Hey,
alles klar, das wusste ich nicht. dann mache ich mehrere Posts. Code:
defogger_disable by jpshortstuff (23.02.10.1)
Log created at 16:20 on 28/05/2014 (ciipresshilll)
Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.
Checking for services/drivers...
-=E.O.F=-
GMER Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-05-28 19:18:08
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 OCZ-AGIL rev.2.15 55,90GB
Running: Gmer-19357.exe; Driver: C:\Users\CIIPRE~1\AppData\Local\Temp\pgldrpog.sys
---- User code sections - GMER 2.1 ----
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe[1780] C:\Windows\SysWOW64\ntdll.dll!NtQueryValueKey 000000007789faa8 5 bytes JMP 0000000173db18dd
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe[1780] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 00000000778a0038 5 bytes JMP 0000000173db1ed6
.text C:\Windows\SysWOW64\PnkBstrA.exe[1928] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 322 0000000073bf1a22 2 bytes [BF, 73]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1928] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 496 0000000073bf1ad0 2 bytes [BF, 73]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1928] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 552 0000000073bf1b08 2 bytes [BF, 73]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1928] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 730 0000000073bf1bba 2 bytes [BF, 73]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1928] C:\Windows\SysWOW64\WSOCK32.dll!setsockopt + 762 0000000073bf1bda 2 bytes [BF, 73]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1928] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075461465 2 bytes [46, 75]
.text C:\Windows\SysWOW64\PnkBstrA.exe[1928] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000754614bb 2 bytes [46, 75]
.text ... * 2
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[1980] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 69 0000000075461465 2 bytes [46, 75]
.text C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe[1980] C:\Windows\syswow64\psapi.dll!GetModuleInformation + 155 00000000754614bb 2 bytes [46, 75]
.text ... * 2
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avpui.exe[3088] C:\Windows\syswow64\USER32.dll!UserClientDllInitialize + 779 000000007716b9f8 4 bytes [0B, 26, DB, 73]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000776a11f5 8 bytes {JMP 0xd}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 00000000776a1390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000776a143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 00000000776a158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000776a191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 00000000776a1b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 00000000776a1bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 00000000776a1d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 00000000776a1eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 00000000776a1edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 00000000776a1f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 00000000776a1fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 00000000776a1fd7 8 bytes {JMP 0xb}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 00000000776a2272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 00000000776a2301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 00000000776a2792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000776a27b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000776a27d2 8 bytes {JMP 0x10}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 00000000776a282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 00000000776a2890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 00000000776a2d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 00000000776a2d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 00000000776a3023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 00000000776a323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000776a33c0 16 bytes {JMP 0x4e}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 00000000776a3a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 00000000776a3ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 00000000776a3b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 00000000776a3d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 00000000776a4190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000776f1380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00000000776f1500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000776f1530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00000000776f1650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00000000776f1700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00000000776f1d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00000000776f1f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000776f27e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000073e813cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000073e8146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000073e816d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000073e816e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000073e819db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000073e819fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000073e81a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000073e81a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000073e81a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000073e81a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 69 0000000075461465 2 bytes [46, 75]
.text C:\Users\ciipresshilll\Desktop\avz4\avz4\avz.exe[3732] C:\Windows\syswow64\PSAPI.DLL!GetModuleInformation + 155 00000000754614bb 2 bytes [46, 75]
.text ... * 2
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000776a11f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 00000000776a1390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000776a143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 00000000776a158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000776a191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 00000000776a1b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 00000000776a1bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 00000000776a1d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 00000000776a1eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 00000000776a1edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 00000000776a1f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 00000000776a1fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 00000000776a1fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 00000000776a2272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 00000000776a2301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 00000000776a2792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000776a27b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000776a27d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 00000000776a282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 00000000776a2890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 00000000776a2d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 00000000776a2d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 00000000776a3023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 00000000776a323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000776a33c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 00000000776a3a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 00000000776a3ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 00000000776a3b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 00000000776a3d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 00000000776a4190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000776f1380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00000000776f1500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000776f1530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00000000776f1650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00000000776f1700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00000000776f1d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00000000776f1f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000776f27e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000073e813cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000073e8146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000073e816d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000073e816e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000073e819db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000073e819fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000073e81a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000073e81a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000073e81a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe[4860] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000073e81a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000776a11f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 00000000776a1390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000776a143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 00000000776a158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000776a191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 00000000776a1b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 00000000776a1bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 00000000776a1d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 00000000776a1eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 00000000776a1edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 00000000776a1f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 00000000776a1fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 00000000776a1fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 00000000776a2272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 00000000776a2301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 00000000776a2792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000776a27b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000776a27d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 00000000776a282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 00000000776a2890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 00000000776a2d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 00000000776a2d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 00000000776a3023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 00000000776a323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000776a33c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 00000000776a3a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 00000000776a3ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 00000000776a3b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 00000000776a3d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 00000000776a4190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000776f1380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00000000776f1500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000776f1530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00000000776f1650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00000000776f1700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00000000776f1d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00000000776f1f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000776f27e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000073e813cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000073e8146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000073e816d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000073e816e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000073e819db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000073e819fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000073e81a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000073e81a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000073e81a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe[1652] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000073e81a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000776a11f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 00000000776a1390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000776a143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 00000000776a158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000776a191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 00000000776a1b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 00000000776a1bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 00000000776a1d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 00000000776a1eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 00000000776a1edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 00000000776a1f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 00000000776a1fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 00000000776a1fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 00000000776a2272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 00000000776a2301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 00000000776a2792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000776a27b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000776a27d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 00000000776a282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 00000000776a2890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 00000000776a2d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 00000000776a2d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 00000000776a3023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 00000000776a323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000776a33c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 00000000776a3a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 00000000776a3ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 00000000776a3b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 00000000776a3d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 00000000776a4190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000776f1380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00000000776f1500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000776f1530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00000000776f1650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00000000776f1700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00000000776f1d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00000000776f1f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000776f27e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000073e813cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000073e8146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000073e816d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000073e816e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000073e819db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000073e819fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000073e81a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000073e81a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000073e81a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[4504] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000073e81a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000776a11f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 00000000776a1390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000776a143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 00000000776a158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000776a191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 00000000776a1b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 00000000776a1bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 00000000776a1d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 00000000776a1eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 00000000776a1edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 00000000776a1f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 00000000776a1fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 00000000776a1fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 00000000776a2272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 00000000776a2301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 00000000776a2792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000776a27b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000776a27d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 00000000776a282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 00000000776a2890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 00000000776a2d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 00000000776a2d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 00000000776a3023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 00000000776a323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000776a33c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 00000000776a3a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 00000000776a3ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 00000000776a3b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 00000000776a3d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 00000000776a4190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000776f1380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00000000776f1500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000776f1530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00000000776f1650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00000000776f1700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00000000776f1d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00000000776f1f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000776f27e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000073e813cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000073e8146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000073e816d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000073e816e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000073e819db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000073e819fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000073e81a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000073e81a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000073e81a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[4916] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000073e81a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000776a11f5 8 bytes {JMP 0xd}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 00000000776a1390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000776a143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 00000000776a158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000776a191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 00000000776a1b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 00000000776a1bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 00000000776a1d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 00000000776a1eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 00000000776a1edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 00000000776a1f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 00000000776a1fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 00000000776a1fd7 8 bytes {JMP 0xb}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 00000000776a2272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 00000000776a2301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 00000000776a2792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000776a27b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000776a27d2 8 bytes {JMP 0x10}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 00000000776a282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 00000000776a2890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 00000000776a2d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 00000000776a2d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 00000000776a3023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 00000000776a323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000776a33c0 16 bytes {JMP 0x4e}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 00000000776a3a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 00000000776a3ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 00000000776a3b85 8 bytes [10, 6A, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 00000000776a3d23 8 bytes [00, 6A, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 00000000776a4190 8 bytes [A0, 69, F8, FF, 00, 00, 00, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000776f1380 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00000000776f1500 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000776f1530 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00000000776f1650 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00000000776f1700 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00000000776f1d30 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00000000776f1f80 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000776f27e0 8 bytes JMP 3f3f3f3f
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000073e813cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000073e8146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000073e816d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000073e816e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000073e819db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000073e819fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000073e81a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000073e81a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000073e81a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Program Files (x86)\Mozilla Firefox\firefox.exe[856] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000073e81a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 5 00000000776a11f5 8 bytes {JMP 0xd}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlWalkHeap + 416 00000000776a1390 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 159 00000000776a143f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlpEnsureBufferSize + 492 00000000776a158c 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 126 00000000776a191e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlDeleteAce + 636 00000000776a1b1c 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!_vsnwprintf_s + 204 00000000776a1bf0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 373 00000000776a1d75 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlCreateActivationContext + 691 00000000776a1eb3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!isalpha + 31 00000000776a1edf 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!_ui64toa + 84 00000000776a1f64 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!_strnicmp + 81 00000000776a1fbd 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelf + 7 00000000776a1fd7 8 bytes {JMP 0xb}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 658 00000000776a2272 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlImpersonateSelfEx + 801 00000000776a2301 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlInstallFunctionTableCallback + 578 00000000776a2792 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlIsGenericTableEmptyAvl + 16 00000000776a27b0 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableAvl + 18 00000000776a27d2 8 bytes {JMP 0x10}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 79 00000000776a282f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlEnumerateGenericTableWithoutSplayingAvl + 176 00000000776a2890 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 2
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 299 00000000776a2d1b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlValidRelativeSecurityDescriptor + 367 00000000776a2d5f 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text ... * 3
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlCutoverTimeToSystemTime + 483 00000000776a3023 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 523 00000000776a323b 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlQueryRegistryValues + 912 00000000776a33c0 16 bytes {JMP 0x4e}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 318 00000000776a3a5e 16 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!_itow_s + 403 00000000776a3ab3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 197 00000000776a3b85 8 bytes [10, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlpCheckDynamicTimeZoneInformation + 611 00000000776a3d23 8 bytes [00, 6A, F8, 7E, 00, 00, 00, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!RtlpGetLCIDFromLangInfoNode + 80 00000000776a4190 8 bytes [A0, 69, F8, 7E, 00, 00, 00, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread 00000000776f1380 8 bytes {JMP QWORD [RIP-0x4d4cf]}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!NtQueryInformationThread 00000000776f1500 8 bytes {JMP QWORD [RIP-0x4d498]}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection 00000000776f1530 8 bytes {JMP QWORD [RIP-0x4d9b1]}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!NtWriteVirtualMemory 00000000776f1650 8 bytes {JMP QWORD [RIP-0x4d7a7]}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!NtQueueApcThread 00000000776f1700 8 bytes {JMP QWORD [RIP-0x4d9e3]}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!NtCreateThreadEx 00000000776f1d30 8 bytes {JMP QWORD [RIP-0x4dba6]}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!NtGetContextThread 00000000776f1f80 8 bytes {JMP QWORD [RIP-0x4de55]}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\ntdll.dll!NtSetContextThread 00000000776f27e0 8 bytes {JMP QWORD [RIP-0x4e770]}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 312 0000000073e813cc 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuInitializeStartupContext + 471 0000000073e8146b 8 bytes {JMP 0xffffffffffffffb0}
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessInit + 611 0000000073e816d7 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessTerm + 3 0000000073e816e3 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuGetStackPointer + 23 0000000073e819db 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetStackPointer + 23 0000000073e819fb 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuSetInstructionPointer + 23 0000000073e81a1b 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuNotifyAffinityChange + 3 0000000073e81a27 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuFlushInstructionCache + 23 0000000073e81a63 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
.text C:\Users\ciipresshilll\Desktop\Gmer-19357.exe[3532] C:\Windows\SYSTEM32\wow64cpu.dll!CpuProcessDebugEvent + 3 0000000073e81a6f 8 bytes [0D, F0, AD, BA, DE, C0, AD, ...]
---- Threads - GMER 2.1 ----
Thread C:\Windows\System32\svchost.exe [3976:4752] 000007fee5339688
---- EOF - GMER 2.1 ---- FRST
FRST Logfile:
FRST Logfile: Code:
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 25-05-2014 02
Ran by ciipresshilll (administrator) on R280 on 28-05-2014 16:34:57
Running from C:\Users\ciipresshilll\Desktop
Platform: Windows 7 Home Premium Service Pack 1 (X64) OS Language: German Standard
Internet Explorer Version 11
Boot Mode: Normal
==================== Processes (Whitelisted) =================
(AMD) C:\Windows\System32\atiesrxx.exe
(AMD) C:\Windows\System32\atieclxx.exe
(Kaspersky Lab ZAO) C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe
() C:\Windows\SysWOW64\PnkBstrA.exe
(Safer-Networking Ltd.) C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(Safer-Networking Ltd.) C:\Program Files (x86)\Spybot - Search & Destroy 2\SDUpdSvc.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
(Safer-Networking Ltd.) C:\Program Files (x86)\Spybot - Search & Destroy 2\SDWSCSvc.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Microsoft Corporation) C:\Program Files\Windows Sidebar\sidebar.exe
() C:\Program Files (x86)\Drakonia Black\hid.exe
() C:\Program Files (x86)\Drakonia Black\trayicon.exe
(Advanced Micro Devices Inc.) D:\P R O G R A M M E\ati\ATI.ACE\Core-Static\MOM.exe
(Kaspersky Lab ZAO) C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avpui.exe
(ATI Technologies Inc.) D:\P R O G R A M M E\ati\ATI.ACE\Core-Static\CCC.exe
(Nullsoft, Inc.) D:\P R O G R A M M E\Winamp\winamp.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Rapid Storage Technology\IAStorDataMgrSvc.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\UNS\UNS.exe
(Kaspersky Lab ZAO) C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\klwtblfs.exe
(Mozilla Corporation) C:\Program Files (x86)\Mozilla Firefox\firefox.exe
==================== Registry (Whitelisted) ==================
HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [11660904 2010-11-30] (Realtek Semiconductor)
HKLM-x32\...\Run: [GamingMouse] => C:\Program Files (x86)\Drakonia Black\hid.exe [247296 2013-06-26] ()
HKLM-x32\...\Run: [StartCCC] => D:\P R O G R A M M E\ati\ATI.ACE\Core-Static\amd64\CLIStart.exe [767200 2014-04-17] (Advanced Micro Devices, Inc.)
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)
Winlogon\Notify\SDWinLogon-x32: SDWinLogon.dll [X]
HKU\.DEFAULT\...\RunOnce: [SPReview] - C:\Windows\System32\SPReview\SPReview.exe [301568 2014-01-10] (Microsoft Corporation)
HKU\S-1-5-21-1425884379-3831331695-1035041748-1000\...\MountPoints2: {539912cd-787e-11e3-b536-806e6f6e6963} - E:\ASRSetup.exe
==================== Internet (Whitelisted) ====================
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = hxxp://de.msn.com/?ocid=iehp
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0x28AFC960B10CCF01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = de-DE
BHO: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO)
BHO: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
BHO: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO)
BHO: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\x64\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
BHO-x32: Content Blocker Plugin - {5564CC73-EFA7-4CBF-918A-5CF7FBBFFF4F} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\ContentBlocker\ie_content_blocker_plugin.dll (Kaspersky Lab ZAO)
BHO-x32: Virtual Keyboard Plugin - {73455575-E40C-433C-9784-C78DC7761455} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\VirtualKeyboard\ie_virtual_keyboard_plugin.dll (Kaspersky Lab ZAO)
BHO-x32: Java(tm) Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO-x32: Microsoft-Konto-Anmelde-Hilfsprogramm - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
BHO-x32: Safe Money Plugin - {9E6D0D23-3D72-4A94-AE1F-2D167624E3D9} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\OnlineBanking\online_banking_bho.dll (Kaspersky Lab ZAO)
BHO-x32: Java(tm) Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
BHO-x32: URL Advisor Plugin - {E33CF602-D945-461A-83F0-819F76A199F8} - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\IEExt\UrlAdvisor\klwtbbho.dll (Kaspersky Lab ZAO)
Hosts: There are more than one entry in Hosts. See Hosts section of Addition.txt
Tcpip\Parameters: [DhcpNameServer] 192.168.178.1
FireFox:
========
FF ProfilePath: C:\Users\ciipresshilll\AppData\Roaming\Mozilla\Firefox\Profiles\uy01leyb.default
FF Homepage: https://www.google.de/?gfe_rd=ctrl&ei=me0SU57UHMGK8QfmgoD4Dw&gws_rd=cr
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF64_13_0_0_214.dll ()
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 - C:\Program Files\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin: @videolan.org/vlc,version=2.1.2 - D:\P R O G R A M M E\vlc\npvlc.dll (VideoLAN)
FF Plugin-x32: @adobe.com/FlashPlayer - C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_13_0_0_214.dll ()
FF Plugin-x32: @esn/esnlaunch,version=2.3.0 - C:\Program Files (x86)\Battlelog Web Plugins\2.3.0\npesnlaunch.dll No File
FF Plugin-x32: @esn/npbattlelog,version=2.4.0 - C:\Program Files (x86)\Battlelog Web Plugins\2.4.0\npbattlelog.dll (EA Digital Illusions CE AB)
FF Plugin-x32: @java.com/DTPlugin,version=10.51.2 - C:\Program Files (x86)\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin-x32: @java.com/JavaPlugin,version=10.51.2 - C:\Program Files (x86)\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 - C:\Program Files (x86)\Microsoft Silverlight\5.1.30214.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=16.4.3528.0331 - C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: Adobe Reader - C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF Extension: German Dictionary - C:\Users\ciipresshilll\AppData\Roaming\Mozilla\Firefox\Profiles\uy01leyb.default\Extensions\de-DE@dictionaries.addons.mozilla.org [2014-04-03]
FF Extension: The Fox, Only Better - C:\Users\ciipresshilll\AppData\Roaming\Mozilla\Firefox\Profiles\uy01leyb.default\Extensions\thefoxonlybetter@quicksaver.xpi [2014-05-24]
FF Extension: Adblock Plus - C:\Users\ciipresshilll\AppData\Roaming\Mozilla\Firefox\Profiles\uy01leyb.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2014-03-02]
FF HKLM-x32\...\Firefox\Extensions: - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com
FF Extension: 卡巴斯基網址顧問 - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\url_advisor@kaspersky.com [2014-01-16]
FF HKLM-x32\...\Firefox\Extensions: [virtual_keyboard@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com
FF Extension: 虛擬鍵盤 - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\virtual_keyboard@kaspersky.com [2014-01-16]
FF HKLM-x32\...\Firefox\Extensions: [content_blocker@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com
FF Extension: 惡意網站攔截器 - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\content_blocker@kaspersky.com [2014-01-16]
FF HKLM-x32\...\Firefox\Extensions: [anti_banner@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com
FF Extension: Chặn quảng cáo - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\anti_banner@kaspersky.com [2014-01-16]
FF HKLM-x32\...\Firefox\Extensions: [online_banking@kaspersky.com] - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com
FF Extension: Safe Money - C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\FFExt\online_banking@kaspersky.com [2014-01-16]
==================== Services (Whitelisted) =================
R2 AVP; C:\Program Files (x86)\Kaspersky Lab\Kaspersky Internet Security 14.0.0\avp.exe [214512 2013-10-17] (Kaspersky Lab ZAO)
R2 PnkBstrA; C:\Windows\system32\PnkBstrA.exe [76888 2014-01-11] ()
R2 PnkBstrA; C:\Windows\SysWOW64\PnkBstrA.exe [76888 2014-02-07] ()
R2 SDScannerService; C:\Program Files (x86)\Spybot - Search & Destroy 2\SDFSSvc.exe [3921880 2013-10-15] (Safer-Networking Ltd.)
R2 SDUpdateService; C:\Program Files (x86)\Spybot - Search & Destroy 2\SDUpdSvc.exe [1042272 2013-09-20] (Safer-Networking Ltd.)
R2 SDWSCService; C:\Program Files (x86)\Spybot - Search & Destroy 2\SDWSCSvc.exe [171416 2013-09-13] (Safer-Networking Ltd.)
==================== Drivers (Whitelisted) ====================
R0 kl1; C:\Windows\System32\DRIVERS\kl1.sys [458336 2014-01-16] (Kaspersky Lab ZAO)
S4 klflt; C:\Windows\System32\DRIVERS\klflt.sys [115296 2014-03-24] (Kaspersky Lab ZAO)
R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [625248 2014-03-24] (Kaspersky Lab ZAO)
R1 KLIM6; C:\Windows\System32\DRIVERS\klim6.sys [29792 2013-10-17] (Kaspersky Lab ZAO)
R3 klkbdflt; C:\Windows\System32\DRIVERS\klkbdflt.sys [29280 2014-02-18] (Kaspersky Lab ZAO)
R3 klmouflt; C:\Windows\System32\DRIVERS\klmouflt.sys [29280 2013-10-17] (Kaspersky Lab ZAO)
R1 klpd; C:\Windows\System32\DRIVERS\klpd.sys [15456 2013-04-12] (Kaspersky Lab ZAO)
R1 kltdi; C:\Windows\System32\DRIVERS\kltdi.sys [55904 2013-05-14] (Kaspersky Lab ZAO)
R1 kneps; C:\Windows\System32\DRIVERS\kneps.sys [178272 2014-01-16] (Kaspersky Lab ZAO)
S3 RTCore64; D:\P R O G R A M M E\MSI Afterburner\RTCore64.sys [13368 2013-01-23] ()
S3 AsrCDDrv; \??\C:\Windows\SysWOW64\Drivers\AsrCDDrv.sys [X]
S3 cpuz136; \??\C:\Users\CIIPRE~1\AppData\Local\Temp\cpuz136\cpuz136_x64.sys [X]
S3 cpuz137; \??\C:\Users\CIIPRE~1\AppData\Local\Temp\cpuz137\cpuz137_x64.sys [X]
==================== NetSvcs (Whitelisted) ===================
==================== One Month Created Files and Folders ========
2014-05-28 16:34 - 2014-05-28 16:35 - 00012389 _____ () C:\Users\ciipresshilll\Desktop\FRST.txt
2014-05-28 16:23 - 2014-05-28 16:34 - 00000000 ____D () C:\FRST
2014-05-28 16:20 - 2014-05-28 16:20 - 00000488 _____ () C:\Users\ciipresshilll\Desktop\defogger_disable.log
2014-05-28 16:20 - 2014-05-28 16:20 - 00000000 _____ () C:\Users\ciipresshilll\defogger_reenable
2014-05-28 16:19 - 2014-05-28 16:19 - 02066944 _____ (Farbar) C:\Users\ciipresshilll\Desktop\FRST64.exe
2014-05-28 16:19 - 2014-05-28 16:19 - 00380416 _____ () C:\Users\ciipresshilll\Desktop\Gmer-19357.exe
2014-05-28 16:18 - 2014-05-28 16:19 - 00050477 _____ () C:\Users\ciipresshilll\Desktop\Defogger.exe
2014-05-27 21:11 - 2014-05-27 21:11 - 00000000 ____D () C:\ProgramData\PopCap Games
2014-05-27 17:32 - 2014-05-27 17:32 - 00018587 _____ () C:\Windows\DirectX.log
2014-05-27 17:32 - 2014-05-27 17:32 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Pflanzen gegen Zombies
2014-05-27 17:15 - 2014-05-27 17:15 - 00018284 _____ () C:\Users\ciipresshilll\Documents\cc_20140527_171556.reg
2014-05-27 17:11 - 2014-05-27 17:11 - 00003180 _____ () C:\Windows\System32\Tasks\{1E84FC35-EA3D-4E38-A62A-EE1D78C3AF59}
2014-05-27 17:11 - 2014-05-27 17:11 - 00000000 ____D () C:\Program Files (x86)\Winamp
2014-05-27 17:05 - 2014-05-27 17:05 - 00000000 __SHD () C:\Users\ciipresshilll\AppData\Local\EmieUserList
2014-05-27 17:05 - 2014-05-27 17:05 - 00000000 __SHD () C:\Users\ciipresshilll\AppData\Local\EmieSiteList
2014-05-26 08:32 - 2014-05-26 08:32 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\Nero
2014-05-26 08:31 - 2014-05-26 18:04 - 00000000 ____D () C:\ProgramData\Nero
2014-05-26 07:43 - 2014-05-26 07:43 - 00000000 ____D () C:\Users\ciipresshilll\Desktop\TEST
2014-05-26 07:36 - 2014-05-26 07:36 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Local\GermaniXSoft
2014-05-25 18:50 - 2014-05-25 18:50 - 00000087 _____ () C:\Users\ciipresshilll\Documents\xbox zugang.txt
2014-05-24 21:20 - 2014-05-28 08:26 - 00002668 _____ () C:\Windows\PFRO.log
2014-05-24 09:44 - 2014-05-24 09:44 - 00051062 _____ () C:\Users\ciipresshilll\Documents\cc_20140524_094401.reg
2014-05-24 08:59 - 2014-05-24 08:59 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\Canneverbe Limited
2014-05-24 08:56 - 2014-05-24 08:56 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CDBurnerXP
2014-05-24 08:56 - 2014-05-24 08:56 - 00000000 ____D () C:\ProgramData\Canneverbe Limited
2014-05-24 08:56 - 2014-05-24 08:56 - 00000000 ____D () C:\Program Files (x86)\CDBurnerXP
2014-05-20 21:32 - 2014-05-20 21:32 - 00971830 ____N () C:\Windows\Minidump\052014-7176-01.dmp
2014-05-19 19:08 - 2014-05-28 16:02 - 00002119 _____ () C:\Windows\setupact.log
2014-05-19 19:08 - 2014-05-19 19:08 - 00000000 _____ () C:\Windows\setuperr.log
2014-05-15 22:28 - 2014-05-06 06:40 - 23544320 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-05-15 22:28 - 2014-05-06 06:17 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-05-15 22:28 - 2014-05-06 05:25 - 17382912 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-05-15 22:28 - 2014-05-06 05:07 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-05-15 22:28 - 2014-05-06 05:00 - 00084992 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2014-05-15 22:28 - 2014-05-06 04:10 - 00069632 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2014-05-15 09:51 - 2014-05-15 09:51 - 00020010 _____ () C:\Users\ciipresshilll\Documents\Leserbrief Vegesack.odt
2014-05-15 08:53 - 2014-05-09 08:14 - 00477184 _____ (Microsoft Corporation) C:\Windows\system32\aepdu.dll
2014-05-15 08:53 - 2014-05-09 08:11 - 00424448 _____ (Microsoft Corporation) C:\Windows\system32\aeinv.dll
2014-05-15 08:53 - 2014-04-12 04:22 - 00155072 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ksecpkg.sys
2014-05-15 08:53 - 2014-04-12 04:22 - 00095680 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ksecdd.sys
2014-05-15 08:53 - 2014-04-12 04:19 - 01460736 _____ (Microsoft Corporation) C:\Windows\system32\lsasrv.dll
2014-05-15 08:53 - 2014-04-12 04:19 - 00136192 _____ (Microsoft Corporation) C:\Windows\system32\sspicli.dll
2014-05-15 08:53 - 2014-04-12 04:19 - 00031232 _____ (Microsoft Corporation) C:\Windows\system32\lsass.exe
2014-05-15 08:53 - 2014-04-12 04:19 - 00029184 _____ (Microsoft Corporation) C:\Windows\system32\sspisrv.dll
2014-05-15 08:53 - 2014-04-12 04:19 - 00028160 _____ (Microsoft Corporation) C:\Windows\system32\secur32.dll
2014-05-15 08:53 - 2014-04-12 04:12 - 00022016 _____ (Microsoft Corporation) C:\Windows\SysWOW64\secur32.dll
2014-05-15 08:53 - 2014-04-12 04:10 - 00096768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\sspicli.dll
2014-05-15 08:53 - 2014-03-25 04:43 - 14175744 _____ (Microsoft Corporation) C:\Windows\system32\shell32.dll
2014-05-15 08:53 - 2014-03-25 04:09 - 12874240 _____ (Microsoft Corporation) C:\Windows\SysWOW64\shell32.dll
2014-05-15 08:53 - 2014-03-04 11:47 - 05550016 _____ (Microsoft Corporation) C:\Windows\system32\ntoskrnl.exe
2014-05-15 08:53 - 2014-03-04 11:44 - 00728064 _____ (Microsoft Corporation) C:\Windows\system32\kerberos.dll
2014-05-15 08:53 - 2014-03-04 11:44 - 00722944 _____ (Microsoft Corporation) C:\Windows\system32\objsel.dll
2014-05-15 08:53 - 2014-03-04 11:44 - 00424960 _____ (Microsoft Corporation) C:\Windows\system32\KernelBase.dll
2014-05-15 08:53 - 2014-03-04 11:44 - 00340992 _____ (Microsoft Corporation) C:\Windows\system32\schannel.dll
2014-05-15 08:53 - 2014-03-04 11:44 - 00314880 _____ (Microsoft Corporation) C:\Windows\system32\msv1_0.dll
2014-05-15 08:53 - 2014-03-04 11:44 - 00210944 _____ (Microsoft Corporation) C:\Windows\system32\wdigest.dll
2014-05-15 08:53 - 2014-03-04 11:44 - 00086528 _____ (Microsoft Corporation) C:\Windows\system32\TSpkg.dll
2014-05-15 08:53 - 2014-03-04 11:44 - 00039936 _____ (Microsoft Corporation) C:\Windows\system32\wincredprovider.dll
2014-05-15 08:53 - 2014-03-04 11:43 - 00455168 _____ (Microsoft Corporation) C:\Windows\system32\winlogon.exe
2014-05-15 08:53 - 2014-03-04 11:43 - 00057344 _____ (Microsoft Corporation) C:\Windows\system32\cngprovider.dll
2014-05-15 08:53 - 2014-03-04 11:43 - 00056832 _____ (Microsoft Corporation) C:\Windows\system32\adprovider.dll
2014-05-15 08:53 - 2014-03-04 11:43 - 00053760 _____ (Microsoft Corporation) C:\Windows\system32\capiprovider.dll
2014-05-15 08:53 - 2014-03-04 11:43 - 00052736 _____ (Microsoft Corporation) C:\Windows\system32\dpapiprovider.dll
2014-05-15 08:53 - 2014-03-04 11:43 - 00044544 _____ (Microsoft Corporation) C:\Windows\system32\dimsroam.dll
2014-05-15 08:53 - 2014-03-04 11:43 - 00022016 _____ (Microsoft Corporation) C:\Windows\system32\credssp.dll
2014-05-15 08:53 - 2014-03-04 11:20 - 03969984 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntkrnlpa.exe
2014-05-15 08:53 - 2014-03-04 11:20 - 03914176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ntoskrnl.exe
2014-05-15 08:53 - 2014-03-04 11:17 - 00550912 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kerberos.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00538112 _____ (Microsoft Corporation) C:\Windows\SysWOW64\objsel.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00259584 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msv1_0.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00247808 _____ (Microsoft Corporation) C:\Windows\SysWOW64\schannel.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00172032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wdigest.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00065536 _____ (Microsoft Corporation) C:\Windows\SysWOW64\TSpkg.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00051200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\cngprovider.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00049664 _____ (Microsoft Corporation) C:\Windows\SysWOW64\adprovider.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00048128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\capiprovider.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00047616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dpapiprovider.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00036864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dimsroam.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00035328 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wincredprovider.dll
2014-05-15 08:53 - 2014-03-04 11:17 - 00017408 _____ (Microsoft Corporation) C:\Windows\SysWOW64\credssp.dll
2014-05-15 08:53 - 2014-03-04 11:16 - 00274944 _____ (Microsoft Corporation) C:\Windows\SysWOW64\KernelBase.dll
2014-05-14 23:15 - 2014-05-14 23:15 - 00002980 _____ () C:\Windows\System32\Tasks\{769110BA-A2BF-410E-BDA0-416551886AF4}
2014-05-10 10:39 - 2014-05-10 10:39 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-05-08 22:34 - 2014-05-25 14:10 - 00527700 _____ () C:\Users\ciipresshilll\Documents\report.txt
2014-05-07 11:17 - 2014-05-07 11:17 - 00002788 _____ () C:\Windows\System32\Tasks\CCleanerSkipUAC
2014-05-07 11:17 - 2014-05-07 11:17 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CCleaner
2014-05-07 11:17 - 2014-05-07 11:17 - 00000000 ____D () C:\Program Files\CCleaner
2014-05-04 21:07 - 2014-05-04 21:07 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\HandBrake
2014-05-04 21:00 - 2014-05-04 21:00 - 00001312 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Movie Maker.lnk
2014-05-04 21:00 - 2014-05-04 21:00 - 00000000 ____D () C:\Windows\de
2014-05-04 21:00 - 2014-05-04 21:00 - 00000000 ____D () C:\Program Files\Windows Live
2014-05-01 13:28 - 2014-05-01 13:28 - 00058129 _____ () C:\Windows\SysWOW64\CCCInstall_201405011328019478.log
2014-05-01 13:28 - 2014-05-01 13:28 - 00000000 ____D () C:\ProgramData\ATI
2014-05-01 13:28 - 2014-05-01 13:28 - 00000000 ____D () C:\Program Files (x86)\AMD AVT
2014-05-01 13:27 - 2014-05-01 13:27 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AMD Catalyst Control Center
2014-05-01 13:25 - 2014-05-01 13:25 - 00060544 _____ () C:\Windows\SysWOW64\CCCInstall_201405011325001151.log
2014-04-30 07:46 - 2014-05-16 07:46 - 00000000 ___SD () C:\Windows\system32\CompatTel
==================== One Month Modified Files and Folders =======
2014-05-28 16:35 - 2014-05-28 16:34 - 00012389 _____ () C:\Users\ciipresshilll\Desktop\FRST.txt
2014-05-28 16:35 - 2014-01-08 20:30 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\NetSpeedMonitor
2014-05-28 16:34 - 2014-05-28 16:23 - 00000000 ____D () C:\FRST
2014-05-28 16:20 - 2014-05-28 16:20 - 00000488 _____ () C:\Users\ciipresshilll\Desktop\defogger_disable.log
2014-05-28 16:20 - 2014-05-28 16:20 - 00000000 _____ () C:\Users\ciipresshilll\defogger_reenable
2014-05-28 16:20 - 2014-01-08 18:06 - 00000000 ____D () C:\Users\ciipresshilll
2014-05-28 16:19 - 2014-05-28 16:19 - 02066944 _____ (Farbar) C:\Users\ciipresshilll\Desktop\FRST64.exe
2014-05-28 16:19 - 2014-05-28 16:19 - 00380416 _____ () C:\Users\ciipresshilll\Desktop\Gmer-19357.exe
2014-05-28 16:19 - 2014-05-28 16:18 - 00050477 _____ () C:\Users\ciipresshilll\Desktop\Defogger.exe
2014-05-28 16:19 - 2014-01-16 21:04 - 00000000 ____D () C:\ProgramData\Kaspersky Lab
2014-05-28 16:09 - 2009-07-14 06:45 - 00018592 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-05-28 16:09 - 2009-07-14 06:45 - 00018592 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-05-28 16:07 - 2014-01-09 03:02 - 00699092 _____ () C:\Windows\system32\perfh007.dat
2014-05-28 16:07 - 2014-01-09 03:02 - 00149232 _____ () C:\Windows\system32\perfc007.dat
2014-05-28 16:07 - 2009-07-14 07:13 - 01619284 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-05-28 16:06 - 2014-02-15 16:55 - 01739198 _____ () C:\Windows\WindowsUpdate.log
2014-05-28 16:04 - 2014-03-17 08:07 - 00000884 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-05-28 16:02 - 2014-05-19 19:08 - 00002119 _____ () C:\Windows\setupact.log
2014-05-28 16:02 - 2009-07-14 07:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-05-28 08:27 - 2014-04-22 00:42 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\Awesomium
2014-05-28 08:26 - 2014-05-24 21:20 - 00002668 _____ () C:\Windows\PFRO.log
2014-05-28 08:26 - 2014-01-08 22:32 - 00000000 ____D () C:\Program Files (x86)\Battlelog Web Plugins
2014-05-27 21:42 - 2014-01-10 17:53 - 00000000 ____D () C:\Users\ciipresshilll\Desktop\Edelarsch
2014-05-27 21:11 - 2014-05-27 21:11 - 00000000 ____D () C:\ProgramData\PopCap Games
2014-05-27 17:49 - 2014-01-13 22:00 - 00290184 _____ () C:\Windows\SysWOW64\PnkBstrB.xtr
2014-05-27 17:49 - 2014-01-08 22:31 - 00290184 _____ () C:\Windows\SysWOW64\PnkBstrB.exe
2014-05-27 17:49 - 2014-01-08 22:31 - 00280904 _____ () C:\Windows\SysWOW64\PnkBstrB.ex0
2014-05-27 17:32 - 2014-05-27 17:32 - 00018587 _____ () C:\Windows\DirectX.log
2014-05-27 17:32 - 2014-05-27 17:32 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Pflanzen gegen Zombies
2014-05-27 17:32 - 2009-07-14 07:32 - 00000000 ___RD () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games
2014-05-27 17:31 - 2014-01-08 18:34 - 00000000 ____D () C:\ProgramData\Origin
2014-05-27 17:30 - 2014-01-08 18:34 - 00000000 ____D () C:\Program Files (x86)\Origin
2014-05-27 17:15 - 2014-05-27 17:15 - 00018284 _____ () C:\Users\ciipresshilll\Documents\cc_20140527_171556.reg
2014-05-27 17:11 - 2014-05-27 17:11 - 00003180 _____ () C:\Windows\System32\Tasks\{1E84FC35-EA3D-4E38-A62A-EE1D78C3AF59}
2014-05-27 17:11 - 2014-05-27 17:11 - 00000000 ____D () C:\Program Files (x86)\Winamp
2014-05-27 17:10 - 2014-01-08 18:06 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Local\VirtualStore
2014-05-27 17:05 - 2014-05-27 17:05 - 00000000 __SHD () C:\Users\ciipresshilll\AppData\Local\EmieUserList
2014-05-27 17:05 - 2014-05-27 17:05 - 00000000 __SHD () C:\Users\ciipresshilll\AppData\Local\EmieSiteList
2014-05-26 18:04 - 2014-05-26 08:31 - 00000000 ____D () C:\ProgramData\Nero
2014-05-26 08:32 - 2014-05-26 08:32 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\Nero
2014-05-26 07:43 - 2014-05-26 07:43 - 00000000 ____D () C:\Users\ciipresshilll\Desktop\TEST
2014-05-26 07:36 - 2014-05-26 07:36 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Local\GermaniXSoft
2014-05-25 18:50 - 2014-05-25 18:50 - 00000087 _____ () C:\Users\ciipresshilll\Documents\xbox zugang.txt
2014-05-25 14:10 - 2014-05-08 22:34 - 00527700 _____ () C:\Users\ciipresshilll\Documents\report.txt
2014-05-24 09:44 - 2014-05-24 09:44 - 00051062 _____ () C:\Users\ciipresshilll\Documents\cc_20140524_094401.reg
2014-05-24 08:59 - 2014-05-24 08:59 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\Canneverbe Limited
2014-05-24 08:56 - 2014-05-24 08:56 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CDBurnerXP
2014-05-24 08:56 - 2014-05-24 08:56 - 00000000 ____D () C:\ProgramData\Canneverbe Limited
2014-05-24 08:56 - 2014-05-24 08:56 - 00000000 ____D () C:\Program Files (x86)\CDBurnerXP
2014-05-22 20:56 - 2014-03-29 22:40 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\Audacity
2014-05-21 20:25 - 2009-07-14 07:08 - 00032632 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-05-20 21:33 - 2014-01-09 21:35 - 00000000 ____D () C:\Windows\Minidump
2014-05-20 21:32 - 2014-05-20 21:32 - 00971830 ____N () C:\Windows\Minidump\052014-7176-01.dmp
2014-05-19 19:08 - 2014-05-19 19:08 - 00000000 _____ () C:\Windows\setuperr.log
2014-05-16 08:55 - 2009-07-14 05:20 - 00000000 ____D () C:\Windows\rescache
2014-05-16 07:46 - 2014-04-30 07:46 - 00000000 ___SD () C:\Windows\system32\CompatTel
2014-05-16 07:46 - 2014-01-08 18:06 - 00000000 ___RD () C:\Users\ciipresshilll\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
2014-05-16 07:46 - 2014-01-08 18:06 - 00000000 ___RD () C:\Users\ciipresshilll\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools
2014-05-15 22:28 - 2014-01-08 18:55 - 93223848 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-05-15 22:28 - 2014-01-08 18:55 - 00000000 ____D () C:\Windows\system32\MRT
2014-05-15 09:51 - 2014-05-15 09:51 - 00020010 _____ () C:\Users\ciipresshilll\Documents\Leserbrief Vegesack.odt
2014-05-14 23:15 - 2014-05-14 23:15 - 00002980 _____ () C:\Windows\System32\Tasks\{769110BA-A2BF-410E-BDA0-416551886AF4}
2014-05-14 17:23 - 2014-03-17 08:07 - 00003822 _____ () C:\Windows\System32\Tasks\Adobe Flash Player Updater
2014-05-14 17:23 - 2014-01-08 22:27 - 00692400 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-05-14 17:23 - 2014-01-08 22:27 - 00070832 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-05-13 08:49 - 2014-01-10 17:49 - 00007607 _____ () C:\Users\ciipresshilll\AppData\Local\Resmon.ResmonCfg
2014-05-13 08:34 - 2014-04-22 00:19 - 00000000 ____D () C:\Users\ciipresshilll\Documents\Elder Scrolls Online
2014-05-13 08:34 - 2014-04-22 00:19 - 00000000 ____D () C:\ProgramData\Elder Scrolls Online
2014-05-13 08:33 - 2014-02-02 23:10 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Games
2014-05-11 19:07 - 2014-03-02 10:30 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service
2014-05-10 10:39 - 2014-05-10 10:39 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-05-09 08:14 - 2014-05-15 08:53 - 00477184 _____ (Microsoft Corporation) C:\Windows\system32\aepdu.dll
2014-05-09 08:11 - 2014-05-15 08:53 - 00424448 _____ (Microsoft Corporation) C:\Windows\system32\aeinv.dll
2014-05-07 11:17 - 2014-05-07 11:17 - 00002788 _____ () C:\Windows\System32\Tasks\CCleanerSkipUAC
2014-05-07 11:17 - 2014-05-07 11:17 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\CCleaner
2014-05-07 11:17 - 2014-05-07 11:17 - 00000000 ____D () C:\Program Files\CCleaner
2014-05-06 06:40 - 2014-05-15 22:28 - 23544320 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-05-06 06:17 - 2014-05-15 22:28 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-05-06 05:25 - 2014-05-15 22:28 - 17382912 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-05-06 05:07 - 2014-05-15 22:28 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-05-06 05:00 - 2014-05-15 22:28 - 00084992 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2014-05-06 04:10 - 2014-05-15 22:28 - 00069632 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2014-05-04 21:07 - 2014-05-04 21:07 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Roaming\HandBrake
2014-05-04 21:00 - 2014-05-04 21:00 - 00001312 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Movie Maker.lnk
2014-05-04 21:00 - 2014-05-04 21:00 - 00000000 ____D () C:\Windows\de
2014-05-04 21:00 - 2014-05-04 21:00 - 00000000 ____D () C:\Program Files\Windows Live
2014-05-04 21:00 - 2014-03-24 15:56 - 00001381 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Photo Gallery.lnk
2014-05-04 21:00 - 2014-01-08 23:09 - 00001497 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows Live Mail.lnk
2014-05-04 21:00 - 2014-01-08 23:09 - 00000000 ____D () C:\Program Files (x86)\Windows Live
2014-05-01 13:28 - 2014-05-01 13:28 - 00058129 _____ () C:\Windows\SysWOW64\CCCInstall_201405011328019478.log
2014-05-01 13:28 - 2014-05-01 13:28 - 00000000 ____D () C:\ProgramData\ATI
2014-05-01 13:28 - 2014-05-01 13:28 - 00000000 ____D () C:\Program Files (x86)\AMD AVT
2014-05-01 13:28 - 2014-01-08 18:39 - 00000000 ____D () C:\ProgramData\AMD
2014-05-01 13:27 - 2014-05-01 13:27 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AMD Catalyst Control Center
2014-05-01 13:27 - 2014-02-07 08:49 - 00000000 ____D () C:\Program Files (x86)\ATI Technologies
2014-05-01 13:25 - 2014-05-01 13:25 - 00060544 _____ () C:\Windows\SysWOW64\CCCInstall_201405011325001151.log
2014-04-29 21:02 - 2014-04-20 22:22 - 00000000 ____D () C:\Users\ciipresshilll\AppData\Local\Battle.net
2014-04-29 20:07 - 2014-04-20 22:18 - 00000000 ____D () C:\ProgramData\Battle.net
Some content of TEMP:
====================
C:\Users\ciipresshilll\AppData\Local\Temp\fileutil.dll
==================== Bamital & volsnap Check =================
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit
LastRegBack: 2014-05-21 20:07
==================== End Of Log ============================ --- --- ---
--- --- --- |