:\dokumente und einstellungen\All Users\Anwendungsdaten\LittleGamesCompany
2012-03-22 22:05 . 2012-03-22 22:05	--------	d-----w-	c:\dokumente und einstellungen\Manuela\Anwendungsdaten\Boolat Games
.
.
.
((((((((((((((((((((((((((((((((((((   Find3M Bericht   ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2012-04-19 08:04 . 2012-04-19 08:04	5691	----a-w-	C:\ComboFix.zip
2012-04-17 20:01 . 2012-04-17 20:01	3946207	----a-w-	C:\_OTL.zip
2012-04-04 13:56 . 2010-10-30 21:54	22344	----a-w-	c:\windows\system32\drivers\mbam.sys
2012-03-17 09:32 . 2011-06-16 16:34	414368	----a-w-	c:\windows\system32\FlashPlayerCPLApp.cpl
2012-03-06 23:15 . 2011-09-27 18:20	41184	----a-w-	c:\windows\avastSS.scr
2012-03-06 23:15 . 2011-09-27 18:20	201352	----a-w-	c:\windows\system32\aswBoot.exe
2012-03-06 23:03 . 2011-09-27 18:21	612184	----a-w-	c:\windows\system32\drivers\aswSnx.sys
2012-03-06 23:03 . 2011-09-27 18:21	337880	----a-w-	c:\windows\system32\drivers\aswSP.sys
2012-03-06 23:02 . 2011-09-27 18:21	35672	----a-w-	c:\windows\system32\drivers\aswRdr.sys
2012-03-06 23:01 . 2011-09-27 18:21	53848	----a-w-	c:\windows\system32\drivers\aswTdi.sys
2012-03-06 23:01 . 2011-09-27 18:21	95704	----a-w-	c:\windows\system32\drivers\aswmon2.sys
2012-03-06 23:01 . 2011-09-27 18:21	89048	----a-w-	c:\windows\system32\drivers\aswmon.sys
2012-03-06 23:01 . 2011-09-27 18:21	20696	----a-w-	c:\windows\system32\drivers\aswFsBlk.sys
2012-03-06 22:58 . 2011-09-27 18:21	24920	----a-w-	c:\windows\system32\drivers\aavmker4.sys
2012-03-01 11:00 . 2006-06-23 11:27	916992	----a-w-	c:\windows\system32\wininet.dll
2012-03-01 11:00 . 2004-05-26 14:50	43520	----a-w-	c:\windows\system32\licmgr10.dll
2012-03-01 11:00 . 2004-05-26 14:50	1469440	------w-	c:\windows\system32\inetcpl.cpl
2012-02-29 14:09 . 2004-05-26 14:51	177664	----a-w-	c:\windows\system32\wintrust.dll
2012-02-29 14:09 . 2004-05-26 14:50	148480	----a-w-	c:\windows\system32\imagehlp.dll
2012-02-29 12:17 . 2004-08-04 07:42	385024	----a-w-	c:\windows\system32\html.iec
2012-02-07 18:06 . 2004-05-26 17:01	499712	----a-w-	c:\windows\system32\msvcp71.dll
2012-02-07 18:06 . 2004-05-26 17:01	348160	----a-w-	c:\windows\system32\msvcr71.dll
2012-02-03 09:57 . 2009-02-12 07:32	1860224	----a-w-	c:\windows\system32\win32k.sys
2012-02-02 15:54 . 2012-02-02 15:54	637848	----a-w-	c:\windows\system32\npdeployJava1.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[7] 2008-04-13 . 08FD04AA961BDC77FB983F328334E3D7 . 42368 . . [5.1.2600.5512] . . c:\windows\ServicePackFiles\i386\agp440.sys
[-] 2001-08-17 . 65880045C51AA36184841CEE915A61DF . 25472 . . [5.1.2600.0] . . c:\windows\system32\drivers\AGP440.SYS
.
(((((((((((((((((((((((((((((   SnapShot@2012-04-19_07.59.12   )))))))))))))))))))))))))))))))))))))))))
.
+ 2012-04-20 11:02 . 2012-04-20 11:02	16384              c:\windows\Temp\Perflib_Perfdata_128.dat
.
((((((((((((((((((((((((((((   Autostartpunkte der Registrierung   ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt. 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\00avast]
@="{472083B0-C522-11CF-8763-00608CC02F24}"
[HKEY_CLASSES_ROOT\CLSID\{472083B0-C522-11CF-8763-00608CC02F24}]
2012-03-06 23:15	123536	----a-w-	c:\programme\AVAST Software\Avast\ashShell.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"swg"="c:\programme\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2012-04-02 39408]
"Spiele Post"="c:\programme\OXXOGames\GPlayer\GameCenterNotifier.exe" [2011-10-13 479984]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Dit"="Dit.exe" [2002-08-28 73728]
"CHotkey"="mHotkey.exe" [2002-07-23 477184]
"avast"="c:\programme\AVAST Software\Avast\avastUI.exe" [2012-03-06 4241512]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\System32\CTFMON.EXE" [2008-04-14 15360]
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"DisableClock"= 0 (0x0)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"MaxRecentDocs"= 6 (0x6)
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute	REG_MULTI_SZ   	autocheck autochk *\0aswBoot.exe /M:124328d8508a
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\ksupmgr]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2012-01-03 07:37	843712	----a-w-	c:\programme\Gemeinsame Dateien\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\ctfmon.exe]
2008-04-14 02:22	15360	----a-w-	c:\windows\system32\ctfmon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\FUFAXSTM]
2009-12-02 22:00	847872	----a-w-	c:\programme\Epson Software\FAX Utility\FUFAXSTM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Spiele Post]
2011-10-13 08:52	479984	----a-w-	c:\programme\OXXOGames\GPlayer\GameCenterNotifier.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\StartCCC]
2009-09-29 20:13	61440	----a-w-	c:\programme\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched]
2011-06-09 12:06	254696	----a-w-	c:\programme\Gemeinsame Dateien\Java\Java Update\jusched.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\swg]
2012-04-02 16:06	39408	----a-w-	c:\programme\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\WMPNSCFG]
2006-11-03 07:56	204288	------w-	c:\programme\Windows Media Player\wmpnscfg.exe
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\run-]
"ctfmon.exe"=c:\windows\system32\ctfmon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\run-]
"Adobe Reader Speed Launcher"="c:\programme\Adobe\Reader 9.0\Reader\Reader_sl.exe"
"Adobe ARM"="c:\programme\Gemeinsame Dateien\Adobe\ARM\1.0\AdobeARM.exe"
"TkBellExe"="c:\programme\Gemeinsame Dateien\Real\Update_OB\realsched.exe"  -osboot
"UnlockerAssistant"="c:\programme\Unlocker\UnlockerAssistant.exe"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center]
"AntiVirusOverride"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
"%windir%\\Network Diagnostic\\xpnetdiag.exe"=
.
R1 aswSnx;aswSnx;c:\windows\system32\drivers\aswSnx.sys [27.09.2011 20:21 612184]
R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [27.09.2011 20:21 337880]
R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [27.09.2011 20:21 20696]
R2 LogWatch;Ereignisprotokoll-Überwachung;c:\programme\CA\SharedComponents\CA_LIC\LogWatNT.exe [20.09.2002 16:29 53248]
R2 Update-Service;Update-Service;c:\windows\System32\svchost.exe -k Update-Service [26.05.2004 16:51 14336]
R3 ctxc51;ctxc51;c:\windows\system32\drivers\ctxc51.sys [28.05.2004 17:20 1086853]
R3 ctxc52;ctxc52;c:\windows\system32\drivers\ctxc52.sys [28.05.2004 17:20 619369]
R3 ctxc53;ctxc53;c:\windows\system32\drivers\ctxc53.sys [28.05.2004 17:20 51493]
S2 Automatisches LiveUpdate - Scheduler;Automatisches LiveUpdate - Scheduler;"c:\programme\Symantec\LiveUpdate\ALUSchedulerSvc.exe" --> c:\programme\Symantec\LiveUpdate\ALUSchedulerSvc.exe [?]
S2 gupdate;Google Update Service (gupdate);c:\programme\Google\Update\GoogleUpdate.exe [02.04.2012 18:05 136176]
S3 CA_LIC_CLNT;CA-Lizenz-Client;c:\programme\CA\SharedComponents\CA_LIC\lic98rmt.exe [20.09.2002 16:27 77824]
S3 CA_LIC_SRVR;CA-Lizenzserver;c:\programme\CA\SharedComponents\CA_LIC\lic98rmtd.exe [20.09.2002 16:41 77824]
S3 gupdatem;Google Update-Dienst (gupdatem);c:\programme\Google\Update\GoogleUpdate.exe [02.04.2012 18:05 136176]
S3 massfilter;ZTE Mass Storage Filter Driver;c:\windows\system32\drivers\massfilter.sys [08.12.2010 14:52 7680]
S3 PhTVTune;MEDION TV-TUNER 7134 MK2/3;c:\windows\system32\drivers\PhTVTune.sys [09.05.2004 20:31 24704]
S3 ute5njmx;AVZ Kernel Driver;\??\c:\windows\system32\Drivers\ute5njmx.sys --> c:\windows\system32\Drivers\ute5njmx.sys [?]
S3 ZTEusbnet;ZTE USB-NDIS miniport;c:\windows\system32\drivers\ZTEusbnet.sys [08.12.2010 14:54 110592]
S3 ZTEusbvoice;ZTE VoUSB Port;c:\windows\system32\drivers\zteusbvoice.sys [08.12.2010 14:53 105344]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
Update-Service-Installer-Service	REG_MULTI_SZ   	Update-Service-Installer-Service
Update-Service	REG_MULTI_SZ   	Update-Service
.
Inhalt des "geplante Tasks" Ordners
.
2012-04-20 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\programme\Google\Update\GoogleUpdate.exe [2012-04-02 16:05]
.
2012-04-20 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\programme\Google\Update\GoogleUpdate.exe [2012-04-02 16:05]
.
2012-04-20 c:\windows\Tasks\User_Feed_Synchronization-{7C4EA040-4EEF-4B9A-95B9-B1DA16925AF5}.job
- c:\windows\system32\msfeedssync.exe [2009-03-08 03:31]
.
.
------- Zusätzlicher Suchlauf -------
.
uStart Page = hxxp://de.yahoo.com/
uDefault_Search_URL = hxxp://www.google.com/ie
mStart Page = 
uInternet Settings,ProxyOverride = localhost
uSearchAssistant = hxxp://www.google.com/ie
uSearchURL,(Default) = hxxp://www.google.com/search?q=%s
IE: Easy-WebPrint Drucken - c:\programme\Canon\Easy-WebPrint\Resource.dll/RC_Print.html
IE: Easy-WebPrint Schnelldruck - c:\programme\Canon\Easy-WebPrint\Resource.dll/RC_HSPrint.html
IE: Easy-WebPrint Vorschau - c:\programme\Canon\Easy-WebPrint\Resource.dll/RC_Preview.html
IE: Easy-WebPrint Zu Druckliste hinzufügen - c:\programme\Canon\Easy-WebPrint\Resource.dll/RC_AddToList.html
IE: Free YouTube to MP3 Converter - c:\dokumente und einstellungen\Manuela\Anwendungsdaten\DVDVideoSoftIEHelpers\freeyoutubetomp3converter.htm
TCP: DhcpNameServer = 217.68.161.141 217.68.161.171
DPF: DirectAnimation Java Classes - file://c:\windows\Java\classes\dajava.cab
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, hxxp://www.gmer.net
Rootkit scan 2012-04-20 17:57
Windows 5.1.2600 Service Pack 3 NTFS
.
Scanne versteckte Prozesse... 
.
Scanne versteckte Autostarteinträge... 
.
Scanne versteckte Dateien... 
.
Scan erfolgreich abgeschlossen
versteckte Dateien: 0
.
**************************************************************************
.
--------------------- Gesperrte Registrierungsschluessel ---------------------
.
[HKEY_USERS\S-1-5-21-3747897397-1259788645-3456638093-1008\Software\Microsoft\SystemCertificates\AddressBook*]
@Allowed: (Read) (RestrictedCode)
@Allowed: (Read) (RestrictedCode)
.
--------------------- Durch laufende Prozesse gestartete DLLs ---------------------
.
- - - - - - - > 'winlogon.exe'(604)
c:\windows\system32\Ati2evxx.dll
.
- - - - - - - > 'explorer.exe'(3968)
c:\windows\system32\webcheck.dll
c:\windows\system32\WPDShServiceObj.dll
c:\windows\system32\PortableDeviceTypes.dll
c:\windows\system32\PortableDeviceApi.dll
.
Zeit der Fertigstellung: 2012-04-20  18:01:22
ComboFix-quarantined-files.txt  2012-04-20 16:01
ComboFix2.txt  2012-04-19 19:22
ComboFix3.txt  2012-04-19 08:02
.
Vor Suchlauf: 15 Verzeichnis(se), 54.276.640.768 Bytes frei
Nach Suchlauf: 16 Verzeichnis(se), 54.254.694.400 Bytes frei
.
- - End Of File - - 03D63586DD1EAD628EC9F63FA1282695
         
__________________


Alt 20.04.2012, 20:26   #33
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BKA-Trojaner - Standard

BKA-Trojaner



Ich brauch die beiden Quarantäneordner von Combofix und OTL. Bitte folgendes machen:

1.) GANZ WICHTIG!! Virenscanner deaktivieren, der darf das Packen nicht beeinflussen!
2.) Ordner MovedFiles in C:\_OTL in eine Datei zippen
3.) Ordner Quarantine in C:\Qoobox in eine Datei zippen
4.) Beide erstellten ZIP-Dateien hier hochladen => http://www.trojaner-board.de/54791-a...ner-board.html

Hinweis: Die Dateien bitte wie in der Anleitung zum UpChannel angegeben auch da hochladen. Bitte NICHT die ZIP-Dateien hier als Anhang in den Thread posten!

5.) Wenns erfolgreich war Bescheid sagen
6.) Erst dann wieder den Virenscanner einschalten
__________________
__________________

Alt 22.04.2012, 10:30   #34
Alimaus_1
 
BKA-Trojaner - Standard

BKA-Trojaner



Hallo,
der letzte Vorgang war erfolgreich.Daten wurden übermittelt.
Gruß Danie

Alt 22.04.2012, 19:17   #35
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BKA-Trojaner - Standard

BKA-Trojaner



Bitte nun Logs mit GMER und OSAM erstellen und posten.
GMER stürzt häufiger ab, wenn das Tool auch beim 2. Mal nicht will, lass es einfach weg und führ nur OSAM aus - die Online-Abfrage durch OSAM bitte überspringen.
Bei OSAM bitte darauf auch achten, dass Du das Log auch als *.log und nicht *.html oder so abspeicherst.

Hinweis: Zum Entpacken von OSAM bitte WinRAR oder 7zip verwenden! Stell auch unbedingt den Virenscanner ab, besonders der Scanner von McAfee meldet oft einen Fehalarm in OSAM!

Downloade dir bitte aswMBR.exe und speichere die Datei auf deinem Desktop.
  • Starte die aswMBR.exe - (aswMBR.exe Anleitung)
    Ab Windows Vista (oder höher) bitte mit Rechtsklick "als Administrator ausführen" starten".
  • Das Tool wird dich fragen, ob Du mit der aktuellen Virendefinition von AVAST! dein System scannen willst. Beantworte diese Frage bitte mit Ja. (Sollte deine Firewall fragen, bitte den Zugriff auf das Internet zulassen )
    Der Download der Definitionen kann je nach Verbindung eine Weile dauern.
  • Klicke auf Scan.
  • Warte bitte bis Scan finished successfully im DOS-Fenster steht.
  • Drücke auf Save Log und speichere diese auf dem Desktop.
Poste mir die aswMBR.txt in deiner nächsten Antwort.

Wichtig: Drücke keinesfalls einen der Fix Buttons ohne Anweisung

Hinweis: Sollte der Scan Button ausgeblendet sein, schließe das Tool und starte es erneut. Sollte der Scan abbrechen und das Programm abstürzen, dann teile mir das mit und wähle unter AV Scan die Einstellung (none).



Noch ein Hinweis: Sollte aswMBR abstürzen und es kommt eine Meldung wie "aswMBR.exe funktioniert nicht mehr, dann mach Folgendes:
Starte aswMBR neu, wähle unten links im Drop-Down-Menü (unten links im Fenster von aswMBR) bei "AV scan" (none) aus und klick nochmal auf den Scan-Button.

__________________
Logfiles bitte immer in CODE-Tags posten

Alt 23.04.2012, 11:00   #36
Alimaus_1
 
BKA-Trojaner - Standard

BKA-Trojaner



hi...hier sind die log's von gmer,osam und aswMBR
Gruß
Dani
Code:
ATTFilter
GMER 1.0.15.15641 - hxxp://www.gmer.net
Rootkit scan 2012-04-23 10:44:31
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4 ST3160812A rev.3.AAE
Running: hxjp93d3.exe; Driver: C:\DOKUME~1\Manuela\LOKALE~1\Temp\pgrdrpod.sys


---- System - GMER 1.0.15 ----

SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwAddBootEntry [0xBA4A6DF8]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwAllocateVirtualMemory [0xBA533A5A]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwAssignProcessToJobObject [0xBA4A785E]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwClose [0xBA4D3D5D]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateEvent [0xBA4AC2E4]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateEventPair [0xBA4AC330]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateIoCompletion [0xBA4AC422]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateKey [0xBA4D3711]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateMutant [0xBA4AC252]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateSection [0xBA4AC374]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateSemaphore [0xBA4AC29A]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateTimer [0xBA4AC3DC]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwDeleteBootEntry [0xBA4A6E44]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwDeleteKey [0xBA4D4423]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwDeleteValueKey [0xBA4D46D9]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwDuplicateObject [0xBA4A99A8]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwEnumerateKey [0xBA4D428E]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwEnumerateValueKey [0xBA4D40F9]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwFreeVirtualMemory [0xBA533B34]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwLoadDriver [0xBA4A6AD6]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwModifyBootEntry [0xBA4A6E90]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwNotifyChangeKey [0xBA4A9D1C]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwNotifyChangeMultipleKeys [0xBA4A7B02]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenEvent [0xBA4AC30E]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenEventPair [0xBA4AC352]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenIoCompletion [0xBA4AC446]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenKey [0xBA4D3A6D]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenMutant [0xBA4AC278]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenProcess [0xBA4A9518]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenSection [0xBA4AC3AE]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenSemaphore [0xBA4AC2C2]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenThread [0xBA4A974C]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenTimer [0xBA4AC400]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwProtectVirtualMemory [0xBA533CA0]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwQueryKey [0xBA4D3F74]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwQueryObject [0xBA4A79CE]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwQueryValueKey [0xBA4D3DC6]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwRenameKey [0xBA53DB68]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwRestoreKey [0xBA4D2D84]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetBootEntryOrder [0xBA4A6EDC]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetBootOptions [0xBA4A6F28]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetSystemInformation [0xBA4A6B46]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetSystemPowerState [0xBA4A6CEA]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetValueKey [0xBA4D452A]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwShutdownSystem [0xBA4A6C92]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSystemDebugControl [0xBA4A6D5A]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwTerminateProcess [0xBA533D60]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwVdmControl [0xBA4A6F74]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwWriteVirtualMemory [0xBA533BE0]

Code            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwCreateProcessEx [0xBA549D92]
Code            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ObInsertObject
Code            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ObMakeTemporaryObject

---- Kernel code sections - GMER 1.0.15 ----

PAGE            ntoskrnl.exe!ObInsertObject                                                                                          8056DA64 5 Bytes  JMP BA54874C \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)
PAGE            ntoskrnl.exe!ZwReplyWaitReceivePortEx + 3CC                                                                          805766FB 4 Bytes  CALL BA4A819F \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
PAGE            ntoskrnl.exe!ZwCreateProcessEx                                                                                       8058B9EC 7 Bytes  JMP BA549D96 \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)
PAGE            ntoskrnl.exe!ObMakeTemporaryObject                                                                                   805AD1E0 5 Bytes  JMP BA546C8C \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)
.text           C:\WINDOWS\system32\DRIVERS\ati2mtag.sys                                                                             section is writeable [0xF7669000, 0x1C5D38, 0xE8000020]
init            C:\WINDOWS\System32\DRIVERS\mohfilt.sys                                                                              entry point in "init" section [0xF892FA60]
.text           win32k.sys!EngFreeUserMem + 674                                                                                      BF8098F2 5 Bytes  JMP BA4AB180 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngFreeUserMem + 35D0                                                                                     BF80C84E 5 Bytes  JMP BA4AB07C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngDeleteSurface + 45                                                                                     BF8138E6 5 Bytes  JMP BA4AB036 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!BRUSHOBJ_pvAllocRbrush + 11D3                                                                             BF81C550 5 Bytes  JMP BA4AA724 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngSetLastError + 79A8                                                                                    BF8240C0 5 Bytes  JMP BA4A9F84 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreateBitmap + F9C                                                                                     BF828A2A 5 Bytes  JMP BA4AB2EA \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngUnmapFontFileFD + 2C50                                                                                 BF831475 5 Bytes  JMP BA4AB4F2 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngUnmapFontFileFD + B68E                                                                                 BF839EB3 5 Bytes  JMP BA4AAF3C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!FONTOBJ_pxoGetXform + 84ED                                                                                BF851745 5 Bytes  JMP BA4A9E66 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!XLATEOBJ_iXlate + F17                                                                                     BF85BC6A 5 Bytes  JMP BA4AA7E6 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!XLATEOBJ_iXlate + 3581                                                                                    BF85E2D4 5 Bytes  JMP BA4AA384 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!XLATEOBJ_iXlate + 360C                                                                                    BF85E35F 5 Bytes  JMP BA4AA562 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreatePalette + 88                                                                                     BF85F5D2 5 Bytes  JMP BA4A9E4E \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreatePalette + 5457                                                                                   BF8649A1 5 Bytes  JMP BA4AB0BA \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngGetCurrentCodePage + 4128                                                                              BF873CF0 5 Bytes  JMP BA4AA51C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngGetLastError + 1606                                                                                    BF890FA2 5 Bytes  JMP BA4AA7FE \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngGradientFill + 26EE                                                                                    BF89454D 5 Bytes  JMP BA4AB232 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngStretchBltROP + 583                                                                                    BF895025 5 Bytes  JMP BA4AB450 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCopyBits + 3857                                                                                        BF89C3CB 5 Bytes  JMP BA4AA70C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCopyBits + 4DEC                                                                                        BF89D960 5 Bytes  JMP BA4A9FF4 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngEraseSurface + A9E0                                                                                    BF8C1EE0 5 Bytes  JMP BA4AA104 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngFillPath + 1517                                                                                        BF8CA342 5 Bytes  JMP BA4AA1AC \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngFillPath + 1797                                                                                        BF8CA5C2 5 Bytes  JMP BA4AA2E4 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngDeleteSemaphore + 3B3E                                                                                 BF8EC017 5 Bytes  JMP BA4A9D52 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngDeleteSemaphore + CB3D                                                                                 BF8F5016 5 Bytes  JMP BA4AA73C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreateClip + 19DF                                                                                      BF913566 5 Bytes  JMP BA4A9F22 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreateClip + 25B3                                                                                      BF91413A 5 Bytes  JMP BA4AA0B0 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreateClip + 4F2C                                                                                      BF916AB3 5 Bytes  JMP BA4AA67C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngPlgBlt + 1940                                                                                          BF946632 5 Bytes  JMP BA4AB3A8 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           C:\WINDOWS\system32\drivers\ACEDRV05.sys                                                                             section is writeable [0xB828C000, 0x30A4A, 0xE8000020]
.pklstb         C:\WINDOWS\system32\drivers\ACEDRV05.sys                                                                             entry point in ".pklstb" section [0xB82CE000]
.relo2          C:\WINDOWS\system32\drivers\ACEDRV05.sys                                                                             unknown last section [0xB82E9000, 0x8E, 0x42000040]

---- User code sections - GMER 1.0.15 ----

.text           C:\WINDOWS\System32\svchost.exe[316] ntdll.dll!LdrLoadDll                                                            7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\svchost.exe[316] ntdll.dll!RtlDosSearchPath_U + 186                                              7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[316] ntdll.dll!LdrUnloadDll                                                          7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\svchost.exe[316] kernel32.dll!GetBinaryTypeW + 80                                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!SetServiceObjectSecurity                                           77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!ChangeServiceConfigA                                               77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!ChangeServiceConfigW                                               77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!ChangeServiceConfig2A                                              77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!ChangeServiceConfig2W                                              77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!CreateServiceA                                                     77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!CreateServiceW                                                     77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!DeleteService                                                      77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!SetWindowsHookExW                                                    7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!UnhookWindowsHookEx                                                  7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!SetWindowsHookExA                                                    7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!SetWinEventHook                                                      7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!UnhookWinEvent                                                       7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\System32\smss.exe[448] ntdll.dll!RtlDosSearchPath_U + 186                                                 7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\csrss.exe[552] ntdll.dll!RtlDosSearchPath_U + 186                                                7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\csrss.exe[552] KERNEL32.dll!GetBinaryTypeW + 80                                                  7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\winlogon.exe[608] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000701F8 
.text           C:\WINDOWS\system32\winlogon.exe[608] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\winlogon.exe[608] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000703FC 
.text           C:\WINDOWS\system32\winlogon.exe[608] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\services.exe[660] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\services.exe[660] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\services.exe[660] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\services.exe[660] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\lsass.exe[672] ntdll.dll!LdrLoadDll                                                              7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\lsass.exe[672] ntdll.dll!RtlDosSearchPath_U + 186                                                7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\lsass.exe[672] ntdll.dll!LdrUnloadDll                                                            7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\lsass.exe[672] kernel32.dll!GetBinaryTypeW + 80                                                  7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!SetServiceObjectSecurity                                             77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!ChangeServiceConfigA                                                 77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!ChangeServiceConfigW                                                 77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!ChangeServiceConfig2A                                                77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!ChangeServiceConfig2W                                                77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!CreateServiceA                                                       77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!CreateServiceW                                                       77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!DeleteService                                                        77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!SetWindowsHookExW                                                      7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!UnhookWindowsHookEx                                                    7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!SetWindowsHookExA                                                      7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!SetWinEventHook                                                        7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!UnhookWinEvent                                                         7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\Dit.exe[700] ntdll.dll!LdrLoadDll                                                                         7C92632D 5 Bytes  JMP 001401F8 
.text           C:\WINDOWS\Dit.exe[700] ntdll.dll!RtlDosSearchPath_U + 186                                                           7C926865 1 Byte  [62]
.text           C:\WINDOWS\Dit.exe[700] ntdll.dll!LdrUnloadDll                                                                       7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\WINDOWS\Dit.exe[700] kernel32.dll!GetBinaryTypeW + 80                                                             7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!SetServiceObjectSecurity                                                        77E06D81 5 Bytes  JMP 00381014 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!ChangeServiceConfigA                                                            77E06E69 5 Bytes  JMP 00380804 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!ChangeServiceConfigW                                                            77E07001 5 Bytes  JMP 00380A08 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!ChangeServiceConfig2A                                                           77E07101 5 Bytes  JMP 00380C0C 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!ChangeServiceConfig2W                                                           77E07189 5 Bytes  JMP 00380E10 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!CreateServiceA                                                                  77E07211 5 Bytes  JMP 003801F8 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!CreateServiceW                                                                  77E073A9 5 Bytes  JMP 003803FC 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!DeleteService                                                                   77E074B1 5 Bytes  JMP 00380600 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!SetWindowsHookExW                                                                 7E37820F 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!UnhookWindowsHookEx                                                               7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!SetWindowsHookExA                                                                 7E381211 5 Bytes  JMP 00390600 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!SetWinEventHook                                                                   7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!UnhookWinEvent                                                                    7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!UnhookWinEvent + 4                                                                7E3818B0 1 Byte  [82]
.text           C:\WINDOWS\System32\svchost.exe[836] ntdll.dll!LdrLoadDll                                                            7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\svchost.exe[836] ntdll.dll!RtlDosSearchPath_U + 186                                              7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[836] ntdll.dll!LdrUnloadDll                                                          7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\svchost.exe[836] kernel32.dll!GetBinaryTypeW + 80                                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!SetServiceObjectSecurity                                           77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!ChangeServiceConfigA                                               77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!ChangeServiceConfigW                                               77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!ChangeServiceConfig2A                                              77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!ChangeServiceConfig2W                                              77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!CreateServiceA                                                     77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!CreateServiceW                                                     77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!DeleteService                                                      77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!SetWindowsHookExW                                                    7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!UnhookWindowsHookEx                                                  7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!SetWindowsHookExA                                                    7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!SetWinEventHook                                                      7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!UnhookWinEvent                                                       7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 001501F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 001503FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 00390600 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!UnhookWinEvent                                                      7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!UnhookWinEvent + 4                                                  7E3818B0 1 Byte  [82]
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 003A1014 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 003A0804 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 003A0A08 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 003A0C0C 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 003A0E10 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 003A01F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 003A03FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 003A0600 
.text           C:\WINDOWS\system32\svchost.exe[856] ntdll.dll!LdrLoadDll                                                            7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\svchost.exe[856] ntdll.dll!RtlDosSearchPath_U + 186                                              7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[856] ntdll.dll!LdrUnloadDll                                                          7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\svchost.exe[856] kernel32.dll!GetBinaryTypeW + 80                                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!SetServiceObjectSecurity                                           77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!ChangeServiceConfigA                                               77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!ChangeServiceConfigW                                               77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!ChangeServiceConfig2A                                              77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!ChangeServiceConfig2W                                              77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!CreateServiceA                                                     77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!CreateServiceW                                                     77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!DeleteService                                                      77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!SetWindowsHookExW                                                    7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!UnhookWindowsHookEx                                                  7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!SetWindowsHookExA                                                    7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!SetWinEventHook                                                      7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!UnhookWinEvent                                                       7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\mHotkey.exe[900] ntdll.dll!LdrLoadDll                                                                     7C92632D 5 Bytes  JMP 001401F8 
.text           C:\WINDOWS\mHotkey.exe[900] ntdll.dll!RtlDosSearchPath_U + 186                                                       7C926865 1 Byte  [62]
.text           C:\WINDOWS\mHotkey.exe[900] ntdll.dll!LdrUnloadDll                                                                   7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\WINDOWS\mHotkey.exe[900] kernel32.dll!GetBinaryTypeW + 80                                                         7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!SetWindowsHookExW                                                             7E37820F 5 Bytes  JMP 00380804 
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!UnhookWindowsHookEx                                                           7E37D5F3 3 Bytes  JMP 00380A08 
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!UnhookWindowsHookEx + 4                                                       7E37D5F7 1 Byte  [82]
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!SetWindowsHookExA                                                             7E381211 5 Bytes  JMP 00380600 
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!SetWinEventHook                                                               7E3817F7 5 Bytes  JMP 003801F8 
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!UnhookWinEvent                                                                7E3818AC 5 Bytes  JMP 003803FC 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!SetServiceObjectSecurity                                                    77E06D81 3 Bytes  JMP 00391014 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!SetServiceObjectSecurity + 4                                                77E06D85 1 Byte  [88]
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!ChangeServiceConfigA                                                        77E06E69 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!ChangeServiceConfigW                                                        77E07001 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!ChangeServiceConfig2A                                                       77E07101 5 Bytes  JMP 00390C0C 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!ChangeServiceConfig2W                                                       77E07189 5 Bytes  JMP 00390E10 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!CreateServiceA                                                              77E07211 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!CreateServiceW                                                              77E073A9 5 Bytes  JMP 003903FC 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!DeleteService                                                               77E074B1 5 Bytes  JMP 00390600 
.text           C:\WINDOWS\system32\svchost.exe[936] ntdll.dll!LdrLoadDll                                                            7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\svchost.exe[936] ntdll.dll!RtlDosSearchPath_U + 186                                              7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[936] ntdll.dll!LdrUnloadDll                                                          7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!GetBinaryTypeW + 80                                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!SetServiceObjectSecurity                                           77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!ChangeServiceConfigA                                               77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!ChangeServiceConfigW                                               77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!ChangeServiceConfig2A                                              77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!ChangeServiceConfig2W                                              77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!CreateServiceA                                                     77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!CreateServiceW                                                     77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!DeleteService                                                      77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!SetWindowsHookExW                                                    7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!UnhookWindowsHookEx                                                  7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!SetWindowsHookExA                                                    7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!SetWinEventHook                                                      7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!UnhookWinEvent                                                       7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\Programme\AVAST Software\Avast\avastUI.exe[984] ntdll.dll!RtlDosSearchPath_U + 186                                7C926865 1 Byte  [62]
.text           C:\Programme\AVAST Software\Avast\avastUI.exe[984] kernel32.dll!GetBinaryTypeW + 80                                  7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\ctfmon.exe[992] ntdll.dll!LdrLoadDll                                                             7C92632D 5 Bytes  JMP 000A01F8 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ntdll.dll!RtlDosSearchPath_U + 186                                               7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\ctfmon.exe[992] ntdll.dll!LdrUnloadDll                                                           7C9271CD 5 Bytes  JMP 000A03FC 
.text           C:\WINDOWS\system32\ctfmon.exe[992] kernel32.dll!GetBinaryTypeW + 80                                                 7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!SetServiceObjectSecurity                                            77E06D81 5 Bytes  JMP 002C1014 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!ChangeServiceConfigA                                                77E06E69 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!ChangeServiceConfigW                                                77E07001 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!ChangeServiceConfig2A                                               77E07101 5 Bytes  JMP 002C0C0C 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!ChangeServiceConfig2W                                               77E07189 5 Bytes  JMP 002C0E10 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!CreateServiceA                                                      77E07211 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!CreateServiceW                                                      77E073A9 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!DeleteService                                                       77E074B1 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!SetWindowsHookExW                                                     7E37820F 5 Bytes  JMP 002D0804 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!UnhookWindowsHookEx                                                   7E37D5F3 5 Bytes  JMP 002D0A08 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!SetWindowsHookExA                                                     7E381211 5 Bytes  JMP 002D0600 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!SetWinEventHook                                                       7E3817F7 5 Bytes  JMP 002D01F8 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!UnhookWinEvent                                                        7E3818AC 5 Bytes  JMP 002D03FC 
.text           C:\WINDOWS\System32\svchost.exe[1004] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\svchost.exe[1004] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[1004] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\svchost.exe[1004] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\System32\svchost.exe[1068] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\svchost.exe[1068] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[1068] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ntdll.dll!LdrLoadDll                                                        7C92632D 5 Bytes  JMP 001401F8 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ntdll.dll!RtlDosSearchPath_U + 186                                          7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\UAService7.exe[1136] ntdll.dll!LdrUnloadDll                                                      7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\WINDOWS\system32\UAService7.exe[1136] kernel32.dll!GetBinaryTypeW + 80                                            7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!SetServiceObjectSecurity                                       77E06D81 5 Bytes  JMP 00381014 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!ChangeServiceConfigA                                           77E06E69 5 Bytes  JMP 00380804 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!ChangeServiceConfigW                                           77E07001 5 Bytes  JMP 00380A08 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!ChangeServiceConfig2A                                          77E07101 5 Bytes  JMP 00380C0C 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!ChangeServiceConfig2W                                          77E07189 5 Bytes  JMP 00380E10 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!CreateServiceA                                                 77E07211 5 Bytes  JMP 003801F8 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!CreateServiceW                                                 77E073A9 5 Bytes  JMP 003803FC 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!DeleteService                                                  77E074B1 5 Bytes  JMP 00380600 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ntdll.dll!LdrLoadDll                                                          7C92632D 5 Bytes  JMP 001501F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ntdll.dll!RtlDosSearchPath_U + 186                                            7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ntdll.dll!LdrUnloadDll                                                        7C9271CD 5 Bytes  JMP 001503FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] kernel32.dll!GetBinaryTypeW + 80                                              7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!SetWindowsHookExW                                                  7E37820F 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!UnhookWindowsHookEx                                                7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!SetWindowsHookExA                                                  7E381211 5 Bytes  JMP 00390600 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!SetWinEventHook                                                    7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!UnhookWinEvent                                                     7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!UnhookWinEvent + 4                                                 7E3818B0 1 Byte  [82]
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!SetServiceObjectSecurity                                         77E06D81 5 Bytes  JMP 003A1014 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!ChangeServiceConfigA                                             77E06E69 5 Bytes  JMP 003A0804 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!ChangeServiceConfigW                                             77E07001 5 Bytes  JMP 003A0A08 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!ChangeServiceConfig2A                                            77E07101 5 Bytes  JMP 003A0C0C 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!ChangeServiceConfig2W                                            77E07189 5 Bytes  JMP 003A0E10 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!CreateServiceA                                                   77E07211 5 Bytes  JMP 003A01F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!CreateServiceW                                                   77E073A9 5 Bytes  JMP 003A03FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!DeleteService                                                    77E074B1 5 Bytes  JMP 003A0600 
.text           C:\WINDOWS\system32\svchost.exe[1220] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\svchost.exe[1220] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[1220] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\svchost.exe[1220] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\DitExp.exe[1400] ntdll.dll!LdrLoadDll                                                                     7C92632D 5 Bytes  JMP 001401F8 
.text           C:\WINDOWS\DitExp.exe[1400] ntdll.dll!RtlDosSearchPath_U + 186                                                       7C926865 1 Byte  [62]
.text           C:\WINDOWS\DitExp.exe[1400] ntdll.dll!LdrUnloadDll                                                                   7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\WINDOWS\DitExp.exe[1400] kernel32.dll!GetBinaryTypeW + 80                                                         7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!SetWindowsHookExW                                                             7E37820F 5 Bytes  JMP 00380804 
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!UnhookWindowsHookEx                                                           7E37D5F3 3 Bytes  JMP 00380A08 
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!UnhookWindowsHookEx + 4                                                       7E37D5F7 1 Byte  [82]
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!SetWindowsHookExA                                                             7E381211 5 Bytes  JMP 00380600 
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!SetWinEventHook                                                               7E3817F7 5 Bytes  JMP 003801F8 
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!UnhookWinEvent                                                                7E3818AC 5 Bytes  JMP 003803FC 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!SetServiceObjectSecurity                                                    77E06D81 3 Bytes  JMP 00391014 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!SetServiceObjectSecurity + 4                                                77E06D85 1 Byte  [88]
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!ChangeServiceConfigA                                                        77E06E69 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!ChangeServiceConfigW                                                        77E07001 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!ChangeServiceConfig2A                                                       77E07101 5 Bytes  JMP 00390C0C 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!ChangeServiceConfig2W                                                       77E07189 5 Bytes  JMP 00390E10 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!CreateServiceA                                                              77E07211 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!CreateServiceW                                                              77E073A9 5 Bytes  JMP 003903FC 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!DeleteService                                                               77E074B1 5 Bytes  JMP 00390600 
.text           C:\Dokumente und Einstellungen\Manuela\Desktop\hxjp93d3.exe[1452] ntdll.dll!RtlDosSearchPath_U + 186                 7C926865 1 Byte  [62]
.text           C:\Dokumente und Einstellungen\Manuela\Desktop\hxjp93d3.exe[1452] kernel32.dll!GetBinaryTypeW + 80                   7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\Explorer.EXE[1472] ntdll.dll!LdrLoadDll                                                                   7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\Explorer.EXE[1472] ntdll.dll!RtlDosSearchPath_U + 186                                                     7C926865 1 Byte  [62]
.text           C:\WINDOWS\Explorer.EXE[1472] ntdll.dll!LdrUnloadDll                                                                 7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\Explorer.EXE[1472] kernel32.dll!GetBinaryTypeW + 80                                                       7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!SetServiceObjectSecurity                                                  77E06D81 5 Bytes  JMP 002C1014 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!ChangeServiceConfigA                                                      77E06E69 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!ChangeServiceConfigW                                                      77E07001 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!ChangeServiceConfig2A                                                     77E07101 5 Bytes  JMP 002C0C0C 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!ChangeServiceConfig2W                                                     77E07189 5 Bytes  JMP 002C0E10 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!CreateServiceA                                                            77E07211 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!CreateServiceW                                                            77E073A9 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!DeleteService                                                             77E074B1 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!SetWindowsHookExW                                                           7E37820F 5 Bytes  JMP 002D0804 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!UnhookWindowsHookEx                                                         7E37D5F3 5 Bytes  JMP 002D0A08 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!SetWindowsHookExA                                                           7E381211 5 Bytes  JMP 002D0600 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!SetWinEventHook                                                             7E3817F7 5 Bytes  JMP 002D01F8 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!UnhookWinEvent                                                              7E3818AC 5 Bytes  JMP 002D03FC 
.text           C:\Programme\AVAST Software\Avast\AvastSvc.exe[1576] ntdll.dll!RtlDosSearchPath_U + 186                              7C926865 1 Byte  [62]
.text           C:\Programme\AVAST Software\Avast\AvastSvc.exe[1576] kernel32.dll!SetUnhandledExceptionFilter                        7C84495D 4 Bytes  [C2, 04, 00, 90] {RET 0x4; NOP }
.text           C:\Programme\AVAST Software\Avast\AvastSvc.exe[1576] kernel32.dll!GetBinaryTypeW + 80                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\System32\alg.exe[1728] ntdll.dll!LdrLoadDll                                                               7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\alg.exe[1728] ntdll.dll!RtlDosSearchPath_U + 186                                                 7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\alg.exe[1728] ntdll.dll!LdrUnloadDll                                                             7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\alg.exe[1728] kernel32.dll!GetBinaryTypeW + 80                                                   7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!SetWindowsHookExW                                                       7E37820F 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!UnhookWindowsHookEx                                                     7E37D5F3 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!SetWindowsHookExA                                                       7E381211 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!SetWinEventHook                                                         7E3817F7 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!UnhookWinEvent                                                          7E3818AC 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!SetServiceObjectSecurity                                              77E06D81 5 Bytes  JMP 002C1014 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!ChangeServiceConfigA                                                  77E06E69 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!ChangeServiceConfigW                                                  77E07001 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!ChangeServiceConfig2A                                                 77E07101 5 Bytes  JMP 002C0C0C 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!ChangeServiceConfig2W                                                 77E07189 5 Bytes  JMP 002C0E10 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!CreateServiceA                                                        77E07211 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!CreateServiceW                                                        77E073A9 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!DeleteService                                                         77E074B1 5 Bytes  JMP 002C0600 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ntdll.dll!LdrLoadDll                                                        7C92632D 5 Bytes  JMP 001501F8 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ntdll.dll!RtlDosSearchPath_U + 186                                          7C926865 1 Byte  [62]
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ntdll.dll!LdrUnloadDll                                                      7C9271CD 5 Bytes  JMP 001503FC 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] kernel32.dll!GetBinaryTypeW + 80                                            7C868D8C 1 Byte  [62]
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!SetServiceObjectSecurity                                       77E06D81 3 Bytes  JMP 00391014 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!SetServiceObjectSecurity + 4                                   77E06D85 1 Byte  [88]
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!ChangeServiceConfigA                                           77E06E69 5 Bytes  JMP 00390804 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!ChangeServiceConfigW                                           77E07001 5 Bytes  JMP 00390A08 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!ChangeServiceConfig2A                                          77E07101 5 Bytes  JMP 00390C0C 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!ChangeServiceConfig2W                                          77E07189 5 Bytes  JMP 00390E10 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!CreateServiceA                                                 77E07211 5 Bytes  JMP 003901F8 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!CreateServiceW                                                 77E073A9 5 Bytes  JMP 003903FC 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!DeleteService                                                  77E074B1 5 Bytes  JMP 00390600 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!SetWindowsHookExW                                                7E37820F 5 Bytes  JMP 003A0804 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!UnhookWindowsHookEx                                              7E37D5F3 5 Bytes  JMP 003A0A08 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!SetWindowsHookExA                                                7E381211 5 Bytes  JMP 003A0600 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!SetWinEventHook                                                  7E3817F7 5 Bytes  JMP 003A01F8 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!UnhookWinEvent                                                   7E3818AC 5 Bytes  JMP 003A03FC 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000A01F8 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000A03FC 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002C1014 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002C0C0C 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002C0E10 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002D0804 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002D0A08 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002D0600 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002D01F8 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002D03FC 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ntdll.dll!LdrLoadDll                                      7C92632D 5 Bytes  JMP 001401F8 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ntdll.dll!RtlDosSearchPath_U + 186                        7C926865 1 Byte  [62]
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ntdll.dll!LdrUnloadDll                                    7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] kernel32.dll!GetBinaryTypeW + 80                          7C868D8C 1 Byte  [62]
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!SetServiceObjectSecurity                     77E06D81 5 Bytes  JMP 00381014 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!ChangeServiceConfigA                         77E06E69 5 Bytes  JMP 00380804 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!ChangeServiceConfigW                         77E07001 5 Bytes  JMP 00380A08 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!ChangeServiceConfig2A                        77E07101 5 Bytes  JMP 00380C0C 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!ChangeServiceConfig2W                        77E07189 5 Bytes  JMP 00380E10 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!CreateServiceA                               77E07211 5 Bytes  JMP 003801F8 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!CreateServiceW                               77E073A9 5 Bytes  JMP 003803FC 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!DeleteService                                77E074B1 5 Bytes  JMP 00380600 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ntdll.dll!LdrLoadDll                                        7C92632D 5 Bytes  JMP 001401F8 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ntdll.dll!RtlDosSearchPath_U + 186                          7C926865 1 Byte  [62]
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ntdll.dll!LdrUnloadDll                                      7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] kernel32.dll!GetBinaryTypeW + 80                            7C868D8C 1 Byte  [62]
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!SetServiceObjectSecurity                       77E06D81 5 Bytes  JMP 00381014 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!ChangeServiceConfigA                           77E06E69 5 Bytes  JMP 00380804 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!ChangeServiceConfigW                           77E07001 5 Bytes  JMP 00380A08 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!ChangeServiceConfig2A                          77E07101 5 Bytes  JMP 00380C0C 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!ChangeServiceConfig2W                          77E07189 5 Bytes  JMP 00380E10 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!CreateServiceA                                 77E07211 5 Bytes  JMP 003801F8 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!CreateServiceW                                 77E073A9 5 Bytes  JMP 003803FC 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!DeleteService                                  77E074B1 5 Bytes  JMP 00380600 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!SetWindowsHookExW                                7E37820F 5 Bytes  JMP 00390804 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!UnhookWindowsHookEx                              7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!SetWindowsHookExA                                7E381211 5 Bytes  JMP 00390600 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!SetWinEventHook                                  7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!UnhookWinEvent                                   7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!UnhookWinEvent + 4                               7E3818B0 1 Byte  [82]
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ntdll.dll!LdrLoadDll                                                 7C92632D 5 Bytes  JMP 001401F8 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ntdll.dll!RtlDosSearchPath_U + 186                                   7C926865 1 Byte  [62]
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ntdll.dll!LdrUnloadDll                                               7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] kernel32.dll!GetBinaryTypeW + 80                                     7C868D8C 1 Byte  [62]
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!SetServiceObjectSecurity                                77E06D81 5 Bytes  JMP 00381014 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!ChangeServiceConfigA                                    77E06E69 5 Bytes  JMP 00380804 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!ChangeServiceConfigW                                    77E07001 5 Bytes  JMP 00380A08 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!ChangeServiceConfig2A                                   77E07101 5 Bytes  JMP 00380C0C 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!ChangeServiceConfig2W                                   77E07189 5 Bytes  JMP 00380E10 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!CreateServiceA                                          77E07211 5 Bytes  JMP 003801F8 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!CreateServiceW                                          77E073A9 5 Bytes  JMP 003803FC 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!DeleteService                                           77E074B1 5 Bytes  JMP 00380600 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!SetWindowsHookExW                                         7E37820F 5 Bytes  JMP 00390804 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!UnhookWindowsHookEx                                       7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!SetWindowsHookExA                                         7E381211 5 Bytes  JMP 00390600 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!SetWinEventHook                                           7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!UnhookWinEvent                                            7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!UnhookWinEvent + 4                                        7E3818B0 1 Byte  [82]

---- User IAT/EAT - GMER 1.0.15 ----

IAT             C:\WINDOWS\system32\services.exe[660] @ C:\WINDOWS\system32\services.exe [ADVAPI32.dll!CreateProcessAsUserW]         005E0002
IAT             C:\WINDOWS\system32\services.exe[660] @ C:\WINDOWS\system32\services.exe [KERNEL32.dll!CreateProcessW]               005E0000
IAT             C:\Programme\AVAST Software\Avast\avastUI.exe[984] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryExW]    [64C8F6A0] C:\Programme\AVAST Software\Avast\aswCmnBS.dll (Common functions/AVAST Software)
IAT             C:\Programme\AVAST Software\Avast\AvastSvc.exe[1576] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryExW]  [64C8F6A0] C:\Programme\AVAST Software\Avast\aswCmnBS.dll (Common functions/AVAST Software)

---- Devices - GMER 1.0.15 ----

Device          \FileSystem\Ntfs \Ntfs                                                                                               aswSP.SYS (avast! self protection module/AVAST Software)

AttachedDevice  \FileSystem\Ntfs \Ntfs                                                                                               aswMon2.SYS (avast! File System Filter Driver for Windows XP/AVAST Software)

Device          \FileSystem\Fastfat \FatCdrom                                                                                        aswSP.SYS (avast! self protection module/AVAST Software)

AttachedDevice  \Driver\Tcpip \Device\Ip                                                                                             aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice  \Driver\Tcpip \Device\Tcp                                                                                            aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice  \Driver\Tcpip \Device\Udp                                                                                            aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice  \Driver\Tcpip \Device\RawIp                                                                                          aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)

Device          \FileSystem\Fastfat \Fat                                                                                             aswSP.SYS (avast! self protection module/AVAST Software)

AttachedDevice  \FileSystem\Fastfat \Fat                                                                                             fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice  \FileSystem\Fastfat \Fat                                                                                             aswMon2.SYS (avast! File System Filter Driver for Windows XP/AVAST Software)

Device          \FileSystem\Cdfs \Cdfs                                                                                               B77E2400

---- EOF - GMER 1.0.15 ----
         

Alt 23.04.2012, 11:01   #37
Alimaus_1
 
BKA-Trojaner - Standard

BKA-Trojaner



Code:
ATTFilter
GMER 1.0.15.15641 - hxxp://www.gmer.net
Rootkit scan 2012-04-23 10:44:31
Windows 5.1.2600 Service Pack 3 Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4 ST3160812A rev.3.AAE
Running: hxjp93d3.exe; Driver: C:\DOKUME~1\Manuela\LOKALE~1\Temp\pgrdrpod.sys


---- System - GMER 1.0.15 ----

SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwAddBootEntry [0xBA4A6DF8]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwAllocateVirtualMemory [0xBA533A5A]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwAssignProcessToJobObject [0xBA4A785E]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwClose [0xBA4D3D5D]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateEvent [0xBA4AC2E4]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateEventPair [0xBA4AC330]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateIoCompletion [0xBA4AC422]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateKey [0xBA4D3711]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateMutant [0xBA4AC252]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateSection [0xBA4AC374]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateSemaphore [0xBA4AC29A]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwCreateTimer [0xBA4AC3DC]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwDeleteBootEntry [0xBA4A6E44]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwDeleteKey [0xBA4D4423]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwDeleteValueKey [0xBA4D46D9]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwDuplicateObject [0xBA4A99A8]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwEnumerateKey [0xBA4D428E]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwEnumerateValueKey [0xBA4D40F9]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwFreeVirtualMemory [0xBA533B34]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwLoadDriver [0xBA4A6AD6]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwModifyBootEntry [0xBA4A6E90]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwNotifyChangeKey [0xBA4A9D1C]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwNotifyChangeMultipleKeys [0xBA4A7B02]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenEvent [0xBA4AC30E]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenEventPair [0xBA4AC352]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenIoCompletion [0xBA4AC446]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenKey [0xBA4D3A6D]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenMutant [0xBA4AC278]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenProcess [0xBA4A9518]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenSection [0xBA4AC3AE]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenSemaphore [0xBA4AC2C2]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenThread [0xBA4A974C]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwOpenTimer [0xBA4AC400]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwProtectVirtualMemory [0xBA533CA0]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwQueryKey [0xBA4D3F74]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwQueryObject [0xBA4A79CE]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwQueryValueKey [0xBA4D3DC6]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwRenameKey [0xBA53DB68]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwRestoreKey [0xBA4D2D84]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetBootEntryOrder [0xBA4A6EDC]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetBootOptions [0xBA4A6F28]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetSystemInformation [0xBA4A6B46]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetSystemPowerState [0xBA4A6CEA]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSetValueKey [0xBA4D452A]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwShutdownSystem [0xBA4A6C92]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwSystemDebugControl [0xBA4A6D5A]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwTerminateProcess [0xBA533D60]
SSDT            \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)                                ZwVdmControl [0xBA4A6F74]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwWriteVirtualMemory [0xBA533BE0]

Code            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ZwCreateProcessEx [0xBA549D92]
Code            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ObInsertObject
Code            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                ObMakeTemporaryObject

---- Kernel code sections - GMER 1.0.15 ----

PAGE            ntoskrnl.exe!ObInsertObject                                                                                          8056DA64 5 Bytes  JMP BA54874C \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)
PAGE            ntoskrnl.exe!ZwReplyWaitReceivePortEx + 3CC                                                                          805766FB 4 Bytes  CALL BA4A819F \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
PAGE            ntoskrnl.exe!ZwCreateProcessEx                                                                                       8058B9EC 7 Bytes  JMP BA549D96 \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)
PAGE            ntoskrnl.exe!ObMakeTemporaryObject                                                                                   805AD1E0 5 Bytes  JMP BA546C8C \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)
.text           C:\WINDOWS\system32\DRIVERS\ati2mtag.sys                                                                             section is writeable [0xF7669000, 0x1C5D38, 0xE8000020]
init            C:\WINDOWS\System32\DRIVERS\mohfilt.sys                                                                              entry point in "init" section [0xF892FA60]
.text           win32k.sys!EngFreeUserMem + 674                                                                                      BF8098F2 5 Bytes  JMP BA4AB180 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngFreeUserMem + 35D0                                                                                     BF80C84E 5 Bytes  JMP BA4AB07C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngDeleteSurface + 45                                                                                     BF8138E6 5 Bytes  JMP BA4AB036 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!BRUSHOBJ_pvAllocRbrush + 11D3                                                                             BF81C550 5 Bytes  JMP BA4AA724 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngSetLastError + 79A8                                                                                    BF8240C0 5 Bytes  JMP BA4A9F84 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreateBitmap + F9C                                                                                     BF828A2A 5 Bytes  JMP BA4AB2EA \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngUnmapFontFileFD + 2C50                                                                                 BF831475 5 Bytes  JMP BA4AB4F2 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngUnmapFontFileFD + B68E                                                                                 BF839EB3 5 Bytes  JMP BA4AAF3C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!FONTOBJ_pxoGetXform + 84ED                                                                                BF851745 5 Bytes  JMP BA4A9E66 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!XLATEOBJ_iXlate + F17                                                                                     BF85BC6A 5 Bytes  JMP BA4AA7E6 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!XLATEOBJ_iXlate + 3581                                                                                    BF85E2D4 5 Bytes  JMP BA4AA384 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!XLATEOBJ_iXlate + 360C                                                                                    BF85E35F 5 Bytes  JMP BA4AA562 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreatePalette + 88                                                                                     BF85F5D2 5 Bytes  JMP BA4A9E4E \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreatePalette + 5457                                                                                   BF8649A1 5 Bytes  JMP BA4AB0BA \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngGetCurrentCodePage + 4128                                                                              BF873CF0 5 Bytes  JMP BA4AA51C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngGetLastError + 1606                                                                                    BF890FA2 5 Bytes  JMP BA4AA7FE \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngGradientFill + 26EE                                                                                    BF89454D 5 Bytes  JMP BA4AB232 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngStretchBltROP + 583                                                                                    BF895025 5 Bytes  JMP BA4AB450 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCopyBits + 3857                                                                                        BF89C3CB 5 Bytes  JMP BA4AA70C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCopyBits + 4DEC                                                                                        BF89D960 5 Bytes  JMP BA4A9FF4 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngEraseSurface + A9E0                                                                                    BF8C1EE0 5 Bytes  JMP BA4AA104 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngFillPath + 1517                                                                                        BF8CA342 5 Bytes  JMP BA4AA1AC \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngFillPath + 1797                                                                                        BF8CA5C2 5 Bytes  JMP BA4AA2E4 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngDeleteSemaphore + 3B3E                                                                                 BF8EC017 5 Bytes  JMP BA4A9D52 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngDeleteSemaphore + CB3D                                                                                 BF8F5016 5 Bytes  JMP BA4AA73C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreateClip + 19DF                                                                                      BF913566 5 Bytes  JMP BA4A9F22 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreateClip + 25B3                                                                                      BF91413A 5 Bytes  JMP BA4AA0B0 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngCreateClip + 4F2C                                                                                      BF916AB3 5 Bytes  JMP BA4AA67C \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           win32k.sys!EngPlgBlt + 1940                                                                                          BF946632 5 Bytes  JMP BA4AB3A8 \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software)
.text           C:\WINDOWS\system32\drivers\ACEDRV05.sys                                                                             section is writeable [0xB828C000, 0x30A4A, 0xE8000020]
.pklstb         C:\WINDOWS\system32\drivers\ACEDRV05.sys                                                                             entry point in ".pklstb" section [0xB82CE000]
.relo2          C:\WINDOWS\system32\drivers\ACEDRV05.sys                                                                             unknown last section [0xB82E9000, 0x8E, 0x42000040]

---- User code sections - GMER 1.0.15 ----

.text           C:\WINDOWS\System32\svchost.exe[316] ntdll.dll!LdrLoadDll                                                            7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\svchost.exe[316] ntdll.dll!RtlDosSearchPath_U + 186                                              7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[316] ntdll.dll!LdrUnloadDll                                                          7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\svchost.exe[316] kernel32.dll!GetBinaryTypeW + 80                                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!SetServiceObjectSecurity                                           77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!ChangeServiceConfigA                                               77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!ChangeServiceConfigW                                               77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!ChangeServiceConfig2A                                              77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!ChangeServiceConfig2W                                              77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!CreateServiceA                                                     77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!CreateServiceW                                                     77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\svchost.exe[316] ADVAPI32.dll!DeleteService                                                      77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!SetWindowsHookExW                                                    7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!UnhookWindowsHookEx                                                  7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!SetWindowsHookExA                                                    7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!SetWinEventHook                                                      7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\svchost.exe[316] USER32.dll!UnhookWinEvent                                                       7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\System32\smss.exe[448] ntdll.dll!RtlDosSearchPath_U + 186                                                 7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\csrss.exe[552] ntdll.dll!RtlDosSearchPath_U + 186                                                7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\csrss.exe[552] KERNEL32.dll!GetBinaryTypeW + 80                                                  7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\winlogon.exe[608] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000701F8 
.text           C:\WINDOWS\system32\winlogon.exe[608] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\winlogon.exe[608] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000703FC 
.text           C:\WINDOWS\system32\winlogon.exe[608] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\winlogon.exe[608] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\winlogon.exe[608] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\services.exe[660] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\services.exe[660] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\services.exe[660] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\services.exe[660] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\services.exe[660] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\services.exe[660] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\lsass.exe[672] ntdll.dll!LdrLoadDll                                                              7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\lsass.exe[672] ntdll.dll!RtlDosSearchPath_U + 186                                                7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\lsass.exe[672] ntdll.dll!LdrUnloadDll                                                            7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\lsass.exe[672] kernel32.dll!GetBinaryTypeW + 80                                                  7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!SetServiceObjectSecurity                                             77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!ChangeServiceConfigA                                                 77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!ChangeServiceConfigW                                                 77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!ChangeServiceConfig2A                                                77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!ChangeServiceConfig2W                                                77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!CreateServiceA                                                       77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!CreateServiceW                                                       77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\lsass.exe[672] ADVAPI32.dll!DeleteService                                                        77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!SetWindowsHookExW                                                      7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!UnhookWindowsHookEx                                                    7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!SetWindowsHookExA                                                      7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!SetWinEventHook                                                        7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\lsass.exe[672] USER32.dll!UnhookWinEvent                                                         7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\Dit.exe[700] ntdll.dll!LdrLoadDll                                                                         7C92632D 5 Bytes  JMP 001401F8 
.text           C:\WINDOWS\Dit.exe[700] ntdll.dll!RtlDosSearchPath_U + 186                                                           7C926865 1 Byte  [62]
.text           C:\WINDOWS\Dit.exe[700] ntdll.dll!LdrUnloadDll                                                                       7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\WINDOWS\Dit.exe[700] kernel32.dll!GetBinaryTypeW + 80                                                             7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!SetServiceObjectSecurity                                                        77E06D81 5 Bytes  JMP 00381014 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!ChangeServiceConfigA                                                            77E06E69 5 Bytes  JMP 00380804 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!ChangeServiceConfigW                                                            77E07001 5 Bytes  JMP 00380A08 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!ChangeServiceConfig2A                                                           77E07101 5 Bytes  JMP 00380C0C 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!ChangeServiceConfig2W                                                           77E07189 5 Bytes  JMP 00380E10 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!CreateServiceA                                                                  77E07211 5 Bytes  JMP 003801F8 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!CreateServiceW                                                                  77E073A9 5 Bytes  JMP 003803FC 
.text           C:\WINDOWS\Dit.exe[700] ADVAPI32.dll!DeleteService                                                                   77E074B1 5 Bytes  JMP 00380600 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!SetWindowsHookExW                                                                 7E37820F 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!UnhookWindowsHookEx                                                               7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!SetWindowsHookExA                                                                 7E381211 5 Bytes  JMP 00390600 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!SetWinEventHook                                                                   7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!UnhookWinEvent                                                                    7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\WINDOWS\Dit.exe[700] USER32.dll!UnhookWinEvent + 4                                                                7E3818B0 1 Byte  [82]
.text           C:\WINDOWS\System32\svchost.exe[836] ntdll.dll!LdrLoadDll                                                            7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\svchost.exe[836] ntdll.dll!RtlDosSearchPath_U + 186                                              7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[836] ntdll.dll!LdrUnloadDll                                                          7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\svchost.exe[836] kernel32.dll!GetBinaryTypeW + 80                                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!SetServiceObjectSecurity                                           77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!ChangeServiceConfigA                                               77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!ChangeServiceConfigW                                               77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!ChangeServiceConfig2A                                              77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!ChangeServiceConfig2W                                              77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!CreateServiceA                                                     77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!CreateServiceW                                                     77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\svchost.exe[836] ADVAPI32.dll!DeleteService                                                      77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!SetWindowsHookExW                                                    7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!UnhookWindowsHookEx                                                  7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!SetWindowsHookExA                                                    7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!SetWinEventHook                                                      7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\svchost.exe[836] USER32.dll!UnhookWinEvent                                                       7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 001501F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 001503FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 00390600 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!UnhookWinEvent                                                      7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] USER32.dll!UnhookWinEvent + 4                                                  7E3818B0 1 Byte  [82]
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 003A1014 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 003A0804 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 003A0A08 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 003A0C0C 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 003A0E10 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 003A01F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 003A03FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[840] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 003A0600 
.text           C:\WINDOWS\system32\svchost.exe[856] ntdll.dll!LdrLoadDll                                                            7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\svchost.exe[856] ntdll.dll!RtlDosSearchPath_U + 186                                              7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[856] ntdll.dll!LdrUnloadDll                                                          7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\svchost.exe[856] kernel32.dll!GetBinaryTypeW + 80                                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!SetServiceObjectSecurity                                           77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!ChangeServiceConfigA                                               77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!ChangeServiceConfigW                                               77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!ChangeServiceConfig2A                                              77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!ChangeServiceConfig2W                                              77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!CreateServiceA                                                     77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!CreateServiceW                                                     77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\svchost.exe[856] ADVAPI32.dll!DeleteService                                                      77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!SetWindowsHookExW                                                    7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!UnhookWindowsHookEx                                                  7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!SetWindowsHookExA                                                    7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!SetWinEventHook                                                      7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\svchost.exe[856] USER32.dll!UnhookWinEvent                                                       7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\mHotkey.exe[900] ntdll.dll!LdrLoadDll                                                                     7C92632D 5 Bytes  JMP 001401F8 
.text           C:\WINDOWS\mHotkey.exe[900] ntdll.dll!RtlDosSearchPath_U + 186                                                       7C926865 1 Byte  [62]
.text           C:\WINDOWS\mHotkey.exe[900] ntdll.dll!LdrUnloadDll                                                                   7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\WINDOWS\mHotkey.exe[900] kernel32.dll!GetBinaryTypeW + 80                                                         7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!SetWindowsHookExW                                                             7E37820F 5 Bytes  JMP 00380804 
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!UnhookWindowsHookEx                                                           7E37D5F3 3 Bytes  JMP 00380A08 
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!UnhookWindowsHookEx + 4                                                       7E37D5F7 1 Byte  [82]
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!SetWindowsHookExA                                                             7E381211 5 Bytes  JMP 00380600 
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!SetWinEventHook                                                               7E3817F7 5 Bytes  JMP 003801F8 
.text           C:\WINDOWS\mHotkey.exe[900] USER32.dll!UnhookWinEvent                                                                7E3818AC 5 Bytes  JMP 003803FC 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!SetServiceObjectSecurity                                                    77E06D81 3 Bytes  JMP 00391014 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!SetServiceObjectSecurity + 4                                                77E06D85 1 Byte  [88]
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!ChangeServiceConfigA                                                        77E06E69 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!ChangeServiceConfigW                                                        77E07001 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!ChangeServiceConfig2A                                                       77E07101 5 Bytes  JMP 00390C0C 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!ChangeServiceConfig2W                                                       77E07189 5 Bytes  JMP 00390E10 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!CreateServiceA                                                              77E07211 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!CreateServiceW                                                              77E073A9 5 Bytes  JMP 003903FC 
.text           C:\WINDOWS\mHotkey.exe[900] ADVAPI32.dll!DeleteService                                                               77E074B1 5 Bytes  JMP 00390600 
.text           C:\WINDOWS\system32\svchost.exe[936] ntdll.dll!LdrLoadDll                                                            7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\svchost.exe[936] ntdll.dll!RtlDosSearchPath_U + 186                                              7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[936] ntdll.dll!LdrUnloadDll                                                          7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\svchost.exe[936] kernel32.dll!GetBinaryTypeW + 80                                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!SetServiceObjectSecurity                                           77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!ChangeServiceConfigA                                               77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!ChangeServiceConfigW                                               77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!ChangeServiceConfig2A                                              77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!ChangeServiceConfig2W                                              77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!CreateServiceA                                                     77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!CreateServiceW                                                     77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\svchost.exe[936] ADVAPI32.dll!DeleteService                                                      77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!SetWindowsHookExW                                                    7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!UnhookWindowsHookEx                                                  7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!SetWindowsHookExA                                                    7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!SetWinEventHook                                                      7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\svchost.exe[936] USER32.dll!UnhookWinEvent                                                       7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\Programme\AVAST Software\Avast\avastUI.exe[984] ntdll.dll!RtlDosSearchPath_U + 186                                7C926865 1 Byte  [62]
.text           C:\Programme\AVAST Software\Avast\avastUI.exe[984] kernel32.dll!GetBinaryTypeW + 80                                  7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\ctfmon.exe[992] ntdll.dll!LdrLoadDll                                                             7C92632D 5 Bytes  JMP 000A01F8 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ntdll.dll!RtlDosSearchPath_U + 186                                               7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\ctfmon.exe[992] ntdll.dll!LdrUnloadDll                                                           7C9271CD 5 Bytes  JMP 000A03FC 
.text           C:\WINDOWS\system32\ctfmon.exe[992] kernel32.dll!GetBinaryTypeW + 80                                                 7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!SetServiceObjectSecurity                                            77E06D81 5 Bytes  JMP 002C1014 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!ChangeServiceConfigA                                                77E06E69 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!ChangeServiceConfigW                                                77E07001 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!ChangeServiceConfig2A                                               77E07101 5 Bytes  JMP 002C0C0C 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!ChangeServiceConfig2W                                               77E07189 5 Bytes  JMP 002C0E10 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!CreateServiceA                                                      77E07211 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!CreateServiceW                                                      77E073A9 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\ctfmon.exe[992] ADVAPI32.dll!DeleteService                                                       77E074B1 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!SetWindowsHookExW                                                     7E37820F 5 Bytes  JMP 002D0804 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!UnhookWindowsHookEx                                                   7E37D5F3 5 Bytes  JMP 002D0A08 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!SetWindowsHookExA                                                     7E381211 5 Bytes  JMP 002D0600 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!SetWinEventHook                                                       7E3817F7 5 Bytes  JMP 002D01F8 
.text           C:\WINDOWS\system32\ctfmon.exe[992] USER32.dll!UnhookWinEvent                                                        7E3818AC 5 Bytes  JMP 002D03FC 
.text           C:\WINDOWS\System32\svchost.exe[1004] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\svchost.exe[1004] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[1004] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\svchost.exe[1004] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\svchost.exe[1004] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\svchost.exe[1004] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\System32\svchost.exe[1068] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\svchost.exe[1068] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[1068] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\svchost.exe[1068] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\svchost.exe[1068] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\svchost.exe[1068] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ntdll.dll!LdrLoadDll                                                        7C92632D 5 Bytes  JMP 001401F8 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ntdll.dll!RtlDosSearchPath_U + 186                                          7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\UAService7.exe[1136] ntdll.dll!LdrUnloadDll                                                      7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\WINDOWS\system32\UAService7.exe[1136] kernel32.dll!GetBinaryTypeW + 80                                            7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!SetServiceObjectSecurity                                       77E06D81 5 Bytes  JMP 00381014 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!ChangeServiceConfigA                                           77E06E69 5 Bytes  JMP 00380804 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!ChangeServiceConfigW                                           77E07001 5 Bytes  JMP 00380A08 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!ChangeServiceConfig2A                                          77E07101 5 Bytes  JMP 00380C0C 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!ChangeServiceConfig2W                                          77E07189 5 Bytes  JMP 00380E10 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!CreateServiceA                                                 77E07211 5 Bytes  JMP 003801F8 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!CreateServiceW                                                 77E073A9 5 Bytes  JMP 003803FC 
.text           C:\WINDOWS\system32\UAService7.exe[1136] ADVAPI32.dll!DeleteService                                                  77E074B1 5 Bytes  JMP 00380600 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ntdll.dll!LdrLoadDll                                                          7C92632D 5 Bytes  JMP 001501F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ntdll.dll!RtlDosSearchPath_U + 186                                            7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ntdll.dll!LdrUnloadDll                                                        7C9271CD 5 Bytes  JMP 001503FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] kernel32.dll!GetBinaryTypeW + 80                                              7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!SetWindowsHookExW                                                  7E37820F 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!UnhookWindowsHookEx                                                7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!SetWindowsHookExA                                                  7E381211 5 Bytes  JMP 00390600 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!SetWinEventHook                                                    7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!UnhookWinEvent                                                     7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] USER32.dll!UnhookWinEvent + 4                                                 7E3818B0 1 Byte  [82]
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!SetServiceObjectSecurity                                         77E06D81 5 Bytes  JMP 003A1014 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!ChangeServiceConfigA                                             77E06E69 5 Bytes  JMP 003A0804 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!ChangeServiceConfigW                                             77E07001 5 Bytes  JMP 003A0A08 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!ChangeServiceConfig2A                                            77E07101 5 Bytes  JMP 003A0C0C 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!ChangeServiceConfig2W                                            77E07189 5 Bytes  JMP 003A0E10 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!CreateServiceA                                                   77E07211 5 Bytes  JMP 003A01F8 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!CreateServiceW                                                   77E073A9 5 Bytes  JMP 003A03FC 
.text           C:\WINDOWS\system32\Ati2evxx.exe[1164] ADVAPI32.dll!DeleteService                                                    77E074B1 5 Bytes  JMP 003A0600 
.text           C:\WINDOWS\system32\svchost.exe[1220] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\svchost.exe[1220] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[1220] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\svchost.exe[1220] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\svchost.exe[1220] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\svchost.exe[1220] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\DitExp.exe[1400] ntdll.dll!LdrLoadDll                                                                     7C92632D 5 Bytes  JMP 001401F8 
.text           C:\WINDOWS\DitExp.exe[1400] ntdll.dll!RtlDosSearchPath_U + 186                                                       7C926865 1 Byte  [62]
.text           C:\WINDOWS\DitExp.exe[1400] ntdll.dll!LdrUnloadDll                                                                   7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\WINDOWS\DitExp.exe[1400] kernel32.dll!GetBinaryTypeW + 80                                                         7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!SetWindowsHookExW                                                             7E37820F 5 Bytes  JMP 00380804 
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!UnhookWindowsHookEx                                                           7E37D5F3 3 Bytes  JMP 00380A08 
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!UnhookWindowsHookEx + 4                                                       7E37D5F7 1 Byte  [82]
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!SetWindowsHookExA                                                             7E381211 5 Bytes  JMP 00380600 
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!SetWinEventHook                                                               7E3817F7 5 Bytes  JMP 003801F8 
.text           C:\WINDOWS\DitExp.exe[1400] USER32.dll!UnhookWinEvent                                                                7E3818AC 5 Bytes  JMP 003803FC 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!SetServiceObjectSecurity                                                    77E06D81 3 Bytes  JMP 00391014 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!SetServiceObjectSecurity + 4                                                77E06D85 1 Byte  [88]
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!ChangeServiceConfigA                                                        77E06E69 5 Bytes  JMP 00390804 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!ChangeServiceConfigW                                                        77E07001 5 Bytes  JMP 00390A08 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!ChangeServiceConfig2A                                                       77E07101 5 Bytes  JMP 00390C0C 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!ChangeServiceConfig2W                                                       77E07189 5 Bytes  JMP 00390E10 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!CreateServiceA                                                              77E07211 5 Bytes  JMP 003901F8 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!CreateServiceW                                                              77E073A9 5 Bytes  JMP 003903FC 
.text           C:\WINDOWS\DitExp.exe[1400] ADVAPI32.dll!DeleteService                                                               77E074B1 5 Bytes  JMP 00390600 
.text           C:\Dokumente und Einstellungen\Manuela\Desktop\hxjp93d3.exe[1452] ntdll.dll!RtlDosSearchPath_U + 186                 7C926865 1 Byte  [62]
.text           C:\Dokumente und Einstellungen\Manuela\Desktop\hxjp93d3.exe[1452] kernel32.dll!GetBinaryTypeW + 80                   7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\Explorer.EXE[1472] ntdll.dll!LdrLoadDll                                                                   7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\Explorer.EXE[1472] ntdll.dll!RtlDosSearchPath_U + 186                                                     7C926865 1 Byte  [62]
.text           C:\WINDOWS\Explorer.EXE[1472] ntdll.dll!LdrUnloadDll                                                                 7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\Explorer.EXE[1472] kernel32.dll!GetBinaryTypeW + 80                                                       7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!SetServiceObjectSecurity                                                  77E06D81 5 Bytes  JMP 002C1014 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!ChangeServiceConfigA                                                      77E06E69 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!ChangeServiceConfigW                                                      77E07001 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!ChangeServiceConfig2A                                                     77E07101 5 Bytes  JMP 002C0C0C 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!ChangeServiceConfig2W                                                     77E07189 5 Bytes  JMP 002C0E10 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!CreateServiceA                                                            77E07211 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!CreateServiceW                                                            77E073A9 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\Explorer.EXE[1472] ADVAPI32.dll!DeleteService                                                             77E074B1 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!SetWindowsHookExW                                                           7E37820F 5 Bytes  JMP 002D0804 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!UnhookWindowsHookEx                                                         7E37D5F3 5 Bytes  JMP 002D0A08 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!SetWindowsHookExA                                                           7E381211 5 Bytes  JMP 002D0600 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!SetWinEventHook                                                             7E3817F7 5 Bytes  JMP 002D01F8 
.text           C:\WINDOWS\Explorer.EXE[1472] USER32.dll!UnhookWinEvent                                                              7E3818AC 5 Bytes  JMP 002D03FC 
.text           C:\Programme\AVAST Software\Avast\AvastSvc.exe[1576] ntdll.dll!RtlDosSearchPath_U + 186                              7C926865 1 Byte  [62]
.text           C:\Programme\AVAST Software\Avast\AvastSvc.exe[1576] kernel32.dll!SetUnhandledExceptionFilter                        7C84495D 4 Bytes  [C2, 04, 00, 90] {RET 0x4; NOP }
.text           C:\Programme\AVAST Software\Avast\AvastSvc.exe[1576] kernel32.dll!GetBinaryTypeW + 80                                7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002B1014 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002B0C0C 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002B0E10 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\spoolsv.exe[1664] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\System32\alg.exe[1728] ntdll.dll!LdrLoadDll                                                               7C92632D 5 Bytes  JMP 000901F8 
.text           C:\WINDOWS\System32\alg.exe[1728] ntdll.dll!RtlDosSearchPath_U + 186                                                 7C926865 1 Byte  [62]
.text           C:\WINDOWS\System32\alg.exe[1728] ntdll.dll!LdrUnloadDll                                                             7C9271CD 5 Bytes  JMP 000903FC 
.text           C:\WINDOWS\System32\alg.exe[1728] kernel32.dll!GetBinaryTypeW + 80                                                   7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!SetWindowsHookExW                                                       7E37820F 5 Bytes  JMP 002B0804 
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!UnhookWindowsHookEx                                                     7E37D5F3 5 Bytes  JMP 002B0A08 
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!SetWindowsHookExA                                                       7E381211 5 Bytes  JMP 002B0600 
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!SetWinEventHook                                                         7E3817F7 5 Bytes  JMP 002B01F8 
.text           C:\WINDOWS\System32\alg.exe[1728] USER32.dll!UnhookWinEvent                                                          7E3818AC 5 Bytes  JMP 002B03FC 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!SetServiceObjectSecurity                                              77E06D81 5 Bytes  JMP 002C1014 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!ChangeServiceConfigA                                                  77E06E69 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!ChangeServiceConfigW                                                  77E07001 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!ChangeServiceConfig2A                                                 77E07101 5 Bytes  JMP 002C0C0C 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!ChangeServiceConfig2W                                                 77E07189 5 Bytes  JMP 002C0E10 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!CreateServiceA                                                        77E07211 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!CreateServiceW                                                        77E073A9 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\System32\alg.exe[1728] ADVAPI32.dll!DeleteService                                                         77E074B1 5 Bytes  JMP 002C0600 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ntdll.dll!LdrLoadDll                                                        7C92632D 5 Bytes  JMP 001501F8 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ntdll.dll!RtlDosSearchPath_U + 186                                          7C926865 1 Byte  [62]
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ntdll.dll!LdrUnloadDll                                                      7C9271CD 5 Bytes  JMP 001503FC 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] kernel32.dll!GetBinaryTypeW + 80                                            7C868D8C 1 Byte  [62]
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!SetServiceObjectSecurity                                       77E06D81 3 Bytes  JMP 00391014 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!SetServiceObjectSecurity + 4                                   77E06D85 1 Byte  [88]
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!ChangeServiceConfigA                                           77E06E69 5 Bytes  JMP 00390804 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!ChangeServiceConfigW                                           77E07001 5 Bytes  JMP 00390A08 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!ChangeServiceConfig2A                                          77E07101 5 Bytes  JMP 00390C0C 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!ChangeServiceConfig2W                                          77E07189 5 Bytes  JMP 00390E10 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!CreateServiceA                                                 77E07211 5 Bytes  JMP 003901F8 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!CreateServiceW                                                 77E073A9 5 Bytes  JMP 003903FC 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] ADVAPI32.dll!DeleteService                                                  77E074B1 5 Bytes  JMP 00390600 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!SetWindowsHookExW                                                7E37820F 5 Bytes  JMP 003A0804 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!UnhookWindowsHookEx                                              7E37D5F3 5 Bytes  JMP 003A0A08 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!SetWindowsHookExA                                                7E381211 5 Bytes  JMP 003A0600 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!SetWinEventHook                                                  7E3817F7 5 Bytes  JMP 003A01F8 
.text           C:\Programme\Java\jre6\bin\jqs.exe[1852] USER32.dll!UnhookWinEvent                                                   7E3818AC 5 Bytes  JMP 003A03FC 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ntdll.dll!LdrLoadDll                                                           7C92632D 5 Bytes  JMP 000A01F8 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ntdll.dll!RtlDosSearchPath_U + 186                                             7C926865 1 Byte  [62]
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ntdll.dll!LdrUnloadDll                                                         7C9271CD 5 Bytes  JMP 000A03FC 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] kernel32.dll!GetBinaryTypeW + 80                                               7C868D8C 1 Byte  [62]
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!SetServiceObjectSecurity                                          77E06D81 5 Bytes  JMP 002C1014 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!ChangeServiceConfigA                                              77E06E69 5 Bytes  JMP 002C0804 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!ChangeServiceConfigW                                              77E07001 5 Bytes  JMP 002C0A08 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!ChangeServiceConfig2A                                             77E07101 5 Bytes  JMP 002C0C0C 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!ChangeServiceConfig2W                                             77E07189 5 Bytes  JMP 002C0E10 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!CreateServiceA                                                    77E07211 5 Bytes  JMP 002C01F8 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!CreateServiceW                                                    77E073A9 5 Bytes  JMP 002C03FC 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] ADVAPI32.dll!DeleteService                                                     77E074B1 5 Bytes  JMP 002C0600 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!SetWindowsHookExW                                                   7E37820F 5 Bytes  JMP 002D0804 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!UnhookWindowsHookEx                                                 7E37D5F3 5 Bytes  JMP 002D0A08 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!SetWindowsHookExA                                                   7E381211 5 Bytes  JMP 002D0600 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!SetWinEventHook                                                     7E3817F7 5 Bytes  JMP 002D01F8 
.text           C:\WINDOWS\system32\wuauclt.exe[2020] USER32.dll!UnhookWinEvent                                                      7E3818AC 5 Bytes  JMP 002D03FC 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ntdll.dll!LdrLoadDll                                      7C92632D 5 Bytes  JMP 001401F8 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ntdll.dll!RtlDosSearchPath_U + 186                        7C926865 1 Byte  [62]
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ntdll.dll!LdrUnloadDll                                    7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] kernel32.dll!GetBinaryTypeW + 80                          7C868D8C 1 Byte  [62]
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!SetServiceObjectSecurity                     77E06D81 5 Bytes  JMP 00381014 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!ChangeServiceConfigA                         77E06E69 5 Bytes  JMP 00380804 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!ChangeServiceConfigW                         77E07001 5 Bytes  JMP 00380A08 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!ChangeServiceConfig2A                        77E07101 5 Bytes  JMP 00380C0C 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!ChangeServiceConfig2W                        77E07189 5 Bytes  JMP 00380E10 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!CreateServiceA                               77E07211 5 Bytes  JMP 003801F8 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!CreateServiceW                               77E073A9 5 Bytes  JMP 003803FC 
.text           C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe[2032] ADVAPI32.dll!DeleteService                                77E074B1 5 Bytes  JMP 00380600 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ntdll.dll!LdrLoadDll                                        7C92632D 5 Bytes  JMP 001401F8 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ntdll.dll!RtlDosSearchPath_U + 186                          7C926865 1 Byte  [62]
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ntdll.dll!LdrUnloadDll                                      7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] kernel32.dll!GetBinaryTypeW + 80                            7C868D8C 1 Byte  [62]
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!SetServiceObjectSecurity                       77E06D81 5 Bytes  JMP 00381014 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!ChangeServiceConfigA                           77E06E69 5 Bytes  JMP 00380804 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!ChangeServiceConfigW                           77E07001 5 Bytes  JMP 00380A08 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!ChangeServiceConfig2A                          77E07101 5 Bytes  JMP 00380C0C 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!ChangeServiceConfig2W                          77E07189 5 Bytes  JMP 00380E10 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!CreateServiceA                                 77E07211 5 Bytes  JMP 003801F8 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!CreateServiceW                                 77E073A9 5 Bytes  JMP 003803FC 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] ADVAPI32.DLL!DeleteService                                  77E074B1 5 Bytes  JMP 00380600 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!SetWindowsHookExW                                7E37820F 5 Bytes  JMP 00390804 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!UnhookWindowsHookEx                              7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!SetWindowsHookExA                                7E381211 5 Bytes  JMP 00390600 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!SetWinEventHook                                  7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!UnhookWinEvent                                   7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\Programme\Microsoft Office\Office10\WINWORD.EXE[2896] USER32.dll!UnhookWinEvent + 4                               7E3818B0 1 Byte  [82]
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ntdll.dll!LdrLoadDll                                                 7C92632D 5 Bytes  JMP 001401F8 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ntdll.dll!RtlDosSearchPath_U + 186                                   7C926865 1 Byte  [62]
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ntdll.dll!LdrUnloadDll                                               7C9271CD 5 Bytes  JMP 001403FC 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] kernel32.dll!GetBinaryTypeW + 80                                     7C868D8C 1 Byte  [62]
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!SetServiceObjectSecurity                                77E06D81 5 Bytes  JMP 00381014 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!ChangeServiceConfigA                                    77E06E69 5 Bytes  JMP 00380804 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!ChangeServiceConfigW                                    77E07001 5 Bytes  JMP 00380A08 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!ChangeServiceConfig2A                                   77E07101 5 Bytes  JMP 00380C0C 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!ChangeServiceConfig2W                                   77E07189 5 Bytes  JMP 00380E10 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!CreateServiceA                                          77E07211 5 Bytes  JMP 003801F8 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!CreateServiceW                                          77E073A9 5 Bytes  JMP 003803FC 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] ADVAPI32.dll!DeleteService                                           77E074B1 5 Bytes  JMP 00380600 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!SetWindowsHookExW                                         7E37820F 5 Bytes  JMP 00390804 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!UnhookWindowsHookEx                                       7E37D5F3 5 Bytes  JMP 00390A08 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!SetWindowsHookExA                                         7E381211 5 Bytes  JMP 00390600 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!SetWinEventHook                                           7E3817F7 5 Bytes  JMP 003901F8 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!UnhookWinEvent                                            7E3818AC 3 Bytes  JMP 003903FC 
.text           C:\Programme\Microsoft Works\WkDStore.exe[3348] USER32.dll!UnhookWinEvent + 4                                        7E3818B0 1 Byte  [82]

---- User IAT/EAT - GMER 1.0.15 ----

IAT             C:\WINDOWS\system32\services.exe[660] @ C:\WINDOWS\system32\services.exe [ADVAPI32.dll!CreateProcessAsUserW]         005E0002
IAT             C:\WINDOWS\system32\services.exe[660] @ C:\WINDOWS\system32\services.exe [KERNEL32.dll!CreateProcessW]               005E0000
IAT             C:\Programme\AVAST Software\Avast\avastUI.exe[984] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryExW]    [64C8F6A0] C:\Programme\AVAST Software\Avast\aswCmnBS.dll (Common functions/AVAST Software)
IAT             C:\Programme\AVAST Software\Avast\AvastSvc.exe[1576] @ C:\WINDOWS\system32\USER32.dll [KERNEL32.dll!LoadLibraryExW]  [64C8F6A0] C:\Programme\AVAST Software\Avast\aswCmnBS.dll (Common functions/AVAST Software)

---- Devices - GMER 1.0.15 ----

Device          \FileSystem\Ntfs \Ntfs                                                                                               aswSP.SYS (avast! self protection module/AVAST Software)

AttachedDevice  \FileSystem\Ntfs \Ntfs                                                                                               aswMon2.SYS (avast! File System Filter Driver for Windows XP/AVAST Software)

Device          \FileSystem\Fastfat \FatCdrom                                                                                        aswSP.SYS (avast! self protection module/AVAST Software)

AttachedDevice  \Driver\Tcpip \Device\Ip                                                                                             aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice  \Driver\Tcpip \Device\Tcp                                                                                            aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice  \Driver\Tcpip \Device\Udp                                                                                            aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice  \Driver\Tcpip \Device\RawIp                                                                                          aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)

Device          \FileSystem\Fastfat \Fat                                                                                             aswSP.SYS (avast! self protection module/AVAST Software)

AttachedDevice  \FileSystem\Fastfat \Fat                                                                                             fltmgr.sys (Microsoft Filesystem Filter Manager/Microsoft Corporation)
AttachedDevice  \FileSystem\Fastfat \Fat                                                                                             aswMon2.SYS (avast! File System Filter Driver for Windows XP/AVAST Software)

Device          \FileSystem\Cdfs \Cdfs                                                                                               B77E2400

---- EOF - GMER 1.0.15 ----
         

Alt 23.04.2012, 11:02   #38
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BKA-Trojaner - Standard

BKA-Trojaner



Warum 2x GMER?
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 23.04.2012, 11:05   #39
Alimaus_1
 
BKA-Trojaner - Standard

BKA-Trojaner



Code:
ATTFilter
aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-04-23 11:02:32
-----------------------------
11:02:32.578    OS Version: Windows 5.1.2600 Service Pack 3
11:02:32.578    Number of processors: 1 586 0x303
11:02:32.578    ComputerName: ANDIUNDDANI  UserName: Manuela
11:02:34.093    Initialize success
11:02:35.000    AVAST engine defs: 12042201
11:04:22.984    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
11:04:22.984    Disk 0 Vendor: ST3160812A 3.AAE Size: 152627MB BusType: 3
11:04:23.015    Disk 0 MBR read successfully
11:04:23.015    Disk 0 MBR scan
11:04:23.078    Disk 0 unknown MBR code
11:04:23.078    Disk 0 Partition - 00     0F Extended LBA             77014 MB offset 154850535
11:04:23.093    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS        75610 MB offset 63
11:04:23.156    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS        70088 MB offset 154850598
11:04:23.156    Disk 0 Partition - 00     05     Extended              6926 MB offset 298391310
11:04:23.187    Disk 0 Partition 3 00     0B        FAT32 MSWIN4.1     6926 MB offset 298391373
11:04:23.218    Disk 0 scanning sectors +312576705
11:04:23.468    Disk 0 scanning C:\WINDOWS\system32\drivers
11:05:04.859    Service scanning
11:05:18.921    Modules scanning
11:05:56.203    Disk 0 trace - called modules:
11:05:56.234    ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS 
11:05:56.234    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x82fd6ab8]
11:05:56.234    3 CLASSPNP.SYS[f8605fd7] -> nt!IofCallDriver -> \Device\0000005a[0x82fe01a8]
11:05:56.250    5 ACPI.sys[f856b620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0x82f82d98]
11:05:56.546    AVAST engine scan C:\WINDOWS
11:06:22.390    AVAST engine scan C:\WINDOWS\system32
11:10:43.140    AVAST engine scan C:\WINDOWS\system32\drivers
11:11:01.031    AVAST engine scan C:\Dokumente und Einstellungen\Manuela
11:18:39.187    AVAST engine scan C:\Dokumente und Einstellungen\All Users
11:21:11.421    Scan finished successfully
11:25:43.734    Disk 0 MBR has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\MBR.dat"
11:25:43.734    The log file has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\aswMBR.txt"


aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-04-23 11:30:20
-----------------------------
11:30:20.093    OS Version: Windows 5.1.2600 Service Pack 3
11:30:20.093    Number of processors: 1 586 0x303
11:30:20.093    ComputerName: ANDIUNDDANI  UserName: Manuela
11:30:20.812    Initialize success
11:30:21.421    AVAST engine defs: 12042201
11:30:25.343    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
11:30:25.343    Disk 0 Vendor: ST3160812A 3.AAE Size: 152627MB BusType: 3
11:30:25.390    Disk 0 MBR read successfully
11:30:25.390    Disk 0 MBR scan
11:30:25.390    Disk 0 unknown MBR code
11:30:25.390    Disk 0 Partition - 00     0F Extended LBA             77014 MB offset 154850535
11:30:25.437    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS        75610 MB offset 63
11:30:25.468    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS        70088 MB offset 154850598
11:30:25.484    Disk 0 Partition - 00     05     Extended              6926 MB offset 298391310
11:30:25.515    Disk 0 Partition 3 00     0B        FAT32 MSWIN4.1     6926 MB offset 298391373
11:30:25.531    Disk 0 scanning sectors +312576705
11:30:25.656    Disk 0 scanning C:\WINDOWS\system32\drivers
11:30:43.046    Service scanning
11:30:57.828    Modules scanning
11:31:07.875    Disk 0 trace - called modules:
11:31:07.890    ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS 
11:31:07.890    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x82fd6ab8]
11:31:07.906    3 CLASSPNP.SYS[f8605fd7] -> nt!IofCallDriver -> \Device\0000005a[0x82fe01a8]
11:31:07.906    5 ACPI.sys[f856b620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0x82f82d98]
11:31:08.187    AVAST engine scan C:\WINDOWS
11:31:18.625    AVAST engine scan C:\WINDOWS\system32
11:34:33.671    AVAST engine scan C:\WINDOWS\system32\drivers
11:34:49.843    AVAST engine scan C:\Dokumente und Einstellungen\Manuela
11:39:55.953    AVAST engine scan C:\Dokumente und Einstellungen\All Users
11:41:21.687    Scan finished successfully
11:43:32.734    Disk 0 MBR has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\MBR.dat"
11:43:32.750    The log file has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\aswMBR.txt"


aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-04-23 11:30:20
-----------------------------
11:30:20.093    OS Version: Windows 5.1.2600 Service Pack 3
11:30:20.093    Number of processors: 1 586 0x303
11:30:20.093    ComputerName: ANDIUNDDANI  UserName: Manuela
11:30:20.812    Initialize success
11:30:21.421    AVAST engine defs: 12042201
11:30:25.343    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
11:30:25.343    Disk 0 Vendor: ST3160812A 3.AAE Size: 152627MB BusType: 3
11:30:25.390    Disk 0 MBR read successfully
11:30:25.390    Disk 0 MBR scan
11:30:25.390    Disk 0 unknown MBR code
11:30:25.390    Disk 0 Partition - 00     0F Extended LBA             77014 MB offset 154850535
11:30:25.437    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS        75610 MB offset 63
11:30:25.468    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS        70088 MB offset 154850598
11:30:25.484    Disk 0 Partition - 00     05     Extended              6926 MB offset 298391310
11:30:25.515    Disk 0 Partition 3 00     0B        FAT32 MSWIN4.1     6926 MB offset 298391373
11:30:25.531    Disk 0 scanning sectors +312576705
11:30:25.656    Disk 0 scanning C:\WINDOWS\system32\drivers
11:30:43.046    Service scanning
11:30:57.828    Modules scanning
11:31:07.875    Disk 0 trace - called modules:
11:31:07.890    ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS 
11:31:07.890    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x82fd6ab8]
11:31:07.906    3 CLASSPNP.SYS[f8605fd7] -> nt!IofCallDriver -> \Device\0000005a[0x82fe01a8]
11:31:07.906    5 ACPI.sys[f856b620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0x82f82d98]
11:31:08.187    AVAST engine scan C:\WINDOWS
11:31:18.625    AVAST engine scan C:\WINDOWS\system32
11:34:33.671    AVAST engine scan C:\WINDOWS\system32\drivers
11:34:49.843    AVAST engine scan C:\Dokumente und Einstellungen\Manuela
11:39:55.953    AVAST engine scan C:\Dokumente und Einstellungen\All Users
11:41:21.687    Scan finished successfully
11:43:32.734    Disk 0 MBR has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\MBR.dat"
11:43:32.750    The log file has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\aswMBR.txt"
11:43:57.140    Disk 0 MBR has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\MBR.dat"
11:43:57.140    The log file has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\aswMBR.txt"
         

Alt 23.04.2012, 11:07   #40
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BKA-Trojaner - Standard

BKA-Trojaner



Das von OSAM fehlt
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 23.04.2012, 11:09   #41
Alimaus_1
 
BKA-Trojaner - Standard

BKA-Trojaner



entschuldige...habe ich verwechselt hier ist osam
Code:
ATTFilter
Report of OSAM: Autorun Manager v5.0.11926.0
hxxp://www.online-solutions.ru/en/
Saved at 10:58:07 on 23.04.2012

OS: Windows XP Home Edition Service Pack 3 (Build 2600)
Default Browser: Microsoft Corporation Internet Explorer 8.00.6001.18702

Scanner Settings
[x] Rootkits detection (hidden registry)
[x] Rootkits detection (hidden files)
[x] Retrieve files information
[x] Check Microsoft signatures

Filters
[ ] Trusted entries
[ ] Empty entries
[x] Hidden registry entries (rootkit activity)
[x] Exclusively opened files
[x] Not found files
[x] Files without detailed information
[x] Existing files
[ ] Non-startable services
[ ] Non-startable drivers
[x] Active entries
[x] Disabled entries


[Boot Execute]
-----( HKLM\SYSTEM\CurrentControlSet\Control\Session Manager )-----
"BootExecute" - "AVAST Software" - C:\WINDOWS\system32\aswBoot.exe

[Control Panel Objects]
-----( %SystemRoot%\system32 )-----
"FlashPlayerCPLApp.cpl" - "Adobe Systems Incorporated" - C:\WINDOWS\system32\FlashPlayerCPLApp.cpl
"ImageDrive.cpl" - "Nero AG" - C:\WINDOWS\system32\ImageDrive.cpl
"infocardcpl.cpl" - "Microsoft Corporation" - C:\WINDOWS\system32\infocardcpl.cpl
"javacpl.cpl" - "Sun Microsystems, Inc." - C:\WINDOWS\system32\javacpl.cpl
"PhysX.cpl" - "NVIDIA Corporation" - C:\WINDOWS\system32\PhysX.cpl
"QTW32.CPL" - "Apple Computer, Inc." - C:\WINDOWS\system32\QTW32.CPL
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Control Panel\Cpls )-----
"Avira AntiVir PersonalEdition Classic " - ? - C:\PROGRA~1\Avira\ANTIVI~1\avconfig.cpl  (File not found)

[Drivers]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
"ACEDRV05" (ACEDRV05) - "Protect Software GmbH" - C:\WINDOWS\system32\drivers\ACEDRV05.sys
"aswFsBlk" (aswFsBlk) - "AVAST Software" - C:\WINDOWS\system32\drivers\aswFsBlk.sys
"aswRdr" (aswRdr) - "AVAST Software" - C:\WINDOWS\system32\drivers\aswRdr.sys
"aswSnx" (aswSnx) - "AVAST Software" - C:\WINDOWS\system32\drivers\aswSnx.sys
"aswSP" (aswSP) - "AVAST Software" - C:\WINDOWS\system32\drivers\aswSP.sys
"avast! Asynchronous Virus Monitor" (Aavmker4) - "AVAST Software" - C:\WINDOWS\system32\drivers\Aavmker4.sys
"avast! Network Shield Support" (aswTdi) - "AVAST Software" - C:\WINDOWS\system32\drivers\aswTdi.sys
"avast! Standard Shield Support" (aswMon2) - "AVAST Software" - C:\WINDOWS\system32\drivers\aswMon2.sys
"AVZ Kernel Driver" (ute5njmx) - ? - C:\WINDOWS\system32\Drivers\ute5njmx.sys  (File not found)
"catchme" (catchme) - ? - C:\DOKUME~1\Manuela\LOKALE~1\Temp\catchme.sys  (File not found)
"CdaD10BA" (CdaD10BA) - "Macrovision Europe Ltd" - C:\WINDOWS\system32\drivers\CdaD10BA.SYS
"Changer" (Changer) - ? - C:\WINDOWS\system32\drivers\Changer.sys  (File not found)
"i2omgmt" (i2omgmt) - ? - C:\WINDOWS\system32\drivers\i2omgmt.sys  (File not found)
"imagedrv" (imagedrv) - ? - C:\WINDOWS\System32\Drivers\imagedrv.sys  (File not found)
"imagesrv" (imagesrv) - ? - C:\WINDOWS\System32\DRIVERS\imagesrv.sys  (File not found)
"Intel AGP-Bus-Filter" (agp440) - "Microsoft Corporation" - C:\WINDOWS\System32\DRIVERS\agp440.sys
"lbrtfdc" (lbrtfdc) - ? - C:\WINDOWS\system32\drivers\lbrtfdc.sys  (File not found)
"Logitech SetPoint Keyboard Driver" (L8042Kbd) - "Logitech, Inc." - C:\WINDOWS\System32\DRIVERS\L8042Kbd.sys
"MxlW2k" (MxlW2k) - "MusicMatch, Inc." - C:\WINDOWS\system32\drivers\MxlW2k.sys
"Padus ASPI Shell" (pfc) - "Padus, Inc." - C:\WINDOWS\System32\drivers\pfc.sys
"PCI-Bus-Treiber" (PCI) - "Microsoft Corporation" - C:\WINDOWS\System32\DRIVERS\pci.sys
"PCIDump" (PCIDump) - ? - C:\WINDOWS\system32\drivers\PCIDump.sys  (File not found)
"PDCOMP" (PDCOMP) - ? - C:\WINDOWS\system32\drivers\PDCOMP.sys  (File not found)
"PDFRAME" (PDFRAME) - ? - C:\WINDOWS\system32\drivers\PDFRAME.sys  (File not found)
"PDRELI" (PDRELI) - ? - C:\WINDOWS\system32\drivers\PDRELI.sys  (File not found)
"PDRFRAME" (PDRFRAME) - ? - C:\WINDOWS\system32\drivers\PDRFRAME.sys  (File not found)
"pgrdrpod" (pgrdrpod) - ? - C:\DOKUME~1\Manuela\LOKALE~1\Temp\pgrdrpod.sys  (Hidden registry entry, rootkit activity | File not found)
"PxHelp20" (PxHelp20) - "Sonic Solutions" - C:\WINDOWS\System32\Drivers\PxHelp20.sys
"SetPoint Mouse Filter Driver" (LMouKE) - "Logitech, Inc." - C:\WINDOWS\System32\DRIVERS\LMouKE.Sys
"SetPoint PS/2 Mouse Filter Driver" (L8042mou) - "Logitech, Inc." - C:\WINDOWS\System32\DRIVERS\L8042mou.Sys
"ssmdrv" (ssmdrv) - "Avira GmbH" - C:\WINDOWS\System32\DRIVERS\ssmdrv.sys
"StarOpen" (StarOpen) - ? - C:\WINDOWS\system32\drivers\StarOpen.sys  (File not found)
"WAN Miniport (ATW)" (wanatw) - ? - C:\WINDOWS\System32\DRIVERS\wanatw4.sys  (File not found)
"WDICA" (WDICA) - ? - C:\WINDOWS\system32\drivers\WDICA.sys  (File not found)

[Explorer]
-----( HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components )-----
{89B4C1CD-B018-4511-B0A1-5476DBF70820} "StubPath" - "Microsoft Corporation" - C:\WINDOWS\system32\Rundll32.exe C:\WINDOWS\system32\mscories.dll,Install
-----( HKLM\Software\Classes\Folder\shellex\ColumnHandlers )-----
{F9DB5320-233E-11D1-9F84-707F02C10627} "PDF Shell Extension" - "Adobe Systems, Inc." - C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\PDFShell.dll
{7D4D6379-F301-4311-BEBA-E26EB0561882} "{7D4D6379-F301-4311-BEBA-E26EB0561882}" - ? -   (File not found | COM-object registry key not found)
-----( HKLM\Software\Classes\Protocols\Filter )-----
{1E66F26B-79EE-11D2-8710-00C04F79ED0D} "Cor MIME Filter, CorFltr, CorFltr 1" - "Microsoft Corporation" - C:\WINDOWS\system32\mscoree.dll
{1E66F26B-79EE-11D2-8710-00C04F79ED0D} "Cor MIME Filter, CorFltr, CorFltr 1" - "Microsoft Corporation" - C:\WINDOWS\system32\mscoree.dll
{1E66F26B-79EE-11D2-8710-00C04F79ED0D} "Cor MIME Filter, CorFltr, CorFltr 1" - "Microsoft Corporation" - C:\WINDOWS\system32\mscoree.dll
-----( HKLM\Software\Classes\Protocols\Handler )-----
{0A9007C0-4076-11D3-8789-0000F8105754} "Microsoft Infotech Storage Protocol for IE 4.0" - "Microsoft Corporation" - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Information Retrieval\msitss.dll
{8E2D00A0-82C6-4821-90BC-07F290841BB6} "XEB Navigation Filter" - ? - C:\Programme\Gemeinsame Dateien\fluxDVD\Lib\XEB\xebnavigation.ax
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved )-----
{23170F69-40C1-278A-1000-000100020000} "7-Zip Shell Extension" - "Igor Pavlov" - D:\7-Zip\7-zip.dll
{472083B0-C522-11CF-8763-00608CC02F24} "avast" - "AVAST Software" - C:\Programme\AVAST Software\Avast\ashShell.dll
{87D62D94-71B3-4b9a-9489-5FE6850DC73E} "Avi Properties Handler" - ? -   (File not found | COM-object registry key not found)
{42071714-76d4-11d1-8b24-00a0c9068ff3} "CPL-Erweiterung für Anzeigeverschiebung" - ? -   (File not found | COM-object registry key not found)
{88895560-9AA2-1069-930E-00AA0030EBC8} "Erweiterung für HyperTerminal-Icons" - ? -   (File not found | COM-object registry key not found)
{C9CF278C-460E-4917-BC43-3F75E6E47D3D} "fluxDVD Shell Information Extractor" - "ACE GmbH" - C:\PROGRA~1\GEMEIN~1\fluxDVD\Lib\XEB\XEBShell.dll
{1D2680C9-0E2A-469d-B787-065558BC7D43} "Fusion Cache" - "Microsoft Corporation" - C:\WINDOWS\system32\mscoree.dll
{FAC3CBF6-8697-43d0-BAB9-DCD1FCE19D75} "IE User Assist" - ? -   (File not found | COM-object registry key not found)
{DCED20BE-3645-11D4-BC95-00C04F0E0588} "InoShell" - ? -   (File not found | COM-object registry key not found)
{CA5FEE26-14C1-4B5A-86E9-233FC0EE2682} "IZArc DragDrop Menu" - ? - C:\Programme\IZArc\IZArcCM.dll  (File found, but it contains no detailed information)
{8D9D4D0D-FDDD-44CB-AAB2-6161FA0757C5} "IZArc Shell Context Menu" - ? - C:\Programme\IZArc\IZArcCM.dll  (File found, but it contains no detailed information)
{853FE2B1-B769-11d0-9C4E-00C04FB6C6FA} "Kontextmenü für die Verschlüsselung" - ? -   (File not found | COM-object registry key not found)
{32683183-48a0-441b-a342-7c2a440a9478} "Media Band" - ? -   (File not found | COM-object registry key not found)
{42042206-2D85-11D3-8CFF-005004838597} "Microsoft Office HTML Icon Handler" - "Microsoft Corporation" - C:\Programme\Microsoft Office\Office10\msohev.dll
{993BE281-6695-4BA5-8A2A-7AACBFAAB69E} "Microsoft Office Metadata Handler" - "Microsoft Corporation" - C:\PROGRA~1\GEMEIN~1\MICROS~1\OFFICE12\msoshext.dll
{C41662BB-1FA0-4CE0-8DC5-9B7F8279FF97} "Microsoft Office Thumbnail Handler" - "Microsoft Corporation" - C:\PROGRA~1\GEMEIN~1\MICROS~1\OFFICE12\msoshext.dll
{D9872D13-7651-4471-9EEE-F0A00218BEBB} "Multiscan" - ? -   (File not found | COM-object registry key not found)
{B327765E-D724-4347-8B16-78AE18552FC3} "NeroDigitalIconHandler" - ? -   (File not found | COM-object registry key not found)
{7F1CF152-04F8-453A-B34C-E609530A9DC8} "NeroDigitalPropSheetHandler" - ? -   (File not found | COM-object registry key not found)
{45AC2688-0253-4ED8-97DE-B5370FA7D48A} "Shell Extension for Malware scanning" - ? -   (File not found | COM-object registry key not found)
{E37E2028-CE1A-4f42-AF05-6CEABC4E5D75} "Shell Icon Handler for Application References" - "Microsoft Corporation" - C:\WINDOWS\system32\dfshim.dll
{764BF0E1-F219-11ce-972D-00AA00A14F56} "Shellerweiterungen für die Dateikomprimierung" - ? -   (File not found | COM-object registry key not found)
{e82a2d71-5b2f-43a0-97b8-81be15854de8} "ShellLink for Application References" - "Microsoft Corporation" - C:\WINDOWS\system32\dfshim.dll
{5E2121EE-0300-11D4-8D3B-444553540000} "SimpleShlExt Class" - "Advanced Micro Devices, Inc." - C:\Programme\ATI Technologies\ATI.ACE\Core-Static\atiacmxx.dll
{e57ce731-33e8-4c51-8354-bb4de9d215d1} "Universelle Plug & Play-Geräte" - ? -   (File not found | COM-object registry key not found)
{BDEADF00-C265-11D0-BCED-00A0C90AB50F} "Web Folders" - "Microsoft Corporation" - C:\Programme\Gemeinsame Dateien\Microsoft Shared\Web Folders\MSONSEXT.DLL

[Internet Explorer]
-----( HKCU\SOFTWARE\Microsoft\Internet Explorer\Explorer Bars )-----
{32683183-48a0-441b-a342-7c2a440a9478} "{32683183-48a0-441b-a342-7c2a440a9478}" - ? -   (File not found | COM-object registry key not found)
-----( HKCU\SOFTWARE\Microsoft\Internet Explorer\Extensions )-----
"MedionShop" - ? - hxxp://www.medionshop.de/  (HTTP value)
-----( HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser )-----
ITBar7Height "ITBar7Height" - ? -   (File not found | COM-object registry key not found)
<binary data> "ITBar7Layout" - ? -   (File not found | COM-object registry key not found)
<binary data> "{2318C2B1-4965-11D4-9B18-009027A5CD4F}" - ? -   (File not found | COM-object registry key not found)
<binary data> "{EE5D279F-081B-4404-994D-C6B60AAEBA6D}" - ? -   (File not found | COM-object registry key not found)
<binary data> "{EF99BD32-C1FB-11D2-892F-0090271D4F88}" - ? -   (File not found | COM-object registry key not found)
-----( HKLM\SOFTWARE\Microsoft\Code Store Database\Distribution Units )-----
DirectAnimation Java Classes "DirectAnimation Java Classes" - ? -   (File not found | COM-object registry key not found) / file://C:\WINDOWS\Java\classes\dajava.cab
{8AD9C840-044E-11D1-B3E9-00805F499D93} "Java Plug-in 1.6.0_30" - "Sun Microsystems, Inc." - C:\Programme\Java\jre6\bin\npjpi160_30.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
{CAFEEFAC-0016-0000-0030-ABCDEFFEDCBA} "Java Plug-in 1.6.0_30" - "Sun Microsystems, Inc." - C:\Programme\Java\jre6\bin\npjpi160_30.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
{CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} "Java Plug-in 1.6.0_30" - "Sun Microsystems, Inc." - C:\Programme\Java\jre6\bin\npjpi160_30.dll / hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
Microsoft XML Parser for Java "Microsoft XML Parser for Java" - ? -   (File not found | COM-object registry key not found) / file://C:\WINDOWS\Java\classes\xmldso.cab
{7530BFB8-7293-4D34-9923-61A11451AFC5} "OnlineScanner Control" - "ESET" - C:\PROGRA~1\ESET\ESETON~1\ONLINE~1.OCX / hxxp://download.eset.com/special/eos/OnlineScanner.cab
-----( HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar )-----
<binary data> "avast! WebRep" - "AVAST Software" - C:\Programme\AVAST Software\Avast\aswWebRepIE.dll
{9421DD08-935F-4701-A9CA-22DF90AC4EA6} "Easy Photo Print" - "SEIKO EPSON CORPORATION / CyCom Technology Corp." - C:\Programme\Epson Software\Easy Photo Print\EPTBL.dll
{10EDB994-47F8-43F7-AE96-F2EA63E9F90F} "QuickStores-Toolbar" - "Microsoft Corporation" - C:\WINDOWS\system32\mscoree.dll
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects )-----
{18DF081C-E8AD-4283-A596-FA578C2EBDC3} "Adobe PDF Link Helper" - "Adobe Systems Incorporated" - C:\Programme\Gemeinsame Dateien\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
{8E5E2654-AD2D-48bf-AC2D-D17F00898D06} "avast! WebRep" - "AVAST Software" - C:\Programme\AVAST Software\Avast\aswWebRepIE.dll
{9421DD08-935F-4701-A9CA-22DF90AC4EA6} "Easy Photo Print" - "SEIKO EPSON CORPORATION / CyCom Technology Corp." - C:\Programme\Epson Software\Easy Photo Print\EPTBL.dll
{DBC80044-A445-435b-BC74-9C25C1C588A9} "Java(tm) Plug-In 2 SSV Helper" - "Sun Microsystems, Inc." - C:\Programme\Java\jre6\bin\jp2ssv.dll
{761497BB-D6F0-462C-B6EB-D4DAF1D92D43} "Java(tm) Plug-In SSV Helper" - "Sun Microsystems, Inc." - C:\Programme\Java\jre6\bin\ssv.dll
{E7E6F031-17CE-4C07-BC86-EABFE594F69C} "JQSIEStartDetectorImpl Class" - "Sun Microsystems, Inc." - C:\Programme\Java\jre6\lib\deploy\jqs\ie\jqs_plugin.dll
{10EDB994-47F8-43F7-AE96-F2EA63E9F90F} "QuickStores-Toolbar" - "Microsoft Corporation" - C:\WINDOWS\system32\mscoree.dll

[Logon]
-----( %UserProfile%\Startmenü\Programme\Autostart )-----
"Desktop.ini" - ? - C:\Dokumente und Einstellungen\Manuela\Startmenü\Programme\Autostart\Desktop.ini
-----( HKLM\Software\Microsoft\Windows\CurrentVersion\Run )-----
"avast" - "AVAST Software" - "C:\Programme\AVAST Software\Avast\avastUI.exe" /nogui
"CHotkey" - "Chicony" - mHotkey.exe
"Dit" - ? - Dit.exe  (File found, but it contains no detailed information)

[Print Monitors]
-----( HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors )-----
"Canon BJ Language Monitor i560" - "CANON INC." - C:\WINDOWS\system32\CNMLM58.DLL
"Canon BJ Language Monitor MP510" - "CANON INC." - C:\WINDOWS\system32\CNMLM85.DLL
"EPSON Stylus DX4400 Series 32MonitorBE" - "SEIKO EPSON CORPORATION" - C:\WINDOWS\system32\E_FLBCAE.DLL
"PDFCreator" - ? - C:\WINDOWS\system32\pdfcmnnt.dll  (File found, but it contains no detailed information)

[Services]
-----( HKLM\SYSTEM\CurrentControlSet\Services )-----
".NET Runtime Optimization Service v2.0.50727_X86" (clr_optimization_v2.0.50727_32) - "Microsoft Corporation" - C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
"Anwendungsverwaltung" (AppMgmt) - ? - C:\WINDOWS\System32\appmgmts.dll  (File not found)
"ArcSoft Connect Daemon" (ACDaemon) - ? - C:\Programme\Gemeinsame Dateien\ArcSoft\Connection Service\Bin\ACService.exe  (File not found)
"ATI Smart" (ATI Smart) - ? - C:\WINDOWS\system32\ati2sgag.exe
"Automatisches LiveUpdate - Scheduler" (Automatisches LiveUpdate - Scheduler) - ? - "C:\Programme\Symantec\LiveUpdate\ALUSchedulerSvc.exe"  (File not found)
"avast! Antivirus" (avast! Antivirus) - "AVAST Software" - C:\Programme\AVAST Software\Avast\AvastSvc.exe
"CA-Lizenz-Client" (CA_LIC_CLNT) - "Computer Associates" - C:\Programme\CA\SharedComponents\CA_LIC\lic98rmt.exe
"CA-Lizenzserver" (CA_LIC_SRVR) - "Computer Associates" - C:\Programme\CA\SharedComponents\CA_LIC\lic98rmtd.exe
"Ereignisprotokoll-Überwachung" (LogWatch) - "Computer Associates" - C:\Programme\CA\SharedComponents\CA_LIC\LogWatNT.exe
"InstallDriver Table Manager" (IDriverT) - "Macrovision Corporation" - C:\Programme\Gemeinsame Dateien\InstallShield\Driver\11\Intel 32\IDriverT.exe
"Java Quick Starter" (JavaQuickStarterService) - "Sun Microsystems, Inc." - C:\Programme\Java\jre6\bin\jqs.exe
"License Management Service ESD" (License Management Service ESD) - ? - "C:\Programme\Gemeinsame Dateien\element5 Shared\Service\Licence Manager ESD.exe"  (File not found)
"LiveUpdate" (LiveUpdate) - ? - "C:\PROGRA~1\Symantec\LIVEUP~1\LUCOMS~1.EXE"  (File not found)
"NMIndexingService" (NMIndexingService) - ? - "C:\Programme\Gemeinsame Dateien\Ahead\Lib\NMIndexingService.exe"  (File not found)
"SecuROM User Access Service (V7)" (UserAccess7) - ? - C:\WINDOWS\system32\UAService7.exe  (File found, but it contains no detailed information)
"Symantec Core LC" (Symantec Core LC) - ? - "C:\Programme\Gemeinsame Dateien\Symantec Shared\CCPD-LC\symlcsvc.exe"  (File not found)
"Update-Service" (Update-Service) - "Joosoft.com GmbH" - C:\WINDOWS\System32\UpdSvc.dll
"Windows CardSpace" (idsvc) - "Microsoft Corporation" - C:\WINDOWS\Microsoft.NET\Framework\v3.0\Windows Communication Foundation\infocard.exe
"Windows Presentation Foundation Font Cache 3.0.0.0" (FontCache3.0.0.0) - "Microsoft Corporation" - C:\WINDOWS\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe

[Winlogon]
-----( HKCU\Control Panel\IOProcs )-----
"MVB" - ? - mvfs32.dll  (File not found)
-----( HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GPExtensions )-----
{c6dc5466-785a-11d2-84d0-00c04fb169f7} "Softwareinstallation" - ? - appmgmts.dll  (File not found)
-----( HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify )-----
"WgaLogon" - "Microsoft Corporation" - C:\WINDOWS\system32\WgaLogon.dll

===[ Logfile end ]=========================================[ Logfile end ]===

If You have questions or want to get some help, You can visit hxxp://forum.online-solutions.ru
         

Alt 23.04.2012, 11:46   #42
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BKA-Trojaner - Standard

BKA-Trojaner



Wir sollten den MBR fixen, sichere für den Fall der Fälle ALLE wichtigen Daten, auch wenn meistens alles glatt geht.

Hinweis: Mach bitte NICHT den MBR-Fix, wenn du noch andere Betriebssysteme wie zB Ubuntu installiert hast, ein MBR-Fix mit Windows-Tools macht ein parallel installiertes (Dualboot) Linux unbootbar.
Mach den Fix auch dann nicht, wenn du zB mit TrueCrypt oder anderen Verschlüsselungsprogrammen eine Vollverschlüsselung der Windowspartition bzw. gesamten Festplatte hast


Starte nach der Datensicherung aswmbr erneut und klick auf den Button FIXMBR.

Hinweis: Bitte den Virenscanner abstellen bevor du aswMBR ausführst, denn v.a. Avira meldet darin oft einen Fehalalrm!

Anschließend Windows neu starten und ein neues Log mit aswMBR machen.
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 23.04.2012, 13:30   #43
Alimaus_1
 
BKA-Trojaner - Standard

BKA-Trojaner



Code:
ATTFilter
aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-04-23 14:04:06
-----------------------------
14:04:06.203    OS Version: Windows 5.1.2600 Service Pack 3
14:04:06.203    Number of processors: 1 586 0x303
14:04:06.203    ComputerName: ANDIUNDDANI  UserName: Manuela
14:04:07.343    Initialize success
14:04:07.468    AVAST engine defs: 12042300
14:04:12.046    Verifying
14:04:22.046    Disk 0 Windows 501 MBR fixed successfully
14:05:39.562    Disk 0 MBR has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\MBR.dat"
14:05:39.562    The log file has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\aswMBR.txt"


aswMBR version 0.9.9.1665 Copyright(c) 2011 AVAST Software
Run date: 2012-04-23 14:11:35
-----------------------------
14:11:35.531    OS Version: Windows 5.1.2600 Service Pack 3
14:11:35.531    Number of processors: 1 586 0x303
14:11:35.531    ComputerName: ANDIUNDDANI  UserName: Manuela
14:11:35.875    Initialize success
14:11:36.218    AVAST engine defs: 12042300
14:11:39.500    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-4
14:11:39.500    Disk 0 Vendor: ST3160812A 3.AAE Size: 152627MB BusType: 3
14:11:39.515    Disk 0 MBR read successfully
14:11:39.531    Disk 0 MBR scan
14:11:39.531    Disk 0 Windows XP default MBR code
14:11:39.531    Disk 0 Partition - 00     0F Extended LBA             77014 MB offset 154850535
14:11:39.531    Disk 0 Partition 1 80 (A) 07    HPFS/NTFS NTFS        75610 MB offset 63
14:11:39.562    Disk 0 Partition 2 00     07    HPFS/NTFS NTFS        70088 MB offset 154850598
14:11:39.578    Disk 0 Partition - 00     05     Extended              6926 MB offset 298391310
14:11:39.750    Disk 0 Partition 3 00     0B        FAT32 MSWIN4.1     6926 MB offset 298391373
14:11:39.796    Disk 0 scanning sectors +312576705
14:11:39.906    Disk 0 scanning C:\WINDOWS\system32\drivers
14:11:54.312    Service scanning
14:12:07.500    Modules scanning
14:12:12.609    Disk 0 trace - called modules:
14:12:12.609    ntoskrnl.exe CLASSPNP.SYS disk.sys ACPI.sys hal.dll atapi.sys pciide.sys PCIIDEX.SYS 
14:12:12.625    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0x82fd6ab8]
14:12:12.625    3 CLASSPNP.SYS[f8605fd7] -> nt!IofCallDriver -> \Device\0000005a[0x82fe01a8]
14:12:12.625    5 ACPI.sys[f856b620] -> nt!IofCallDriver -> \Device\Ide\IdeDeviceP0T0L0-4[0x82f82d98]
14:12:12.906    AVAST engine scan C:\WINDOWS
14:12:20.218    AVAST engine scan C:\WINDOWS\system32
14:15:00.968    AVAST engine scan C:\WINDOWS\system32\drivers
14:15:14.265    AVAST engine scan C:\Dokumente und Einstellungen\Manuela
14:22:57.031    AVAST engine scan C:\Dokumente und Einstellungen\All Users
14:26:40.921    Scan finished successfully
14:27:23.078    Disk 0 MBR has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\MBR.dat"
14:27:23.109    The log file has been saved successfully to "C:\Dokumente und Einstellungen\Manuela\Desktop\aswMBR.txt"
         

Alt 23.04.2012, 13:46   #44
cosinus
/// Winkelfunktion
/// TB-Süch-Tiger™
 
BKA-Trojaner - Standard

BKA-Trojaner



Sieht ok aus. Mach bitte zur Kontrolle Vollscans mit Malwarebytes und SUPERAntiSpyware und poste die Logs.
Denk dran beide Tools zu updaten vor dem Scan!!
__________________
Logfiles bitte immer in CODE-Tags posten

Alt 23.04.2012, 16:37   #45
Alimaus_1
 
BKA-Trojaner - Standard

BKA-Trojaner



anbei die zwei log's
Grüße
Dani
Code:
ATTFilter
Malwarebytes Anti-Malware 1.61.0.1400
www.malwarebytes.org

Datenbank Version: v2012.04.23.03

Windows XP Service Pack 3 x86 NTFS
Internet Explorer 8.0.6001.18702
Manuela :: ANDIUNDDANI [Administrator]

23.04.2012 15:14:16
mbam-log-2012-04-23 (15-14-16).txt

Art des Suchlaufs: Vollständiger Suchlauf
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 288914
Laufzeit: 49 Minute(n), 19 Sekunde(n)

Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)

Infizierte Registrierungswerte: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)

Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)

Infizierte Dateien: 0
(Keine bösartigen Objekte gefunden)

(Ende)
         
Code:
ATTFilter
SUPERAntiSpyware Scan Log
hxxp://www.superantispyware.com

Generated 04/23/2012 at 05:20 PM

Application Version : 5.0.1146

Core Rules Database Version : 8493
Trace Rules Database Version: 6305

Scan type       : Complete Scan
Total Scan Time : 00:52:33

Operating System Information
Windows XP Home Edition 32-bit, Service Pack 3 (Build 5.01.2600)
Administrator

Memory items scanned      : 472
Memory threats detected   : 0
Registry items scanned    : 35199
Registry threats detected : 0
File items scanned        : 36486
File threats detected     : 59

Adware.Tracking Cookie
	C:\Dokumente und Einstellungen\Manuela\Cookies\96XY10FL.txt [ /ad3.adfarm1.adition.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\5WA9EYS2.txt [ /apmebf.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\SEZ86CUY.txt [ /webmasterplan.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\82OIH541.txt [ /traffictrack.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\Y4PSWFR5.txt [ /www.etracker.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\VYEJP109.txt [ /microsoftinternetexplorer.112.2o7.net ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\T31MYM6V.txt [ /fastclick.net ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\4879OUKS.txt [ /tradedoubler.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\QC5M832P.txt [ /www.googleadservices.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\R6B00EFK.txt [ /ad.ad-srv.net ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\CTGTN0OG.txt [ /adtech.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\WL0YL2FH.txt [ /adx2.chip.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\FI2OUZL5.txt [ /adinterax.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\7TMBW5VI.txt [ /adform.net ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\SBQ98UKF.txt [ /server.cpmstar.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\SN2UL24P.txt [ /revsci.net ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\F8JNFAHZ.txt [ /www.googleadservices.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\AKKBR31C.txt [ /track.adform.net ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\45HG63NR.txt [ /bs.serving-sys.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\NM7CBW8N.txt [ /tribalfusion.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\8Q3C45A0.txt [ /adserver.adtechus.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\RAHJYJBS.txt [ /ad2.adfarm1.adition.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\53ZR52V1.txt [ /doubleclick.net ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\YNT1IVYY.txt [ /ads.saymedia.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\R6K1ZL7C.txt [ /www.zanox-affiliate.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\LFHXC0BU.txt [ /ads.intergi.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\BLJISCJ6.txt [ /unitymedia.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\E1G07A9A.txt [ /ad.zanox.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\I7RNEPYU.txt [ /adx.chip.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\L45K3FG8.txt [ /ad.360yield.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\YE21JZ44.txt [ /zanox.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\9RIE8DLD.txt [ /ad.yieldmanager.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\GVHN8P5M.txt [ /mediaplex.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\29D48YNP.txt [ /imrworldwide.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\RFVTOQF3.txt [ /serving-sys.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\5N5FXITU.txt [ /atdmt.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\9R183W0M.txt [ /tracking.quisma.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\TWUV1VHC.txt [ /invitemedia.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\9KYP02Z9.txt [ /tracking.mlsat02.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\WKTEC395.txt [ /ads.creative-serving.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\37YWRBJ9.txt [ /zanox-affiliate.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\3M3LYF3L.txt [ /statcounter.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\DT4LPMS3.txt [ /eas.apm.emediate.eu ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\MHR5OD31.txt [ /adfarm1.adition.com ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\75D01ONF.txt [ /a.revenuemax.de ]
	C:\Dokumente und Einstellungen\Manuela\Cookies\U8M70FT1.txt [ /ad1.adfarm1.adition.com ]
	C:\DOKUMENTE UND EINSTELLUNGEN\MANUELA\Cookies\58FZ7Q59.txt [ Cookie:manuela@www.geld-per-bierdeckel.com/counter/ ]
	delivery.ibanner.de [ C:\DOKUMENTE UND EINSTELLUNGEN\MANUELA\ANWENDUNGSDATEN\MACROMEDIA\FLASH PLAYER\#SHAREDOBJECTS\AMMT3NSY ]
	statse.webtrendslive.com [ C:\DOKUMENTE UND EINSTELLUNGEN\MANUELA\ANWENDUNGSDATEN\MOZILLA\FIREFOX\PROFILES\K1024F68.DEFAULT\COOKIES.SQLITE ]
	.doubleclick.net [ C:\DOKUMENTE UND EINSTELLUNGEN\MANUELA\ANWENDUNGSDATEN\MOZILLA\FIREFOX\PROFILES\K1024F68.DEFAULT\COOKIES.SQLITE ]
	ad.jdtracker.com [ C:\DOKUMENTE UND EINSTELLUNGEN\MANUELA\ANWENDUNGSDATEN\MOZILLA\FIREFOX\PROFILES\K1024F68.DEFAULT\COOKIES.SQLITE ]

Trojan.Agent/Gen-Nullo[Short]
	D:\SYSTEM VOLUME INFORMATION\_RESTORE{21560525-99BE-41FA-AE6A-0F053CABA928}\RP2052\A0345187.EXE
	D:\SYSTEM VOLUME INFORMATION\_RESTORE{21560525-99BE-41FA-AE6A-0F053CABA928}\RP2052\A0345188.EXE
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{21560525-99BE-41FA-AE6A-0F053CABA928}\RP2052\A0345186.EXE

Trojan.Agent/Gen
	ZIP ARCHIVE( C:\_OTL.ZIP )/_OTL/MOVEDFILES/04172012_201909/C_WINDOWS/SYSTEM32/DRIVERS/UTE5NJMX.SYS
	C:\_OTL.ZIP
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{21560525-99BE-41FA-AE6A-0F053CABA928}\RP2064\A0347142.LNK
	C:\SYSTEM VOLUME INFORMATION\_RESTORE{21560525-99BE-41FA-AE6A-0F053CABA928}\RP2068\A0349080.LNK
	C:\_OTL\MOVEDFILES\04172012_201909\C_WINDOWS\SYSTEM32\DRIVERS\UTE5NJMX.SYS
         

Antwort

Themen zu BKA-Trojaner
abgesicherte, abgesicherten, abgesicherten modus, bka-trojaner, dateien, fehlerhafte, folge, folgende, gefunde, großes, helft, malewarebytes, modus, neustart, nicht mehr, problem, schritte, spinn




Zum Thema BKA-Trojaner - Ok. Starte Windows neu, lösch die alte combofix.exe, lade CF neu runter und führe CF nochmal aus - BKA-Trojaner...
Archiv
Du betrachtest: BKA-Trojaner auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.