|
Plagegeister aller Art und deren Bekämpfung: Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbarWindows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen. |
13.07.2014, 12:45 | #1 |
| Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Hallo an alle, ich mache diesen Thread zum zweiten mal auf. Das liegt daran das ich heute Nacht meinen alten 2x editiert habe und ein drittes mal wohl nicht funktioniert. Deswegen musste ich auf meinen eigenen Thread antworten um etwas zu ergänzen. Ich habe gelesen das bei euch eine Antwort als "wird bearbeitet gilt". Ich brauche meinen Laptop ab heute Abend 23.00 zum arbeiten, es wäre toll wenn ich ihn bis dahin noch kaputt "bomben" könnte. "Ich glaube ich habe mir was eingefangen. Ob das von einem uralten USB Stick kam den ich gefunden habe und mal eingesteckt hatte (ist Linux drauf) (autorun über Windows deaktiviert) oder weil ich den Virenscanner gewechselt habe (Seitdem ging es glaube ich los, scheiß Kaspersky!). Habe auch mit dem VMPlayer rumgespielt. Ich bin mir eigentlich sicher das irgendwas gehörig faul ist. Wenn nicht, traue ich dem ganzen Braten trotzdem nicht. Ich will den PC jetzt 100% neu aufsetzen und vorher alles kaputt bomben egal ob alles rein ist oder nicht. Ich schreibe mal alles was mir so auffällt und hänge Screenshots an. Mein Laptop rödelt die ganze Zeit, ich merk da ist irgendwas. Außerdem blinkt die LED Leuchte immer im Takt. Auch wenn ich die Internet Verbindung ausmache (Wlan adapter deaktivieren alles) und als geht es weiter. Ich habe sogar das Netzwerk Kabel vom Router gezogen und als arbeitet mein Laptop weiter. Ich hoffe die FritzBox & FritzBox Repeater Software (hatte mich drauf eingeloggt als die Internet Verbindung als rumspinnte) hat nix abbekommen. Hänge mit meinem Sony Bravia TV sowie Xbox und Ps ebenfalls an dem Router. Wenn ich einen Ordner schließe oder sonst was mache, bekomme ich manchmal in der linkeren oberen Ecke irgendeinen Schwarzen Kasten angezeigt in dem irgendwas drin steht, kann ich aber nicht lesen so schnell ist das Ding wieder weg. Ich habe mich in den letzten Stunden bei allem möglichen eingeloggt, vom Online Banking, bis zu Microsoft,Paypal usw. Wie kann ich meinen PC komplett nieder machen? Mit Dariks Boot and Nuke alles komplett kaputt bomben? (Bräuchte eine Anleitung) Wie kann ich auf sicherem Wege saubere Software + Windows 7 Iso downloaden? Und wenn mein Router infiziert ist kann ich ja meinen Laptop retten wie ich will oder? Ich bitte um eure Hilfe! __________________________________________________________ € Ich habe die ganze Nacht tausende Programme durchprobiert. Kram deinstalliert, Haufen Scans gemacht. Bis 23.00 Uhr kann ich hoffentlich fertig sein.. Die Kiste läuft jetzt schon ruhiger, aber ich kann den Sicherheits Dienst nicht starten und werde auf Malware Seiten umgeleitet. Bissher hat kein Programm mir das je gemeldet! Nur das Emisoft Anti Malware! - Emisoft Anti-Malware meldet wenn ich den Firefox öffne wird eine Verbindung zu XXX (ich poste den Link hier nicht) aufgebaut. VirusTotal -> Malware Seite - Unhackme: Item Name: BootExecute Author: Unknown Related File: autocheck autochk *\n <BR>sdnclean64.exe<BR> Type: Bootexecute - Irgendein Microsoft Scanner (Name weiß ich nicht mehr, ich habe wirkliche dutzende Programm bis heute morgen um 05.00 durchprobiert) meldete es wäre ein Proxy eingestellt. Das habe ich gefixt. - Als ich den Eset Online Scanner (hatte Eset die ganze Zeit als Virenscanner, hätte ich den bloß behalten lief alles gut) nutzte, konnte der keine Virenupdates laden. Als ich unter Proxy Einstellungen Proxy aktivieren gemacht habe und alle Felder frei gelassen hatte, also nix eingetragen konnte das Ding auf einmal die Updates laden. - Microsoft Sicherheitscenter Dienst ist deaktiviert, und ich kann ihn auch nicht mehr aktivieren. - WMI Autorun Entry: BVTConsumer Microsoft ® Console Based Script Host Microsoft Corporation c:\windows\system32\cscript.exe 12.10.2013 03:33 Normal? - Autorun Logon: cmd.exe Windows-Befehlsprozessor Microsoft Corporation c:\windows\system32\cmd.exe 20.11.2010 11:46 Normal? - Autorun Logon: SystemPropertiesPerformance.exe Computerleistungseinstellungen ändern Microsoft Corporation c:\windows\system32\systempropertiesperformance.exe 14.07.2009 01:56 Normal? - TrojanHunter (aber auch nur TrojanHunter, kein anderes Programm) meldet mein Dritek (dsiwmis.exe) WMI Service + Launch Manager utility process (LMutilps32.exe) wäre infiziert. Geändert von Kenor (13.07.2014 um 13:02 Uhr) |
13.07.2014, 12:47 | #2 |
/// the machine /// TB-Ausbilder | Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Hi,
__________________Logs bitte immer in den Thread posten. Zur Not aufteilen und mehrere Posts nutzen. Ich kann auf Arbeit keine Anhänge öffnen, danke. So funktioniert es: Posten in CODE-Tags Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR, 7Z-Archive zu packen erschwert mir massiv die Arbeit, es sei denn natürlich die Datei wäre ansonsten zu gross für das Forum. Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
__________________ |
13.07.2014, 12:57 | #3 |
| Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Hallo Schrauber (du hast mir schon einmal geholfen ) wird gemacht.
__________________FRST FRST Logfile: Code:
ATTFilter Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 11-07-2014 Ran by Andreas (administrator) on CHFGHT8 on 13-07-2014 01:02:57 Running from C:\Users\Andreas\Desktop Platform: Windows 7 Professional Service Pack 1 (X64) OS Language: Deutsch (Deutschland) Internet Explorer Version 11 Boot Mode: Normal ==================== Processes (Whitelisted) ================= (Microsoft Corporation) C:\Windows\System32\wlanext.exe (Kaspersky Lab ZAO) C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe (Dritek System Inc.) C:\Program Files (x86)\Launch Manager\dsiwmis.exe (Intel(R) Corporation) C:\Program Files\Intel\iCLS Client\HeciServer.exe (Dritek System Inc.) C:\Program Files (x86)\Launch Manager\LMutilps32.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\Jhi_service.exe (Kaspersky Lab ZAO) C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avpui.exe (Microsoft Corporation) C:\Windows\System32\taskmgr.exe (Emsisoft GmbH) C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe (Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe (Apache Software Foundation) C:\Program Files (x86)\OpenOffice 4\program\swriter.exe (Apache Software Foundation) C:\Program Files (x86)\OpenOffice 4\program\soffice.exe (Apache Software Foundation) C:\Program Files (x86)\OpenOffice 4\program\soffice.bin ==================== Registry (Whitelisted) ================== HKLM-x32\...\Run: [emsisoft anti-malware] => C:\Program Files (x86)\Emsisoft Anti-Malware\a2guard.exe [4841824 2014-07-12] (Emsisoft GmbH) Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation) HKU\S-1-5-19\...\Run: [Sidebar] => %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun HKU\S-1-5-20\...\Run: [Sidebar] => %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun BootExecute: autocheck autochk * sdnclean64.exe ==================== Internet (Whitelisted) ==================== ProxyServer: localhost:8080 HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://www.dell.com HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = about:blank HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = about:blank BHO: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO) BHO: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO) BHO: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre8\bin\ssv.dll (Oracle Corporation) BHO: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO) BHO: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre8\bin\jp2ssv.dll (Oracle Corporation) BHO: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO) BHO-x32: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO) BHO-x32: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO) BHO-x32: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation) BHO-x32: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO) BHO-x32: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation) BHO-x32: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO) Tcpip\Parameters: [DhcpNameServer] 192.168.178.1 FireFox: ======== FF ProfilePath: C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default FF Homepage: about:blank FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_14_0_0_145.dll () FF Plugin: @java.com/DTPlugin,version=11.5.2 - C:\Program Files\Java\jre8\bin\dtplugin\npDeployJava1.dll (Oracle Corporation) FF Plugin: @java.com/JavaPlugin,version=11.5.2 - C:\Program Files\Java\jre8\bin\plugin2\npjp2.dll (Oracle Corporation) FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_14_0_0_145.dll () FF Plugin-x32: @intel-webapi.intel.com/Intel WebAPI ipt;version=2.0.59 - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT\npIntelWebAPIIPT.dll (Intel Corporation) FF Plugin-x32: @intel-webapi.intel.com/Intel WebAPI updater - C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\IPT\npIntelWebAPIUpdater.dll (Intel Corporation) FF Plugin-x32: @java.com/DTPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation) FF Plugin-x32: @java.com/JavaPlugin,version=10.55.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation) FF Plugin HKCU: @Google.com/GoogleEarthPlugin - C:\Users\Andreas\AppData\Local\Google\Google Earth\plugin\npgeplugin.dll (Google) FF SearchPlugin: C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\searchplugins\ixquick-https.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml FF Extension: Flash Video Downloader - Full HD Download - C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\Extensions\artur.dubovoy@gmail.com [2014-05-09] FF Extension: anonymoX - C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\Extensions\client@anonymox.net.xpi [2013-08-22] FF Extension: Ghostery - C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\Extensions\firefox@ghostery.com.xpi [2013-08-18] FF Extension: convert2mp3.net YouTube2MP3 Converter - C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\Extensions\info@convert2mp3.net.xpi [2013-06-07] FF Extension: RefControl - C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\Extensions\{455D905A-D37C-4643-A9E2-F6FEFAA0424A}.xpi [2013-08-22] FF Extension: SmoothWheel (mozdev.org) - C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\Extensions\{5F590AA2-1221-4113-A6F4-A4BB62414FAC}.xpi [2013-08-22] FF Extension: NoScript - C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\Extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi [2013-06-07] FF Extension: Adblock Plus - C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2013-06-04] FF Extension: BetterPrivacy - C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\4m9pb2cr.default\Extensions\{d40f5e7b-d2cf-4856-b441-cc613eeffbe3}.xpi [2013-08-22] FF HKLM\...\Thunderbird\Extensions: [eplgTb@eset.com] - C:\Program Files\ESET\ESET Smart Security\Mozilla Thunderbird FF HKLM-x32\...\Firefox\Extensions: - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com FF Extension: 卡巴斯基網址顧問 - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com [2014-07-07] FF HKLM-x32\...\Firefox\Extensions: [virtual_keyboard@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com FF Extension: 虛擬鍵盤 - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com [2014-07-07] FF HKLM-x32\...\Firefox\Extensions: [content_blocker@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com FF Extension: 惡意網站攔截器 - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com [2014-07-07] FF HKLM-x32\...\Firefox\Extensions: [anti_banner@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com FF Extension: Chặn quảng cáo - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com [2014-07-07] FF HKLM-x32\...\Firefox\Extensions: [online_banking@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com FF Extension: Safe Money - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com [2014-07-07] FF HKLM-x32\...\Thunderbird\Extensions: [eplgTb@eset.com] - C:\Program Files\ESET\ESET Smart Security\Mozilla Thunderbird Chrome: ======= Error reading preferences. Please check "preferences" file for possible corruption. <======= ATTENTION CHR HKLM-x32\...\Chrome\Extension: [blbkdnmdcafmfhinpmnlhhddbepgkeaa] - https://chrome.google.com/webstore/detail/blbkdnmdcafmfhinpmnlhhddbepgkeaa [] CHR HKLM-x32\...\Chrome\Extension: [dchlnpcodkpfdpacogkljefecpegganj] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\urladvisor.crx [2014-05-28] CHR HKLM-x32\...\Chrome\Extension: [hakdifolhalapjijoafobooafbilfakh] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\online_banking_chrome.crx [2014-05-28] CHR HKLM-x32\...\Chrome\Extension: [hghkgaeecgjhjkannahfamoehjmkjail] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\content_blocker_chrome.crx [2014-05-28] CHR HKLM-x32\...\Chrome\Extension: [jagncdcchgajhfhijbbhecadmaiegcmh] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\virtkbd.crx [2014-05-28] CHR HKLM-x32\...\Chrome\Extension: [pjldcfjmnllhmgjclecdnfampinooman] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\ChromeExt\ab.crx [2014-05-28] ==================== Services (Whitelisted) ================= R2 a2AntiMalware; C:\Program Files (x86)\Emsisoft Anti-Malware\a2service.exe [4741384 2014-07-12] (Emsisoft GmbH) R2 AVP; C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe [214512 2014-05-28] (Kaspersky Lab ZAO) R2 jhi_service; C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\DAL\jhi_service.exe [161560 2012-02-08] (Intel Corporation) S4 rpcapd; C:\Program Files (x86)\WinPcap\rpcapd.exe [118520 2013-03-01] (Riverbed Technology, Inc.) S3 SystemExplorerHelpService; C:\Program Files (x86)\System Explorer\service\SystemExplorerService64.exe [821720 2012-11-25] (Mister Group) S4 wltrysvc; C:\Program Files\Broadcom\Broadcom 802.11 Network Adapter\bcmwltry.exe [5824512 2013-05-31] (Broadcom Corporation) [File not signed] ==================== Drivers (Whitelisted) ==================== R3 a2acc; C:\PROGRAM FILES (X86)\EMSISOFT ANTI-MALWARE\a2accx64.sys [71472 2014-05-12] (Emsisoft GmbH) R1 A2DDA; C:\Program Files (x86)\Emsisoft Anti-Malware\a2ddax64.sys [26176 2013-03-28] (Emsisoft GmbH) R3 cleanhlp; C:\Program Files (x86)\Emsisoft Anti-Malware\cleanhlp64.sys [57024 2013-12-04] (Emsisoft GmbH) R3 dtsoftbus01; C:\Windows\System32\DRIVERS\dtsoftbus01.sys [283064 2014-04-20] (Disc Soft Ltd) R0 kl1; C:\Windows\System32\DRIVERS\kl1.sys [458336 2014-05-28] (Kaspersky Lab ZAO) S4 klflt; C:\Windows\System32\DRIVERS\klflt.sys [115296 2014-05-28] (Kaspersky Lab ZAO) R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [625248 2014-05-28] (Kaspersky Lab ZAO) R1 KLIM6; C:\Windows\System32\DRIVERS\klim6.sys [29792 2014-05-28] (Kaspersky Lab ZAO) R3 klkbdflt; C:\Windows\System32\DRIVERS\klkbdflt.sys [29280 2014-05-28] (Kaspersky Lab ZAO) R3 klmouflt; C:\Windows\System32\DRIVERS\klmouflt.sys [29280 2014-05-28] (Kaspersky Lab ZAO) R1 klpd; C:\Windows\System32\DRIVERS\klpd.sys [15456 2013-04-12] (Kaspersky Lab ZAO) R1 kltdi; C:\Windows\System32\DRIVERS\kltdi.sys [55904 2013-05-14] (Kaspersky Lab ZAO) R1 kneps; C:\Windows\System32\DRIVERS\kneps.sys [178272 2014-05-28] (Kaspersky Lab ZAO) S3 MEMSWEEP2; C:\Windows\system32\3563.tmp [6144 2009-06-18] (Sophos Plc) [File not signed] S3 NPF; C:\Windows\System32\drivers\npf.sys [36600 2013-03-01] (Riverbed Technology, Inc.) S3 Serial; C:\Windows\system32\drivers\serial.sys [94208 2009-07-14] (Brother Industries Ltd.) R3 SmbDrv; C:\Windows\System32\DRIVERS\Smb_driver.sys [22800 2012-02-14] (Synaptics Incorporated) R0 vsock; C:\Windows\System32\drivers\vsock.sys [73296 2013-10-08] (VMware, Inc.) S3 DIRECTIO; \??\C:\Program Files\PerformanceTest\DirectIo64.sys [X] U3 DumpIt; \??\C:\Windows\SysWOW64\Drivers\DumpIt.sys [X] S3 esihdrv; \??\C:\Users\Andreas\AppData\Local\Temp\esihdrv.sys [X] ==================== NetSvcs (Whitelisted) =================== ==================== One Month Created Files and Folders ======== 2014-07-13 01:02 - 2014-07-13 01:03 - 00014726 _____ () C:\Users\Andreas\Desktop\FRST.txt 2014-07-13 01:02 - 2014-07-13 01:03 - 00000000 ____D () C:\FRST 2014-07-13 01:02 - 2014-07-13 01:02 - 00000476 _____ () C:\Users\Andreas\Desktop\defogger_disable.log 2014-07-13 01:02 - 2014-07-13 01:02 - 00000000 _____ () C:\Users\Andreas\defogger_reenable 2014-07-13 01:01 - 2014-07-13 01:01 - 00380416 _____ () C:\Users\Andreas\Desktop\ij2jhrkq.exe 2014-07-13 01:00 - 2014-07-13 01:01 - 02084864 _____ (Farbar) C:\Users\Andreas\Desktop\FRST64.exe 2014-07-13 01:00 - 2014-07-13 01:00 - 00050477 _____ () C:\Users\Andreas\Desktop\Defogger.exe 2014-07-13 00:59 - 2014-07-13 01:01 - 00000096 ____H () C:\Users\Andreas\Desktop\.~lock.OpenDocument Text (neu).odt# 2014-07-13 00:59 - 2014-07-13 01:00 - 00027764 _____ () C:\Users\Andreas\Desktop\OpenDocument Text (neu).odt 2014-07-13 00:44 - 2014-07-13 00:44 - 00000000 ____D () C:\ProgramData\Emsisoft 2014-07-12 23:24 - 2009-06-18 12:54 - 00006144 ____N (Sophos Plc) C:\Windows\system32\3563.tmp 2014-07-12 23:22 - 2014-07-12 23:22 - 00001095 _____ () C:\Users\Public\Desktop\Emsisoft Anti-Malware.lnk 2014-07-12 23:22 - 2014-07-12 23:22 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Emsisoft Anti-Malware 2014-07-12 23:21 - 2014-07-13 00:58 - 00000000 ____D () C:\Program Files (x86)\Emsisoft Anti-Malware 2014-07-12 23:15 - 2014-07-12 23:15 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Sophos 2014-07-12 23:15 - 2014-07-12 23:15 - 00000000 ____D () C:\Program Files (x86)\Sophos 2014-07-12 23:15 - 2009-06-18 12:54 - 00006144 ____N (Sophos Plc) C:\Windows\system32\ADFA.tmp 2014-07-12 22:54 - 2014-07-12 22:54 - 00000000 ____D () C:\Program Files (x86)\ESET 2014-07-12 22:42 - 2014-07-13 00:56 - 00000112 _____ () C:\Windows\setupact.log 2014-07-12 22:42 - 2014-07-12 22:43 - 00286096 _____ () C:\Windows\system32\FNTCACHE.DAT 2014-07-12 22:42 - 2014-07-12 22:42 - 00000000 _____ () C:\Windows\setuperr.log 2014-07-12 22:41 - 2014-07-12 22:41 - 00064024 _____ () C:\Users\Andreas\AppData\Local\GDIPFONTCACHEV1.DAT 2014-07-12 21:49 - 2014-07-12 23:45 - 00002924 _____ () C:\Users\Andreas\Desktop\Neues Textdokument (2).txt 2014-07-12 21:07 - 2014-07-12 21:07 - 00000011 _____ () C:\Users\Andreas\Desktop\Neues Textdokument.txt 2014-07-12 20:59 - 2014-07-13 00:40 - 00000000 ____D () C:\Users\Andreas\Desktop\a 2014-07-10 09:50 - 2014-07-10 09:50 - 00002102 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Mozilla Thunderbird.lnk 2014-07-10 09:50 - 2014-07-10 09:50 - 00000000 ____D () C:\Users\Andreas\AppData\Roaming\Thunderbird 2014-07-10 09:50 - 2014-07-10 09:50 - 00000000 ____D () C:\Users\Andreas\AppData\Local\Thunderbird 2014-07-10 09:50 - 2014-07-10 09:50 - 00000000 ____D () C:\Program Files (x86)\Mozilla Thunderbird 2014-07-09 22:23 - 2014-06-20 22:14 - 00266424 _____ (Microsoft Corporation) C:\Windows\system32\iedkcs32.dll 2014-07-09 22:23 - 2014-06-20 21:39 - 00240824 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iedkcs32.dll 2014-07-09 22:23 - 2014-06-19 03:39 - 23464448 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll 2014-07-09 22:23 - 2014-06-19 03:06 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb 2014-07-09 22:23 - 2014-06-19 03:06 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll 2014-07-09 22:23 - 2014-06-19 02:48 - 02768384 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll 2014-07-09 22:23 - 2014-06-19 02:42 - 00548352 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll 2014-07-09 22:23 - 2014-06-19 02:42 - 00066048 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll 2014-07-09 22:23 - 2014-06-19 02:41 - 00083968 _____ (Microsoft Corporation) C:\Windows\system32\MshtmlDac.dll 2014-07-09 22:23 - 2014-06-19 02:41 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll 2014-07-09 22:23 - 2014-06-19 02:32 - 00051200 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll 2014-07-09 22:23 - 2014-06-19 02:31 - 00033792 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll 2014-07-09 22:23 - 2014-06-19 02:26 - 00598016 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll 2014-07-09 22:23 - 2014-06-19 02:24 - 00139264 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe 2014-07-09 22:23 - 2014-06-19 02:24 - 00111616 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe 2014-07-09 22:23 - 2014-06-19 02:23 - 00752640 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll 2014-07-09 22:23 - 2014-06-19 02:16 - 17276416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll 2014-07-09 22:23 - 2014-06-19 02:14 - 00940032 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe 2014-07-09 22:23 - 2014-06-19 02:09 - 00452608 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll 2014-07-09 22:23 - 2014-06-19 01:59 - 00038400 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll 2014-07-09 22:23 - 2014-06-19 01:56 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb 2014-07-09 22:23 - 2014-06-19 01:53 - 00195584 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll 2014-07-09 22:23 - 2014-06-19 01:51 - 05721088 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll 2014-07-09 22:23 - 2014-06-19 01:50 - 00085504 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll 2014-07-09 22:23 - 2014-06-19 01:48 - 00292864 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll 2014-07-09 22:23 - 2014-06-19 01:39 - 00608768 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe 2014-07-09 22:23 - 2014-06-19 01:38 - 00455168 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll 2014-07-09 22:23 - 2014-06-19 01:37 - 00061952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll 2014-07-09 22:23 - 2014-06-19 01:36 - 00051200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll 2014-07-09 22:23 - 2014-06-19 01:35 - 00062464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\MshtmlDac.dll 2014-07-09 22:23 - 2014-06-19 01:33 - 00631808 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll 2014-07-09 22:23 - 2014-06-19 01:32 - 02179072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll 2014-07-09 22:23 - 2014-06-19 01:28 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll 2014-07-09 22:23 - 2014-06-19 01:28 - 00032768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll 2014-07-09 22:23 - 2014-06-19 01:27 - 02040832 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl 2014-07-09 22:23 - 2014-06-19 01:27 - 01249280 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll 2014-07-09 22:23 - 2014-06-19 01:25 - 00442368 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll 2014-07-09 22:23 - 2014-06-19 01:23 - 00112128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe 2014-07-09 22:23 - 2014-06-19 01:22 - 00592896 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll 2014-07-09 22:23 - 2014-06-19 01:12 - 00367616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll 2014-07-09 22:23 - 2014-06-19 01:06 - 00032256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\JavaScriptCollectionAgent.dll 2014-07-09 22:23 - 2014-06-19 01:01 - 00164864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll 2014-07-09 22:23 - 2014-06-19 00:59 - 00069632 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll 2014-07-09 22:23 - 2014-06-19 00:58 - 02266112 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll 2014-07-09 22:23 - 2014-06-19 00:58 - 00239616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll 2014-07-09 22:23 - 2014-06-19 00:52 - 04254720 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll 2014-07-09 22:23 - 2014-06-19 00:51 - 13527040 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll 2014-07-09 22:23 - 2014-06-19 00:49 - 00526336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll 2014-07-09 22:23 - 2014-06-19 00:46 - 01068032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmlmedia.dll 2014-07-09 22:23 - 2014-06-19 00:45 - 01964544 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl 2014-07-09 22:23 - 2014-06-19 00:35 - 11742208 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll 2014-07-09 22:23 - 2014-06-19 00:34 - 01393664 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll 2014-07-09 22:23 - 2014-06-19 00:15 - 00846336 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll 2014-07-09 22:23 - 2014-06-19 00:13 - 01791488 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll 2014-07-09 22:23 - 2014-06-19 00:09 - 01139200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll 2014-07-09 22:23 - 2014-06-19 00:07 - 00704512 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll 2014-07-09 22:23 - 2014-06-05 16:45 - 01460736 _____ (Microsoft Corporation) C:\Windows\system32\lsasrv.dll 2014-07-09 22:23 - 2014-06-05 16:26 - 00022016 _____ (Microsoft Corporation) C:\Windows\SysWOW64\secur32.dll 2014-07-09 22:23 - 2014-06-05 16:25 - 00096768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\sspicli.dll 2014-07-09 22:22 - 2014-06-18 04:18 - 00692736 _____ (Microsoft Corporation) C:\Windows\system32\osk.exe 2014-07-09 22:22 - 2014-06-18 03:51 - 00646144 _____ (Microsoft Corporation) C:\Windows\SysWOW64\osk.exe 2014-07-09 22:22 - 2014-06-18 03:10 - 03157504 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys 2014-07-09 22:22 - 2014-06-06 12:10 - 00624128 _____ (Microsoft Corporation) C:\Windows\system32\qedit.dll 2014-07-09 22:22 - 2014-06-06 11:44 - 00509440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\qedit.dll 2014-07-09 22:22 - 2014-05-30 10:08 - 00728064 _____ (Microsoft Corporation) C:\Windows\system32\kerberos.dll 2014-07-09 22:22 - 2014-05-30 10:08 - 00340992 _____ (Microsoft Corporation) C:\Windows\system32\schannel.dll 2014-07-09 22:22 - 2014-05-30 10:08 - 00314880 _____ (Microsoft Corporation) C:\Windows\system32\msv1_0.dll 2014-07-09 22:22 - 2014-05-30 10:08 - 00307200 _____ (Microsoft Corporation) C:\Windows\system32\ncrypt.dll 2014-07-09 22:22 - 2014-05-30 10:08 - 00210944 _____ (Microsoft Corporation) C:\Windows\system32\wdigest.dll 2014-07-09 22:22 - 2014-05-30 10:08 - 00086528 _____ (Microsoft Corporation) C:\Windows\system32\TSpkg.dll 2014-07-09 22:22 - 2014-05-30 10:08 - 00022016 _____ (Microsoft Corporation) C:\Windows\system32\credssp.dll 2014-07-09 22:22 - 2014-05-30 09:52 - 00550912 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kerberos.dll 2014-07-09 22:22 - 2014-05-30 09:52 - 00259584 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msv1_0.dll 2014-07-09 22:22 - 2014-05-30 09:52 - 00247808 _____ (Microsoft Corporation) C:\Windows\SysWOW64\schannel.dll 2014-07-09 22:22 - 2014-05-30 09:52 - 00220160 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ncrypt.dll 2014-07-09 22:22 - 2014-05-30 09:52 - 00172032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wdigest.dll 2014-07-09 22:22 - 2014-05-30 09:52 - 00065536 _____ (Microsoft Corporation) C:\Windows\SysWOW64\TSpkg.dll 2014-07-09 22:22 - 2014-05-30 09:52 - 00017408 _____ (Microsoft Corporation) C:\Windows\SysWOW64\credssp.dll 2014-07-09 22:22 - 2014-05-30 08:45 - 00497152 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\afd.sys 2014-07-07 11:43 - 2014-07-07 11:43 - 00000000 ____D () C:\Program Files (x86)\Sirrix AG 2014-07-07 11:42 - 2014-07-07 11:42 - 00000000 ____D () C:\Program Files\Oracle 2014-07-07 11:42 - 2011-12-21 13:15 - 00219440 _____ (Oracle Corporation) C:\Windows\system32\Drivers\VBoxDrv.sys 2014-07-07 11:42 - 2011-12-21 13:15 - 00044848 _____ (Oracle Corporation) C:\Windows\system32\Drivers\VBoxUSBMon.sys 2014-07-07 09:50 - 2014-07-08 01:20 - 00000000 ____D () C:\ProgramData\SystemExplorer 2014-07-07 09:50 - 2014-07-07 09:50 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Explorer 2014-07-07 09:50 - 2014-07-07 09:50 - 00000000 ____D () C:\Program Files (x86)\System Explorer 2014-07-07 04:54 - 2014-07-07 11:21 - 00000000 ____D () C:\Users\Andreas\AppData\Local\VMware 2014-07-07 04:54 - 2014-07-07 10:32 - 00000000 ____D () C:\Users\Andreas\AppData\Roaming\VMware 2014-07-07 04:49 - 2014-06-12 18:23 - 00359128 _____ (VMware, Inc.) C:\Windows\SysWOW64\vmnetdhcp.exe 2014-07-07 04:49 - 2014-06-12 18:23 - 00064728 _____ (VMware, Inc.) C:\Windows\system32\Drivers\vmx86.sys 2014-07-07 04:49 - 2014-06-12 18:22 - 00931032 _____ (VMware, Inc.) C:\Windows\system32\vnetlib64.dll 2014-07-07 04:49 - 2014-06-12 18:22 - 00437976 _____ (VMware, Inc.) C:\Windows\SysWOW64\vmnat.exe 2014-07-07 04:49 - 2014-06-12 18:22 - 00031448 _____ (VMware, Inc.) C:\Windows\system32\Drivers\vmnetuserif.sys 2014-07-07 04:49 - 2014-06-12 18:21 - 00033496 _____ (VMware, Inc.) C:\Windows\system32\Drivers\VMkbd.sys 2014-07-07 04:49 - 2014-02-27 18:40 - 00054464 _____ (VMware, Inc.) C:\Windows\system32\Drivers\hcmon.sys 2014-07-07 04:49 - 2013-10-08 18:21 - 00073296 _____ (VMware, Inc.) C:\Windows\system32\Drivers\vsock.sys 2014-07-07 04:49 - 2013-10-08 18:21 - 00067664 _____ (VMware, Inc.) C:\Windows\system32\vsocklib.dll 2014-07-07 04:49 - 2013-10-08 18:21 - 00063568 _____ (VMware, Inc.) C:\Windows\SysWOW64\vsocklib.dll 2014-07-07 04:48 - 2014-07-07 11:15 - 00000000 ____D () C:\ProgramData\VMware 2014-07-07 04:48 - 2014-07-07 04:48 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VMware 2014-07-07 04:48 - 2014-07-07 04:48 - 00000000 ____D () C:\Program Files\Common Files\VMware 2014-07-07 04:48 - 2014-07-07 04:48 - 00000000 ____D () C:\Program Files (x86)\VMware 2014-07-07 01:20 - 2014-07-07 01:20 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Kaspersky Internet Security 2014-07-07 01:20 - 2013-05-06 09:13 - 00110176 _____ (Kaspersky Lab ZAO) C:\Windows\system32\klfphc.dll 2014-07-07 01:19 - 2014-07-13 00:57 - 00000000 ____D () C:\ProgramData\Kaspersky Lab 2014-07-07 01:19 - 2014-07-07 01:19 - 00000000 ____D () C:\Windows\ELAMBKUP 2014-07-07 01:19 - 2014-07-07 01:19 - 00000000 ____D () C:\Program Files\Windows Sidebar 2014-07-07 01:19 - 2014-07-07 01:19 - 00000000 ____D () C:\Program Files (x86)\Windows Sidebar 2014-07-07 01:19 - 2014-07-07 01:19 - 00000000 ____D () C:\Program Files (x86)\Kaspersky Lab 2014-07-07 01:19 - 2014-05-28 16:38 - 00625248 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klif.sys 2014-07-07 01:19 - 2014-05-28 16:38 - 00115296 _____ (Kaspersky Lab ZAO) C:\Windows\system32\Drivers\klflt.sys 2014-07-07 00:18 - 2014-07-07 00:59 - 00231960 _____ () C:\Windows\RegBootClean64.exe 2014-07-06 22:37 - 2014-07-06 22:37 - 00000036 _____ () C:\Users\Andreas\AppData\Local\housecall.guid.cache 2014-06-18 09:35 - 2014-06-18 09:35 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\HotForex MetaTrader 2014-06-14 12:05 - 2014-07-11 15:53 - 00699056 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe 2014-06-14 12:05 - 2014-07-11 15:53 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl ==================== One Month Modified Files and Folders ======= 2014-07-13 01:03 - 2014-07-13 01:02 - 00014726 _____ () C:\Users\Andreas\Desktop\FRST.txt 2014-07-13 01:03 - 2014-07-13 01:02 - 00000000 ____D () C:\FRST 2014-07-13 01:02 - 2014-07-13 01:02 - 00000476 _____ () C:\Users\Andreas\Desktop\defogger_disable.log 2014-07-13 01:02 - 2014-07-13 01:02 - 00000000 _____ () C:\Users\Andreas\defogger_reenable 2014-07-13 01:02 - 2013-05-31 15:45 - 00000000 ____D () C:\Users\Andreas 2014-07-13 01:01 - 2014-07-13 01:01 - 00380416 _____ () C:\Users\Andreas\Desktop\ij2jhrkq.exe 2014-07-13 01:01 - 2014-07-13 01:00 - 02084864 _____ (Farbar) C:\Users\Andreas\Desktop\FRST64.exe 2014-07-13 01:01 - 2014-07-13 00:59 - 00000096 ____H () C:\Users\Andreas\Desktop\.~lock.OpenDocument Text (neu).odt# 2014-07-13 01:01 - 2013-06-01 01:31 - 00702688 _____ () C:\Windows\system32\perfh007.dat 2014-07-13 01:01 - 2013-06-01 01:31 - 00151322 _____ () C:\Windows\system32\perfc007.dat 2014-07-13 01:01 - 2009-07-14 07:13 - 01630122 _____ () C:\Windows\system32\PerfStringBackup.INI 2014-07-13 01:00 - 2014-07-13 01:00 - 00050477 _____ () C:\Users\Andreas\Desktop\Defogger.exe 2014-07-13 01:00 - 2014-07-13 00:59 - 00027764 _____ () C:\Users\Andreas\Desktop\OpenDocument Text (neu).odt 2014-07-13 01:00 - 2013-05-31 15:36 - 01081407 _____ () C:\Windows\WindowsUpdate.log 2014-07-13 00:58 - 2014-07-12 23:21 - 00000000 ____D () C:\Program Files (x86)\Emsisoft Anti-Malware 2014-07-13 00:57 - 2014-07-07 01:19 - 00000000 ____D () C:\ProgramData\Kaspersky Lab 2014-07-13 00:56 - 2014-07-12 22:42 - 00000112 _____ () C:\Windows\setupact.log 2014-07-13 00:56 - 2009-07-14 07:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT 2014-07-13 00:44 - 2014-07-13 00:44 - 00000000 ____D () C:\ProgramData\Emsisoft 2014-07-13 00:40 - 2014-07-12 20:59 - 00000000 ____D () C:\Users\Andreas\Desktop\a 2014-07-13 00:09 - 2009-07-14 06:45 - 00026720 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 2014-07-13 00:09 - 2009-07-14 06:45 - 00026720 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 2014-07-12 23:45 - 2014-07-12 21:49 - 00002924 _____ () C:\Users\Andreas\Desktop\Neues Textdokument (2).txt 2014-07-12 23:22 - 2014-07-12 23:22 - 00001095 _____ () C:\Users\Public\Desktop\Emsisoft Anti-Malware.lnk 2014-07-12 23:22 - 2014-07-12 23:22 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Emsisoft Anti-Malware 2014-07-12 23:15 - 2014-07-12 23:15 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Sophos 2014-07-12 23:15 - 2014-07-12 23:15 - 00000000 ____D () C:\Program Files (x86)\Sophos 2014-07-12 22:54 - 2014-07-12 22:54 - 00000000 ____D () C:\Program Files (x86)\ESET 2014-07-12 22:43 - 2014-07-12 22:42 - 00286096 _____ () C:\Windows\system32\FNTCACHE.DAT 2014-07-12 22:42 - 2014-07-12 22:42 - 00000000 _____ () C:\Windows\setuperr.log 2014-07-12 22:41 - 2014-07-12 22:41 - 00064024 _____ () C:\Users\Andreas\AppData\Local\GDIPFONTCACHEV1.DAT 2014-07-12 22:33 - 2014-06-11 03:29 - 00000000 ____D () C:\Users\Andreas\AppData\Roaming\MetaQuotes 2014-07-12 21:07 - 2014-07-12 21:07 - 00000011 _____ () C:\Users\Andreas\Desktop\Neues Textdokument.txt 2014-07-12 20:34 - 2014-04-15 21:46 - 00000000 ____D () C:\ProgramData\Oracle 2014-07-12 20:29 - 2014-04-20 23:44 - 00000000 ____D () C:\Program Files\Java 2014-07-12 20:23 - 2014-05-06 18:56 - 00122584 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys 2014-07-11 15:53 - 2014-06-14 12:05 - 00699056 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe 2014-07-11 15:53 - 2014-06-14 12:05 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl 2014-07-11 15:53 - 2014-04-15 21:42 - 00000000 ____D () C:\Users\Andreas\AppData\Local\Adobe 2014-07-11 12:30 - 2014-01-17 22:37 - 00000000 ____D () C:\Users\Andreas\AppData\Local\Battle.net 2014-07-11 11:32 - 2014-01-17 22:37 - 00000000 ____D () C:\Program Files (x86)\Battle.net 2014-07-10 16:55 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\rescache 2014-07-10 09:50 - 2014-07-10 09:50 - 00002102 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Mozilla Thunderbird.lnk 2014-07-10 09:50 - 2014-07-10 09:50 - 00000000 ____D () C:\Users\Andreas\AppData\Roaming\Thunderbird 2014-07-10 09:50 - 2014-07-10 09:50 - 00000000 ____D () C:\Users\Andreas\AppData\Local\Thunderbird 2014-07-10 09:50 - 2014-07-10 09:50 - 00000000 ____D () C:\Program Files (x86)\Mozilla Thunderbird 2014-07-09 22:27 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\SysWOW64\Dism 2014-07-09 22:27 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\system32\Dism 2014-07-09 22:25 - 2013-07-12 21:23 - 00000000 ____D () C:\Windows\system32\MRT 2014-07-09 22:24 - 2013-06-01 07:34 - 96441528 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe 2014-07-08 08:58 - 2013-06-27 17:08 - 00000000 ____D () C:\Users\Andreas\AppData\Roaming\vlc 2014-07-08 01:20 - 2014-07-07 09:50 - 00000000 ____D () C:\ProgramData\SystemExplorer 2014-07-07 11:43 - 2014-07-07 11:43 - 00000000 ____D () C:\Program Files (x86)\Sirrix AG 2014-07-07 11:42 - 2014-07-07 11:42 - 00000000 ____D () C:\Program Files\Oracle 2014-07-07 11:21 - 2014-07-07 04:54 - 00000000 ____D () C:\Users\Andreas\AppData\Local\VMware 2014-07-07 11:15 - 2014-07-07 04:48 - 00000000 ____D () C:\ProgramData\VMware 2014-07-07 10:32 - 2014-07-07 04:54 - 00000000 ____D () C:\Users\Andreas\AppData\Roaming\VMware 2014-07-07 09:50 - 2014-07-07 09:50 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Explorer 2014-07-07 09:50 - 2014-07-07 09:50 - 00000000 ____D () C:\Program Files (x86)\System Explorer 2014-07-07 09:43 - 2013-05-31 19:37 - 00000000 ____D () C:\ProgramData\Intel 2014-07-07 04:48 - 2014-07-07 04:48 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VMware 2014-07-07 04:48 - 2014-07-07 04:48 - 00000000 ____D () C:\Program Files\Common Files\VMware 2014-07-07 04:48 - 2014-07-07 04:48 - 00000000 ____D () C:\Program Files (x86)\VMware 2014-07-07 04:48 - 2014-01-07 22:17 - 01651014 _____ () C:\Windows\SysWOW64\PerfStringBackup.INI 2014-07-07 01:20 - 2014-07-07 01:20 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Kaspersky Internet Security 2014-07-07 01:19 - 2014-07-07 01:19 - 00000000 ____D () C:\Windows\ELAMBKUP 2014-07-07 01:19 - 2014-07-07 01:19 - 00000000 ____D () C:\Program Files\Windows Sidebar 2014-07-07 01:19 - 2014-07-07 01:19 - 00000000 ____D () C:\Program Files (x86)\Windows Sidebar 2014-07-07 01:19 - 2014-07-07 01:19 - 00000000 ____D () C:\Program Files (x86)\Kaspersky Lab 2014-07-07 00:59 - 2014-07-07 00:18 - 00231960 _____ () C:\Windows\RegBootClean64.exe 2014-07-06 22:37 - 2014-07-06 22:37 - 00000036 _____ () C:\Users\Andreas\AppData\Local\housecall.guid.cache 2014-07-03 14:17 - 2014-01-17 22:40 - 00000000 ____D () C:\Program Files (x86)\Hearthstone 2014-06-25 21:23 - 2014-03-28 00:01 - 00000000 ____D () C:\Program Files (x86)\World of Warcraft 2014-06-20 22:14 - 2014-07-09 22:23 - 00266424 _____ (Microsoft Corporation) C:\Windows\system32\iedkcs32.dll 2014-06-20 21:39 - 2014-07-09 22:23 - 00240824 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iedkcs32.dll 2014-06-19 03:39 - 2014-07-09 22:23 - 23464448 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll 2014-06-19 03:06 - 2014-07-09 22:23 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb 2014-06-19 03:06 - 2014-07-09 22:23 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll 2014-06-19 02:48 - 2014-07-09 22:23 - 02768384 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll 2014-06-19 02:42 - 2014-07-09 22:23 - 00548352 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll 2014-06-19 02:42 - 2014-07-09 22:23 - 00066048 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll 2014-06-19 02:41 - 2014-07-09 22:23 - 00083968 _____ (Microsoft Corporation) C:\Windows\system32\MshtmlDac.dll 2014-06-19 02:41 - 2014-07-09 22:23 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll 2014-06-19 02:32 - 2014-07-09 22:23 - 00051200 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll 2014-06-19 02:31 - 2014-07-09 22:23 - 00033792 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll 2014-06-19 02:26 - 2014-07-09 22:23 - 00598016 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll 2014-06-19 02:24 - 2014-07-09 22:23 - 00139264 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe 2014-06-19 02:24 - 2014-07-09 22:23 - 00111616 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe 2014-06-19 02:23 - 2014-07-09 22:23 - 00752640 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll 2014-06-19 02:16 - 2014-07-09 22:23 - 17276416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll 2014-06-19 02:14 - 2014-07-09 22:23 - 00940032 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe 2014-06-19 02:09 - 2014-07-09 22:23 - 00452608 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll 2014-06-19 01:59 - 2014-07-09 22:23 - 00038400 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll 2014-06-19 01:56 - 2014-07-09 22:23 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb 2014-06-19 01:53 - 2014-07-09 22:23 - 00195584 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll 2014-06-19 01:51 - 2014-07-09 22:23 - 05721088 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll 2014-06-19 01:50 - 2014-07-09 22:23 - 00085504 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll 2014-06-19 01:48 - 2014-07-09 22:23 - 00292864 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll 2014-06-19 01:39 - 2014-07-09 22:23 - 00608768 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe 2014-06-19 01:38 - 2014-07-09 22:23 - 00455168 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll 2014-06-19 01:37 - 2014-07-09 22:23 - 00061952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll 2014-06-19 01:36 - 2014-07-09 22:23 - 00051200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll 2014-06-19 01:35 - 2014-07-09 22:23 - 00062464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\MshtmlDac.dll 2014-06-19 01:33 - 2014-07-09 22:23 - 00631808 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll 2014-06-19 01:32 - 2014-07-09 22:23 - 02179072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll 2014-06-19 01:28 - 2014-07-09 22:23 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll 2014-06-19 01:28 - 2014-07-09 22:23 - 00032768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll 2014-06-19 01:27 - 2014-07-09 22:23 - 02040832 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl 2014-06-19 01:27 - 2014-07-09 22:23 - 01249280 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll 2014-06-19 01:25 - 2014-07-09 22:23 - 00442368 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll 2014-06-19 01:23 - 2014-07-09 22:23 - 00112128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe 2014-06-19 01:22 - 2014-07-09 22:23 - 00592896 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll 2014-06-19 01:12 - 2014-07-09 22:23 - 00367616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll 2014-06-19 01:06 - 2014-07-09 22:23 - 00032256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\JavaScriptCollectionAgent.dll 2014-06-19 01:01 - 2014-07-09 22:23 - 00164864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll 2014-06-19 00:59 - 2014-07-09 22:23 - 00069632 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll 2014-06-19 00:58 - 2014-07-09 22:23 - 02266112 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll 2014-06-19 00:58 - 2014-07-09 22:23 - 00239616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll 2014-06-19 00:52 - 2014-07-09 22:23 - 04254720 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll 2014-06-19 00:51 - 2014-07-09 22:23 - 13527040 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll 2014-06-19 00:49 - 2014-07-09 22:23 - 00526336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll 2014-06-19 00:46 - 2014-07-09 22:23 - 01068032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmlmedia.dll 2014-06-19 00:45 - 2014-07-09 22:23 - 01964544 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl 2014-06-19 00:35 - 2014-07-09 22:23 - 11742208 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll 2014-06-19 00:34 - 2014-07-09 22:23 - 01393664 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll 2014-06-19 00:15 - 2014-07-09 22:23 - 00846336 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll 2014-06-19 00:13 - 2014-07-09 22:23 - 01791488 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll 2014-06-19 00:09 - 2014-07-09 22:23 - 01139200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll 2014-06-19 00:07 - 2014-07-09 22:23 - 00704512 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll 2014-06-18 09:35 - 2014-06-18 09:35 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\HotForex MetaTrader 2014-06-18 04:18 - 2014-07-09 22:22 - 00692736 _____ (Microsoft Corporation) C:\Windows\system32\osk.exe 2014-06-18 03:51 - 2014-07-09 22:22 - 00646144 _____ (Microsoft Corporation) C:\Windows\SysWOW64\osk.exe 2014-06-18 03:10 - 2014-07-09 22:22 - 03157504 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys 2014-06-14 11:31 - 2013-06-04 09:41 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox Some content of TEMP: ==================== C:\Users\Andreas\AppData\Local\Temp\fwhqrb.exe C:\Users\Andreas\AppData\Local\Temp\jbhfkn.exe C:\Users\Andreas\AppData\Local\Temp\rzzgbt.exe C:\Users\Andreas\AppData\Local\Temp\vfhrqp.exe C:\Users\Andreas\AppData\Local\Temp\wbqpvl.exe C:\Users\Andreas\AppData\Local\Temp\wghphz.exe ==================== Bamital & volsnap Check ================= C:\Windows\System32\winlogon.exe => File is digitally signed C:\Windows\System32\wininit.exe => File is digitally signed C:\Windows\SysWOW64\wininit.exe => File is digitally signed C:\Windows\explorer.exe => File is digitally signed C:\Windows\SysWOW64\explorer.exe => File is digitally signed C:\Windows\System32\svchost.exe => File is digitally signed C:\Windows\SysWOW64\svchost.exe => File is digitally signed C:\Windows\System32\services.exe => File is digitally signed C:\Windows\System32\User32.dll => File is digitally signed C:\Windows\SysWOW64\User32.dll => File is digitally signed C:\Windows\System32\userinit.exe => File is digitally signed C:\Windows\SysWOW64\userinit.exe => File is digitally signed C:\Windows\System32\rpcss.dll => File is digitally signed C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed LastRegBack: 2014-07-08 09:37 ==================== End Of Log ============================ |
13.07.2014, 12:58 | #4 | |
| Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar addition Zitat:
GMER Logfile: Code:
ATTFilter gmer 2.1.19357 - hxxp://www.gmer.net rootkit scan 2014-07-13 01:40:24 windows 6.1.7601 service pack 1 x64 \device\harddisk0\dr0 -> \device\ide\iaastoragedevice-1 toshiba_ rev.am00 465,76gb running: Ij2jhrkq.exe; driver: C:\users\andreas\appdata\local\temp\fgldqpod.sys ---- user code sections - gmer 2.1 ---- .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlwalkheap + 5 00000000774d11f5 8 bytes {jmp 0xd} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlwalkheap + 416 00000000774d1390 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 159 00000000774d143f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 492 00000000774d158c 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtldeleteace + 126 00000000774d191e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtldeleteace + 636 00000000774d1b1c 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!_vsnwprintf_s + 204 00000000774d1bf0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 373 00000000774d1d75 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 691 00000000774d1eb3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!isalpha + 31 00000000774d1edf 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!_ui64toa + 84 00000000774d1f64 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!_strnicmp + 81 00000000774d1fbd 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlimpersonateself + 7 00000000774d1fd7 8 bytes {jmp 0xb} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 658 00000000774d2272 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 801 00000000774d2301 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlinstallfunctiontablecallback + 578 00000000774d2792 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlisgenerictableemptyavl + 16 00000000774d27b0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlenumerategenerictableavl + 18 00000000774d27d2 8 bytes {jmp 0x10} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 79 00000000774d282f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 176 00000000774d2890 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 2 .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 299 00000000774d2d1b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 367 00000000774d2d5f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 3 .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlcutovertimetosystemtime + 483 00000000774d3023 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 523 00000000774d323b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 912 00000000774d33c0 16 bytes {jmp 0x4e} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!_itow_s + 318 00000000774d3a5e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!_itow_s + 403 00000000774d3ab3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 197 00000000774d3b85 8 bytes [10, 6a, f8, 7e, 00, 00, 00, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 611 00000000774d3d23 8 bytes [00, 6a, f8, 7e, 00, 00, 00, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!rtlpgetlcidfromlanginfonode + 80 00000000774d4190 8 bytes [a0, 69, f8, 7e, 00, 00, 00, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!ntsetinformationthread 0000000077521380 8 bytes {jmp qword [rip-0x4d4cf]} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!ntqueryinformationthread 0000000077521500 8 bytes {jmp qword [rip-0x4d498]} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!ntmapviewofsection 0000000077521530 8 bytes {jmp qword [rip-0x4d9b1]} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!ntwritevirtualmemory 0000000077521650 8 bytes {jmp qword [rip-0x4d7a7]} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!ntqueueapcthread 0000000077521700 8 bytes {jmp qword [rip-0x4d9e3]} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!ntcreatethreadex 0000000077521d30 8 bytes {jmp qword [rip-0x4dba6]} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!ntgetcontextthread 0000000077521f80 8 bytes {jmp qword [rip-0x4de55]} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\ntdll.dll!ntsetcontextthread 00000000775227e0 8 bytes {jmp qword [rip-0x4e770]} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 312 0000000074ff13cc 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 471 0000000074ff146b 8 bytes {jmp 0xffffffffffffffb0} .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpuprocessinit + 611 0000000074ff16d7 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpuprocessterm + 3 0000000074ff16e3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpugetstackpointer + 23 0000000074ff19db 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpusetstackpointer + 23 0000000074ff19fb 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpusetinstructionpointer + 23 0000000074ff1a1b 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpunotifyaffinitychange + 3 0000000074ff1a27 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpuflushinstructioncache + 23 0000000074ff1a63 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) rapid storage technology\iastordatamgrsvc.exe[3916] c:\windows\system32\wow64cpu.dll!cpuprocessdebugevent + 3 0000000074ff1a6f 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlwalkheap + 5 00000000774d11f5 8 bytes {jmp 0xd} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlwalkheap + 416 00000000774d1390 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 159 00000000774d143f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 492 00000000774d158c 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtldeleteace + 126 00000000774d191e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtldeleteace + 636 00000000774d1b1c 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!_vsnwprintf_s + 204 00000000774d1bf0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 373 00000000774d1d75 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 691 00000000774d1eb3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!isalpha + 31 00000000774d1edf 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!_ui64toa + 84 00000000774d1f64 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!_strnicmp + 81 00000000774d1fbd 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlimpersonateself + 7 00000000774d1fd7 8 bytes {jmp 0xb} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 658 00000000774d2272 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 801 00000000774d2301 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlinstallfunctiontablecallback + 578 00000000774d2792 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlisgenerictableemptyavl + 16 00000000774d27b0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlenumerategenerictableavl + 18 00000000774d27d2 8 bytes {jmp 0x10} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 79 00000000774d282f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 176 00000000774d2890 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 2 .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 299 00000000774d2d1b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 367 00000000774d2d5f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 3 .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlcutovertimetosystemtime + 483 00000000774d3023 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 523 00000000774d323b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 912 00000000774d33c0 16 bytes {jmp 0x4e} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!_itow_s + 318 00000000774d3a5e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!_itow_s + 403 00000000774d3ab3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 197 00000000774d3b85 8 bytes [10, 6a, f8, 7e, 00, 00, 00, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 611 00000000774d3d23 8 bytes [00, 6a, f8, 7e, 00, 00, 00, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!rtlpgetlcidfromlanginfonode + 80 00000000774d4190 8 bytes [a0, 69, f8, 7e, 00, 00, 00, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!ntsetinformationthread 0000000077521380 8 bytes {jmp qword [rip-0x4d4cf]} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!ntqueryinformationthread 0000000077521500 8 bytes {jmp qword [rip-0x4d498]} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!ntmapviewofsection 0000000077521530 8 bytes {jmp qword [rip-0x4d9b1]} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!ntwritevirtualmemory 0000000077521650 8 bytes {jmp qword [rip-0x4d7a7]} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!ntqueueapcthread 0000000077521700 8 bytes {jmp qword [rip-0x4d9e3]} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!ntcreatethreadex 0000000077521d30 8 bytes {jmp qword [rip-0x4dba6]} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!ntgetcontextthread 0000000077521f80 8 bytes {jmp qword [rip-0x4de55]} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\ntdll.dll!ntsetcontextthread 00000000775227e0 8 bytes {jmp qword [rip-0x4e770]} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 312 0000000074ff13cc 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 471 0000000074ff146b 8 bytes {jmp 0xffffffffffffffb0} .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpuprocessinit + 611 0000000074ff16d7 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpuprocessterm + 3 0000000074ff16e3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpugetstackpointer + 23 0000000074ff19db 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpusetstackpointer + 23 0000000074ff19fb 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpusetinstructionpointer + 23 0000000074ff1a1b 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpunotifyaffinitychange + 3 0000000074ff1a27 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpuflushinstructioncache + 23 0000000074ff1a63 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\lms\lms.exe[3972] c:\windows\system32\wow64cpu.dll!cpuprocessdebugevent + 3 0000000074ff1a6f 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlwalkheap + 5 00000000774d11f5 8 bytes {jmp 0xd} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlwalkheap + 416 00000000774d1390 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 159 00000000774d143f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 492 00000000774d158c 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtldeleteace + 126 00000000774d191e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtldeleteace + 636 00000000774d1b1c 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!_vsnwprintf_s + 204 00000000774d1bf0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 373 00000000774d1d75 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 691 00000000774d1eb3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!isalpha + 31 00000000774d1edf 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!_ui64toa + 84 00000000774d1f64 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!_strnicmp + 81 00000000774d1fbd 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlimpersonateself + 7 00000000774d1fd7 8 bytes {jmp 0xb} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 658 00000000774d2272 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 801 00000000774d2301 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlinstallfunctiontablecallback + 578 00000000774d2792 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlisgenerictableemptyavl + 16 00000000774d27b0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlenumerategenerictableavl + 18 00000000774d27d2 8 bytes {jmp 0x10} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 79 00000000774d282f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 176 00000000774d2890 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 2 .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 299 00000000774d2d1b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 367 00000000774d2d5f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 3 .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlcutovertimetosystemtime + 483 00000000774d3023 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 523 00000000774d323b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 912 00000000774d33c0 16 bytes {jmp 0x4e} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!_itow_s + 318 00000000774d3a5e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!_itow_s + 403 00000000774d3ab3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 197 00000000774d3b85 8 bytes [10, 6a, f8, 7e, 00, 00, 00, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 611 00000000774d3d23 8 bytes [00, 6a, f8, 7e, 00, 00, 00, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!rtlpgetlcidfromlanginfonode + 80 00000000774d4190 8 bytes [a0, 69, f8, 7e, 00, 00, 00, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!ntsetinformationthread 0000000077521380 8 bytes {jmp qword [rip-0x4d4cf]} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!ntqueryinformationthread 0000000077521500 8 bytes {jmp qword [rip-0x4d498]} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!ntmapviewofsection 0000000077521530 8 bytes {jmp qword [rip-0x4d9b1]} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!ntwritevirtualmemory 0000000077521650 8 bytes {jmp qword [rip-0x4d7a7]} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!ntqueueapcthread 0000000077521700 8 bytes {jmp qword [rip-0x4d9e3]} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!ntcreatethreadex 0000000077521d30 8 bytes {jmp qword [rip-0x4dba6]} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!ntgetcontextthread 0000000077521f80 8 bytes {jmp qword [rip-0x4de55]} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\ntdll.dll!ntsetcontextthread 00000000775227e0 8 bytes {jmp qword [rip-0x4e770]} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 312 0000000074ff13cc 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 471 0000000074ff146b 8 bytes {jmp 0xffffffffffffffb0} .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpuprocessinit + 611 0000000074ff16d7 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpuprocessterm + 3 0000000074ff16e3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpugetstackpointer + 23 0000000074ff19db 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpusetstackpointer + 23 0000000074ff19fb 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpusetinstructionpointer + 23 0000000074ff1a1b 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpunotifyaffinitychange + 3 0000000074ff1a27 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpuflushinstructioncache + 23 0000000074ff1a63 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\intel\intel(r) management engine components\uns\uns.exe[2884] c:\windows\system32\wow64cpu.dll!cpuprocessdebugevent + 3 0000000074ff1a6f 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlwalkheap + 5 00000000774d11f5 8 bytes {jmp 0xd} .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlwalkheap + 416 00000000774d1390 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 159 00000000774d143f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 492 00000000774d158c 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtldeleteace + 126 00000000774d191e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtldeleteace + 636 00000000774d1b1c 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!_vsnwprintf_s + 204 00000000774d1bf0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 373 00000000774d1d75 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 691 00000000774d1eb3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!isalpha + 31 00000000774d1edf 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!_ui64toa + 84 00000000774d1f64 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!_strnicmp + 81 00000000774d1fbd 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlimpersonateself + 7 00000000774d1fd7 8 bytes {jmp 0xb} .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 658 00000000774d2272 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 801 00000000774d2301 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlinstallfunctiontablecallback + 578 00000000774d2792 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlisgenerictableemptyavl + 16 00000000774d27b0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlenumerategenerictableavl + 18 00000000774d27d2 8 bytes {jmp 0x10} .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 79 00000000774d282f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 176 00000000774d2890 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 2 .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 299 00000000774d2d1b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 367 00000000774d2d5f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 3 .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlcutovertimetosystemtime + 483 00000000774d3023 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 523 00000000774d323b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 912 00000000774d33c0 16 bytes {jmp 0x4e} .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!_itow_s + 318 00000000774d3a5e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!_itow_s + 403 00000000774d3ab3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 197 00000000774d3b85 8 bytes [10, 6a, f8, ff, 00, 00, 00, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 611 00000000774d3d23 8 bytes [00, 6a, f8, ff, 00, 00, 00, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!rtlpgetlcidfromlanginfonode + 80 00000000774d4190 8 bytes [a0, 69, f8, ff, 00, 00, 00, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!ntsetinformationthread 0000000077521380 8 bytes jmp 3f3f3f3f .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!ntqueryinformationthread 0000000077521500 8 bytes jmp 3f3f3f3f .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!ntmapviewofsection 0000000077521530 8 bytes jmp 3f3f3f3f .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!ntwritevirtualmemory 0000000077521650 8 bytes jmp 3f3f3f3f .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!ntqueueapcthread 0000000077521700 8 bytes jmp 3f3f3f3f .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!ntcreatethreadex 0000000077521d30 8 bytes jmp 3f3f3f3f .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!ntgetcontextthread 0000000077521f80 8 bytes jmp 3f3f3f3f .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\ntdll.dll!ntsetcontextthread 00000000775227e0 8 bytes jmp 3f3f3f3f .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 312 0000000074ff13cc 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 471 0000000074ff146b 8 bytes {jmp 0xffffffffffffffb0} .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpuprocessinit + 611 0000000074ff16d7 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpuprocessterm + 3 0000000074ff16e3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpugetstackpointer + 23 0000000074ff19db 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpusetstackpointer + 23 0000000074ff19fb 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpusetinstructionpointer + 23 0000000074ff1a1b 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpunotifyaffinitychange + 3 0000000074ff1a27 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpuflushinstructioncache + 23 0000000074ff1a63 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\program files (x86)\mozilla firefox\firefox.exe[3884] c:\windows\system32\wow64cpu.dll!cpuprocessdebugevent + 3 0000000074ff1a6f 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlwalkheap + 5 00000000774d11f5 8 bytes {jmp 0xd} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlwalkheap + 416 00000000774d1390 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 159 00000000774d143f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlpensurebuffersize + 492 00000000774d158c 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtldeleteace + 126 00000000774d191e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtldeleteace + 636 00000000774d1b1c 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!_vsnwprintf_s + 204 00000000774d1bf0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 373 00000000774d1d75 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlcreateactivationcontext + 691 00000000774d1eb3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!isalpha + 31 00000000774d1edf 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!_ui64toa + 84 00000000774d1f64 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!_strnicmp + 81 00000000774d1fbd 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlimpersonateself + 7 00000000774d1fd7 8 bytes {jmp 0xb} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 658 00000000774d2272 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlimpersonateselfex + 801 00000000774d2301 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlinstallfunctiontablecallback + 578 00000000774d2792 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlisgenerictableemptyavl + 16 00000000774d27b0 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlenumerategenerictableavl + 18 00000000774d27d2 8 bytes {jmp 0x10} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 79 00000000774d282f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlenumerategenerictablewithoutsplayingavl + 176 00000000774d2890 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 2 .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 299 00000000774d2d1b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlvalidrelativesecuritydescriptor + 367 00000000774d2d5f 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text ... * 3 .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlcutovertimetosystemtime + 483 00000000774d3023 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 523 00000000774d323b 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlqueryregistryvalues + 912 00000000774d33c0 16 bytes {jmp 0x4e} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!_itow_s + 318 00000000774d3a5e 16 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!_itow_s + 403 00000000774d3ab3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 197 00000000774d3b85 8 bytes [10, 6a, f8, 7e, 00, 00, 00, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlpcheckdynamictimezoneinformation + 611 00000000774d3d23 8 bytes [00, 6a, f8, 7e, 00, 00, 00, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!rtlpgetlcidfromlanginfonode + 80 00000000774d4190 8 bytes [a0, 69, f8, 7e, 00, 00, 00, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!ntsetinformationthread 0000000077521380 8 bytes {jmp qword [rip-0x4d4cf]} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!ntqueryinformationthread 0000000077521500 8 bytes {jmp qword [rip-0x4d498]} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!ntmapviewofsection 0000000077521530 8 bytes {jmp qword [rip-0x4d9b1]} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!ntwritevirtualmemory 0000000077521650 8 bytes {jmp qword [rip-0x4d7a7]} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!ntqueueapcthread 0000000077521700 8 bytes {jmp qword [rip-0x4d9e3]} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!ntcreatethreadex 0000000077521d30 8 bytes {jmp qword [rip-0x4dba6]} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!ntgetcontextthread 0000000077521f80 8 bytes {jmp qword [rip-0x4de55]} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\ntdll.dll!ntsetcontextthread 00000000775227e0 8 bytes {jmp qword [rip-0x4e770]} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 312 0000000074ff13cc 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpuinitializestartupcontext + 471 0000000074ff146b 8 bytes {jmp 0xffffffffffffffb0} .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpuprocessinit + 611 0000000074ff16d7 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpuprocessterm + 3 0000000074ff16e3 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpugetstackpointer + 23 0000000074ff19db 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpusetstackpointer + 23 0000000074ff19fb 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpusetinstructionpointer + 23 0000000074ff1a1b 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpunotifyaffinitychange + 3 0000000074ff1a27 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpuflushinstructioncache + 23 0000000074ff1a63 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\system32\wow64cpu.dll!cpuprocessdebugevent + 3 0000000074ff1a6f 8 bytes [0d, f0, ad, ba, de, c0, ad, ...] .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntopenprocess 00000000776cfc20 3 bytes jmp 718a000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntopenprocess + 4 00000000776cfc24 2 bytes jmp 718a000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntsetinformationfile 00000000776cfc38 3 bytes jmp 7181000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntsetinformationfile + 4 00000000776cfc3c 2 bytes jmp 7181000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntopenfile 00000000776cfd64 3 bytes jmp 7184000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntopenfile + 4 00000000776cfd68 2 bytes jmp 7184000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntcreatefile 00000000776d00b4 3 bytes jmp 7187000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntcreatefile + 4 00000000776d00b8 2 bytes jmp 7187000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntsetvaluekey 00000000776d01c4 3 bytes jmp 7190000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntsetvaluekey + 4 00000000776d01c8 2 bytes jmp 7190000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntdeletevaluekey 00000000776d0a44 3 bytes jmp 718d000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntdeletevaluekey + 4 00000000776d0a48 2 bytes jmp 718d000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntsetcontextthread 00000000776d1920 3 bytes jmp 717e000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\ntdll.dll!ntsetcontextthread + 4 00000000776d1924 2 bytes jmp 717e000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\kernel32.dll!createprocessinternalw 00000000769f3bbb 3 bytes jmp 717b000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\kernel32.dll!createprocessinternalw + 4 00000000769f3bbf 2 bytes jmp 717b000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\kernelbase.dll!loadlibraryexw + 493 00000000756e2c9e 4 bytes call 71af0000 .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\user32.dll!sendmessagew 0000000077079679 6 bytes jmp 719f000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\user32.dll!postmessagew 00000000770812a5 6 bytes jmp 7199000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\user32.dll!postmessagea 0000000077083baa 6 bytes jmp 719c000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\user32.dll!sendmessagea 000000007708612e 6 bytes jmp 71a2000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\user32.dll!sendinput 000000007709ff4a 3 bytes jmp 71a5000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\user32.dll!sendinput + 4 000000007709ff4e 2 bytes jmp 71a5000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\user32.dll!mouse_event 00000000770d027b 6 bytes jmp 71ab000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\user32.dll!keybd_event 00000000770d02bf 6 bytes jmp 71a8000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\advapi32.dll!createservicew 00000000751d70c4 6 bytes jmp 7193000a .text c:\users\andreas\desktop\ij2jhrkq.exe[1340] c:\windows\syswow64\advapi32.dll!createservicea 00000000751f3264 6 bytes jmp 7196000a ---- eof - gmer 2.1 ----[/quote] |
14.07.2014, 09:28 | #5 |
/// the machine /// TB-Ausbilder | Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar hi, Scan mit Combofix
__________________ gruß, schrauber Proud Member of UNITE and ASAP since 2009 Spenden Anleitungen und Hilfestellungen Trojaner-Board Facebook-Seite Keine Hilfestellung via PM! |
15.07.2014, 17:31 | #6 | |
| Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Hi schrauber. Ich habe Sonntag Abend meinen Laptop platt gemacht weil ich ihn dringend gebraucht habe. Mit einer Linux CD Partion gelöscht, neu gemacht, Win7 drauf. Da ich trotzdem sicher gehen wollte, habe ich erneut einen Farbar + Gmer Scan auf dem frisch installierten Win7 gemacht. Keine Probleme. Jetzt habe ich Combofix geladen, Internet getrennt, Virenscanner deaktiviert bis zum Neustart (gibt bei Smart Security keine anderen Optionen, da hätte ich schon den kompletten Dienst über services.msc deaktivieren müssen). Combofix gestartet, einen Moment später die Meldung ob ich Eset Smart Security beenden möchte (da war das blaue Dos Fenster von Combofix schon im Hintergrund), hab auf ja geklickt. Da ich dem Scan nicht beim arbeiten zuschauen wollte bin ich vom Laptop weggegangen. Während ich an meinem Ersatz Laptop (den ich gerade nutze) sitze, höre ich den Sound vom Win7 Start. Höh? Hat die Kiste also neugestartet, nagut ich melde mich an. Und jetzt habe ich ein Problem: Das Fenster von Combofix "springt" (ich mein wie bei einem Daumenkino) von links oben bis in etwa die Mitte. Ich krieg den Taskmanager gerade so auf aber schaffe es nicht auf irgendeinen Prozess zu klicken und diesen zu beenden. Wenn ich einen Klick schaffe ist die Markierung gleich wieder weg. Die Taskmanager zeigt fast 100% CPU Auslastung und der Laptop brennt mir die Beine weg wenn ich ihn auf dem Schoß habe. Laptop hart neugestartet -> keinen Erfolg. Der selbe Scheiß wieder. Kann das von Eset Smart Security kommen das ich nach dem PC Neustart wieder aktiviert hat? War der Neustart überhaupt normal? Jetzt kann ich das Teil gar nicht mehr benutzen und heiß laufen tut es zudem auch. Ich bin über ein anderes Benutzerkonto ins Windows gekommen. Combofix blaues Fenster öffnete sich, erstellte Log. Log Datei öffnete sich, Taskleiste verschwand. Log Datei ging zu dann startete Windows neu. Bin dann nicht mehr übers Admin Konto rein, sondern übers normale (bei dem Combofix vorhin so Probleme gemacht hat) Jetzt habe ich ein paar neue Ordner auf C:\ $RECYCLE.BIN ComboFix QooBox Und eine Log Datei die auf C:\ direkt liegt. Combofix Logfile: Code:
ATTFilter ComboFix 14-07-15.03 - AWS 15.07.2014 15:28:28.1.2 - x64 Microsoft Windows 7 Professional 6.1.7601.1.1252.49.1031.18.8008.6517 [GMT 2:00] ausgeführt von:: c:\users\Andreas\Desktop\ComboFix.exe AV: ESET Smart Security 7.0 *Disabled/Updated* {19259FAE-8396-A113-46DB-15B0E7DFA289} FW: ESET Personal Firewall *Enabled* {211E1E8B-C9F9-A04B-6D84-BC85190CE5F2} SP: ESET Smart Security 7.0 *Disabled/Updated* {A2447E4A-A5AC-AE9D-7C6B-2EC29C58E834} SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46} * Neuer Wiederherstellungspunkt wurde erstellt . . ((((((((((((((((((((((( Dateien erstellt von 2014-06-15 bis 2014-07-15 )))))))))))))))))))))))))))))) . . 2014-07-15 13:10 . 2014-07-15 13:11 -------- d-----w- C:\FRST 2014-07-15 12:33 . 2009-06-18 10:54 6144 ------w- c:\windows\system32\8852.tmp 2014-07-15 12:31 . 2009-06-18 10:54 6144 ------w- c:\windows\system32\F6BC.tmp 2014-07-15 12:03 . 2014-07-02 03:09 10924376 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{C8070ECE-B581-4E12-99AD-656EF8F0B1C0}\mpengine.dll 2014-07-15 12:03 . 2014-07-15 12:03 -------- d-----w- C:\bc0d53bff48238be6f2b26e1dc 2014-07-15 12:02 . 2014-07-15 12:02 -------- d-----w- c:\program files\WinRAR 2014-07-15 11:44 . 2014-07-15 11:45 -------- d-----w- c:\program files (x86)\CDBurnerXP 2014-07-15 10:55 . 2014-07-15 10:56 -------- d-----w- c:\programdata\SystemExplorer 2014-07-15 10:55 . 2014-07-15 10:55 -------- d-----w- c:\program files (x86)\System Explorer 2014-07-15 10:53 . 2014-07-15 10:53 -------- d-----w- c:\programdata\Sophos 2014-07-15 10:53 . 2014-07-15 10:53 -------- d-----w- c:\program files (x86)\Sophos 2014-07-14 19:56 . 2013-04-02 22:51 1643520 ----a-w- c:\windows\system32\DWrite.dll 2014-07-14 19:56 . 2013-04-09 23:34 1247744 ----a-w- c:\windows\SysWow64\DWrite.dll 2014-07-14 19:53 . 2014-07-14 19:53 122584 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys 2014-07-14 19:53 . 2014-07-14 19:53 -------- d-----w- c:\program files (x86)\ Malwarebytes Anti-Malware 2014-07-14 19:53 . 2014-07-14 19:53 -------- d-----w- c:\programdata\Malwarebytes 2014-07-14 19:53 . 2014-05-12 05:26 63704 ----a-w- c:\windows\system32\drivers\mwac.sys 2014-07-14 19:53 . 2014-05-12 05:26 91352 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys 2014-07-14 19:53 . 2014-05-12 05:25 25816 ----a-w- c:\windows\system32\drivers\mbam.sys 2014-07-14 19:48 . 2014-07-14 19:48 -------- d-----w- c:\programdata\Martau 2014-07-14 19:48 . 2014-07-14 19:48 -------- d-----w- c:\program files\Total Uninstall 6 2014-07-14 19:43 . 2014-07-14 19:43 -------- d-----w- c:\program files\CCleaner 2014-07-14 19:38 . 2014-07-14 19:38 71344 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl 2014-07-14 19:38 . 2014-07-14 19:38 699056 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe 2014-07-14 19:38 . 2014-07-14 19:38 -------- d-----w- c:\windows\SysWow64\Macromed 2014-07-14 19:38 . 2014-07-14 19:38 -------- d-----w- c:\windows\system32\Macromed 2014-07-14 19:35 . 2014-07-14 19:35 -------- d-----w- c:\program files (x86)\VideoLAN 2014-07-14 19:27 . 2014-07-15 13:27 -------- d-----r- c:\users\Public 2014-07-14 19:01 . 2014-07-14 19:01 -------- d-----w- c:\users\Andreas 2014-07-14 18:51 . 2011-02-25 06:19 2871808 ----a-w- c:\windows\explorer.exe 2014-07-14 18:51 . 2011-02-25 05:30 2616320 ----a-w- c:\windows\SysWow64\explorer.exe 2014-07-14 18:28 . 2014-01-09 02:22 5694464 ----a-w- c:\windows\SysWow64\mstscax.dll 2014-07-14 18:28 . 2014-01-03 22:44 6574592 ----a-w- c:\windows\system32\mstscax.dll 2014-07-14 18:28 . 2014-05-08 09:32 3178496 ----a-w- c:\windows\system32\rdpcorets.dll 2014-07-14 18:28 . 2014-05-08 09:32 16384 ----a-w- c:\windows\system32\RdpGroupPolicyExtension.dll 2014-07-14 18:28 . 2012-02-11 06:36 559104 ----a-w- c:\windows\system32\spoolsv.exe 2014-07-14 18:28 . 2012-02-11 06:36 67072 ----a-w- c:\windows\splwow64.exe 2014-07-14 18:13 . 2014-07-14 18:13 -------- d-----w- c:\program files (x86)\Microsoft.NET 2014-07-14 18:13 . 2014-07-14 18:13 -------- d-----w- c:\windows\Migration 2014-07-14 18:09 . 2013-12-24 23:09 1987584 ----a-w- c:\windows\SysWow64\d3d10warp.dll 2014-07-14 17:38 . 2012-07-26 07:46 2560 ----a-w- c:\windows\system32\drivers\de-DE\wdf01000.sys.mui 2014-07-14 17:37 . 2012-08-23 14:10 19456 ----a-w- c:\windows\system32\drivers\rdpvideominiport.sys 2014-07-14 17:37 . 2012-08-23 14:08 30208 ----a-w- c:\windows\system32\drivers\TsUsbGD.sys 2014-07-14 17:37 . 2012-08-23 11:12 192000 ----a-w- c:\windows\SysWow64\rdpendp_winip.dll 2014-07-14 17:37 . 2012-08-23 14:13 243200 ----a-w- c:\windows\system32\rdpudd.dll 2014-07-14 17:37 . 2012-08-23 10:51 228864 ----a-w- c:\windows\system32\rdpendp_winip.dll 2014-07-14 17:35 . 2012-07-26 03:08 229888 ----a-w- c:\windows\system32\WUDFHost.exe 2014-07-14 17:35 . 2012-07-26 03:08 84992 ----a-w- c:\windows\system32\WUDFSvc.dll 2014-07-14 17:35 . 2012-07-26 03:08 744448 ----a-w- c:\windows\system32\WUDFx.dll 2014-07-14 17:35 . 2012-07-26 03:08 45056 ----a-w- c:\windows\system32\WUDFCoinstaller.dll 2014-07-14 17:35 . 2012-07-26 03:08 194048 ----a-w- c:\windows\system32\WUDFPlatform.dll 2014-07-14 17:35 . 2012-07-26 02:26 87040 ----a-w- c:\windows\system32\drivers\WUDFPf.sys 2014-07-14 17:35 . 2012-07-26 02:26 198656 ----a-w- c:\windows\system32\drivers\WUDFRd.sys 2014-07-14 17:32 . 2012-08-21 21:01 245760 ----a-w- c:\windows\system32\OxpsConverter.exe 2014-07-14 17:30 . 2014-01-24 02:37 1684928 ----a-w- c:\windows\system32\drivers\ntfs.sys 2014-07-14 17:28 . 2013-08-28 01:12 461312 ----a-w- c:\windows\system32\scavengeui.dll 2014-07-14 17:18 . 2014-07-14 17:18 -------- d-----w- c:\windows\SysWow64\wbem\en-US 2014-07-14 17:18 . 2014-07-14 17:18 -------- d-----w- c:\windows\system32\wbem\en-US 2014-07-14 17:06 . 2013-10-14 16:00 28368 ----a-w- c:\windows\system32\IEUDINIT.EXE 2014-07-14 16:59 . 2014-07-14 16:59 878080 ----a-w- c:\windows\system32\advapi32.dll 2014-07-14 16:59 . 2014-07-14 16:59 859648 ----a-w- c:\windows\system32\tdh.dll 2014-07-14 16:59 . 2014-07-14 16:59 1732032 ----a-w- c:\windows\system32\ntdll.dll 2014-07-14 16:59 . 2014-07-14 16:59 640512 ----a-w- c:\windows\SysWow64\advapi32.dll 2014-07-14 16:59 . 2014-07-14 16:59 619520 ----a-w- c:\windows\SysWow64\tdh.dll 2014-07-14 16:59 . 2014-07-14 16:59 1292192 ----a-w- c:\windows\SysWow64\ntdll.dll 2014-07-14 16:58 . 2014-07-14 16:58 327168 ----a-w- c:\windows\system32\mswsock.dll 2014-07-14 16:58 . 2014-07-14 16:58 231424 ----a-w- c:\windows\SysWow64\mswsock.dll 2014-07-14 16:54 . 2014-07-14 16:54 1887232 ----a-w- c:\windows\system32\d3d11.dll 2014-07-14 16:54 . 2014-07-14 16:54 1505280 ----a-w- c:\windows\SysWow64\d3d11.dll 2014-07-14 16:44 . 2014-07-14 16:45 -------- d-----w- c:\windows\system32\MRT 2014-07-14 16:42 . 2010-02-23 08:16 294912 ----a-w- c:\windows\system32\browserchoice.exe 2014-07-14 16:32 . 2012-03-01 06:46 23408 ----a-w- c:\windows\system32\drivers\fs_rec.sys 2014-07-14 16:32 . 2012-03-01 06:28 5120 ----a-w- c:\windows\system32\wmi.dll 2014-07-14 16:32 . 2012-03-01 05:29 5120 ----a-w- c:\windows\SysWow64\wmi.dll 2014-07-14 16:29 . 2014-06-05 14:45 1460736 ----a-w- c:\windows\system32\lsasrv.dll 2014-07-14 16:29 . 2014-06-05 14:26 22016 ----a-w- c:\windows\SysWow64\secur32.dll 2014-07-14 16:29 . 2014-06-05 14:25 96768 ----a-w- c:\windows\SysWow64\sspicli.dll 2014-07-14 16:29 . 2014-04-12 02:22 95680 ----a-w- c:\windows\system32\drivers\ksecdd.sys 2014-07-14 16:29 . 2014-04-12 02:22 155072 ----a-w- c:\windows\system32\drivers\ksecpkg.sys 2014-07-14 16:29 . 2014-04-12 02:19 29184 ----a-w- c:\windows\system32\sspisrv.dll 2014-07-14 16:29 . 2014-04-12 02:19 136192 ----a-w- c:\windows\system32\sspicli.dll 2014-07-14 16:29 . 2014-04-12 02:19 28160 ----a-w- c:\windows\system32\secur32.dll 2014-07-14 16:29 . 2014-04-12 02:19 31232 ----a-w- c:\windows\system32\lsass.exe 2014-07-14 16:29 . 2013-07-04 12:18 458712 ----a-w- c:\windows\system32\drivers\cng.sys 2014-07-14 16:26 . 2011-08-27 05:37 861696 ----a-w- c:\windows\system32\oleaut32.dll 2014-07-14 16:26 . 2011-08-27 05:37 331776 ----a-w- c:\windows\system32\oleacc.dll 2014-07-14 16:26 . 2011-08-27 04:26 571904 ----a-w- c:\windows\SysWow64\oleaut32.dll 2014-07-14 16:26 . 2011-08-27 04:26 233472 ----a-w- c:\windows\SysWow64\oleacc.dll 2014-07-14 16:26 . 2014-06-18 02:19 449024 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\tabskb.dll 2014-07-14 16:26 . 2014-06-18 02:18 692736 ----a-w- c:\windows\system32\osk.exe 2014-07-14 16:26 . 2014-06-18 01:51 646144 ----a-w- c:\windows\SysWow64\osk.exe 2014-07-14 16:26 . 2014-06-18 01:10 3157504 ----a-w- c:\windows\system32\win32k.sys 2014-07-14 16:26 . 2014-06-03 10:02 1354240 ----a-w- c:\program files\Common Files\Microsoft Shared\ink\journal.dll 2014-07-14 16:26 . 2014-06-03 09:29 936960 ----a-w- c:\program files (x86)\Common Files\Microsoft Shared\ink\journal.dll 2014-07-14 16:26 . 2013-02-27 06:02 111448 ----a-w- c:\windows\system32\consent.exe 2014-07-14 16:26 . 2013-02-27 05:47 70144 ----a-w- c:\windows\system32\appinfo.dll 2014-07-14 16:24 . 2013-11-27 01:41 53248 ----a-w- c:\windows\system32\drivers\usbehci.sys 2014-07-14 16:10 . 2012-06-02 22:19 2428952 ----a-w- c:\windows\system32\wuaueng.dll 2014-07-14 16:10 . 2012-06-02 22:19 57880 ----a-w- c:\windows\system32\wuauclt.exe 2014-07-14 16:10 . 2012-06-02 22:19 44056 ----a-w- c:\windows\system32\wups2.dll 2014-07-14 16:10 . 2012-06-02 22:15 2622464 ----a-w- c:\windows\system32\wucltux.dll 2014-07-14 16:10 . 2012-06-02 22:19 38424 ----a-w- c:\windows\system32\wups.dll 2014-07-14 16:10 . 2012-06-02 22:19 701976 ----a-w- c:\windows\system32\wuapi.dll 2014-07-14 16:10 . 2012-06-02 22:15 99840 ----a-w- c:\windows\system32\wudriver.dll 2014-07-14 16:10 . 2012-06-02 13:19 186752 ----a-w- c:\windows\system32\wuwebv.dll 2014-07-14 16:10 . 2012-06-02 13:15 36864 ----a-w- c:\windows\system32\wuapp.exe 2014-07-14 15:33 . 2014-07-14 15:33 -------- d-----w- c:\program files (x86)\Launch Manager 2014-07-14 15:32 . 2011-05-25 10:55 281680 ----a-w- c:\windows\UNINSTLMv4.EXE 2014-07-14 12:47 . 2014-07-14 12:47 -------- d-----w- c:\program files (x86)\Cisco 2014-07-14 12:38 . 2014-07-14 12:38 -------- d-----w- c:\windows\SysWow64\RTCOM 2014-07-14 12:37 . 2010-07-22 08:37 200800 ----a-w- c:\windows\system32\AERTAC64.dll 2014-07-14 12:37 . 2009-11-17 10:12 108960 ----a-w- c:\windows\system32\AERTAR64.dll 2014-07-14 12:37 . 2014-07-14 12:37 -------- d-----w- c:\program files (x86)\Realtek 2014-07-14 12:37 . 2014-07-14 12:39 -------- d--h--w- c:\program files (x86)\Temp 2014-07-14 12:37 . 2011-12-13 03:01 1698408 ----a-w- c:\windows\RtlExUpd.dll 2014-07-14 12:37 . 2014-07-14 12:37 -------- d-----w- c:\program files (x86)\Common Files\InstallShield 2014-07-14 12:35 . 2014-07-14 12:35 -------- d-----w- c:\program files (x86)\Common Files\Intel Corporation 2014-07-14 12:32 . 2012-02-01 14:16 568600 ----a-w- c:\windows\system32\drivers\iaStor.sys 2014-07-14 12:32 . 2014-07-14 12:37 -------- d--h--w- c:\program files (x86)\InstallShield Installation Information 2014-07-14 12:28 . 2012-01-31 02:22 53248 ----a-w- c:\windows\SysWow64\CSVer.dll 2014-07-14 12:28 . 2014-07-14 17:40 -------- d-----w- c:\program files (x86)\Intel 2014-07-14 12:28 . 2014-07-14 12:28 -------- d-----w- C:\Intel 2014-07-14 08:36 . 2014-07-15 13:06 -------- d-----w- C:\Downloads 2014-07-14 07:22 . 2014-07-14 07:22 -------- d-----w- c:\program files\ESET 2014-07-14 07:15 . 2014-07-15 10:53 -------- d-sh--w- c:\windows\Installer . . (((((((((((((((((((((((((((((((((((( Find3M Bericht )))))))))))))))))))))))))))))))))))))))))))))))))))))) . . . (((((((((((((((((((((((((((( Autostartpunkte der Registrierung )))))))))))))))))))))))))))))))))))))))) . . *Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt. REGEDIT4 . [HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system] "ConsentPromptBehaviorUser"= 3 (0x3) "EnableUIADesktopToggle"= 0 (0x0) . R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [x] R3 BcmVWL;Broadcom Virtual Wireless;c:\windows\system32\DRIVERS\bcmvwl64.sys;c:\windows\SYSNATIVE\DRIVERS\bcmvwl64.sys [x] R3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys;c:\windows\SYSNATIVE\drivers\dmvsc.sys [x] R3 k57nd60a;Broadcom NetLink (TM) Gigabit Ethernet - NDIS 6.0;c:\windows\system32\DRIVERS\k57nd60a.sys;c:\windows\SYSNATIVE\DRIVERS\k57nd60a.sys [x] R3 MEMSWEEP2;MEMSWEEP2;c:\windows\system32\8852.tmp;c:\windows\SYSNATIVE\8852.tmp [x] R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys;c:\windows\SYSNATIVE\drivers\rdpvideominiport.sys [x] R3 SystemExplorerHelpService;System Explorer Service;c:\program files (x86)\System Explorer\service\SystemExplorerService64.exe;c:\program files (x86)\System Explorer\service\SystemExplorerService64.exe [x] R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x] R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys;c:\windows\SYSNATIVE\drivers\TsUsbGD.sys [x] R4 DsiWMIService;Dritek WMI Service;c:\program files (x86)\Launch Manager\dsiwmis.exe;c:\program files (x86)\Launch Manager\dsiwmis.exe [x] R4 IAStorDataMgrSvc;Intel(R) Rapid Storage Technology;c:\program files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe;c:\program files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe [x] R4 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\IEEtwCollector.exe;c:\windows\SYSNATIVE\IEEtwCollector.exe [x] S0 epfwwfp;epfwwfp;c:\windows\system32\DRIVERS\epfwwfp.sys;c:\windows\SYSNATIVE\DRIVERS\epfwwfp.sys [x] S1 eamonm;eamonm;c:\windows\system32\DRIVERS\eamonm.sys;c:\windows\SYSNATIVE\DRIVERS\eamonm.sys [x] S1 ehdrv;ehdrv;c:\windows\system32\DRIVERS\ehdrv.sys;c:\windows\SYSNATIVE\DRIVERS\ehdrv.sys [x] S1 EpfwLWF;Epfw NDIS LightWeight Filter;c:\windows\system32\DRIVERS\EpfwLWF.sys;c:\windows\SYSNATIVE\DRIVERS\EpfwLWF.sys [x] S2 ekrn;ESET Service;c:\program files\ESET\ESET Smart Security\x86\ekrn.exe;c:\program files\ESET\ESET Smart Security\x86\ekrn.exe [x] . . . --------- X64 Entries ----------- . . [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] "egui"="c:\program files\ESET\ESET Smart Security\egui.exe" [2014-02-24 5581888] . ------- Zusätzlicher Suchlauf ------- . uLocal Page = c:\windows\system32\blank.htm uStart Page = about:blank mLocal Page = c:\windows\SysWOW64\blank.htm TCP: DhcpNameServer = 192.168.178.1 FF - ProfilePath - c:\users\AWS\AppData\Roaming\Mozilla\Firefox\Profiles\tojbnvi0.default\ FF - prefs.js: browser.startup.homepage - about:blank . . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\MEMSWEEP2] "ImagePath"="\??\c:\windows\system32\8852.tmp" . --------------------- Gesperrte Registrierungsschluessel --------------------- . [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security] @Denied: (Full) (Everyone) . Zeit der Fertigstellung: 2014-07-15 16:46:12 - PC wurde neu gestartet ComboFix-quarantined-files.txt 2014-07-15 14:46 . Vor Suchlauf: 10 Verzeichnis(se), 464.846.831.616 Bytes frei Nach Suchlauf: 14 Verzeichnis(se), 465.082.003.456 Bytes frei . - - End Of File - - 4955EC2513465AEC337FF34F42943A2C Hier noch die anderen Logs nach der Neuinstall von Windows. FRST: Zitat:
|
15.07.2014, 17:32 | #7 | ||
| Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbarZitat:
Zitat:
Code:
ATTFilter gmer 2.1.19357 - GMER - Rootkit Detector and Remover rootkit scan 2014-07-15 15:24:43 windows 6.1.7601 service pack 1 x64 \device\harddisk0\dr0 -> \device\ide\iaastoragedevice-1 toshiba_ rev.am00 465,76gb running: Qly4td9y.exe; driver: C:\users\aws\appdata\local\temp\fgldqpod.sys ---- user code sections - gmer 2.1 ---- .text c:\program files\eset\eset smart security\x86\ekrn.exe[1312] c:\windows\syswow64\kernel32.dll!setunhandledexceptionfilter 0000000076038791 4 bytes [c2, 04, 00, 00] .text c:\program files\eset\eset smart security\x86\ekrn.exe[1312] c:\windows\syswow64\psapi.dll!getmoduleinformation + 69 0000000075d11465 2 bytes [d1, 75] .text c:\program files\eset\eset smart security\x86\ekrn.exe[1312] c:\windows\syswow64\psapi.dll!getmoduleinformation + 155 0000000075d114bb 2 bytes [d1, 75] .text ... * 2 ---- eof - gmer 2.1 ---- |
16.07.2014, 17:21 | #8 |
/// the machine /// TB-Ausbilder | Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Downloade Dir bitte Malwarebytes Anti-Malware
Downloade Dir bitte AdwCleaner auf deinen Desktop.
Beende bitte Deine Schutzsoftware um eventuelle Konflikte zu vermeiden.
und ein frisches FRST log bitte.
__________________ gruß, schrauber Proud Member of UNITE and ASAP since 2009 Spenden Anleitungen und Hilfestellungen Trojaner-Board Facebook-Seite Keine Hilfestellung via PM! |
20.07.2014, 11:04 | #9 | ||
| Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Ich habe in Eigenregie RogueKiller benutzt. Es wurde etwas gefunden das ich gelöscht habe. Log hänge ich mit dran. Junkware Removal Tool funktioniert nicht. Es öffnet sich die Kommandokonsole in der nichts drin steht. Es blinkt nur der cursor (also der unterstrich) und das wars auch. Habe über 30 Minuten gewartet aber es nichts passiert. Ich habe von Malwarebytes auch diese Chameleon Version benutzt. Das was auf der offiziellen Seite angeboten wird wenn Rechner bereits infiziert sind. ROGUEKILLER Zitat:
Zitat:
AdwCleaner Logfile: Code:
ATTFilter # AdwCleaner v3.215 - Bericht erstellt am 16/07/2014 um 20:33:43 # Aktualisiert 09/07/2014 von Xplode # Betriebssystem : Windows 7 Professional Service Pack 1 (64 bits) # Benutzername : AWS - CHFGHT8 # Gestartet von : C:\Users\Andreas\Desktop\adwcleaner_3.215.exe # Option : Suchen ***** [ Dienste ] ***** ***** [ Dateien / Ordner ] ***** ***** [ Verknüpfungen ] ***** ***** [ Registrierungsdatenbank ] ***** ***** [ Browser ] ***** -\\ Internet Explorer v11.0.9600.17207 -\\ Mozilla Firefox v30.0 (de) [ Datei : C:\Users\Andreas\AppData\Roaming\Mozilla\Firefox\Profiles\i4fxz57q.default\prefs.js ] [ Datei : C:\Users\AWS\AppData\Roaming\Mozilla\Firefox\Profiles\tojbnvi0.default\prefs.js ] ************************* AdwCleaner[R0].txt - [769 octets] - [16/07/2014 20:33:43] ########## EOF - \AdwCleaner\AdwCleaner[R0].txt - [828 octets] ########## |
20.07.2014, 17:32 | #10 |
/// the machine /// TB-Ausbilder | Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbarESET Online Scanner
Downloade Dir bitte SecurityCheck und:
und ein frisches FRST log bitte. Noch Probleme?
__________________ gruß, schrauber Proud Member of UNITE and ASAP since 2009 Spenden Anleitungen und Hilfestellungen Trojaner-Board Facebook-Seite Keine Hilfestellung via PM! |
20.07.2014, 18:32 | #11 | |||
| Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Hi schrauber! Hier kommen die Logs: ESET Zitat:
Zitat:
Zitat:
|
20.07.2014, 18:33 | #12 | ||
| Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar frst 2 Zitat:
Zitat:
|
20.07.2014, 21:14 | #13 |
/// the machine /// TB-Ausbilder | Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Fertig Die Reihenfolge ist hier entscheidend.
Falls Du Lob oder Kritik abgeben möchtest kannst Du das hier tun Hier noch ein paar Tipps zur Absicherung deines Systems. Ich kann garnicht zu oft erwähnen, wie wichtig es ist, dass dein System Up to Date ist.
Anti- Viren Software
Zusätzlicher Schutz
Sicheres Browsen
Alternative Browser Andere Browser tendieren zu etwas mehr Sicherheit als der IE, da diese keine Active X Elemente verwenden. Diese können von Spyware zur Infektion deines Systems missbraucht werden.
Performance Bereinige regelmäßig deine Temp Files. Ich empfehle hierzu TFC Halte dich fern von jedlichen Registry Cleanern. Diese Schaden deinem System mehr als sie helfen. Hier ein paar ( englishe ) Links Miekemoes Blogspot ( MVP ) Bill Castner ( MVP ) Don'ts
Hinweis: Bitte gib mir eine kurze Rückmeldung wenn alles erledigt ist und keine Fragen mehr vorhanden sind, so das ich diesen Thread aus meinen Abos löschen kann.
__________________ gruß, schrauber Proud Member of UNITE and ASAP since 2009 Spenden Anleitungen und Hilfestellungen Trojaner-Board Facebook-Seite Keine Hilfestellung via PM! |
27.07.2014, 10:33 | #14 |
| Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Hallo schrauber! Vielen Dank für deine Hilfe! Ich habe alle Schritte durch und es sind keine Probleme aufgetreten. Dann hoffe ich mal jetzt Ruhe zu haben. |
27.07.2014, 14:00 | #15 |
/// the machine /// TB-Ausbilder | Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar Gern Geschehen
__________________ gruß, schrauber Proud Member of UNITE and ASAP since 2009 Spenden Anleitungen und Hilfestellungen Trojaner-Board Facebook-Seite Keine Hilfestellung via PM! |
Themen zu Laptop arbeitet dauernd | Firefox leitet auf Malware Seite um | Dienste nicht mehr reaktivierbar |
100%, autorun, blinkt, einstellungen, firefox, infiziert, internet, kaputt, kaspersky, kis, launch, malware, netzwerk, proxy, scan, seiten, software, starten, stick, system, updates, usb, virus, windows, wlan, wmi |