Zurück   Trojaner-Board > Malware entfernen > Plagegeister aller Art und deren Bekämpfung

Plagegeister aller Art und deren Bekämpfung: Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?

Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen.

Antwort
Alt 19.12.2011, 21:45   #76
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



RkUnhooker report generator v0.7
==============================================
Rootkit Unhooker kernel version: 3.7.300.501
==============================================
Windows Major Version: 5
Windows Minor Version: 1
Windows Build Number: 2600
==============================================
>SSDT State
NtConnectPort
Actual Address 0xBA2122F4
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateFile
Actual Address 0xBA20C5CA
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateKey
Actual Address 0xBA22B58A
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreatePort
Actual Address 0xBA212A80
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateProcess
Actual Address 0xBA225E4E
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateProcessEx
Actual Address 0xBA22623C
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateSection
Actual Address 0xBA22F6F6
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtCreateWaitablePort
Actual Address 0xBA212BB6
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtDeleteFile
Actual Address 0xBA20D1E0
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtDeleteKey
Actual Address 0xBA22CE3C
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtDeleteValueKey
Actual Address 0xBA22C7B2
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtDuplicateObject
Actual Address 0xBA224D8A
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtLoadKey
Actual Address 0xBA22D794
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtLoadKey2
Actual Address 0xBA22D99C
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtOpenFile
Actual Address 0xBA20CDF2
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtOpenProcess
Actual Address 0xBA228160
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtOpenThread
Actual Address 0xBA227D8A
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtRenameKey
Actual Address 0xBA22E72A
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtReplaceKey
Actual Address 0xBA22E060
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtRequestWaitReplyPort
Actual Address 0xBA211EC4
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtRestoreKey
Actual Address 0xBA22F0FC
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtSecureConnectPort
Actual Address 0xBA21259C
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtSetInformationFile
Actual Address 0xBA20D5A4
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtSetSecurityObject
Actual Address 0xBA22EC6A
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtSetValueKey
Actual Address 0xBA22BF72
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtSystemDebugControl
Actual Address 0xBA226EA4
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtTerminateProcess
Actual Address 0xBA226C20
Hooked by: C:\WINDOWS\System32\vsdatant.sys
==============================================
>Shadow
NtUserMessageCall
Actual Address 0xBA210D66
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtUserPostMessage
Actual Address 0xBA210EA8
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtUserPostThreadMessage
Actual Address 0xBA210FE0
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtUserRegisterRawInputDevices
Actual Address 0xBA20E97A
Hooked by: C:\WINDOWS\System32\vsdatant.sys
NtUserSendInput
Actual Address 0xBA2113D4
Hooked by: C:\WINDOWS\System32\vsdatant.sys
==============================================
>Processes
Process: System
Process Id: 4
EPROCESS Address: 0x89A32BD0

Process: C:\WINDOWS\system32\wscntfy.exe
Process Id: 108
EPROCESS Address: 0x89167A20

Process: C:\Programme\CheckPoint\ZAForceField\ForceField.exe
Process Id: 140
EPROCESS Address: 0x896C6C08

Process: C:\WINDOWS\system32\alg.exe
Process Id: 240
EPROCESS Address: 0x89603870

Process: C:\WINDOWS\system32\smss.exe
Process Id: 356
EPROCESS Address: 0x897F6DA0

Process: C:\Programme\Vodafone\Vodafone Mobile Broadband\Bin\MobileBroadband.exe
Process Id: 440
EPROCESS Address: 0x89133020

Process: C:\WINDOWS\system32\ctfmon.exe
Process Id: 524
EPROCESS Address: 0x89122730

Process: C:\WINDOWS\system32\csrss.exe
Process Id: 572
EPROCESS Address: 0x897EA158

Process: C:\WINDOWS\system32\winlogon.exe
Process Id: 596
EPROCESS Address: 0x89888910

Process: C:\WINDOWS\system32\services.exe
Process Id: 640
EPROCESS Address: 0x897C1580

Process: C:\WINDOWS\system32\lsass.exe
Process Id: 652
EPROCESS Address: 0x895C5858

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 812
EPROCESS Address: 0x897B43B8

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 900
EPROCESS Address: 0x89805860

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 940
EPROCESS Address: 0x89896868

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 1028
EPROCESS Address: 0x897B63C8

Process: C:\WINDOWS\system32\svchost.exe
Process Id: 1056
EPROCESS Address: 0x89641860

Process: C:\WINDOWS\system32\wbem\wmiprvse.exe
Process Id: 1256
EPROCESS Address: 0x890FEBE0

Process: C:\WINDOWS\explorer.exe
Process Id: 1300
EPROCESS Address: 0x89830BE0

Process: C:\Programme\CheckPoint\ZAForceField\ISWSVC.exe
Process Id: 1508
EPROCESS Address: 0x8961E860

Process: C:\WINDOWS\system32\spoolsv.exe
Process Id: 1564
EPROCESS Address: 0x8961F5D0

Process: C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
Process Id: 1660
EPROCESS Address: 0x898CE8B0

Process: C:\Programme\Vodafone\Vodafone Mobile Broadband\Bin\VmbService.exe
Process Id: 1772
EPROCESS Address: 0x8961C6F0

Process: C:\Programme\Internet Explorer\iexplore.exe
Process Id: 2420
EPROCESS Address: 0x89631860

Process: C:\WINDOWS\system32\wuauclt.exe
Process Id: 2504
EPROCESS Address: 0x898B7020

Process: C:\WINDOWS\system32\wpabaln.exe
Process Id: 3328
EPROCESS Address: 0x8913F508

Process: C:\Programme\CheckPoint\ZoneAlarm\zatray.exe
Process Id: 452
EPROCESS Address: 0x891374E0

Process: C:\Programme\CheckPoint\ZoneAlarm\vsmon.exe
Process Id: 1104
EPROCESS Address: 0x895C0AB8

Process: C:\Dokumente und Einstellungen\Rich\Desktop\RkUnhooker\ne2Jr8N2.exe
Process Id: 1844
EPROCESS Address: 0x88CC6B28

==============================================
>Drivers
Driver: C:\WINDOWS\system32\ntkrnlpa.exe
Address: 0x804D7000
Size: 2154496 bytes

Driver: PnpManager
Address: 0x804D7000
Size: 2154496 bytes

Driver: RAW
Address: 0x804D7000
Size: 2154496 bytes

Driver: WMIxWDM
Address: 0x804D7000
Size: 2154496 bytes

Driver: Win32k
Address: 0xBF800000
Size: 1847296 bytes

Driver: C:\WINDOWS\System32\win32k.sys
Address: 0xBF800000
Size: 1847296 bytes

Driver: Ntfs.sys
Address: 0xBA65A000
Size: 577536 bytes

Driver: C:\WINDOWS\System32\vsdatant.sys
Address: 0xBA1F1000
Size: 520192 bytes

Driver: C:\WINDOWS\System32\Drivers\wdf01000.sys
Address: 0xBA470000
Size: 507904 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mrxsmb.sys
Address: 0xBA10C000
Size: 458752 bytes

Driver: C:\WINDOWS\system32\DRIVERS\update.sys
Address: 0xBA4FE000
Size: 385024 bytes

Driver: C:\WINDOWS\system32\DRIVERS\tcpip.sys
Address: 0xBA2BE000
Size: 364544 bytes

Driver: C:\WINDOWS\system32\DRIVERS\srv.sys
Address: 0xB9670000
Size: 335872 bytes

Driver: C:\WINDOWS\System32\Drivers\HTTP.sys
Address: 0xB93AF000
Size: 266240 bytes

Driver: ACPI.sys
Address: 0xBA778000
Size: 192512 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mrxdav.sys
Address: 0xB97DA000
Size: 184320 bytes

Driver: NDIS.sys
Address: 0xBA62D000
Size: 184320 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rdbss.sys
Address: 0xBA17C000
Size: 176128 bytes

Driver: C:\WINDOWS\system32\DRIVERS\netbt.sys
Address: 0xBA270000
Size: 163840 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ipnat.sys
Address: 0xBA298000
Size: 155648 bytes

Driver: C:\WINDOWS\system32\DRIVERS\USBPORT.SYS
Address: 0xBA5A7000
Size: 147456 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ks.sys
Address: 0xBA584000
Size: 143360 bytes

Driver: C:\WINDOWS\System32\drivers\afd.sys
Address: 0xBA1A7000
Size: 139264 bytes

Driver: ACPI_HAL
Address: 0x806E5000
Size: 134400 bytes

Driver: C:\WINDOWS\system32\hal.dll
Address: 0x806E5000
Size: 134400 bytes

Driver: fltmgr.sys
Address: 0xBA710000
Size: 131072 bytes

Driver: ftdisk.sys
Address: 0xBA748000
Size: 126976 bytes

Driver: Mup.sys
Address: 0xBA613000
Size: 106496 bytes

Driver: atapi.sys
Address: 0xBA730000
Size: 98304 bytes

Driver: C:\WINDOWS\System32\Drivers\dump_atapi.sys
Address: 0xBA0DF000
Size: 98304 bytes

Driver: KSecDD.sys
Address: 0xBA6E7000
Size: 94208 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ndiswan.sys
Address: 0xBA56D000
Size: 94208 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ew_jucdcacm.sys
Address: 0xBA0F7000
Size: 86016 bytes

Driver: C:\WINDOWS\System32\drivers\VIDEOPRT.SYS
Address: 0xBA34A000
Size: 81920 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ipsec.sys
Address: 0xBA317000
Size: 77824 bytes

Driver: C:\WINDOWS\System32\drivers\dxg.sys
Address: 0xBF9C3000
Size: 73728 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ew_jubusenum.sys
Address: 0xBA4EC000
Size: 73728 bytes

Driver: sr.sys
Address: 0xBA6FE000
Size: 73728 bytes

Driver: pci.sys
Address: 0xBA767000
Size: 69632 bytes

Driver: C:\WINDOWS\system32\DRIVERS\psched.sys
Address: 0xBA55C000
Size: 69632 bytes

Driver: C:\WINDOWS\System32\Drivers\Cdfs.SYS
Address: 0xBAA88000
Size: 65536 bytes

Driver: C:\WINDOWS\system32\DRIVERS\cdrom.sys
Address: 0xBA998000
Size: 65536 bytes

Driver: C:\WINDOWS\system32\DRIVERS\redbook.sys
Address: 0xBA9A8000
Size: 61440 bytes

Driver: C:\WINDOWS\system32\DRIVERS\usbhub.sys
Address: 0xBAA28000
Size: 61440 bytes

Driver: VolSnap.sys
Address: 0xBA8C8000
Size: 57344 bytes

Driver: C:\WINDOWS\system32\DRIVERS\CLASSPNP.SYS
Address: 0xBA8E8000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ew_jucdcecm.sys
Address: 0xBAA98000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\i8042prt.sys
Address: 0xBA978000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rasl2tp.sys
Address: 0xBA9B8000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\WDFLDR.SYS
Address: 0xBAA08000
Size: 53248 bytes

Driver: C:\WINDOWS\system32\DRIVERS\raspptp.sys
Address: 0xBA9D8000
Size: 49152 bytes

Driver: C:\WINDOWS\System32\Drivers\Fips.SYS
Address: 0xBAA58000
Size: 45056 bytes

Driver: C:\WINDOWS\system32\DRIVERS\imapi.sys
Address: 0xBA988000
Size: 45056 bytes

Driver: MountMgr.sys
Address: 0xBA8B8000
Size: 45056 bytes

Driver: C:\WINDOWS\system32\DRIVERS\raspppoe.sys
Address: 0xBA9C8000
Size: 45056 bytes

Driver: C:\WINDOWS\system32\DRIVERS\intelppm.sys
Address: 0xBA968000
Size: 40960 bytes

Driver: isapnp.sys
Address: 0xBA8A8000
Size: 40960 bytes

Driver: C:\WINDOWS\System32\Drivers\NDProxy.SYS
Address: 0xBAA18000
Size: 40960 bytes

Driver: C:\WINDOWS\system32\DRIVERS\termdd.sys
Address: 0xBA9F8000
Size: 40960 bytes

Driver: disk.sys
Address: 0xBA8D8000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\msgpc.sys
Address: 0xBA9E8000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\netbios.sys
Address: 0xBAA48000
Size: 36864 bytes

Driver: C:\WINDOWS\system32\DRIVERS\wanarp.sys
Address: 0xBAA38000
Size: 36864 bytes

Driver: C:\Programme\CheckPoint\ZAForceField\ISWKL.sys
Address: 0xBAC10000
Size: 32768 bytes

Driver: C:\WINDOWS\System32\Drivers\Modem.SYS
Address: 0xBAC20000
Size: 32768 bytes

Driver: C:\WINDOWS\System32\Drivers\Npfs.SYS
Address: 0xBABF0000
Size: 32768 bytes

Driver: C:\WINDOWS\system32\DRIVERS\usbccgp.sys
Address: 0xBAC00000
Size: 32768 bytes

Driver: C:\WINDOWS\system32\DRIVERS\usbehci.sys
Address: 0xBAB98000
Size: 32768 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ew_juextctrl.sys
Address: 0xBAC28000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\kbdclass.sys
Address: 0xBABA0000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\PCIIDEX.SYS
Address: 0xBAB28000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\USBSTOR.SYS
Address: 0xBAC08000
Size: 28672 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mouclass.sys
Address: 0xBABA8000
Size: 24576 bytes

Driver: C:\WINDOWS\System32\Drivers\rkhdrv40.SYS
Address: 0xBAC60000
Size: 24576 bytes

Driver: C:\WINDOWS\system32\DRIVERS\usbuhci.sys
Address: 0xBAB90000
Size: 24576 bytes

Driver: C:\WINDOWS\System32\drivers\vga.sys
Address: 0xBABE0000
Size: 24576 bytes

Driver: C:\WINDOWS\System32\Drivers\Msfs.SYS
Address: 0xBABE8000
Size: 20480 bytes

Driver: PartMgr.sys
Address: 0xBAB30000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ptilink.sys
Address: 0xBABB8000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\raspti.sys
Address: 0xBABC0000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\TDI.SYS
Address: 0xBABB0000
Size: 20480 bytes

Driver: C:\WINDOWS\System32\watchdog.sys
Address: 0xBAC30000
Size: 20480 bytes

Driver: C:\WINDOWS\system32\DRIVERS\mssmbios.sys
Address: 0xBAD48000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ndisuio.sys
Address: 0xB9BBF000
Size: 16384 bytes

Driver: C:\WINDOWS\system32\BOOTVID.dll
Address: 0xBACB8000
Size: 12288 bytes

Driver: C:\WINDOWS\System32\drivers\Dxapi.sys
Address: 0xBA5D3000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ew_usbenumfilter.sys
Address: 0xBAD88000
Size: 12288 bytes

Driver: C:\WINDOWS\System32\framebuf.dll
Address: 0xBFF70000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\ndistapi.sys
Address: 0xBAD40000
Size: 12288 bytes

Driver: C:\WINDOWS\system32\DRIVERS\rasacd.sys
Address: 0xBAD74000
Size: 12288 bytes

Driver: C:\WINDOWS\System32\Drivers\Beep.SYS
Address: 0xBADB6000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\dump_WMILIB.SYS
Address: 0xBADBC000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\Fs_Rec.SYS
Address: 0xBADB4000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\KDCOM.DLL
Address: 0xBADA8000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\Drivers\mnmdd.SYS
Address: 0xBADB8000
Size: 8192 bytes

Driver: C:\WINDOWS\System32\DRIVERS\RDPCDD.sys
Address: 0xBADBA000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\swenum.sys
Address: 0xBADB0000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\USBD.SYS
Address: 0xBADB2000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\WMILIB.SYS
Address: 0xBADAA000
Size: 8192 bytes

Driver: C:\WINDOWS\system32\DRIVERS\audstub.sys
Address: 0xBAECA000
Size: 4096 bytes

Driver: C:\WINDOWS\System32\drivers\dxgthk.sys
Address: 0xBAEFF000
Size: 4096 bytes

Driver: C:\WINDOWS\System32\Drivers\Null.SYS
Address: 0xBAF3D000
Size: 4096 bytes

Driver: pciide.sys
Address: 0xBAE70000
Size: 4096 bytes

==============================================
>Stealth
==============================================
>Files
==============================================
>Hooks

tcpip.sys-->ndis.sys-->NdisCloseAdapter, Type: IAT modification at address 0xBA2FD3A8 hook handler located in [vsdatant.sys]
tcpip.sys-->ndis.sys-->NdisOpenAdapter, Type: IAT modification at address 0xBA2FD3D4 hook handler located in [vsdatant.sys]
tcpip.sys-->ndis.sys-->NdisRegisterProtocol, Type: IAT modification at address 0xBA2FD3E0 hook handler located in [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisCloseAdapter, Type: IAT modification at address 0xBAA3DB4C hook handler located in [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisDeregisterProtocol, Type: IAT modification at address 0xBAA3DB1C hook handler located in [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisOpenAdapter, Type: IAT modification at address 0xBAA3DB3C hook handler located in [vsdatant.sys]
wanarp.sys-->ndis.sys-->NdisRegisterProtocol, Type: IAT modification at address 0xBAA3DB28 hook handler located in [vsdatant.sys]
[1028]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1028]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1056]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[108]wscntfy.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1256]wmiprvse.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->kernel32.dll-->GetProcAddress, Type: IAT modification at address 0x01001268 hook handler located in [shimeng.dll]
[1300]explorer.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1300]explorer.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->kernel32.dll-->SetUnhandledExceptionFilter, Type: Inline - RelativeJump at address 0x7C8449FD hook handler located in [ISWDMP.dll]
[140]ForceField.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[140]ForceField.exe-->user32.dll+0x000142A8, Type: Inline - RelativeJump at address 0x7E3742A8 hook handler located in [ISWSHEX.dll]
[1508]ISWSVC.exe-->kernel32.dll+0x00002C2C, Type: Inline - SEH at address 0x7C802C2C hook handler located in [unknown_code_page]
[1508]ISWSVC.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1508]ISWSVC.exe-->user32.dll+0x000142A8, Type: Inline - RelativeJump at address 0x7E3742A8 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1564]spoolsv.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1660]mscorsvw.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[1772]VmbService.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[240]alg.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[2504]wuauclt.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[3328]wpabaln.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[440]MobileBroadband.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[524]ctfmon.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[596]winlogon.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[640]services.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[640]services.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[640]services.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[640]services.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[640]services.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[640]services.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[640]services.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[640]services.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[652]lsass.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[812]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[900]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->advapi32.dll-->ImpersonateNamedPipeClient, Type: Inline - RelativeJump at address 0x77DA7416 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->advapi32.dll-->SetThreadToken, Type: Inline - RelativeJump at address 0x77DAF183 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->kernel32.dll-->OpenProcess, Type: Inline - RelativeJump at address 0x7C8309D1 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->ntdll.dll-->NtAccessCheckAndAuditAlarm, Type: Inline - RelativeJump at address 0x7C91CE70 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->ntdll.dll-->NtImpersonateAnonymousToken, Type: Inline - RelativeJump at address 0x7C91D3E0 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->ntdll.dll-->NtSetInformationObject, Type: Inline - RelativeJump at address 0x7C91DC80 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->user32.dll-->FindWindowA, Type: Inline - RelativeJump at address 0x7E3782E1 hook handler located in [ISWSHEX.dll]
[940]svchost.exe-->user32.dll-->FindWindowW, Type: Inline - RelativeJump at address 0x7E37C9C3 hook handler located in [ISWSHEX.dll]

Alt 19.12.2011, 21:48   #77
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



das kann doch aber nicht sein ...
ich schmeiss den pc weg und kauf mir nen neuen .. kann es sein, dass die sich so tief reingesetzt hat, dass es nicht mal mit Neuaufsetzen klappt, sie rauszuwerfen? .. sag
__________________


Alt 20.12.2011, 12:50   #78
markusg
/// Malware-holic
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



warum denn wer soll "sie" denn sein, das meiste sind funktion die von deiner firewall verwendet werden
vsdatant.sys
ist teil deiner firewall.
wie lautet denn die genaue meldung gibts ne ip dazu?
die logs sind alle sauber dein pc ist formatiert und damit ebenfalls ok oder sind noch auffälligkeiten festzustellen...
bitte weiter mit der absicherung
__________________
__________________

Alt 20.12.2011, 15:12   #79
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



na toll ..
"sie" ist die person, die zugang zu meinem rechner hatte

wenn sie sich im master boot record eingenistet hat, ist sie mit formatieren nicht draussen - warum sonst habe ich die gleichen meldungen wie vorher? warum meldet mir zonealarm ein netzwerk mit einer abweichenden ip von meiner?
warum hab ich immer noch die meldung von unhooker nach einem scan, dass "rootkit activity possible" ist und als warnung angegeben wird mit 27 ausrufezeichen?

die HD komplett formatieren und mit eine Special- Tool die MBR über ein Fly-on system restaurieren ... das wäre eine möglichkeit, die ich aber allein nicht durchziehen kann .. mist ist na klar, dass sie freien zugang zu meinem pc hatte und theoretisch auch alles mögliche in der hardware veranstaltet hat .. kann ich das irgendwie rauskriegen?


und ja - es gibt jedesmal eine ip .. wie gesagt, minimal abweichend von meiner, es handelt sich jeweils um die letzten zwei oder drei ziffern
ich werde dann noch nachsehen, ob wieder eine fb-meldung vorliegt, dass sich jemand eingeloggt hat in meiner abwesenheit - ansonsten .. ich hatte noch nie! vorher diese netzwerkmeldungen von zonealarm und ich arbeite schon immer mit zonealarm
wenn ich es ignoriere, hängt alles und nichts geht mehr .. ich habe zwei optionen.... die eine sagt (ich sags jetzt mal aus dem kopf, hab ja den text nicht original grad vor mir) ... ich kann gemeinsame ressourcen zulassen oder aber unabhängig und für andere aus dem netzwerk nicht sichtbar sein .. klar klicke ich immer das letztere an - sonst kann ich gar nichts mehr machen am pc .. das andere gefällt mir schon mal gar nicht

gestern hatte ich zonealarm installiert .. heute wars nicht mehr in der startleiste .. habe die exe nochmal gestartet und bekam eine meldung, dass sich möglicherweise schädliche software auf meinem pc befindet, die eine installation von zonealarm verhindern möchte - ich habe dann zugestimmt, diese software deinstallieren zu lassen (aber was heisst das schon) und somit ist es wieder da ... im moment wenigstens

Alt 20.12.2011, 15:19   #80
Santi
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



nein - fb-meldungen habe ich heute nicht, aber vielleicht hält sie ja auch nur die füsse still im moment

Markus ... habe ich eine möglichkeit, festzustellen, ob alles nur "komische" meldungen sind oder wirklich noch ein problem da ist... wie kann ich das testen?


Alt 20.12.2011, 15:28   #81
markusg
/// Malware-holic
 
Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - Standard

Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?



der mbr ist sauber den haben wir ja geprüft aber von mir aus können wir noch mal formatieren mit mbr bereinigung.
nimm die windows cd, lege sie ein starte neu.
am anfang drücke die taste r um in die reperatur konsole zu kommen, dort wähle die windows instalation, meistens ist das mit drücken der taste 1 möglich.
falls du ein passwort eingeben sollst, überspringe das mit enter.
dann schreibe:
fixmbr
enter
y bzw j zum bestätigen.
danach:
fixboot
enter
y bzw j drücken zum bestätigen
dann:
format c:
enter j bzw y zum bestätigen.
abwarten dann exit neustarten und windows neu instalieren dann gleich mit den updates los legen und emsisoft instalieren, noch keine der gesicherten daten auf den pc kopieren.
wenn emsisoft drauf ist weiter mit dem rest der anleitung.
__________________
--> Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?

Antwort

Themen zu Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?
andere, anderen, anderer, angemeldet, anmeldung, antwort, computer, interne, internet, internetstick, kein netzwerk, mail, melde, meldung, netzwerk, niemals, spanisch, stelle, stick, stimmen, suche, täglich, verändert, wirklich, überwachen, zonealarm, zugang




Ähnliche Themen: Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?


  1. Unbekannter Computername in Windows Netzwerk über Wlan
    Netzwerk und Hardware - 20.10.2015 (5)
  2. VIREN BEFALL? anderer PC im Netzwerk war befallen...
    Plagegeister aller Art und deren Bekämpfung - 31.08.2015 (2)
  3. Malware über Wlan Netzwerk
    Diskussionsforum - 20.08.2015 (18)
  4. Master Card Spam geöffnet - meldung: anderer pc hat dieselbe ip adresse!
    Plagegeister aller Art und deren Bekämpfung - 24.07.2014 (9)
  5. Über Lan mit W-Lan im Netzwerk ins Internet Windows XP
    Log-Analyse und Auswertung - 04.12.2013 (7)
  6. Meldung von ZoneAlarm: Trojan-Ransom.Win32.Foreign.fvto erkannt
    Plagegeister aller Art und deren Bekämpfung - 09.09.2013 (19)
  7. Weiterleitung über andere Adresse im Browser, gleiches Problem wie anderer Thread vom 10.3.2013
    Plagegeister aller Art und deren Bekämpfung - 21.04.2013 (9)
  8. Datensicherung bei Virenbefall über LAN-Netzwerk sicher?
    Plagegeister aller Art und deren Bekämpfung - 27.11.2012 (7)
  9. über eine lokales Netzwerk auf den Ordner Programme zugreifen
    Alles rund um Windows - 11.07.2011 (1)
  10. Fehler 815 bei Verbindung über DFÜ mit Netzwerk
    Netzwerk und Hardware - 12.09.2010 (0)
  11. Meldungen von ZoneAlarm über ausgehende Nachichten an Verschiedene Mailadressen.
    Plagegeister aller Art und deren Bekämpfung - 15.03.2008 (13)
  12. windows xp Netzwerk funktioniert nicht über NetBEUI
    Netzwerk und Hardware - 16.07.2007 (10)
  13. Seltsame Meldung von Zonealarm
    Antiviren-, Firewall- und andere Schutzprogramme - 28.05.2007 (4)
  14. Zonealarm läßt über Outlook keine Mails versenden
    Antiviren-, Firewall- und andere Schutzprogramme - 11.07.2003 (2)
  15. Zonealarm läßt über Outlook keine Mails versenden
    Antiviren-, Firewall- und andere Schutzprogramme - 11.07.2003 (1)
  16. ZONEALARM idiotische Meldung
    Antiviren-, Firewall- und andere Schutzprogramme - 30.04.2003 (5)
  17. privates Netzwerk-ZoneAlarm verbietet Client Zugang zum I-net
    Antiviren-, Firewall- und andere Schutzprogramme - 16.04.2003 (7)

Zum Thema Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? - RkUnhooker report generator v0.7 ============================================== Rootkit Unhooker kernel version: 3.7.300.501 ============================================== Windows Major Version: 5 Windows Minor Version: 1 Windows Build Number: 2600 ============================================== >SSDT State NtConnectPort Actual Address 0xBA2122F4 - Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP?...
Archiv
Du betrachtest: Bei Anmeldung: ZoneAlarm-Meldung über ein Netzwerk mit anderer IP? auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.