Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Search Protect ganz vom PC entfernen

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML.

 
Alt 28.02.2014, 07:23   #1
R0bb
 
Search Protect ganz vom PC entfernen - Standard

Search Protect ganz vom PC entfernen



Hallo

Mir ist aufgefallen das ich unter den ausgeblendeten Symbolen Search Protect befindet.
Ich habe es unter Sofware deinstalliert.
Es wär sehr freundlich wenn sich jemand die Logs anschauen könnte und mir sagen ob es ganz weg ist.
Ich bin wegen folgendem Link darauf gekommen das es nicht vollständig weg sein könnte.
http://www.trojaner-board.de/148381-...entfernen.html

Ein Komplettscan mit Kaspersky hat nichts ergeben. (alles sauber)

schon mal Herzlichen Dank

Defogger:

Code:
ATTFilter
defogger_disable by jpshortstuff (23.02.10.1)
Log created at 06:52 on 28/02/2014 (Game)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...


-=E.O.F=-
         
FRST txt:
Code:
ATTFilter
defogger_disable by jpshortstuff (23.02.10.1)
Log created at 06:52 on 28/02/2014 (Game)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...


-=E.O.F=-
         
addition:
Code:
ATTFilter
Additional scan result of Farbar Recovery Scan Tool (x64) Version: 27-02-2014 02
Ran by Game at 2014-02-28 07:00:01
Running from C:\Users\Game\Downloads
Boot Mode: Normal
==========================================================


==================== Security Center ========================

AV: Kaspersky Internet Security (Enabled - Up to date) {179979E8-273D-D14E-0543-2861940E4886}
AV: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: Kaspersky Internet Security (Enabled - Up to date) {ACF8980C-0107-DEC0-3FF3-1313EF89023B}
AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
FW: Kaspersky Internet Security (Enabled) {2FA2F8CD-6D52-D016-2E1C-81546ADD0FFD}

==================== Installed Programs ======================

Adobe Flash Player 12 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 12.0.0.70 - Adobe Systems Incorporated)
Battlefield 4™ (HKLM-x32\...\{ABADE36E-EC37-413B-8179-B432AD3FACE7}) (Version: 1.1.0.1 - Electronic Arts)
Battlelog Web Plugins (HKLM-x32\...\Battlelog Web Plugins) (Version: 2.3.2 - EA Digital Illusions CE AB)
Counter-Strike: Source (HKLM-x32\...\Steam App 240) (Version:  - Valve)
CPUID CPU-Z 1.67.1 (HKLM\...\CPUID CPU-Z_is1) (Version:  - )
DayZ (HKLM-x32\...\Steam App 221100) (Version:  - Bohemia Interactive)
ESN Sonar (HKLM-x32\...\ESN Sonar-0.70.4) (Version: 0.70.4 - ESN Social Software AB)
GeForce Experience NvStream Client Components (Version: 1.6.28 - NVIDIA Corporation) Hidden
ImgBurn (HKLM-x32\...\ImgBurn) (Version: 2.5.8.0 - LIGHTNING UK!)
Intel(R) Management Engine Components (HKLM-x32\...\{65153EA5-8B6E-43B6-857B-C6E4FC25798A}) (Version: 9.5.15.1730 - Intel Corporation)
Intel(R) Rapid Storage Technology (HKLM\...\{409CB30E-E457-4008-9B1A-ED1B9EA21140}) (Version: 12.8.0.1016 - Intel Corporation)
Intel(R) Rapid Storage Technology (Version: 12.8.0.1016 - Intel Corporation) Hidden
Intel® Trusted Connect Service Client (Version: 1.31.8.1 - Intel Corporation) Hidden
Java 7 Update 45 (64-bit) (HKLM\...\{26A24AE4-039D-4CA4-87B4-2F86417045FF}) (Version: 7.0.450 - Oracle)
Java 7 Update 51 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83217045FF}) (Version: 7.0.510 - Oracle)
Java Auto Updater (x32 Version: 2.1.9.8 - Sun Microsystems, Inc.) Hidden
Kaspersky Internet Security (HKLM-x32\...\InstallWIX_{6F6873E3-5C92-4049-B511-231A138DD090}) (Version: 14.0.0.4651 - Kaspersky Lab)
Kaspersky Internet Security (x32 Version: 14.0.0.4651 - Kaspersky Lab) Hidden
Logitech Gaming Software (Version: 8.45.88 - Logitech Inc.) Hidden
Logitech Gaming Software 8.50 (HKLM\...\Logitech Gaming Software) (Version: 8.50.281 - Logitech Inc.)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x64) - 11.0.60610 (HKLM-x32\...\{a1909659-0a08-4554-8af1-2175904903a1}) (Version: 11.0.60610.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 Redistributable (x86) - 11.0.60610 (HKLM-x32\...\{95716cce-fc71-413f-8ad5-56c2892d4b3a}) (Version: 11.0.60610.1 - Microsoft Corporation)
Microsoft Visual C++ 2012 x64 Additional Runtime - 11.0.60610 (Version: 11.0.60610 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x64 Minimum Runtime - 11.0.60610 (Version: 11.0.60610 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Additional Runtime - 11.0.60610 (x32 Version: 11.0.60610 - Microsoft Corporation) Hidden
Microsoft Visual C++ 2012 x86 Minimum Runtime - 11.0.60610 (x32 Version: 11.0.60610 - Microsoft Corporation) Hidden
Mozilla Firefox 27.0.1 (x86 de) (HKLM-x32\...\Mozilla Firefox 27.0.1 (x86 de)) (Version: 27.0.1 - Mozilla)
Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 27.0.1 - Mozilla)
NirSoft BlueScreenView (HKLM-x32\...\NirSoft BlueScreenView) (Version:  - )
NVIDIA 3D Vision Controller-Treiber 334.89 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.NVIRUSB) (Version: 334.89 - NVIDIA Corporation)
NVIDIA 3D Vision Treiber 334.89 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.3DVision) (Version: 334.89 - NVIDIA Corporation)
NVIDIA GeForce Experience 1.8.2 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.GFExperience) (Version: 1.8.2 - NVIDIA Corporation)
NVIDIA Grafiktreiber 334.89 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.Driver) (Version: 334.89 - NVIDIA Corporation)
NVIDIA HD-Audiotreiber 1.3.30.1 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_HDAudio.Driver) (Version: 1.3.30.1 - NVIDIA Corporation)
NVIDIA Install Application (Version: 2.1002.147.1067 - NVIDIA Corporation) Hidden
NVIDIA LED Visualizer 1.0 (Version: 1.0 - NVIDIA Corporation) Hidden
NVIDIA Network Service (Version: 1.0 - NVIDIA Corporation) Hidden
NVIDIA PhysX (x32 Version: 9.13.1220 - NVIDIA Corporation) Hidden
NVIDIA PhysX-Systemsoftware 9.13.1220 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_Display.PhysX) (Version: 9.13.1220 - NVIDIA Corporation)
NVIDIA ShadowPlay 11.10.11 (Version: 11.10.11 - NVIDIA Corporation) Hidden
NVIDIA Stereoscopic 3D Driver (x32 Version: 7.17.13.3489 - NVIDIA Corporation) Hidden
NVIDIA Systemsteuerung 334.89 (Version: 334.89 - NVIDIA Corporation) Hidden
NVIDIA Update 11.10.11 (Version: 11.10.11 - NVIDIA Corporation) Hidden
NVIDIA Update Core (Version: 11.10.11 - NVIDIA Corporation) Hidden
NVIDIA Virtual Audio 1.2.20 (HKLM\...\{B2FE1952-0186-46C3-BAEC-A80AA35AC5B8}_VirtualAudio.Driver) (Version: 1.2.20 - NVIDIA Corporation)
Origin (HKLM-x32\...\Origin) (Version: 9.3.6.4639 - Electronic Arts, Inc.)
PunkBuster Services (HKLM-x32\...\PunkBusterSvc) (Version: 0.993 - Even Balance, Inc.)
Realtek Ethernet Controller Driver (HKLM-x32\...\{8833FFB6-5B0C-4764-81AA-06DFEED9A476}) (Version: 8.21.909.2013 - Realtek)
Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.7037 - Realtek Semiconductor Corp.)
SHIELD Streaming (Version: 1.7.306 - NVIDIA Corporation) Hidden
Steam (HKLM-x32\...\Steam) (Version:  - Valve Corporation)
WinRAR 5.00 (64-Bit) (HKLM\...\WinRAR archiver) (Version: 5.00.0 - win.rar GmbH)

==================== Restore Points  =========================

03-02-2014 09:10:26 Geplanter Prüfpunkt
12-02-2014 16:11:11 Windows Update
18-02-2014 05:59:35 Windows Modules Installer
19-02-2014 06:31:38 DirectX wurde installiert
21-02-2014 05:24:40 DirectX wurde installiert

==================== Hosts content: ==========================

2013-08-22 14:25 - 2013-08-22 14:25 - 00000824 ____A C:\WINDOWS\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

Task: {05293577-D647-4185-B859-C94839A0B2E3} - System32\Tasks\Microsoft\Windows\SettingSync\NetworkStateChangeTask
Task: {0B545118-B563-42FC-8D07-B78F602FCF34} - System32\Tasks\Microsoft\Windows\WS\WSRefreshBannedAppsListTask => Rundll32.exe WSClient.dll,RefreshBannedAppsList
Task: {2085BF56-520D-4951-B7C0-DF34AF90CC6A} - System32\Tasks\Microsoft\Windows\Sysmain\WsSwapAssessmentTask => Rundll32.exe sysmain.dll,PfSvWsSwapAssessmentTask
Task: {2C9C0C6C-2A74-46F2-858A-4389D253EAD0} - System32\Tasks\Microsoft\Windows\Sysmain\HybridDriveCachePrepopulate
Task: {352E6CA0-7314-4DF4-89C4-682368D80D57} - System32\Tasks\Microsoft\Windows\Workplace Join\Automatic-Workplace-Join => C:\Windows\System32\AutoWorkplace.exe [2013-08-22] (Microsoft Corporation)
Task: {3B6D8A73-F20B-4C93-B8FB-56A154F172D2} - System32\Tasks\Microsoft\Windows\Time Zone\SynchronizeTimeZone => C:\Windows\system32\tzsync.exe [2013-08-22] (Microsoft Corporation)
Task: {49754026-21E1-41FC-94FD-727AFE414FE7} - System32\Tasks\Microsoft\Windows\Sysmain\HybridDriveCacheRebalance
Task: {6AA91E8C-DDBD-4979-8464-4062F7681A19} - System32\Tasks\Microsoft\Windows\Plug and Play\Plug and Play Cleanup
Task: {6DF326B7-CAEF-42DC-9816-28A8E2EB3851} - System32\Tasks\Microsoft\Windows\RemovalTools\MRT_HB => C:\WINDOWS\system32\MRT.exe [2014-02-18] (Microsoft Corporation)
Task: {6DFCB649-0769-4F83-BB10-F60F235F6D3D} - System32\Tasks\Microsoft\Windows\SkyDrive\Idle Sync Maintenance Task
Task: {73B1B253-CE67-4501-AE1A-377DD1D68B65} - System32\Tasks\Microsoft\Windows\Application Experience\StartupAppTask => Rundll32.exe Startupscan.dll,SusRunTask
Task: {77F1D869-6E65-4079-A2A0-E2023408EF97} - System32\Tasks\Microsoft\Windows\ApplicationData\CleanupTemporaryState => Rundll32.exe Windows.Storage.ApplicationData.dll,CleanupTemporaryState
Task: {872D0E53-FD2E-41E3-B431-698AF82882CE} - System32\Tasks\Microsoft\Windows\SkyDrive\Routine Maintenance Task
Task: {8CC813C9-712A-41EF-9512-B233444FC669} - System32\Tasks\Microsoft\Windows\AppxDeploymentClient\Pre-staged app cleanup => Rundll32.exe %windir%\system32\AppxDeploymentClient.dll,AppxPreStageCleanupRunTask
Task: {9FF4C139-5234-410C-B7FA-23EE2FD2AB53} - System32\Tasks\Microsoft\Windows\Work Folders\Work Folders Maintenance Work
Task: {CFD7C21A-808B-487B-A6EC-8A10E44E8360} - System32\Tasks\Microsoft\Windows\SettingSync\BackupTask
Task: {D88FEC9E-A82A-46F9-87E2-B6B97B301C1A} - System32\Tasks\Microsoft\Windows\WS\License Validation => Rundll32.exe WSClient.dll,WSpTLR licensing
Task: {DA46820F-FF8A-4B5E-A6B2-B12185DCFFFB} - System32\Tasks\Microsoft\Windows\Work Folders\Work Folders Logon Synchronization
Task: {E6D378FA-E068-4BCB-80DE-56D43A249507} - System32\Tasks\Microsoft\Windows\RecoveryEnvironment\VerifyWinRE

==================== Loaded Modules (whitelisted) =============

2013-11-03 01:12 - 2014-02-08 18:42 - 00117024 _____ () C:\Program Files\NVIDIA Corporation\Display\NvSmartMax64.dll
2013-11-03 23:54 - 2014-01-17 07:09 - 00076888 _____ () C:\WINDOWS\SysWOW64\PnkBstrA.exe
2013-06-17 12:35 - 2013-06-17 12:35 - 00478400 _____ () C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\dblite.dll
2013-05-08 14:52 - 2013-05-08 14:52 - 01270464 _____ () C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\kpcengine.2.3.dll
2014-02-16 00:25 - 2014-02-16 00:25 - 03578992 _____ () C:\Program Files (x86)\Mozilla Firefox\mozjs.dll
2013-11-03 04:45 - 2013-09-16 12:17 - 01242584 _____ () C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\ACE.dll

==================== Alternate Data Streams (whitelisted) =========

AlternateDataStreams: C:\Users\Birgi_000\SkyDrive:ms-properties
AlternateDataStreams: C:\Users\Game\SkyDrive:ms-properties

==================== Safe Mode (whitelisted) ===================


==================== Disabled items from MSCONFIG ==============


==================== Faulty Device Manager Devices =============


==================== Event log errors: =========================

Application errors:
==================
Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Fehler beim Herunterladen der Zeichenfolgen der Leistungsindikatoren für Dienst "WmiApRpl" (WmiApRpl). Der Fehlercode ist das erste DWORD im Datenbereich.

Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich.

Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich.

Error: (02/28/2014 06:22:19 AM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (02/28/2014 06:21:46 AM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (02/28/2014 06:21:24 AM) (Source: Steam Client Service) (User: )
Description: Error: Failed to poke open firewall

Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Fehler beim Herunterladen der Zeichenfolgen der Leistungsindikatoren für Dienst "WmiApRpl" (WmiApRpl). Der Fehlercode ist das erste DWORD im Datenbereich.

Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich.

Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Die Zeichenfolgen der Leistungsindikatoren in der Leistungsindikatorenregistrierung werden beschädigt wenn der Prozess "Performance" auf dem Erweiterungsleistungsindikator-Anbieter ausgeführt wird. Der Wert "BaseIndex" aus der Leistungsregistrierung ist das erste DWORD im Datenbereich, der Wert "LastCounter" ist das zweite DWORD im Datenbereich und der Werte "LastHelp" ist das dritte DWORD im Datenbereich.

Error: (02/27/2014 08:48:46 AM) (Source: Microsoft-Windows-LoadPerf) (User: NT-AUTORITÄT)
Description: Fehler beim Herunterladen der Zeichenfolgen der Leistungsindikatoren für Dienst "WmiApRpl" (WmiApRpl). Der Fehlercode ist das erste DWORD im Datenbereich.


System errors:
=============
Error: (02/28/2014 06:30:32 AM) (Source: bowser) (User: )
Description: Der Suchdiensttreiber erhielt zu viele nicht erlaubte Datagramme vom Remotecomputer "EASYBOX" zum Namen "GAMING-PC" auf Transport "NetBT_Tcpip_{3080DCC1-74EC-400C-AD85-D11F189867F9}". Das Datagramm steht in den Daten.
Es werden keine weiteren Ereignisse erzeugt, solange die Rücksetzfrequenz nicht abgelaufen ist.

Error: (02/28/2014 06:30:28 AM) (Source: EventLog) (User: )
Description: Das System wurde zuvor am ‎28.‎02.‎2014 um 06:19:39 unerwartet heruntergefahren.

Error: (02/27/2014 10:00:01 AM) (Source: DCOM) (User: NT-AUTORITÄT)
Description: ComputerstandardLokalAktivierung{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}NT-AUTORITÄTLokaler DienstS-1-5-19LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar

Error: (02/27/2014 09:52:21 AM) (Source: Service Control Manager) (User: )
Description: Der Aufruf "ScRegSetValueExW" ist für "FailureActions" aufgrund folgenden Fehlers fehlgeschlagen: 
%%5

Error: (02/27/2014 07:08:26 AM) (Source: DCOM) (User: NT-AUTORITÄT)
Description: AnwendungsspezifischLokalAktivierung{135FD325-45B7-4C30-89F8-4386961669F0}{135FD325-45B7-4C30-89F8-4386961669F0}NT-AUTORITÄTNetzwerkdienstS-1-5-20LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar

Error: (02/26/2014 10:00:01 AM) (Source: DCOM) (User: NT-AUTORITÄT)
Description: ComputerstandardLokalAktivierung{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}NT-AUTORITÄTLokaler DienstS-1-5-19LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar

Error: (02/26/2014 09:25:28 AM) (Source: Service Control Manager) (User: )
Description: Der Dienst "Steam Client Service" wurde aufgrund folgenden Fehlers nicht gestartet: 
%%1053

Error: (02/26/2014 09:25:28 AM) (Source: Service Control Manager) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Steam Client Service erreicht.

Error: (02/25/2014 02:52:43 PM) (Source: DCOM) (User: NT-AUTORITÄT)
Description: ComputerstandardLokalAktivierung{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}NT-AUTORITÄTLokaler DienstS-1-5-19LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar

Error: (02/24/2014 10:00:01 AM) (Source: DCOM) (User: NT-AUTORITÄT)
Description: ComputerstandardLokalAktivierung{C2F03A33-21F5-47FA-B4BB-156362A2F239}{316CDED5-E4AE-4B15-9113-7055D84DCC97}NT-AUTORITÄTLokaler DienstS-1-5-19LocalHost (unter Verwendung von LRPC)Nicht verfügbarNicht verfügbar


Microsoft Office Sessions:
=========================
Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT)
Description: WmiApRplWmiApRpl8F2030000E5050000

Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT)
Description: Performance163707000000000000000000008F020000

Error: (02/28/2014 06:37:24 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT)
Description: Performance163707000000000000000000008F020000

Error: (02/28/2014 06:22:19 AM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (02/28/2014 06:21:46 AM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (02/28/2014 06:21:24 AM) (Source: Steam Client Service)(User: )
Description: Failed to poke open firewall

Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT)
Description: WmiApRplWmiApRpl8F2030000E5050000

Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT)
Description: Performance163707000000000000000000008F020000

Error: (02/27/2014 09:16:55 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT)
Description: Performance163707000000000000000000008F020000

Error: (02/27/2014 08:48:46 AM) (Source: Microsoft-Windows-LoadPerf)(User: NT-AUTORITÄT)
Description: WmiApRplWmiApRpl8F2030000E5050000


==================== Memory info =========================== 

Percentage of memory in use: 19%
Total physical RAM: 8136.98 MB
Available physical RAM: 6526.72 MB
Total Pagefile: 9416.98 MB
Available Pagefile: 7530.34 MB
Total Virtual: 131072 MB
Available Virtual: 131071.79 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:231.37 GB) (Free:148.83 GB) NTFS
Drive g: (Volume) (Fixed) (Total:1 GB) (Free:0.72 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 932 GB) (Disk ID: 00000000)

Partition: GPT Partition Type.

========================================================
Disk: 1 (MBR Code: Windows 7 or 8) (Size: 233 GB) (Disk ID: 00000000)

Partition: GPT Partition Type.

==================== End Of Log ============================
         

Gmer:
Code:
ATTFilter
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-02-28 07:09:11
Windows 6.2.9200  x64 \Device\Harddisk1\DR1 -> \Device\00000034 Samsung_SSD_840_EVO_250GB rev.EXT0BB0Q 232,89GB
Running: Gmer-19357.exe; Driver: C:\Users\Game\AppData\Local\Temp\awdyapod.sys


---- Kernel code sections - GMER 2.1 ----

.text   C:\WINDOWS\System32\win32k.sys!W32pServiceTable                                                                                                   fffff960001cb500 15 bytes [00, F1, 0F, 02, C0, 1E, 70, ...]
.text   C:\WINDOWS\System32\win32k.sys!W32pServiceTable + 16                                                                                              fffff960001cb510 11 bytes [00, 4D, FC, FF, 80, 7C, DF, ...]

---- User code sections - GMER 2.1 ----

.text   C:\WINDOWS\system32\dwm.exe[340] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506                                                           00007fff07fa169a 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\system32\dwm.exe[340] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514                                                           00007fff07fa16a2 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\system32\dwm.exe[340] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118                                                              00007fff07fa181a 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\system32\dwm.exe[340] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142                                                              00007fff07fa1832 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\system32\nvvsvc.exe[580] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506                                                        00007fff07fa169a 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\system32\nvvsvc.exe[580] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514                                                        00007fff07fa16a2 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\system32\nvvsvc.exe[580] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118                                                           00007fff07fa181a 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\system32\nvvsvc.exe[580] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142                                                           00007fff07fa1832 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\Explorer.EXE[2652] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506                                                              00007fff07fa169a 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\Explorer.EXE[2652] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514                                                              00007fff07fa16a2 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\Explorer.EXE[2652] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118                                                                 00007fff07fa181a 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\Explorer.EXE[2652] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142                                                                 00007fff07fa1832 4 bytes [FA, 07, FF, 7F]
.text   C:\Program Files\Logitech Gaming Software\LCore.exe[5616] C:\WINDOWS\system32\psapi.dll!GetModuleBaseNameA + 506                                  00007fff07fa169a 4 bytes [FA, 07, FF, 7F]
.text   C:\Program Files\Logitech Gaming Software\LCore.exe[5616] C:\WINDOWS\system32\psapi.dll!GetModuleBaseNameA + 514                                  00007fff07fa16a2 4 bytes [FA, 07, FF, 7F]
.text   C:\Program Files\Logitech Gaming Software\LCore.exe[5616] C:\WINDOWS\system32\psapi.dll!QueryWorkingSet + 118                                     00007fff07fa181a 4 bytes [FA, 07, FF, 7F]
.text   C:\Program Files\Logitech Gaming Software\LCore.exe[5616] C:\WINDOWS\system32\psapi.dll!QueryWorkingSet + 142                                     00007fff07fa1832 4 bytes [FA, 07, FF, 7F]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772                        00007fff0a56285c 8 bytes {JMP 0xffffffffffffff8c}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 11                 00007fff0a562873 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 79                 00007fff0a5628b7 8 bytes {JMP 0xfffffffffffffff2}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddProcessTrustLabelAce + 312             00007fff0a5629f8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetSaclSecurityDescriptor + 104           00007fff0a562a68 8 bytes {JMP 0xffffffffffffffe9}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateAndSetSD + 848                      00007fff0a562dc0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObject + 63                    00007fff0a562e07 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteAce + 120                           00007fff0a562eb8 8 bytes {JMP 0xffffffffffffffdf}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateAndInitializeSid + 268            00007fff0a563948 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominates + 751                        00007fff0a563c3f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlEqualSid + 43                             00007fff0a563c73 8 bytes {JMP 0xffffffffffffffe5}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddAce + 339                              00007fff0a563f0f 8 bytes {JMP 0xffffffffffffffdc}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99                  00007fff0a563f7b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembershipEx + 904              00007fff0a564748 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952                00007fff0a564b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104           00007fff0a564b78 8 bytes {JMP 0xffffffffffffffe5}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356                     00007fff0a564ce4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64                       00007fff0a5674d8 8 bytes {JMP 0xffffffffffffffd0}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43             00007fff0a567617 8 bytes {JMP 0xfffffffffffffff5}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135                00007fff0a567fe3 8 bytes {JMP 0xffffffffffffffaa}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103         00007fff0a568053 8 bytes {JMP 0xffffffffffffffe6}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeSid + 35                        00007fff0a5681f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292                    00007fff0a568324 8 bytes {JMP 0xffffffffffffffdc}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20                    00007fff0a568340 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAFinal + 300                             00007fff0a568474 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAInit + 44                               00007fff0a5684a8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23             00007fff0a56ab33 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8            00007fff0a56ab44 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 392          00007fff0a56acc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   ...                                                                                                                                               * 2
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 43                           00007fff0a56b0cf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 615                          00007fff0a56b30b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   ...                                                                                                                                               * 2
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792                00007fff0a56bb14 8 bytes {JMP 0xffffffffffffffa9}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteResource + 60                       00007fff0a56c314 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 330                         00007fff0a56c5fa 8 bytes {JMP 0xf}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 475                         00007fff0a56c68b 8 bytes {JMP 0xffffffffffffff90}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244                  00007fff0a56c9e8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 340                  00007fff0a56ca48 8 bytes {JMP 0xfffffffffffffff5}
.text   ...                                                                                                                                               * 2
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412               00007fff0a56cd70 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread                       00007fff0a5e6640 8 bytes {JMP QWORD [RIP-0x775d3]}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread                     00007fff0a5e67c0 8 bytes {JMP QWORD [RIP-0x7733b]}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection                           00007fff0a5e67f0 8 bytes {JMP QWORD [RIP-0x7822a]}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory                         00007fff0a5e6910 8 bytes {JMP QWORD [RIP-0x77d2e]}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread                             00007fff0a5e69c0 8 bytes {JMP QWORD [RIP-0x77f6e]}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx                             00007fff0a5e7080 8 bytes {JMP QWORD [RIP-0x77406]}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread                           00007fff0a5e7380 8 bytes {JMP QWORD [RIP-0x779b3]}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread                           00007fff0a5e7c00 8 bytes {JMP QWORD [RIP-0x78372]}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381                       000000007718137d 16 bytes {JMP 0xffffffffffffffd3}
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386                       0000000077181512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49             0000000077181551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23                   0000000077181577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516           0000000077181784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50                        00000000771817c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23                   00000000771817e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68                       0000000077181834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1               0000000077181841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513             0000000077181a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   ...                                                                                                                                               * 2
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16             0000000077182ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308         0000000077182c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[5820] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3                  0000000077182c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772                 00007fff0a56285c 8 bytes {JMP 0xffffffffffffff8c}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 11          00007fff0a562873 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 79          00007fff0a5628b7 8 bytes {JMP 0xfffffffffffffff2}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddProcessTrustLabelAce + 312      00007fff0a5629f8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetSaclSecurityDescriptor + 104    00007fff0a562a68 8 bytes {JMP 0xffffffffffffffe9}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateAndSetSD + 848               00007fff0a562dc0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObject + 63             00007fff0a562e07 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteAce + 120                    00007fff0a562eb8 8 bytes {JMP 0xffffffffffffffdf}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateAndInitializeSid + 268     00007fff0a563948 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominates + 751                 00007fff0a563c3f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlEqualSid + 43                      00007fff0a563c73 8 bytes {JMP 0xffffffffffffffe5}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddAce + 339                       00007fff0a563f0f 8 bytes {JMP 0xffffffffffffffdc}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99           00007fff0a563f7b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembershipEx + 904       00007fff0a564748 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952         00007fff0a564b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104    00007fff0a564b78 8 bytes {JMP 0xffffffffffffffe5}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356              00007fff0a564ce4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64                00007fff0a5674d8 8 bytes {JMP 0xffffffffffffffd0}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43      00007fff0a567617 8 bytes {JMP 0xfffffffffffffff5}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135         00007fff0a567fe3 8 bytes {JMP 0xffffffffffffffaa}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103  00007fff0a568053 8 bytes {JMP 0xffffffffffffffe6}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeSid + 35                 00007fff0a5681f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292             00007fff0a568324 8 bytes {JMP 0xffffffffffffffdc}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20             00007fff0a568340 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAFinal + 300                      00007fff0a568474 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAInit + 44                        00007fff0a5684a8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23      00007fff0a56ab33 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8     00007fff0a56ab44 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 392   00007fff0a56acc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   ...                                                                                                                                               * 2
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 43                    00007fff0a56b0cf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 615                   00007fff0a56b30b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   ...                                                                                                                                               * 2
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792         00007fff0a56bb14 8 bytes {JMP 0xffffffffffffffa9}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteResource + 60                00007fff0a56c314 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 330                  00007fff0a56c5fa 8 bytes {JMP 0xf}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 475                  00007fff0a56c68b 8 bytes {JMP 0xffffffffffffff90}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244           00007fff0a56c9e8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 340           00007fff0a56ca48 8 bytes {JMP 0xfffffffffffffff5}
.text   ...                                                                                                                                               * 2
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412        00007fff0a56cd70 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread                00007fff0a5e6640 8 bytes {JMP QWORD [RIP-0x775d3]}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread              00007fff0a5e67c0 8 bytes {JMP QWORD [RIP-0x7733b]}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection                    00007fff0a5e67f0 8 bytes {JMP QWORD [RIP-0x7822a]}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory                  00007fff0a5e6910 8 bytes {JMP QWORD [RIP-0x77d2e]}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread                      00007fff0a5e69c0 8 bytes {JMP QWORD [RIP-0x77f6e]}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx                      00007fff0a5e7080 8 bytes {JMP QWORD [RIP-0x77406]}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread                    00007fff0a5e7380 8 bytes {JMP QWORD [RIP-0x779b3]}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread                    00007fff0a5e7c00 8 bytes {JMP QWORD [RIP-0x78372]}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381                000000007718137d 16 bytes {JMP 0xffffffffffffffd3}
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386                0000000077181512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49      0000000077181551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23            0000000077181577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516    0000000077181784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50                 00000000771817c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23            00000000771817e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68                0000000077181834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1        0000000077181841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513      0000000077181a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   ...                                                                                                                                               * 2
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16      0000000077182ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308  0000000077182c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Program Files\Intel\Intel(R) Rapid Storage Technology\IAStorIcon.exe[5588] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3           0000000077182c43 8 bytes [7C, 68, D7, 7E, 00, 00, 00, ...]
.text   C:\WINDOWS\ImmersiveControlPanel\SystemSettings.exe[6240] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 506                                  00007fff07fa169a 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\ImmersiveControlPanel\SystemSettings.exe[6240] C:\WINDOWS\system32\PSAPI.DLL!GetModuleBaseNameA + 514                                  00007fff07fa16a2 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\ImmersiveControlPanel\SystemSettings.exe[6240] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 118                                     00007fff07fa181a 4 bytes [FA, 07, FF, 7F]
.text   C:\WINDOWS\ImmersiveControlPanel\SystemSettings.exe[6240] C:\WINDOWS\system32\PSAPI.DLL!QueryWorkingSet + 142                                     00007fff07fa1832 4 bytes [FA, 07, FF, 7F]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDefaultNpAcl + 772                                                  00007fff0a56285c 8 bytes {JMP 0xffffffffffffff8c}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 11                                           00007fff0a562873 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembership + 79                                           00007fff0a5628b7 8 bytes {JMP 0xfffffffffffffff2}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddProcessTrustLabelAce + 312                                       00007fff0a5629f8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetSaclSecurityDescriptor + 104                                     00007fff0a562a68 8 bytes {JMP 0xffffffffffffffe9}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateAndSetSD + 848                                                00007fff0a562dc0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObject + 63                                              00007fff0a562e07 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteAce + 120                                                     00007fff0a562eb8 8 bytes {JMP 0xffffffffffffffdf}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAllocateAndInitializeSid + 268                                      00007fff0a563948 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominates + 751                                                  00007fff0a563c3f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlEqualSid + 43                                                       00007fff0a563c73 8 bytes {JMP 0xffffffffffffffe5}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddAce + 339                                                        00007fff0a563f0f 8 bytes {JMP 0xffffffffffffffdc}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlNewSecurityObjectEx + 99                                            00007fff0a563f7b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenMembershipEx + 904                                        00007fff0a564748 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCheckTokenCapability + 952                                          00007fff0a564b08 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSetDaclSecurityDescriptor + 104                                     00007fff0a564b78 8 bytes {JMP 0xffffffffffffffe5}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddMandatoryAce + 356                                               00007fff0a564ce4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlMapGenericMask + 64                                                 00007fff0a5674d8 8 bytes {JMP 0xffffffffffffffd0}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateSecurityDescriptor + 43                                       00007fff0a567617 8 bytes {JMP 0xfffffffffffffff5}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlSidDominatesForTrust + 135                                          00007fff0a567fe3 8 bytes {JMP 0xffffffffffffffaa}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlIsValidProcessTrustLabelSid + 103                                   00007fff0a568053 8 bytes {JMP 0xffffffffffffffe6}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeSid + 35                                                  00007fff0a5681f7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlCreateServiceSid + 292                                              00007fff0a568324 8 bytes {JMP 0xffffffffffffffdc}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlLengthRequiredSid + 20                                              00007fff0a568340 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAFinal + 300                                                       00007fff0a568474 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!A_SHAInit + 44                                                         00007fff0a5684a8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteBoundaryDescriptor + 23                                       00007fff0a56ab33 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 8                                      00007fff0a56ab44 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlAddSIDToBoundaryDescriptor + 392                                    00007fff0a56acc4 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   ...                                                                                                                                               * 2
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 43                                                     00007fff0a56b0cf 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!EtwEventWrite + 615                                                    00007fff0a56b30b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   ...                                                                                                                                               * 2
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!WinSqmIsSessionDisabled + 792                                          00007fff0a56bb14 8 bytes {JMP 0xffffffffffffffa9}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDeleteResource + 60                                                 00007fff0a56c314 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 330                                                   00007fff0a56c5fa 8 bytes {JMP 0xf}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlDestroyHeap + 475                                                   00007fff0a56c68b 8 bytes {JMP 0xffffffffffffff90}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 244                                            00007fff0a56c9e8 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!RtlInitializeResource + 340                                            00007fff0a56ca48 8 bytes {JMP 0xfffffffffffffff5}
.text   ...                                                                                                                                               * 2
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!CsrClientConnectToServer + 412                                         00007fff0a56cd70 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetInformationThread                                                 00007fff0a5e6640 8 bytes {JMP QWORD [RIP-0x775d3]}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueryInformationThread                                               00007fff0a5e67c0 8 bytes {JMP QWORD [RIP-0x7733b]}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtMapViewOfSection                                                     00007fff0a5e67f0 8 bytes {JMP QWORD [RIP-0x7822a]}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtWriteVirtualMemory                                                   00007fff0a5e6910 8 bytes {JMP QWORD [RIP-0x77d2e]}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtQueueApcThread                                                       00007fff0a5e69c0 8 bytes {JMP QWORD [RIP-0x77f6e]}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtCreateThreadEx                                                       00007fff0a5e7080 8 bytes {JMP QWORD [RIP-0x77406]}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtGetContextThread                                                     00007fff0a5e7380 8 bytes {JMP QWORD [RIP-0x779b3]}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\SYSTEM32\ntdll.dll!NtSetContextThread                                                     00007fff0a5e7c00 8 bytes {JMP QWORD [RIP-0x78372]}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuSetContext + 381                                                 000000007718137d 16 bytes {JMP 0xffffffffffffffd3}
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuGetContext + 386                                                 0000000077181512 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuSetInstructionPointer + 49                                       0000000077181551 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuSetStackPointer + 23                                             0000000077181577 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuResetToConsistentState + 516                                     0000000077181784 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuThreadInit + 50                                                  00000000771817c2 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuGetStackPointer + 23                                             00000000771817e7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessInit + 68                                                 0000000077181834 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 1                                         0000000077181841 24 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuNotifyAffinityChange + 513                                       0000000077181a41 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   ...                                                                                                                                               * 2
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuFlushInstructionCache + 16                                       0000000077182ae0 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuInitializeStartupContext + 308                                   0000000077182c1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text   C:\Users\Game\Downloads\Gmer-19357.exe[5992] C:\WINDOWS\system32\wow64cpu.dll!CpuProcessDebugEvent + 3                                            0000000077182c43 8 bytes [7C, 68, F8, 7F, 00, 00, 00, ...]

---- Threads - GMER 2.1 ----

Thread  C:\WINDOWS\system32\csrss.exe [712:748]                                                                                                           fffff960008144d0

---- EOF - GMER 2.1 ----
         

 

Themen zu Search Protect ganz vom PC entfernen
.dll, cpu-z, dll, explorer.exe, failed, flash player, freundlich, internet, lightning, ntdll.dll, nvidia, pup.optional.conduit.a, pup.optional.opencandy, pup.optional.outbrowse, pup.optional.searchprotect.a, remotecomputer, rundll, software, win32k.sys, windows




Ähnliche Themen: Search Protect ganz vom PC entfernen


  1. Search Protect in Taskleiste
    Log-Analyse und Auswertung - 17.04.2015 (24)
  2. Search Protect in Taskleiste
    Lob, Kritik und Wünsche - 16.04.2015 (1)
  3. Search Protect entfernen
    Anleitungen, FAQs & Links - 04.03.2015 (2)
  4. istartsurf und Search Protect entfernen?
    Plagegeister aller Art und deren Bekämpfung - 17.02.2015 (11)
  5. Windows 7: Search Protect
    Plagegeister aller Art und deren Bekämpfung - 18.01.2015 (11)
  6. Search Protect und Co entfernen
    Plagegeister aller Art und deren Bekämpfung - 30.12.2014 (19)
  7. Search Protect unter Win 7 entfernen
    Log-Analyse und Auswertung - 08.12.2014 (35)
  8. Search Protect mitinstalliert
    Plagegeister aller Art und deren Bekämpfung - 22.08.2014 (15)
  9. Search Protect (trovi.com, search.iminent.com), Fehler bei der Deinstallation.
    Plagegeister aller Art und deren Bekämpfung - 22.07.2014 (17)
  10. "InstallX Search Protect for Yahoo" entfernen
    Anleitungen, FAQs & Links - 13.02.2014 (2)
  11. Search Protect läst sich nicht entfernen
    Plagegeister aller Art und deren Bekämpfung - 27.01.2014 (17)
  12. Search Protect von Conduit - wie restlos entfernen?
    Plagegeister aller Art und deren Bekämpfung - 27.01.2014 (9)
  13. Search protect - conduit
    Plagegeister aller Art und deren Bekämpfung - 27.01.2014 (17)
  14. search protect condoit
    Alles rund um Windows - 29.12.2013 (1)
  15. search protect by conduit
    Plagegeister aller Art und deren Bekämpfung - 19.12.2013 (11)
  16. Search Protect by Conduit (u.a.?)
    Log-Analyse und Auswertung - 10.12.2013 (11)
  17. search protect by conduit
    Plagegeister aller Art und deren Bekämpfung - 31.05.2013 (8)

Zum Thema Search Protect ganz vom PC entfernen - Hallo Mir ist aufgefallen das ich unter den ausgeblendeten Symbolen Search Protect befindet. Ich habe es unter Sofware deinstalliert. Es wär sehr freundlich wenn sich jemand die Logs anschauen könnte - Search Protect ganz vom PC entfernen...
Archiv
Du betrachtest: Search Protect ganz vom PC entfernen auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.