![]() |
|
Log-Analyse und Auswertung: Search Protect ganz vom PC entfernenWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
![]() | #1 |
![]() | ![]() Search Protect ganz vom PC entfernen Hallo Mir ist aufgefallen das ich unter den ausgeblendeten Symbolen Search Protect befindet. Ich habe es unter Sofware deinstalliert. Es wär sehr freundlich wenn sich jemand die Logs anschauen könnte und mir sagen ob es ganz weg ist. Ich bin wegen folgendem Link darauf gekommen das es nicht vollständig weg sein könnte. http://www.trojaner-board.de/148381-...entfernen.html Ein Komplettscan mit Kaspersky hat nichts ergeben. (alles sauber) schon mal Herzlichen Dank Defogger: Code:
ATTFilter defogger_disable by jpshortstuff (23.02.10.1) Log created at 06:52 on 28/02/2014 (Game) Checking for autostart values... HKCU\~\Run values retrieved. HKLM\~\Run values retrieved. Checking for services/drivers... -=E.O.F=- Code:
ATTFilter defogger_disable by jpshortstuff (23.02.10.1) Log created at 06:52 on 28/02/2014 (Game) Checking for autostart values... HKCU\~\Run values retrieved. HKLM\~\Run values retrieved. Checking for services/drivers... -=E.O.F=- Code:
ATTFilter Additional scan result of Farbar Recovery Scan Tool (x64) Version: 27-02-2014 02 Ran by Game at 2014-02-28 07:00:01 Running from C:\Users\Game\Downloads Boot Mode: Normal ========================================================== ==================== Security Center ======================== AV: Kaspersky Internet Security (Enabled - Up to date) {179979E8-273D-D14E-0543-2861940E4886} AV: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} AS: Kaspersky Internet Security (Enabled - Up to date) {ACF8980C-0107-DEC0-3FF3-1313EF89023B} AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} FW: Kaspersky Internet Security (Enabled) {2FA2F8CD-6D52-D016-2E1C-81546ADD0FFD} ==================== Installed Programs ====================== Adobe Flash Player 12 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 12.0.0.70 - Adobe Systems Incorporated) Battlefield 4™ (HKLM-x32\...\{ABADE36E-EC37-413B-8179-B432AD3FACE7}) (Version: 1.1.0.1 - Electronic Arts) Battlelog Web Plugins (HKLM-x32\...\Battlelog Web Plugins) (Version: 2.3.2 - EA Digital Illusions CE AB) Counter-Strike: Source (HKLM-x32\...\Steam App 240) (Version: - Valve) CPUID CPU-Z 1.67.1 (HKLM\...\CPUID CPU-Z_is1) (Version: - ) DayZ (HKLM-x32\...\Steam App 221100) (Version: - Bohemia Interactive) ESN Sonar (HKLM-x32\...\ESN Sonar-0.70.4) (Version: 0.70.4 - ESN Social Software AB) GeForce Experience NvStream Client Components (Version: 1.6.28 - NVIDIA Corporation) Hidden ImgBurn (HKLM-x32\...\ImgBurn) (Version: 2.5.8.0 - LIGHTNING UK!) Intel(R) Management Engine Components (HKLM-x32\...\{65153EA5-8B6E-43B6-857B-C6E4FC25798A}) (Version: 9.5.15.1730 - Intel Corporation) Intel(R) Rapid Storage Technology (HKLM\...\{409CB30E-E457-4008-9B1A-ED1B9EA21140}) (Version: 12.8.0.1016 - Intel Corporation) Intel(R) Rapid Storage Technology (Version: 12.8.0.1016 - Intel Corporation) Hidden Intel® Trusted Connect Service Client (Version: 1.31.8.1 - Intel Corporation) Hidden Java 7 Update 45 (64-bit) (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F86417045FF}) (Version: 7.0.450 - Oracle) Java 7 Update 51 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83217045FF}) (Version: 7.0.510 - Oracle) Java Auto Updater (x32 Version: 2.1.9.8 - Sun Microsystems, Inc.) Hidden Kaspersky Internet Security (HKLM-x32\...\InstallWIX_{6F6873E3-5C92-4049-B511-231A138DD090}) (Version: 14.0.0.4651 - Kaspersky Lab) Kaspersky Internet Security (x32 Version: 14.0.0.4651 - Kaspersky Lab) Hidden Logitech Gaming Software (Version: 8.45.88 - Logitech Inc.) Hidden Logitech Gaming Software 8.50 (HKLM\...\Logitech Gaming Software) (Version: 8.50.281 - Logitech Inc.) Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation) Microsoft Visual C++ 2010 x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation) Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation) Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.60610 (HKLM-x32\...\{a1909659-0a08-4554-8af1-2175904903a1}) (Version: 11.0.60610.1 - Microsoft Corporation) Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.60610 (HKLM-x32\...\{95716cce-fc71-413f-8ad5-56c2892d4b3a}) (Version: 11.0.60610.1 - Microsoft Corporation) Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.60610 (Version: 11.0.60610 - Microsoft Corporation) Hidden Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.60610 (Version: 11.0.60610 - Microsoft Corporation) Hidden Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.60610 (x32 Version: 11.0.60610 - Microsoft Corporation) Hidden Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.60610 (x32 Version: 11.0.60610 - Microsoft Corporation) Hidden Mozilla Firefox 27.0.1 (x86 de) (HKLM-x32\...\Mozilla Firefox 27.0.1 (x86 de)) (Version: 27.0.1 - Mozilla) Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 27.0.1 - Mozilla) NirSoft BlueScreenView (HKLM-x32\...\NirSoft BlueScreenView) (Version: - ) NVIDIA 3D Vision Controller-Treiber 334.89 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.NVIRUSB) (Version: 334.89 - NVIDIA Corporation) NVIDIA 3D Vision Treiber 334.89 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.3DVision) (Version: 334.89 - NVIDIA Corporation) NVIDIA GeForce Experience 1.8.2 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.GFExperience) (Version: 1.8.2 - NVIDIA Corporation) NVIDIA Grafiktreiber 334.89 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Driver) (Version: 334.89 - NVIDIA Corporation) NVIDIA HD-Audiotreiber 1.3.30.1 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_HDAudio.Driver) (Version: 1.3.30.1 - NVIDIA Corporation) NVIDIA Install Application (Version: 2.1002.147.1067 - NVIDIA Corporation) Hidden NVIDIA LED Visualizer 1.0 (Version: 1.0 - NVIDIA Corporation) Hidden NVIDIA Network Service (Version: 1.0 - NVIDIA Corporation) Hidden NVIDIA PhysX (x32 Version: 9.13.1220 - NVIDIA Corporation) Hidden NVIDIA PhysX-Systemsoftware 9.13.1220 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.PhysX) (Version: 9.13.1220 - NVIDIA Corporation) NVIDIA ShadowPlay 11.10.11 (Version: 11.10.11 - NVIDIA Corporation) Hidden NVIDIA Stereoscopic 3D Driver (x32 Version: 7.17.13.3489 - NVIDIA Corporation) Hidden NVIDIA Systemsteuerung 334.89 (Version: 334.89 - NVIDIA Corporation) Hidden NVIDIA Update 11.10.11 (Version: 11.10.11 - NVIDIA Corporation) Hidden NVIDIA Update Core (Version: 11.10.11 - NVIDIA Corporation) Hidden NVIDIA Virtual Audio 1.2.20 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_VirtualAudio.Driver) (Version: 1.2.20 - NVIDIA Corporation) Origin (HKLM-x32\...\Origin) (Version: 9.3.6.4639 - Electronic Arts, Inc.) PunkBuster Services (HKLM-x32\...\PunkBusterSvc) (Version: 0.993 - Even Balance, Inc.) Realtek Ethernet Controller Driver (HKLM-x32\...\{8833FFB6-5B0C-4764-81AA-06DFEED9A476}) (Version: 8.21.909.2013 - Realtek) Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.7037 - Realtek Semiconductor Corp.) SHIELD Streaming (Version: 1.7.306 - NVIDIA Corporation) Hidden Steam (HKLM-x32\...\Steam) (Version: - Valve Corporation) WinRAR 5.00 (64-Bit) (HKLM\...\WinRAR archiver) (Version: 5.00.0 - win.rar GmbH) ==================== Restore Points ========================= 03-02-2014 09:10:26 Geplanter Prüfpunkt 12-02-2014 16:11:11 Windows Update 18-02-2014 05:59:35 Windows Modules Installer 19-02-2014 06:31:38 DirectX wurde installiert 21-02-2014 05:24:40 DirectX wurde installiert ==================== Hosts content: ========================== 2013-08-22 14:25 - 2013-08-22 14:25 - 00000824 ____A C:\WINDOWS\system32\Drivers\etc\hosts ==================== Scheduled Tasks (whitelisted) ============= Task: {05293577-D647-4185-B859-C94839A0B2E3} - System32\Tasks\Microsoft\Windows\SettingSync\NetworkStateChangeTask Task: {0B545118-B563-42FC-8D07-B78F602FCF34} - System32\Tasks\Microsoft\Windows\WS\WSRefreshBannedAppsListTask => Rundll32.exe WSClient.dll,RefreshBannedAppsList Task: {2085BF56-520D-4951-B7C0-DF34AF90CC6A} - System32\Tasks\Microsoft\Windows\Sysmain\WsSwapAssessmentTask => Rundll32.exe sysmain.dll,PfSvWsSwapAssessmentTask Task: {2C9C0C6C-2A74-46F2-858A-4389D253EAD0} - System32\Tasks\Microsoft\Windows\Sysmain\HybridDriveCachePrepopulate Task: {352E6CA0-7314-4DF4-89C4-682368D80D57} - System32\Tasks\Microsoft\Windows\Workplace Join\Automatic-Workplace-Join => C:\Windows\System32\AutoWorkplace.exe [2013-08-22] (Microsoft Corporation) Task: {3B6D8A73-F20B-4C93-B8FB-56A154F172D2} - System32\Tasks\Microsoft\Windows\Time Zone\SynchronizeTimeZone => C:\Windows\system32\tzsync.exe [2013-08-22] (Microsoft Corporation) Task: {49754026-21E1-41FC-94FD-727AFE414FE7} - System32\Tasks\Microsoft\Windows\Sysmain\HybridDriveCacheRebalance Task: {6AA91E8C-DDBD-4979-8464-4062F7681A19} - System32\Tasks\Microsoft\Windows\Plug and Play\Plug and Play Cleanup Task: {6DF326B7-CAEF-42DC-9816-28A8E2EB3851} - System32\Tasks\Microsoft\Windows\RemovalTools\MRT_HB => C:\WINDOWS\system32\MRT.exe [2014-02-18] (Microsoft Corporation) Task: {6DFCB649-0769-4F83-BB10-F60F235F6D3D} - System32\Tasks\Microsoft\Windows\SkyDrive\Idle Sync Maintenance Task Task: {73B1B253-CE67-4501-AE1A-377DD1D68B65} - System32\Tasks\Microsoft\Windows\Application Experience\StartupAppTask => Rundll32.exe Startupscan.dll,SusRunTask Task: {77F1D869-6E65-4079-A2A0-E2023408EF97} - System32\Tasks\Microsoft\Windows\ApplicationData\CleanupTemporaryState => Rundll32.exe Windows.Storage.ApplicationData.dll,CleanupTemporaryState Task: {872D0E53-FD2E-41E3-B431-698AF82882CE} - System32\Tasks\Microsoft\Windows\SkyDrive\Routine Maintenance Task Task: {8CC813C9-712A-41EF-9512-B233444FC669} - System32\Tasks\Microsoft\Windows\AppxDeploymentClient\Pre-staged app cleanup => Rundll32.exe %windir%\system32\AppxDeploymentClient.dll,AppxPreStageCleanupRunTask Task: {9FF4C139-5234-410C-B7FA-23EE2FD2AB53} - System32\Tasks\Microsoft\Windows\Work Folders\Work Folders Maintenance Work Task: {CFD7C21A-808B-487B-A6EC-8A10E44E8360} - System32\Tasks\Microsoft\Windows\SettingSync\BackupTask Task: {D88FEC9E-A82A-46F9-87E2-B6B97B301C1A} - System32\Tasks\Microsoft\Windows\WS\License Validation => Rundll32.exe WSClient.dll,WSpTLR licensing Task: {DA46820F-FF8A-4B5E-A6B2-B12185DCFFFB} - System32\Tasks\Microsoft\Windows\Work Folders\Work Folders Logon Synchronization Task: {E6D378FA-E068-4BCB-80DE-56D43A249507} - System32\Tasks\Microsoft\Windows\RecoveryEnvironment\VerifyWinRE ==================== Loaded Modules (whitelisted) ============= 2013-11-03 01:12 - 2014-02-08 18:42 - 00117024 _____ () C:\Program Files\NVIDIA Corporation\Display\NvSmartMax64.dll 2013-11-03 23:54 - 2014-01-17 07:09 - 00076888 _____ () C:\WINDOWS\SysWOW64\PnkBstrA.exe 2013-06-17 12:35 - 2013-06-17 12:35 - 00478400 _____ () C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\dblite.dll 2013-05-08 14:52 - 2013-05-08 14:52 - 01270464 _____ () C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\kpcengine.2.3.dll 2014-02-16 00:25 - 2014-02-16 00:25 - 03578992 _____ () C:\Program Files (x86)\Mozilla Firefox\mozjs.dll 2013-11-03 04:45 - 2013-09-16 12:17 - 01242584 _____ () C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\ACE.dll ==================== Alternate Data Streams (whitelisted) ========= AlternateDataStreams: C:\Users\Birgi_000\SkyDrive:ms-properties AlternateDataStreams: C:\Users\Game\SkyDrive:ms-properties ==================== Safe Mode (whitelisted) =================== ==================== Disabled items from MSCONFIG ============== ==================== Faulty Device Manager Devices ============= ==================== Event log errors: ========================= Application errors: ================== Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT) Description: Fehler beim Herunterladen der Zeichenfolgen der Leistungsindikatoren für Dienst "WmiApRpl" (WmiApRpl). Der Fehlercode ist das erste DWORD im Datenbereich. Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT) Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich. Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT) Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich. Error: (02/28/2014 06:22:19 AM) (Source: Steam Client Service) (User: ) Description: Error: Failed to poke open firewall Error: (02/28/2014 06:21:46 AM) (Source: Steam Client Service) (User: ) Description: Error: Failed to poke open firewall Error: (02/28/2014 06:21:24 AM) (Source: Steam Client Service) (User: ) Description: Error: Failed to poke open firewall Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT) Description: Fehler beim Herunterladen der Zeichenfolgen der Leistungsindikatoren für Dienst "WmiApRpl" (WmiApRpl). Der Fehlercode ist das erste DWORD im Datenbereich. Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT) Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich. Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT) Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich. Error: (02/27/2014 08:48:46 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT) Description: Fehler beim Herunterladen der Zeichenfolgen der Leistungsindikatoren für Dienst "WmiApRpl" (WmiApRpl). Der Fehlercode ist das erste DWORD im Datenbereich. System errors: ============= Error: (02/28/2014 06:30:32 AM) (Source: bowser) (User: ) Description: Der Suchdiensttreiber erhielt zu viele nicht erlaubte Datagramme vom Remotecomputer "EASYBOX" zum Namen "GAMING-PC" auf Transport "NetBT_Tcpip_{3080DCC1-74EC-400C-AD85-D11F189867F9}". Das Datagramm steht in den Daten. Es werden keine weiteren Ereignisse erzeugt, solange die Rücksetzfrequenz nicht abgelaufen ist. Error: (02/28/2014 06:30:28 AM) (Source: EventLog) (User: ) Description: Das System wurde zuvor am 28.02.2014 um 06:19:39 unerwartet heruntergefahren. Error: (02/27/2014 10:00:01 AM) (Source: DCOM) (User: NT-AUTORITÄT) Description: ComputerstandardLokalAktivierung{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}NT-AUTORITÄTLokaler DienstS-1-5-19LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar Error: (02/27/2014 09:52:21 AM) (Source: Service Control Manager) (User: ) Description: Der Aufruf "ScRegSetValueExW" ist für "FailureActions" aufgrund folgenden Fehlers fehlgeschlagen: %%5 Error: (02/27/2014 07:08:26 AM) (Source: DCOM) (User: NT-AUTORITÄT) Description: AnwendungsspezifischLokalAktivierung{135FD325-45B7-4C30-89F8-4386961669F0}{135FD325-45B7-4C30-89F8-4386961669F0}NT-AUTORITÄTNetzwerkdienstS-1-5-20LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar Error: (02/26/2014 10:00:01 AM) (Source: DCOM) (User: NT-AUTORITÄT) Description: ComputerstandardLokalAktivierung{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}NT-AUTORITÄTLokaler DienstS-1-5-19LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar Error: (02/26/2014 09:25:28 AM) (Source: Service Control Manager) (User: ) Description: Der Dienst "Steam Client Service" wurde aufgrund folgenden Fehlers nicht gestartet: %%1053 Error: (02/26/2014 09:25:28 AM) (Source: Service Control Manager) (User: ) Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Steam Client Service erreicht. Error: (02/25/2014 02:52:43 PM) (Source: DCOM) (User: NT-AUTORITÄT) Description: ComputerstandardLokalAktivierung{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}NT-AUTORITÄTLokaler DienstS-1-5-19LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar Error: (02/24/2014 10:00:01 AM) (Source: DCOM) (User: NT-AUTORITÄT) Description: ComputerstandardLokalAktivierung{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}NT-AUTORITÄTLokaler DienstS-1-5-19LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar Microsoft Office Sessions: ========================= Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT) Description: WmiApRplWmiApRpl8F2030000E5050000 Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT) Description: Performance163707000000000000000000008F020000 Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT) Description: Performance163707000000000000000000008F020000 Error: (02/28/2014 06:22:19 AM) (Source: Steam Client Service)(User: ) Description: Failed to poke open firewall Error: (02/28/2014 06:21:46 AM) (Source: Steam Client Service)(User: ) Description: Failed to poke open firewall Error: (02/28/2014 06:21:24 AM) (Source: Steam Client Service)(User: ) Description: Failed to poke open firewall Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT) Description: WmiApRplWmiApRpl8F2030000E5050000 Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT) Description: Performance163707000000000000000000008F020000 Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT) Description: Performance163707000000000000000000008F020000 Error: (02/27/2014 08:48:46 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT) Description: WmiApRplWmiApRpl8F2030000E5050000 ==================== Memory info =========================== Percentage of memory in use: 19% Total physical RAM: 8136.98 MB Available physical RAM: 6526.72 MB Total Pagefile: 9416.98 MB Available Pagefile: 7530.34 MB Total Virtual: 131072 MB Available Virtual: 131071.79 MB ==================== Drives ================================ Drive c: () (Fixed) (Total:231.37 GB) (Free:148.83 GB) NTFS Drive g: (Volume) (Fixed) (Total:1 GB) (Free:0.72 GB) NTFS ==================== MBR & Partition Table ================== ======================================================== Disk: 0 (MBR Code: Windows 7 or 8) (Size: 932 GB) (Disk ID: 00000000) Partition: GPT Partition Type. ======================================================== Disk: 1 (MBR Code: Windows 7 or 8) (Size: 233 GB) (Disk ID: 00000000) Partition: GPT Partition Type. ==================== End Of Log ============================ Gmer: Code:
ATTFilter GMER 2.1.19357 - hxxp://www.gmer.net Rootkit scan 2014-02-28 07:09:11 Windows 6.2.9200 x64 \Device\Harddisk1\DR1 -> \Device\00000034 Samsung_SSD_840_EVO_250GB rev.EXT0BB0Q 232,89GB Running: Gmer-19357.exe; Driver: C:\Users\Game\AppData\Local\Temp\awdyapod.sys ---- Kernel code sections - GMER 2.1 ---- .text C:\WINDOWS\System32\win32k.sys!W32pServiceTable fffff960001cb500 15 bytes [00, F1, 0F, 02, C0, 1E, 70, ...] .text C:\WINDOWS\System32\win32k.sys!W32pServiceTable + 16 fffff960001cb510 11 bytes [00, 4D, FC, FF, 80, 7C, DF, ...] ---- User code sections - GMER 2.1 ---- .text C:\WINDOWS\system32\dwm.exe[340] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007fff07fa169a 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\system32\dwm.exe[340] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007fff07fa16a2 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\system32\dwm.exe[340] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118 00007fff07fa181a 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\system32\dwm.exe[340] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142 00007fff07fa1832 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\system32\nvvsvc.exe[580] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007fff07fa169a 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\system32\nvvsvc.exe[580] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007fff07fa16a2 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\system32\nvvsvc.exe[580] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118 00007fff07fa181a 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\system32\nvvsvc.exe[580] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142 00007fff07fa1832 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\Explorer.EXE[2652] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007fff07fa169a 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\Explorer.EXE[2652] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007fff07fa16a2 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\Explorer.EXE[2652] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118 00007fff07fa181a 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\Explorer.EXE[2652] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142 00007fff07fa1832 4 bytes [FA, 07, FF, 7F] .text C:\Program Files\Logitech Gaming Software\LCore.exe[5616] C:\WINDOWS\system32\psapi.dll!GetModuleBaseNameA + 506 00007fff07fa169a 4 bytes [FA, 07, FF, 7F] .text C:\Program Files\Logitech Gaming Software\LCore.exe[5616] C:\WINDOWS\system32\psapi.dll!GetModuleBaseNameA + 514 00007fff07fa16a2 4 bytes [FA, 07, FF, 7F] .text C:\Program Files\Logitech Gaming Software\LCore.exe[5616] C:\WINDOWS\system32\psapi.dll!QueryWorkingSet + 118 00007fff07fa181a 4 bytes [FA, 07, FF, 7F] .text C:\Program Files\Logitech Gaming Software\LCore.exe[5616] C:\WINDOWS\system32\psapi.dll!QueryWorkingSet + 142 00007fff07fa1832 4 bytes [FA, 07, FF, 7F] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007fff0a56285c 8 bytes {JMP 0xffffffffffffff8c} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 11 00007fff0a562873 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 79 00007fff0a5628b7 8 bytes {JMP 0xfffffffffffffff2} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddProcessTrustLabelAce + 312 00007fff0a5629f8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetSaclSecurityDescriptor + 104 00007fff0a562a68 8 bytes {JMP 0xffffffffffffffe9} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateAndSetSD + 848 00007fff0a562dc0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObject + 63 00007fff0a562e07 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteAce + 120 00007fff0a562eb8 8 bytes {JMP 0xffffffffffffffdf} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateAndInitializeSid + 268 00007fff0a563948 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominates + 751 00007fff0a563c3f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlEqualSid + 43 00007fff0a563c73 8 bytes {JMP 0xffffffffffffffe5} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007fff0a563f0f 8 bytes {JMP 0xffffffffffffffdc} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007fff0a563f7b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembershipEx + 904 00007fff0a564748 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007fff0a564b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007fff0a564b78 8 bytes {JMP 0xffffffffffffffe5} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007fff0a564ce4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007fff0a5674d8 8 bytes {JMP 0xffffffffffffffd0} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007fff0a567617 8 bytes {JMP 0xfffffffffffffff5} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007fff0a567fe3 8 bytes {JMP 0xffffffffffffffaa} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007fff0a568053 8 bytes {JMP 0xffffffffffffffe6} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007fff0a5681f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007fff0a568324 8 bytes {JMP 0xffffffffffffffdc} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007fff0a568340 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007fff0a568474 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007fff0a5684a8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007fff0a56ab33 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007fff0a56ab44 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 392 00007fff0a56acc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text ... * 2 .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007fff0a56b0cf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 615 00007fff0a56b30b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text ... * 2 .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007fff0a56bb14 8 bytes {JMP 0xffffffffffffffa9} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteResource + 60 00007fff0a56c314 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 330 00007fff0a56c5fa 8 bytes {JMP 0xf} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 475 00007fff0a56c68b 8 bytes {JMP 0xffffffffffffff90} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007fff0a56c9e8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 340 00007fff0a56ca48 8 bytes {JMP 0xfffffffffffffff5} .text ... * 2 .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007fff0a56cd70 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007fff0a5e6640 8 bytes {JMP QWORD [RIP-0x775d3]} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007fff0a5e67c0 8 bytes {JMP QWORD [RIP-0x7733b]} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007fff0a5e67f0 8 bytes {JMP QWORD [RIP-0x7822a]} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007fff0a5e6910 8 bytes {JMP QWORD [RIP-0x77d2e]} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007fff0a5e69c0 8 bytes {JMP QWORD [RIP-0x77f6e]} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007fff0a5e7080 8 bytes {JMP QWORD [RIP-0x77406]} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007fff0a5e7380 8 bytes {JMP QWORD [RIP-0x779b3]} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007fff0a5e7c00 8 bytes {JMP QWORD [RIP-0x78372]} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 000000007718137d 16 bytes {JMP 0xffffffffffffffd3} .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077181512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077181551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077181577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077181784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000771817c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000771817e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077181834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077181841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077181a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text ... * 2 .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077182ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077182c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077182c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007fff0a56285c 8 bytes {JMP 0xffffffffffffff8c} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 11 00007fff0a562873 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 79 00007fff0a5628b7 8 bytes {JMP 0xfffffffffffffff2} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddProcessTrustLabelAce + 312 00007fff0a5629f8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetSaclSecurityDescriptor + 104 00007fff0a562a68 8 bytes {JMP 0xffffffffffffffe9} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateAndSetSD + 848 00007fff0a562dc0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObject + 63 00007fff0a562e07 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteAce + 120 00007fff0a562eb8 8 bytes {JMP 0xffffffffffffffdf} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateAndInitializeSid + 268 00007fff0a563948 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominates + 751 00007fff0a563c3f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlEqualSid + 43 00007fff0a563c73 8 bytes {JMP 0xffffffffffffffe5} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007fff0a563f0f 8 bytes {JMP 0xffffffffffffffdc} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007fff0a563f7b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembershipEx + 904 00007fff0a564748 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007fff0a564b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007fff0a564b78 8 bytes {JMP 0xffffffffffffffe5} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007fff0a564ce4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007fff0a5674d8 8 bytes {JMP 0xffffffffffffffd0} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007fff0a567617 8 bytes {JMP 0xfffffffffffffff5} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007fff0a567fe3 8 bytes {JMP 0xffffffffffffffaa} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007fff0a568053 8 bytes {JMP 0xffffffffffffffe6} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007fff0a5681f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007fff0a568324 8 bytes {JMP 0xffffffffffffffdc} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007fff0a568340 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007fff0a568474 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007fff0a5684a8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007fff0a56ab33 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007fff0a56ab44 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 392 00007fff0a56acc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text ... * 2 .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007fff0a56b0cf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 615 00007fff0a56b30b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text ... * 2 .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007fff0a56bb14 8 bytes {JMP 0xffffffffffffffa9} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteResource + 60 00007fff0a56c314 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 330 00007fff0a56c5fa 8 bytes {JMP 0xf} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 475 00007fff0a56c68b 8 bytes {JMP 0xffffffffffffff90} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007fff0a56c9e8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 340 00007fff0a56ca48 8 bytes {JMP 0xfffffffffffffff5} .text ... * 2 .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007fff0a56cd70 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007fff0a5e6640 8 bytes {JMP QWORD [RIP-0x775d3]} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007fff0a5e67c0 8 bytes {JMP QWORD [RIP-0x7733b]} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007fff0a5e67f0 8 bytes {JMP QWORD [RIP-0x7822a]} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007fff0a5e6910 8 bytes {JMP QWORD [RIP-0x77d2e]} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007fff0a5e69c0 8 bytes {JMP QWORD [RIP-0x77f6e]} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007fff0a5e7080 8 bytes {JMP QWORD [RIP-0x77406]} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007fff0a5e7380 8 bytes {JMP QWORD [RIP-0x779b3]} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007fff0a5e7c00 8 bytes {JMP QWORD [RIP-0x78372]} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 000000007718137d 16 bytes {JMP 0xffffffffffffffd3} .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077181512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077181551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077181577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077181784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000771817c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000771817e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077181834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077181841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077181a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text ... * 2 .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077182ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077182c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077182c43 8 bytes [7C, 68, D7, 7E, 00, 00, 00, ...] .text C:\WINDOWS\ImmersiveControlPanel\SystemSettings.exe[6240] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506 00007fff07fa169a 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\ImmersiveControlPanel\SystemSettings.exe[6240] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514 00007fff07fa16a2 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\ImmersiveControlPanel\SystemSettings.exe[6240] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118 00007fff07fa181a 4 bytes [FA, 07, FF, 7F] .text C:\WINDOWS\ImmersiveControlPanel\SystemSettings.exe[6240] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142 00007fff07fa1832 4 bytes [FA, 07, FF, 7F] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772 00007fff0a56285c 8 bytes {JMP 0xffffffffffffff8c} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 11 00007fff0a562873 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 79 00007fff0a5628b7 8 bytes {JMP 0xfffffffffffffff2} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddProcessTrustLabelAce + 312 00007fff0a5629f8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetSaclSecurityDescriptor + 104 00007fff0a562a68 8 bytes {JMP 0xffffffffffffffe9} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateAndSetSD + 848 00007fff0a562dc0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObject + 63 00007fff0a562e07 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteAce + 120 00007fff0a562eb8 8 bytes {JMP 0xffffffffffffffdf} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateAndInitializeSid + 268 00007fff0a563948 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominates + 751 00007fff0a563c3f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlEqualSid + 43 00007fff0a563c73 8 bytes {JMP 0xffffffffffffffe5} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddAce + 339 00007fff0a563f0f 8 bytes {JMP 0xffffffffffffffdc} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99 00007fff0a563f7b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembershipEx + 904 00007fff0a564748 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952 00007fff0a564b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104 00007fff0a564b78 8 bytes {JMP 0xffffffffffffffe5} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356 00007fff0a564ce4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64 00007fff0a5674d8 8 bytes {JMP 0xffffffffffffffd0} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43 00007fff0a567617 8 bytes {JMP 0xfffffffffffffff5} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135 00007fff0a567fe3 8 bytes {JMP 0xffffffffffffffaa} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103 00007fff0a568053 8 bytes {JMP 0xffffffffffffffe6} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeSid + 35 00007fff0a5681f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292 00007fff0a568324 8 bytes {JMP 0xffffffffffffffdc} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20 00007fff0a568340 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAFinal + 300 00007fff0a568474 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAInit + 44 00007fff0a5684a8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23 00007fff0a56ab33 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8 00007fff0a56ab44 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 392 00007fff0a56acc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text ... * 2 .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 43 00007fff0a56b0cf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 615 00007fff0a56b30b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text ... * 2 .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792 00007fff0a56bb14 8 bytes {JMP 0xffffffffffffffa9} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteResource + 60 00007fff0a56c314 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 330 00007fff0a56c5fa 8 bytes {JMP 0xf} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 475 00007fff0a56c68b 8 bytes {JMP 0xffffffffffffff90} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244 00007fff0a56c9e8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 340 00007fff0a56ca48 8 bytes {JMP 0xfffffffffffffff5} .text ... * 2 .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412 00007fff0a56cd70 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread 00007fff0a5e6640 8 bytes {JMP QWORD [RIP-0x775d3]} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread 00007fff0a5e67c0 8 bytes {JMP QWORD [RIP-0x7733b]} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection 00007fff0a5e67f0 8 bytes {JMP QWORD [RIP-0x7822a]} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00007fff0a5e6910 8 bytes {JMP QWORD [RIP-0x77d2e]} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread 00007fff0a5e69c0 8 bytes {JMP QWORD [RIP-0x77f6e]} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx 00007fff0a5e7080 8 bytes {JMP QWORD [RIP-0x77406]} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread 00007fff0a5e7380 8 bytes {JMP QWORD [RIP-0x779b3]} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread 00007fff0a5e7c00 8 bytes {JMP QWORD [RIP-0x78372]} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381 000000007718137d 16 bytes {JMP 0xffffffffffffffd3} .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386 0000000077181512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49 0000000077181551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23 0000000077181577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516 0000000077181784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50 00000000771817c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23 00000000771817e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68 0000000077181834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1 0000000077181841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513 0000000077181a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text ... * 2 .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16 0000000077182ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308 0000000077182c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...] .text C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000077182c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...] ---- Threads - GMER 2.1 ---- Thread C:\WINDOWS\system32\csrss.exe [712:748] fffff960008144d0 ---- EOF - GMER 2.1 ---- |
Themen zu Search Protect ganz vom PC entfernen |
.dll, cpu-z, dll, explorer.exe, failed, flash player, freundlich, internet, lightning, ntdll.dll, nvidia, pup.optional.conduit.a, pup.optional.opencandy, pup.optional.outbrowse, pup.optional.searchprotect.a, remotecomputer, rundll, software, win32k.sys, windows |