Nachtmann | 09.05.2014 15:50 | HulaToo Virus entfernt? Hallo zusammen,
ich habe mir den HulaToo virus eingefangen und alles nach der Anleitung von AdminBot und DA GuRu gemacht. Nun habe ich, wie man sieht und AbminBot empfohlen hat, dieses Thema erstellt.
Erst mal, was ich gemacht habe:
Nachdem ich den Virus bemerkte, MBAM laufen lassen Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlauf Datum: 08.05.2014
Suchlauf-Zeit: 22:44:01
Logdatei: Scan.txt
Administrator: Ja
Version: 2.00.1.1004
Malware Datenbank: v2014.05.08.06
Rootkit Datenbank: v2014.03.27.01
Lizenz: Kostenlos
Malware Schutz: Deaktiviert
Bösartiger Webseiten Schutz: Deaktiviert
Chameleon: Deaktiviert
Betriebssystem: Windows 8.1
CPU: x64
Dateisystem: NTFS
Benutzer: Berthold
Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 287320
Verstrichene Zeit: 27 Min, 51 Sek
Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Shuriken: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 4
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\updateHulaToo.exe, 2624, Löschen bei Neustart, [0aecf8567407b08650bc412d5ba64db3]
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\utilHulaToo.exe, 5504, Löschen bei Neustart, [8175d777c9b2033310fc640a52af25db]
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\FilterApp_C64.exe, 5896, Löschen bei Neustart, [886ef35bf7840e2890eaf38e4cb61ae6]
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\HulaToo.BrowserAdapter.exe, 3876, Löschen bei Neustart, [886ef35bf7840e2890eaf38e4cb61ae6]
Module: 1
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\{b2db3058-74ee-4ace-bcd8-8cd0fbe3a4f6}.dll, Löschen bei Neustart, [886ef35bf7840e2890eaf38e4cb61ae6],
Registrierungsschlüssel: 20
PUP.Optional.HulaToo.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Update HulaToo, In Quarantäne, [0aecf8567407b08650bc412d5ba64db3],
PUP.Optional.HulaToo.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Util HulaToo, In Quarantäne, [8175d777c9b2033310fc640a52af25db],
PUP.Optional.Amonetize.A, HKLM\SOFTWARE\CLASSES\TYPELIB\{EAB5257A-1FB3-474C-9B42-231F52622E72}, In Quarantäne, [93633a14a0dbd660adb285bed22e26da],
PUP.Optional.Amonetize.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{EAB5257A-1FB3-474C-9B42-231F52622E72}, In Quarantäne, [93633a14a0dbd660adb285bed22e26da],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{ab65caf0-fc3b-40f8-8b88-6d096a48f659}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\CLASSES\TYPELIB\{596eaa89-f3d2-4174-9bd9-f7d79c744cda}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{32C53681-8E69-4659-8320-7422685BD486}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{32C53681-8E69-4659-8320-7422685BD486}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{596eaa89-f3d2-4174-9bd9-f7d79c744cda}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{AB65CAF0-FC3B-40F8-8B88-6D096A48F659}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\HulaToo, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\CLASSES\TYPELIB\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, HKLM\SOFTWARE\WOW6432NODE\HulaToo, In Quarantäne, [867094ba83f859dd2755423f0101867a],
PUP.Optional.HulaToo.A, HKU\S-1-5-21-2475367731-2059570959-480394121-1002-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\HulaToo, In Quarantäne, [52a427277308b185a6d56021877b2ad6],
Registrierungswerte: 0
(No malicious items detected)
Registrierungsdaten: 0
(No malicious items detected)
Ordner: 4
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo, Löschen bei Neustart, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin, Löschen bei Neustart, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\plugins, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\TEMP, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
Dateien: 25
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\updateHulaToo.exe, Löschen bei Neustart, [0aecf8567407b08650bc412d5ba64db3],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\utilHulaToo.exe, Löschen bei Neustart, [8175d777c9b2033310fc640a52af25db],
PUP.Optional.SkyTech.A, C:\Users\Berthold\AppData\Local\Temp\awh3186.tmp, In Quarantäne, [4aacada14536b58158132c2850b141bf],
PUP.Optional.HulaToo.A, C:\Users\Berthold\AppData\Local\Temp\HulaTooSetup.exe, In Quarantäne, [32c4232b3e3d8aac40a5310352b210f0],
PUP.Optional.Amonetize.A, C:\Users\Berthold\AppData\Local\20540\a19371.exe, In Quarantäne, [93633a14a0dbd660adb285bed22e26da],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\HulaToo.ico, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\0, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\7za.exe, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\HulaTooBHO.dll, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\HulaTooUninstall.exe, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\updateHulaToo.InstallState, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\7za.exe, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\BrowserAdapterS.7z, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\FilterApp_C64.exe, Löschen bei Neustart, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\HulaToo.BrowserAdapter.exe, Löschen bei Neustart, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\HulaTooBAApp.dll, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\sqlite3.dll, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\utilHulaToo.InstallState, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\{b2db3058-74ee-4ace-bcd8-8cd0fbe3a4f6}.dll, Löschen bei Neustart, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\plugins\HulaToo.Bromon.dll, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\plugins\HulaToo.BrowserAdapterS.dll, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\plugins\HulaToo.CompatibilityChecker.dll, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\plugins\HulaToo.FFUpdate.dll, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\plugins\HulaToo.IEUpdate.dll, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
PUP.Optional.HulaToo.A, C:\Program Files (x86)\HulaToo\bin\plugins\HulaToo.PurBrowseG.dll, In Quarantäne, [886ef35bf7840e2890eaf38e4cb61ae6],
Physische Sektoren: 0
(No malicious items detected)
(end) Dann nochmal mit MBAM Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Suchlauf Datum: 08.05.2014
Suchlauf-Zeit: 23:44:16
Logdatei: Scan2.txt
Administrator: Ja
Version: 2.00.1.1004
Malware Datenbank: v2014.05.08.11
Rootkit Datenbank: v2014.03.27.01
Lizenz: Kostenlos
Malware Schutz: Deaktiviert
Bösartiger Webseiten Schutz: Deaktiviert
Chameleon: Deaktiviert
Betriebssystem: Windows 8.1
CPU: x64
Dateisystem: NTFS
Benutzer: Berthold
Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 287250
Verstrichene Zeit: 18 Min, 6 Sek
Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Shuriken: Aktiviert
PUP: Aktiviert
PUM: Aktiviert
Prozesse: 0
(No malicious items detected)
Module: 0
(No malicious items detected)
Registrierungsschlüssel: 0
(No malicious items detected)
Registrierungswerte: 0
(No malicious items detected)
Registrierungsdaten: 0
(No malicious items detected)
Ordner: 0
(No malicious items detected)
Dateien: 1
PUP.Optional.Amonetize, C:\$Recycle.Bin\S-1-5-21-2475367731-2059570959-480394121-1002\$R96GY67.exe, In Quarantäne, [78835af4275468ce811393a27f850000],
Physische Sektoren: 0
(No malicious items detected)
(end) Dann AdwCleaner Code:
# AdwCleaner v3.207 - Bericht erstellt am 08/05/2014 um 23:17:24
# Aktualisiert 05/05/2014 von Xplode
# Betriebssystem : Windows 8.1 (64 bits)
# Benutzername : Berthold - BERTHIPC2
# Gestartet von : C:\Users\Berthold\Downloads\adwcleaner.exe
# Option : Löschen
***** [ Dienste ] *****
Dienst Gelöscht : wStLibG64
***** [ Dateien / Ordner ] *****
***** [ Verknüpfungen ] *****
***** [ Registrierungsdatenbank ] *****
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Interface\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Interface\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}
***** [ Browser ] *****
-\\ Internet Explorer v11.0.9600.17037
-\\ Mozilla Firefox v29.0 (de)
[ Datei : C:\Users\Berthold\AppData\Roaming\Mozilla\Firefox\Profiles\5g5l4rur.default\prefs.js ]
-\\ Google Chrome v34.0.1847.131
[ Datei : C:\Users\Berthold\AppData\Local\Google\Chrome\User Data\Default\preferences ]
*************************
AdwCleaner[R8].txt - [1314 octets] - [08/05/2014 23:16:11]
AdwCleaner[S2].txt - [1235 octets] - [08/05/2014 23:17:24]
########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt - [1295 octets] ########## JRT Code:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 8.1 x64
Ran by Berthold on 09.05.2014 at 6:42:22,81
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Default_Page_URL
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Myfree Codec
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Myfree Codec
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{9E8E555C-A695-4439-8B1F-AD190B1F0DAD}
~~~ Files
~~~ Folders
Successfully deleted: [Folder] "C:\Program Files (x86)\myfree codec"
~~~ FireFox
Emptied folder: C:\Users\Berthold\AppData\Roaming\mozilla\firefox\profiles\5g5l4rur.default\minidumps [1 files]
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 09.05.2014 at 6:55:01,18
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Code:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 8.1 x64
Ran by Berthold on 09.05.2014 at 6:42:22,81
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Default_Page_URL
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Myfree Codec
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Myfree Codec
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{9E8E555C-A695-4439-8B1F-AD190B1F0DAD}
~~~ Files
~~~ Folders
Successfully deleted: [Folder] "C:\Program Files (x86)\myfree codec"
~~~ FireFox
Emptied folder: C:\Users\Berthold\AppData\Roaming\mozilla\firefox\profiles\5g5l4rur.default\minidumps [1 files]
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 09.05.2014 at 6:55:01,18
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ scCleaner Code:
Shortcut Cleaner 1.3.3 by Lawrence Abrams (Grinler)
hxxp://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Shortcut Cleaner can be found at this link:
hxxp://www.bleepingcomputer.com/download/shortcut-cleaner/
Windows Version: Windows 8.1
Program started at: 05/09/2014 07:17:23 AM.
Scanning for registry hijacks:
* No issues found in the Registry.
Searching for Hijacked Shortcuts:
Searching C:\Users\Berthold\AppData\Roaming\Microsoft\Windows\Start Menu\
Searching C:\ProgramData\Microsoft\Windows\Start Menu\
Searching C:\Users\Berthold\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\
Searching C:\Users\Public\Desktop\
Searching C:\Users\Berthold\Desktop
0 bad shortcuts found.
Program finished at: 05/09/2014 07:17:27 AM
Execution time: 0 hours(s), 0 minute(s), and 3 seconds(s) Der ESET hatte nichts gefunden
So, dann habe ich hier die ganzen Log`s, für die Themeneröffnung
ABER, der GMER hat tatsächlich Probleme gemacht. Da kam immer die Meldung, dass da noch ein anderer Prozeß ausgeführt wird. Dann habe ich ihn im abgesicherten Modus gestartet. Es kam dann zwar auch ein paar Mal diese Meldung, aber er scheint durchgelaufen zu sein.
defogger: Code:
defogger_disable by jpshortstuff (23.02.10.1)
Log created at 14:29 on 09/05/2014 (Berthold)
Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.
Checking for services/drivers...
-=E.O.F=- FRST und Addition soll ich Zippen.
gmer: Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-05-09 15:05:29
Windows 6.3.9600 x64 \Device\Harddisk0\DR0 -> \Device\0000002b TOSHIBA_MQ01ABD075 rev.AX001C 698,64GB
Running: Gmer-19357.exe; Driver: C:\Users\Berthold\AppData\Local\Temp\fglcqpow.sys
---- Kernel code sections - GMER 2.1 ----
.text C:\WINDOWS\system32\ntoskrnl.exe!NtCallbackReturn + 960 fffff801569ddd00 60 bytes [C0, 52, AC, FF, 02, AD, 4E, ...]
---- User code sections - GMER 2.1 ----
.text C:\WINDOWS\Explorer.EXE[304] C:\WINDOWS\SYSTEM32\MSIMG32.dll!GradientFill + 714 00007ff9ee5a154a 4 bytes [5A, EE, F9, 7F]
.text C:\WINDOWS\Explorer.EXE[304] C:\WINDOWS\SYSTEM32\MSIMG32.dll!GradientFill + 722 00007ff9ee5a1552 4 bytes [5A, EE, F9, 7F]
.text C:\WINDOWS\Explorer.EXE[304] C:\WINDOWS\SYSTEM32\MSIMG32.dll!TransparentBlt + 98 00007ff9ee5a162a 4 bytes [5A, EE, F9, 7F]
.text C:\WINDOWS\Explorer.EXE[304] C:\WINDOWS\SYSTEM32\MSIMG32.dll!TransparentBlt + 122 00007ff9ee5a1642 4 bytes [5A, EE, F9, 7F]
.text C:\Program Files\Classic Shell\ClassicStartMenu.exe[352] C:\WINDOWS\SYSTEM32\MSIMG32.dll!GradientFill + 714 00007ff9ee5a154a 4 bytes [5A, EE, F9, 7F]
.text C:\Program Files\Classic Shell\ClassicStartMenu.exe[352] C:\WINDOWS\SYSTEM32\MSIMG32.dll!GradientFill + 722 00007ff9ee5a1552 4 bytes [5A, EE, F9, 7F]
.text C:\Program Files\Classic Shell\ClassicStartMenu.exe[352] C:\WINDOWS\SYSTEM32\MSIMG32.dll!TransparentBlt + 98 00007ff9ee5a162a 4 bytes [5A, EE, F9, 7F]
.text C:\Program Files\Classic Shell\ClassicStartMenu.exe[352] C:\WINDOWS\SYSTEM32\MSIMG32.dll!TransparentBlt + 122 00007ff9ee5a1642 4 bytes [5A, EE, F9, 7F]
---- Threads - GMER 2.1 ----
Thread C:\WINDOWS\system32\csrss.exe [468:492] fffff960008cfb90
---- Disk sectors - GMER 2.1 ----
Disk \Device\Harddisk0\DR0 unknown MBR code
---- EOF - GMER 2.1 ---- |