feivel001 | 25.11.2014 16:46 | Code:
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-11-25 14:18:01
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\00000073 ST975042 rev.0003 698,64GB
Running: Gmer-19357.exe; Driver: C:\Users\me\AppData\Local\Temp\uxldypow.sys
---- Kernel code sections - GMER 2.1 ----
INITKDBG C:\windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 738 fffff800033ef0d2 12 bytes [4C, 8B, 4C, 24, 70, 44, 38, ...]
INITKDBG C:\windows\system32\ntoskrnl.exe!ExDeleteNPagedLookasideList + 751 fffff800033ef0df 7 bytes [74, 08, 41, 89, 06, E9, A0]
---- User code sections - GMER 2.1 ----
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077411401 2 bytes JMP 765cb21b C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077411419 2 bytes JMP 765cb346 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077411431 2 bytes JMP 76648ea9 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007741144a 2 bytes CALL 765a48ad C:\windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774114dd 2 bytes JMP 766487a2 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774114f5 2 bytes JMP 76648978 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007741150d 2 bytes JMP 76648698 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077411525 2 bytes JMP 76648a62 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007741153d 2 bytes JMP 765bfca8 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077411555 2 bytes JMP 765c68ef C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007741156d 2 bytes JMP 76648f61 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077411585 2 bytes JMP 76648ac2 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007741159d 2 bytes JMP 7664865c C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774115b5 2 bytes JMP 765bfd41 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774115cd 2 bytes JMP 765cb2dc C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774116b2 2 bytes JMP 76648e24 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\EaseUS\Todo Backup\bin\Agent.exe[2640] C:\windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774116bd 2 bytes JMP 766485f1 C:\windows\syswow64\kernel32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\ksuser.dll!KsCreatePin + 35 00000000706d11a8 2 bytes [6D, 70]
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\ksuser.dll!KsCreatePin + 248 00000000706d127d 2 bytes CALL 765a14b9 C:\windows\syswow64\kernel32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\ksuser.dll!KsCreatePin + 395 00000000706d1310 2 bytes CALL 765a14b9 C:\windows\syswow64\kernel32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\ksuser.dll!KsCreateAllocator + 21 00000000706d13a8 2 bytes [6D, 70]
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\ksuser.dll!KsCreateClock + 21 00000000706d1422 2 bytes [6D, 70]
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\ksuser.dll!KsCreateTopologyNode + 19 00000000706d1498 2 bytes [6D, 70]
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkD3dContextCreate + 4 00000000704f1825 2 bytes JMP 774d6125 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkD3dContextDestroy + 4 00000000704f1830 2 bytes JMP 774d6145 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkD3dContextDestroyAll + 4 00000000704f183b 2 bytes JMP 774d6165 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkD3dDrawPrimitives2 + 4 00000000704f1846 2 bytes JMP 774d5a05 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkD3dValidateTextureStageState + 4 00000000704f1851 2 bytes JMP 774d6185 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdAddAttachedSurface + 4 00000000704f185c 2 bytes JMP 774d6265 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdAlphaBlt + 4 00000000704f1867 2 bytes JMP 774d6285 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdAttachSurface + 4 00000000704f1872 2 bytes JMP 774d62a5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdBeginMoCompFrame + 4 00000000704f187d 2 bytes JMP 774d62c5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdBlt + 4 00000000704f1888 2 bytes JMP 774d5a25 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdCanCreateD3DBuffer + 4 00000000704f1893 2 bytes JMP 774d62e5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdCanCreateSurface + 4 00000000704f189e 2 bytes JMP 774d5aa5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdColorControl + 4 00000000704f18a9 2 bytes JMP 774d6305 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdCreateD3DBuffer + 4 00000000704f18b4 2 bytes JMP 774d6325 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdCreateDirectDrawObject + 4 00000000704f18bf 2 bytes JMP 774a1fcb C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdCreateMoComp + 4 00000000704f18ca 2 bytes JMP 774d6365 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdCreateSurface + 4 00000000704f18d5 2 bytes JMP 774d5ac5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdCreateSurfaceEx + 4 00000000704f18e0 2 bytes JMP 774d5b45 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdCreateSurfaceObject + 4 00000000704f18eb 2 bytes JMP 774d5b65 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdDeleteDirectDrawObject + 4 00000000704f18f6 2 bytes JMP 774d68c5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdDeleteSurfaceObject + 4 00000000704f1901 2 bytes JMP 774d5a85 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdDestroyD3DBuffer + 4 00000000704f190c 2 bytes JMP 774d68e5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdDestroyMoComp + 4 00000000704f1917 2 bytes JMP 774d6925 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdDestroySurface + 4 00000000704f1922 2 bytes JMP 774d5ae5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdEndMoCompFrame + 4 00000000704f192d 2 bytes JMP 774d6945 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdFlip + 4 00000000704f1938 2 bytes JMP 774d6965 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdFlipToGDISurface + 4 00000000704f1943 2 bytes JMP 774d6985 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetAvailDriverMemory + 4 00000000704f194e 2 bytes JMP 774d69a5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetBltStatus + 4 00000000704f1959 2 bytes JMP 774d69c5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetDC + 4 00000000704f1964 2 bytes JMP 774d69e5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetDriverInfo + 4 00000000704f196f 2 bytes JMP 774d6a05 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetDriverState + 4 00000000704f197a 2 bytes JMP 774d6a25 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetDxHandle + 4 00000000704f1985 2 bytes JMP 774d6a45 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetFlipStatus + 4 00000000704f1990 2 bytes JMP 774d6a65 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetInternalMoCompInfo + 4 00000000704f199b 2 bytes JMP 774d6a85 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetMoCompBuffInfo + 4 00000000704f19a6 2 bytes JMP 774d6aa5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetMoCompFormats + 4 00000000704f19b1 2 bytes JMP 774d6ac5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetMoCompGuids + 4 00000000704f19bc 2 bytes JMP 774d6ae5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdGetScanLine + 4 00000000704f19c7 2 bytes JMP 774d6b05 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdLock + 4 00000000704f19d2 2 bytes JMP 774d6b25 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdLockD3D + 4 00000000704f19dd 2 bytes JMP 774d5b85 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdQueryDirectDrawObject + 4 00000000704f19e8 2 bytes JMP 774d6b65 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdQueryMoCompStatus + 4 00000000704f19f3 2 bytes JMP 774d6b85 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdReenableDirectDrawObject + 4 00000000704f19fe 2 bytes JMP 774d6bc3 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdReleaseDC + 4 00000000704f1a09 2 bytes JMP 774d6be3 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdRenderMoComp + 4 00000000704f1a14 2 bytes JMP 774d6c03 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdResetVisrgn + 4 00000000704f1a1f 2 bytes JMP 774d5b05 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdSetColorKey + 4 00000000704f1a2a 2 bytes JMP 774d6c23 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdSetExclusiveMode + 4 00000000704f1a35 2 bytes JMP 774d6c43 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdSetGammaRamp + 4 00000000704f1a40 2 bytes JMP 774d6c63 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdSetOverlayPosition + 4 00000000704f1a4b 2 bytes JMP 774d6c83 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdUnattachSurface + 4 00000000704f1a56 2 bytes JMP 774d6ca3 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdUnlock + 4 00000000704f1a61 2 bytes JMP 774d6cc3 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdUnlockD3D + 4 00000000704f1a6c 2 bytes JMP 774d5ba5 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdUpdateOverlay + 4 00000000704f1a77 2 bytes JMP 774d6ce3 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 4 00000000704f1a82 2 bytes JMP 774d6d03 C:\windows\syswow64\GDI32.dll
.text C:\windows\SysWow64\ArcVCapRender\uArcCapture.exe[2832] C:\Windows\SysWOW64\d3d8thk.dll!OsThunkDdWaitForVerticalBlank + 52 00000000704f1ab2 2 bytes JMP 75bedc75 C:\windows\syswow64\msvcrt.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077411401 2 bytes JMP 765cb21b C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077411419 2 bytes JMP 765cb346 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077411431 2 bytes JMP 76648ea9 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007741144a 2 bytes CALL 765a48ad C:\windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774114dd 2 bytes JMP 766487a2 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774114f5 2 bytes JMP 76648978 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007741150d 2 bytes JMP 76648698 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077411525 2 bytes JMP 76648a62 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007741153d 2 bytes JMP 765bfca8 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077411555 2 bytes JMP 765c68ef C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007741156d 2 bytes JMP 76648f61 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077411585 2 bytes JMP 76648ac2 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007741159d 2 bytes JMP 7664865c C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774115b5 2 bytes JMP 765bfd41 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774115cd 2 bytes JMP 765cb2dc C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774116b2 2 bytes JMP 76648e24 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe[3976] C:\windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774116bd 2 bytes JMP 766485f1 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077411401 2 bytes JMP 765cb21b C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077411419 2 bytes JMP 765cb346 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077411431 2 bytes JMP 76648ea9 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007741144a 2 bytes CALL 765a48ad C:\windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774114dd 2 bytes JMP 766487a2 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774114f5 2 bytes JMP 76648978 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007741150d 2 bytes JMP 76648698 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077411525 2 bytes JMP 76648a62 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007741153d 2 bytes JMP 765bfca8 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077411555 2 bytes JMP 765c68ef C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007741156d 2 bytes JMP 76648f61 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077411585 2 bytes JMP 76648ac2 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007741159d 2 bytes JMP 7664865c C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774115b5 2 bytes JMP 765bfd41 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774115cd 2 bytes JMP 765cb2dc C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774116b2 2 bytes JMP 76648e24 C:\windows\syswow64\kernel32.dll
.text C:\Program Files (x86)\Launchy\Launchy.exe[4192] C:\windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774116bd 2 bytes JMP 766485f1 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetModuleFileNameExW + 17 0000000077411401 2 bytes JMP 765cb21b C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!EnumProcessModules + 17 0000000077411419 2 bytes JMP 765cb346 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetModuleInformation + 17 0000000077411431 2 bytes JMP 76648ea9 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetModuleInformation + 42 000000007741144a 2 bytes CALL 765a48ad C:\windows\syswow64\kernel32.dll
.text ... * 9
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!EnumDeviceDrivers + 17 00000000774114dd 2 bytes JMP 766487a2 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetDeviceDriverBaseNameA + 17 00000000774114f5 2 bytes JMP 76648978 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!QueryWorkingSetEx + 17 000000007741150d 2 bytes JMP 76648698 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetDeviceDriverBaseNameW + 17 0000000077411525 2 bytes JMP 76648a62 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetModuleBaseNameW + 17 000000007741153d 2 bytes JMP 765bfca8 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!EnumProcesses + 17 0000000077411555 2 bytes JMP 765c68ef C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetProcessMemoryInfo + 17 000000007741156d 2 bytes JMP 76648f61 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetPerformanceInfo + 17 0000000077411585 2 bytes JMP 76648ac2 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!QueryWorkingSet + 17 000000007741159d 2 bytes JMP 7664865c C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetModuleBaseNameA + 17 00000000774115b5 2 bytes JMP 765bfd41 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetModuleFileNameExA + 17 00000000774115cd 2 bytes JMP 765cb2dc C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetProcessImageFileNameW + 20 00000000774116b2 2 bytes JMP 76648e24 C:\windows\syswow64\kernel32.dll
.text C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe[4328] C:\windows\syswow64\Psapi.dll!GetProcessImageFileNameW + 31 00000000774116bd 2 bytes JMP 766485f1 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetModuleFileNameExW + 17 0000000077411401 2 bytes JMP 765cb21b C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!EnumProcessModules + 17 0000000077411419 2 bytes JMP 765cb346 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 17 0000000077411431 2 bytes JMP 76648ea9 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 42 000000007741144a 2 bytes CALL 765a48ad C:\windows\syswow64\kernel32.dll
.text ... * 9
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!EnumDeviceDrivers + 17 00000000774114dd 2 bytes JMP 766487a2 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameA + 17 00000000774114f5 2 bytes JMP 76648978 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!QueryWorkingSetEx + 17 000000007741150d 2 bytes JMP 76648698 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetDeviceDriverBaseNameW + 17 0000000077411525 2 bytes JMP 76648a62 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetModuleBaseNameW + 17 000000007741153d 2 bytes JMP 765bfca8 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!EnumProcesses + 17 0000000077411555 2 bytes JMP 765c68ef C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetProcessMemoryInfo + 17 000000007741156d 2 bytes JMP 76648f61 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetPerformanceInfo + 17 0000000077411585 2 bytes JMP 76648ac2 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!QueryWorkingSet + 17 000000007741159d 2 bytes JMP 7664865c C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetModuleBaseNameA + 17 00000000774115b5 2 bytes JMP 765bfd41 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetModuleFileNameExA + 17 00000000774115cd 2 bytes JMP 765cb2dc C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 20 00000000774116b2 2 bytes JMP 76648e24 C:\windows\syswow64\kernel32.dll
.text C:\program files (x86)\avira\antivir desktop\ipmGui.exe[2968] C:\windows\syswow64\PSAPI.DLL!GetProcessImageFileNameW + 31 00000000774116bd 2 bytes JMP 766485f1 C:\windows\syswow64\kernel32.dll
---- Processes - GMER 2.1 ----
Library C:\Users\me\AppData\Roaming\Dropbox\bin\wxmsw28uh_vc.dll (*** suspicious ***) @ C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe [4328](2014-11-13 06:49:58) 00000000040a0000
Library c:\users\me\appdata\local\temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmppkzdfb.dll (*** suspicious ***) @ C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe [4328](2014-11-24 20:05:46) 00000000044e0000
Library C:\Users\me\AppData\Roaming\Dropbox\bin\libcef.dll (*** suspicious ***) @ C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe [4328](2013-08-23 19:01:44) 00000000611a0000
Library C:\Users\me\AppData\Roaming\Dropbox\bin\icudt.dll (*** suspicious ***) @ C:\Users\me\AppData\Roaming\Dropbox\bin\Dropbox.exe [4328] (ICU Data DLL/The ICU Project)(2013-08-23 19:01:42) 00000000602d0000
---- Registry - GMER 2.1 ----
Reg HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\9cb70d3b8676
Reg HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\9cb70d3b8676 (not active ControlSet)
---- EOF - GMER 2.1 ---- Code:
Malwarebytes Anti-Malware
www.malwarebytes.org
Scan Date: 24.11.2014
Scan Time: 19:10:47
Logfile: MBAW.txt
Administrator: Yes
Version: 2.00.3.1025
Malware Database: v2014.11.24.07
Rootkit Database: v2014.11.22.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: me
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 338082
Time Elapsed: 20 min, 31 sec
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
Processes: 0
(No malicious items detected)
Modules: 0
(No malicious items detected)
Registry Keys: 12
PUP.Optional.FlowSurf.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{E3F1CA13-EA0E-4617-8D03-3EAA6A94A7E0}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKLM\SOFTWARE\CLASSES\TYPELIB\{C321541F-B22D-4593-AC1A-9634812A4E40}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{A8018C54-B702-4D52-9ACC-8CA78911E633}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKLM\SOFTWARE\CLASSES\INTERFACE\{C6A846C5-D67F-48B4-8552-C22354E56966}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{A8018C54-B702-4D52-9ACC-8CA78911E633}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{C6A846C5-D67F-48B4-8552-C22354E56966}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{C321541F-B22D-4593-AC1A-9634812A4E40}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{E3F1CA13-EA0E-4617-8D03-3EAA6A94A7E0}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKU\S-1-5-21-4238942255-3180995338-2938082374-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{E3F1CA13-EA0E-4617-8D03-3EAA6A94A7E0}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKU\S-1-5-21-4238942255-3180995338-2938082374-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{E3F1CA13-EA0E-4617-8D03-3EAA6A94A7E0}, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.FlowSurf.A, HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\FLOWSURF, , [ecab65da512ba78f806663476c9825db],
PUP.Optional.FlowSurf.A, HKU\S-1-5-21-4238942255-3180995338-2938082374-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\FLOWSURF, , [c4d3da655f1d1c1a31b5fcae08fc8f71],
Registry Values: 3
PUP.Optional.FlowSurf.A, HKLM\SOFTWARE\WOW6432NODE\MOZILLA\FIREFOX\EXTENSIONS|jid1-tofUlNEIFlkUIA@jetpack, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack, , [64336bd4314b85b16cc4d79543c0b44c]
PUP.Optional.FlowSurf.A, HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\FLOWSURF|chrid, oglkiljdmflopemijdadoiepkhcaodjn, , [ecab65da512ba78f806663476c9825db]
PUP.Optional.FlowSurf.A, HKU\S-1-5-21-4238942255-3180995338-2938082374-1001-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\FLOWSURF|chrid, oglkiljdmflopemijdadoiepkhcaodjn, , [c4d3da655f1d1c1a31b5fcae08fc8f71]
Registry Data: 0
(No malicious items detected)
Folders: 11
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\defaults, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\defaults\preferences, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\locale, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\resources, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\resources\addon-sdk, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\resources\addon-sdk\lib, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\resources\flowsurf, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\resources\flowsurf\data, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\resources\flowsurf\lib, , [0790b48b46365dd91dc6e5c5cf3543bd],
Files: 15
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\flowsurf.dll, , [8314fe41d7a540f62ac005bc23df8e72],
PUP.Optional.Bandoo, C:\Users\me\AppData\Local\Temp\GIIl7j5U.exe.part, , [d3c4e857cfad9e98d9b2aa7a13ee6898],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\install.ico, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\atl110.dll, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\fsupd.exe, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\msvcr110.dll, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\upfs7214.exe, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\bootstrap.js, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\harness-options.json, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\icon.png, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\icon64.png, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\install.rdf, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\locales.json, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\defaults\preferences\prefs.js, , [0790b48b46365dd91dc6e5c5cf3543bd],
PUP.Optional.FlowSurf.A, C:\Program Files (x86)\Flowsurf\jid1-tofUlNEIFlkUIA@jetpack\resources\flowsurf\lib\main.js, , [0790b48b46365dd91dc6e5c5cf3543bd],
Physical Sectors: 0
(No malicious items detected)
(end) Code:
# AdwCleaner v4.102 - Bericht erstellt am 24/11/2014 um 20:58:47
# Aktualisiert 23/11/2014 von Xplode
# Database : 2014-11-24.1 [Live]
# Betriebssystem : Windows 7 Home Premium Service Pack 1 (64 bits)
# Benutzername : me - ME-HP
# Gestartet von : C:\Users\me\Desktop\AdwCleaner_4.102.exe
# Option : Suchen
***** [ Dienste ] *****
***** [ Dateien / Ordner ] *****
Datei Gefunden : C:\END
Ordner Gefunden : C:\Users\me\AppData\Roaming\pdfforge
***** [ Tasks ] *****
Task Gefunden : fsupdate
***** [ Verknüpfungen ] *****
***** [ Registrierungsdatenbank ] *****
Schlüssel Gefunden : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Schlüssel Gefunden : HKCU\Software\Myfree Codec
Schlüssel Gefunden : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Schlüssel Gefunden : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Schlüssel Gefunden : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{B7FCA997-D0FB-4FE0-8AFD-255E89CF9671}
Schlüssel Gefunden : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{EC29EDF6-AD3C-4E1C-A087-D6CB81400C43}
Schlüssel Gefunden : [x64] HKCU\Software\Myfree Codec
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\AppID\secman.DLL
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{533403E2-6E21-4615-9E28-43F4E97E977B}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\driverscanner
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{0FCE4F01-64EC-42F1-83E1-1E08D38605D2}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{1A2A195A-A0F9-4006-AF02-3F05EEFDE792}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{2D9DB233-DC4B-4677-946C-5FA5ABCF506B}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{3AE76A17-C344-4A83-81CE-65EFEE41E42D}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{4C0A69B0-CE97-42B7-86FC-08280C99C74D}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{4E9EB4D5-C929-4005-AC62-1856B1DA5A24}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{8FAF962C-3EDE-405E-B1D0-62B8235C6044}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{C1F5E799-B218-4C32-B189-3C389BA140BB}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\Interface\{F60C9408-3110-4C98-A139-ABE1EE1111DD}
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\secman.OutlookSecurityManager
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\secman.OutlookSecurityManager.1
Schlüssel Gefunden : HKLM\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}
Schlüssel Gefunden : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Schlüssel Gefunden : HKLM\SOFTWARE\Myfree Codec
Schlüssel Gefunden : HKLM\SOFTWARE\Uniblue
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{0FCE4F01-64EC-42F1-83E1-1E08D38605D2}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{1A2A195A-A0F9-4006-AF02-3F05EEFDE792}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{2D9DB233-DC4B-4677-946C-5FA5ABCF506B}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{3AE76A17-C344-4A83-81CE-65EFEE41E42D}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{4C0A69B0-CE97-42B7-86FC-08280C99C74D}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{4E9EB4D5-C929-4005-AC62-1856B1DA5A24}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{8FAF962C-3EDE-405E-B1D0-62B8235C6044}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{C1F5E799-B218-4C32-B189-3C389BA140BB}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Classes\Interface\{F60C9408-3110-4C98-A139-ABE1EE1111DD}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{B7FCA997-D0FB-4FE0-8AFD-255E89CF9671}
Schlüssel Gefunden : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{EC29EDF6-AD3C-4E1C-A087-D6CB81400C43}
***** [ Browser ] *****
-\\ Internet Explorer v11.0.9600.17420
-\\ Mozilla Firefox v33.1 (x86 de)
[JonDoFox] - Zeile gefunden : user_pref("pttl.menu-search-groups-tab", false);
[JonDoFox] - Zeile gefunden : user_pref("pttl.menu-search-groups-win", false);
*************************
AdwCleaner[R0].txt - [5270 octets] - [24/11/2014 19:34:40]
AdwCleaner[R1].txt - [5110 octets] - [24/11/2014 20:58:47]
########## EOF - C:\AdwCleaner\AdwCleaner[R1].txt - [5170 octets] ########## Code:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.3.9 (11.15.2014:2)
OS: Windows 7 Home Premium x64
Ran by me on 24.11.2014 at 22:23:44,02
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~ Services
~~~ Registry Values
~~~ Registry Keys
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{B7FCA997-D0FB-4FE0-8AFD-255E89CF9671}
~~~ Files
~~~ Folders
Successfully deleted: [Folder] "C:\Program Files (x86)\myfree codec"
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{11E69D26-4768-40CA-85E4-93908918BAAE}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{1E3EE51A-1FA1-4435-BDC3-41B5BFC14CB9}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{246FFD0B-D95D-4412-B7EC-975EDC36E50F}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{2692EE9B-5929-4C41-9DE9-1DF7144EA6B2}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{3ACD9B83-135B-4BF0-B18F-A90D39EFCE21}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{69C2BC25-90DB-4984-B8A1-9BBDC661D351}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{700BF096-23F4-427B-9A18-BAC6F702581A}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{8550D672-D66C-4981-801F-11BECDC55954}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{9207E18B-6B3F-4073-B450-911E3F7B5218}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{99F751F2-778B-442A-990C-C016ADB565C7}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{D183EE99-A3B9-4C65-B3CC-A37FFEC0E1E6}
Successfully deleted: [Empty Folder] C:\Users\me\appdata\local\{E9ABC72A-CB16-4D41-B8C7-899892E95460}
~~~ FireFox
Emptied folder: C:\Users\me\AppData\Roaming\mozilla\firefox\profiles\m0axdbgg.default\minidumps [119 files]
~~~ Event Viewer Logs were cleared
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 24.11.2014 at 22:28:50,92
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Code:
Shortcut Cleaner 1.3.4 by Lawrence Abrams (Grinler)
hxxp://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Shortcut Cleaner can be found at this link:
hxxp://www.bleepingcomputer.com/download/shortcut-cleaner/
Windows Version: Windows 7 Home Premium Service Pack 1
Program started at: 11/25/2014 02:23:51 PM.
Scanning for registry hijacks:
* No issues found in the Registry.
Searching for Hijacked Shortcuts:
Searching C:\Users\me\AppData\Roaming\Microsoft\Windows\Start Menu\
Searching C:\ProgramData\Microsoft\Windows\Start Menu\
Searching C:\Users\me\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\
Searching C:\Users\Public\Desktop\
Searching C:\Users\me\Desktop
0 bad shortcuts found.
Program finished at: 11/25/2014 02:23:52 PM
Execution time: 0 hours(s), 0 minute(s), and 1 seconds(s) |