Zurück   Trojaner-Board > Malware entfernen > Plagegeister aller Art und deren Bekämpfung

Plagegeister aller Art und deren Bekämpfung: Windows-Verschlüsselungs-Trojaner auf Win7

Windows 7 Wenn Du nicht sicher bist, ob Du dir Malware oder Trojaner eingefangen hast, erstelle hier ein Thema. Ein Experte wird sich mit weiteren Anweisungen melden und Dir helfen die Malware zu entfernen oder Unerwünschte Software zu deinstallieren bzw. zu löschen. Bitte schildere dein Problem so genau wie möglich. Sollte es ein Trojaner oder Viren Problem sein wird ein Experte Dir bei der Beseitigug der Infektion helfen.

 
Alt 12.06.2012, 14:31   #1
McManaman
 
Windows-Verschlüsselungs-Trojaner auf Win7 - Standard

Windows-Verschlüsselungs-Trojaner auf Win7



Hallo,
auch wir haben uns den Trojaner eingefangen.

System: Windows 7, 32bit-Version

Hier die Daten des Scans:
Code:
ATTFilter
 Malwarebytes Anti-Malware  (Test) 1.61.0.1400
www.malwarebytes.org
 
Datenbank Version: v2012.06.12.03
 
Windows 7 x86 NTFS (Abgesichertenmodus/Netzwerkfähig)
Internet Explorer 9.0.8112.16421
Ari :: ARI-MSI [Administrator]
 
Schutz: Deaktiviert
 
12.06.2012 14:46:40
mbam-log-2012-06-12 (14-46-40).txt
 
Art des Suchlaufs: Vollständiger Suchlauf
Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM
Deaktivierte Suchlaufeinstellungen: P2P
Durchsuchte Objekte: 366120
Laufzeit: 33 Minute(n), 47 Sekunde(n)
 
Infizierte Speicherprozesse: 0
(Keine bösartigen Objekte gefunden)
 
Infizierte Speichermodule: 0
(Keine bösartigen Objekte gefunden)
 
Infizierte Registrierungsschlüssel: 0
(Keine bösartigen Objekte gefunden)
 
Infizierte Registrierungswerte: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|1470A94A (Trojan.Agent.SZ) -> Daten: C:\Users\Ari\AppData\Roaming\Xell\6BB6EB991470A94AFBEA.exe -> Erfolgreich gelöscht und in Quarantäne gestellt.
 
Infizierte Dateiobjekte der Registrierung: 0
(Keine bösartigen Objekte gefunden)
 
Infizierte Verzeichnisse: 0
(Keine bösartigen Objekte gefunden)
 
Infizierte Dateien: 2
C:\Users\Ari\AppData\Roaming\Xell\6BB6EB991470A94AFBEA.exe (Trojan.Agent.SZ) -> Erfolgreich gelöscht und in Quarantäne gestellt.
D:\DecryptHelper-0.5.3.exe (Trojan.FakeAlert) -> Erfolgreich gelöscht und in Quarantäne gestellt.
 
(Ende)
         
Wie gehts jetzt weiter? Danke für die Hilfe.

Gruß
Dennis

Nach dem verschieben der Funde in Quarantäne kann ich zumindest wieder im normalen Windows-Modus arbeiten, ohne dass das Fenster zum bezahlen kommt.

OTL.txt

Code:
ATTFilter
OTL logfile created on: 6/13/2012 2:19:37 PM - Run 1
OTL by OldTimer - Version 3.2.48.0     Folder = C:\Users\Ari\Desktop
 Home Premium Edition  (Version = 6.1.7600) - Type = NTWorkstation
Internet Explorer (Version = 9.0.8112.16421)
Locale: 00000409 | Country: Deutschland | Language: DEU | Date Format: dd.MM.yyyy
 
3.17 Gb Total Physical Memory | 2.10 Gb Available Physical Memory | 66.40% Memory free
6.34 Gb Paging File | 5.01 Gb Available in Paging File | 79.10% Paging File free
Paging file location(s): ?:\pagefile.sys [binary data]
 
%SystemDrive% = C: | %SystemRoot% = C:\windows | %ProgramFiles% = C:\Program Files
Drive C: | 273.39 Gb Total Space | 229.00 Gb Free Space | 83.76% Space Free | Partition Type: NTFS
Drive D: | 182.27 Gb Total Space | 168.82 Gb Free Space | 92.62% Space Free | Partition Type: NTFS
 
Computer Name: ARI-MSI | User Name: Ari | Logged in as Administrator.
Boot Mode: Normal | Scan Mode: Current user | Quick Scan
Company Name Whitelist: On | Skip Microsoft Files: On | No Company Name Whitelist: On | File Age = 30 Days
 
========== Processes (SafeList) ==========
 
PRC - [2012/06/13 14:11:22 | 000,596,480 | ---- | M] (OldTimer Tools) -- C:\Users\Ari\Desktop\OTL.exe
PRC - [2012/05/02 01:42:28 | 000,086,224 | ---- | M] (Avira Operations GmbH & Co. KG) -- C:\Program Files\Avira\AntiVir Desktop\sched.exe
PRC - [2012/05/02 00:55:21 | 000,465,360 | ---- | M] (Avira Operations GmbH & Co. KG) -- C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE
PRC - [2012/05/02 00:34:34 | 000,110,032 | ---- | M] (Avira Operations GmbH & Co. KG) -- C:\Program Files\Avira\AntiVir Desktop\avguard.exe
PRC - [2012/05/02 00:31:35 | 000,348,624 | ---- | M] (Avira Operations GmbH & Co. KG) -- C:\Program Files\Avira\AntiVir Desktop\avgnt.exe
PRC - [2012/04/24 02:11:55 | 000,080,336 | ---- | M] (Avira Operations GmbH & Co. KG) -- C:\Program Files\Avira\AntiVir Desktop\avshadow.exe
PRC - [2012/04/18 11:56:22 | 001,557,160 | ---- | M] (Ask) -- C:\Program Files\Ask.com\Updater\Updater.exe
PRC - [2012/04/04 15:56:40 | 000,654,408 | ---- | M] (Malwarebytes Corporation) -- C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
PRC - [2012/03/31 04:38:14 | 003,521,424 | ---- | M] (Samsung Electronics Co., Ltd.) -- C:\Program Files\Samsung\Kies\KiesTrayAgent.exe
PRC - [2012/03/31 04:38:12 | 000,954,256 | ---- | M] (Samsung) -- C:\Program Files\Samsung\Kies\KiesHelper.exe
PRC - [2012/03/28 22:12:02 | 000,694,784 | ---- | M] (Mobileleader Co., Ltd.) -- C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe
PRC - [2012/03/28 22:11:58 | 000,140,800 | ---- | M] (Mobileleader Co., Ltd.) -- C:\Program Files\Samsung\Kies\External\DeviceModules\ConnectionManager.exe
PRC - [2012/01/17 11:07:58 | 000,505,736 | ---- | M] (Sun Microsystems, Inc.) -- C:\Program Files\Common Files\Java\Java Update\jucheck.exe
PRC - [2011/07/16 06:31:12 | 000,271,360 | ---- | M] (Microsoft Corporation) -- C:\Windows\System32\conhost.exe
PRC - [2011/07/04 14:43:51 | 000,042,184 | ---- | M] (AVAST Software) -- C:\Program Files\AVAST Software\Avast\AvastSvc.exe
PRC - [2011/02/26 07:33:07 | 002,614,784 | ---- | M] (Microsoft Corporation) -- C:\Windows\explorer.exe
PRC - [2010/03/18 11:19:26 | 000,113,152 | ---- | M] (ArcSoft Inc.) -- C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
PRC - [2009/12/17 02:00:40 | 002,396,160 | ---- | M] (Micro-Star International Co., Ltd.) -- C:\Program Files\System Control Manager\MGSysCtrl.exe
PRC - [2009/12/09 19:15:21 | 000,368,640 | ---- | M] (AMD) -- C:\Windows\System32\atieclxx.exe
PRC - [2009/12/09 19:14:52 | 000,172,032 | ---- | M] (AMD) -- C:\Windows\System32\atiesrxx.exe
PRC - [2009/10/13 21:25:54 | 000,186,904 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe
PRC - [2009/10/13 21:25:30 | 000,354,840 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe
PRC - [2009/09/30 14:01:32 | 002,320,920 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe
PRC - [2009/09/30 14:01:30 | 000,268,824 | ---- | M] (Intel Corporation) -- C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
PRC - [2009/07/14 03:14:42 | 000,049,152 | ---- | M] (Microsoft Corporation) -- C:\Windows\System32\taskhost.exe
PRC - [2009/07/10 01:54:42 | 000,160,768 | ---- | M] (Micro-Star International Co., Ltd.) -- C:\Program Files\System Control Manager\MSIService.exe
 
 
========== Modules (No Company Name) ==========
 
MOD - [2012/05/12 09:21:21 | 002,295,296 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Core\c366ebd7f33816762268154efc68176d\System.Core.ni.dll
MOD - [2012/05/09 19:00:53 | 000,368,128 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFramewo#\fc626095c194be137bceb219934b06a7\PresentationFramework.Aero.ni.dll
MOD - [2012/05/09 19:00:52 | 000,212,992 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.ServiceProce#\c06efd2e3e05e4e3231904d543240c20\System.ServiceProcess.ni.dll
MOD - [2012/05/09 19:00:36 | 011,824,128 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Web\fe88a64f62eb6afc6dfc945fc335b92b\System.Web.ni.dll
MOD - [2012/05/09 19:00:23 | 000,771,584 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Runtime.Remo#\0c00b1a8336dd4c1bd1ebce7780f20b4\System.Runtime.Remoting.ni.dll
MOD - [2012/05/09 19:00:20 | 000,628,224 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.EnterpriseSe#\558fa6c6131f14af258f94291a5d19d6\System.EnterpriseServices.ni.dll
MOD - [2012/05/09 19:00:17 | 000,627,200 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Transactions\61fbbd8bc7d76972115b292b132ff2d1\System.Transactions.ni.dll
MOD - [2012/05/09 19:00:14 | 006,618,624 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Data\294d439cfe959b5528ca81d37d3d502f\System.Data.ni.dll
MOD - [2012/05/09 18:59:38 | 014,325,760 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\PresentationFramewo#\64e140108933b8090472da1a76b78c20\PresentationFramework.ni.dll
MOD - [2012/05/09 18:59:22 | 012,433,920 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Windows.Forms\9e953ea4e76b62ab1c4a1874abae2961\System.Windows.Forms.ni.dll
MOD - [2012/05/09 18:59:15 | 001,586,688 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Drawing\bbf2cf8dd0409f1ccc989406e2942dac\System.Drawing.ni.dll
MOD - [2012/05/09 18:59:11 | 012,218,880 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\PresentationCore\b6370d1903505abc171c968e357fe1bf\PresentationCore.ni.dll
MOD - [2012/05/09 18:59:01 | 003,325,952 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\WindowsBase\b68fdf2c95b93fc5006a092c11eed07c\WindowsBase.ni.dll
MOD - [2012/05/09 18:58:55 | 005,453,312 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Xml\5c85c9c42e1b8a8760de82ecb4c7d582\System.Xml.ni.dll
MOD - [2012/05/09 18:58:51 | 000,971,264 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System.Configuration\cb079eab134fd1a752ad91db13274110\System.Configuration.ni.dll
MOD - [2012/05/09 18:58:49 | 007,952,384 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\System\2ebb3c259eab50af565e3a8dba6ad20e\System.ni.dll
MOD - [2012/05/09 18:58:38 | 011,490,816 | ---- | M] () -- C:\windows\assembly\NativeImages_v2.0.50727_32\mscorlib\5858678a79aae31262b0214424245d06\mscorlib.ni.dll
MOD - [2012/03/30 03:23:38 | 000,079,872 | ---- | M] () -- C:\Program Files\Samsung\Kies\Common\Kies.Common.DeviceServiceLib.FileService.dll
MOD - [2012/03/30 03:21:48 | 014,144,512 | ---- | M] () -- C:\Program Files\Samsung\Kies\Theme\Kies.Theme.dll
MOD - [2012/03/30 03:21:18 | 000,486,912 | ---- | M] () -- C:\Program Files\Samsung\Kies\Common\Kies.UI.dll
MOD - [2012/03/30 03:21:12 | 000,034,304 | ---- | M] () -- C:\Program Files\Samsung\Kies\Common\Kies.Common.DeviceServiceLib.Interface.dll
MOD - [2012/03/29 18:44:34 | 000,022,528 | ---- | M] () -- C:\Program Files\Samsung\Kies\MVVM\Kies.MVVM.dll
MOD - [2012/03/28 22:13:12 | 000,037,376 | ---- | M] () -- C:\Program Files\Samsung\Kies\Common\ASF_cSharpAPI.dll
MOD - [2012/03/28 22:12:04 | 000,839,680 | ---- | M] () -- C:\Program Files\Samsung\Kies\External\System.Data.SQLite.dll
MOD - [2012/03/28 22:12:00 | 000,712,704 | ---- | M] () -- C:\Program Files\Samsung\Kies\External\DeviceModules\SHOWDRM_UCC.dll
MOD - [2012/03/28 22:11:58 | 000,237,568 | ---- | M] () -- C:\Program Files\Samsung\Kies\External\DeviceModules\drmcm.dll
MOD - [2012/03/28 22:11:28 | 000,720,896 | ---- | M] () -- C:\Program Files\Samsung\Kies\External\MediaModules\LDBCShConv.dll
MOD - [2010/01/29 23:30:10 | 000,249,856 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\PresentationFramework.resources\3.0.0.0_de_31bf3856ad364e35\PresentationFramework.resources.dll
MOD - [2010/01/29 23:30:00 | 000,049,152 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\System.Configuration.resources\2.0.0.0_de_b03f5f7f11d50a3a\System.Configuration.resources.dll
MOD - [2010/01/29 23:29:59 | 000,167,936 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\System.Xml.resources\2.0.0.0_de_b77a5c561934e089\System.Xml.resources.dll
MOD - [2010/01/29 23:29:56 | 000,434,176 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\System.Windows.Forms.resources\2.0.0.0_de_b77a5c561934e089\System.Windows.Forms.resources.dll
MOD - [2010/01/29 23:29:55 | 000,315,392 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\mscorlib.resources\2.0.0.0_de_b77a5c561934e089\mscorlib.resources.dll
MOD - [2010/01/29 23:29:53 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\System.ServiceProcess.resources\2.0.0.0_de_b03f5f7f11d50a3a\System.ServiceProcess.resources.dll
MOD - [2010/01/29 23:20:28 | 000,372,736 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Caste.Graphics.Runtime\2.0.3630.42316__90ba9c70f846762e\CLI.Caste.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:28 | 000,204,800 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.InfoCentre.Graphics.Wizard\2.0.3630.42335__90ba9c70f846762e\CLI.Aspect.InfoCentre.Graphics.Wizard.dll
MOD - [2010/01/29 23:20:28 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Caste.Graphics.Wizard\2.0.3630.42330__90ba9c70f846762e\CLI.Caste.Graphics.Wizard.dll
MOD - [2010/01/29 23:20:27 | 001,708,032 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DisplaysManager2.Graphics.Wizard\2.0.3630.42432__90ba9c70f846762e\CLI.Aspect.DisplaysManager2.Graphics.Wizard.dll
MOD - [2010/01/29 23:20:27 | 000,827,392 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.MMVideo.Graphics.Dashboard\2.0.3630.42360__90ba9c70f846762e\CLI.Aspect.MMVideo.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:27 | 000,491,520 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.TransCode.Graphics.Wizard\2.0.3630.42404__90ba9c70f846762e\CLI.Aspect.TransCode.Graphics.Wizard.dll
MOD - [2010/01/29 23:20:27 | 000,409,600 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.MMVideo.Graphics.Wizard\2.0.3630.42380__90ba9c70f846762e\CLI.Aspect.MMVideo.Graphics.Wizard.dll
MOD - [2010/01/29 23:20:27 | 000,356,352 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.Radeon3D.Graphics.Dashboard\2.0.3630.42371__90ba9c70f846762e\CLI.Aspect.Radeon3D.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:27 | 000,196,608 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.InfoCentre.Graphics.Dashboard\2.0.3630.42335__90ba9c70f846762e\CLI.Aspect.InfoCentre.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:27 | 000,118,784 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.PowerPlayDPPE.Graphics.Dashboard\2.0.3630.42403__90ba9c70f846762e\CLI.Aspect.PowerPlayDPPE.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:27 | 000,102,400 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.PowerXpress.Graphics.Dashboard\2.0.3630.42413__90ba9c70f846762e\CLI.Aspect.PowerXpress.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:27 | 000,098,304 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.MMVideo.Graphics.Runtime\2.0.3630.42359__90ba9c70f846762e\CLI.Aspect.MMVideo.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:27 | 000,094,208 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.Radeon3D.Graphics.Wizard\2.0.3630.42372__90ba9c70f846762e\CLI.Aspect.Radeon3D.Graphics.Wizard.dll
MOD - [2010/01/29 23:20:27 | 000,094,208 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DisplaysOptions.Graphics.Dashboard\2.0.3630.42364__90ba9c70f846762e\CLI.Aspect.DisplaysOptions.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:27 | 000,077,824 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceTV.Graphics.Runtime\2.0.3630.42385__90ba9c70f846762e\CLI.Aspect.DeviceTV.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:27 | 000,073,728 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Caste.Graphics.Dashboard\2.0.3630.42324__90ba9c70f846762e\CLI.Caste.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:27 | 000,065,536 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.Welcome.Graphics.Dashboard\2.0.3630.42404__90ba9c70f846762e\CLI.Aspect.Welcome.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:27 | 000,065,536 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.Radeon3D.Graphics.Runtime\2.0.3630.42371__90ba9c70f846762e\CLI.Aspect.Radeon3D.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:27 | 000,065,536 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceCV.Graphics.Runtime\2.0.3630.42367__90ba9c70f846762e\CLI.Aspect.DeviceCV.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:27 | 000,057,344 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.CrossFireX.Graphics.Dashboard\2.0.3630.42427__90ba9c70f846762e\CLI.Aspect.CrossFireX.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:27 | 000,045,056 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.PowerPlayDPPE.Graphics.Runtime\2.0.3630.42403__90ba9c70f846762e\CLI.Aspect.PowerPlayDPPE.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:27 | 000,045,056 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceProperty.Graphics.Runtime\2.0.3630.42358__90ba9c70f846762e\CLI.Aspect.DeviceProperty.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:27 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.HotkeysHandling.Graphics.Runtime\2.0.3630.42325__90ba9c70f846762e\CLI.Aspect.HotkeysHandling.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:27 | 000,019,968 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.PowerXpress.Graphics.Runtime\2.0.3630.42413__90ba9c70f846762e\CLI.Aspect.PowerXpress.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:27 | 000,013,312 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.Welcome.Graphics.Runtime\2.0.3630.42432__90ba9c70f846762e\CLI.Aspect.Welcome.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:26 | 001,142,784 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DisplaysManager2.Graphics.Dashboard\2.0.3630.42428__90ba9c70f846762e\CLI.Aspect.DisplaysManager2.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:26 | 000,573,440 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DisplaysColour2.Graphics.Dashboard\2.0.3630.42336__90ba9c70f846762e\CLI.Aspect.DisplaysColour2.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:26 | 000,393,216 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceCRT.Graphics.Dashboard\2.0.3630.42359__90ba9c70f846762e\CLI.Aspect.DeviceCRT.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:26 | 000,372,736 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceDFP.Graphics.Dashboard\2.0.3630.42354__90ba9c70f846762e\CLI.Aspect.DeviceDFP.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:26 | 000,323,584 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceLCD.Graphics.Dashboard\2.0.3630.42366__90ba9c70f846762e\CLI.Aspect.DeviceLCD.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:26 | 000,307,200 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceLCD.Graphics.Wizard\2.0.3630.42340__90ba9c70f846762e\CLI.Aspect.DeviceLCD.Graphics.Wizard.dll
MOD - [2010/01/29 23:20:26 | 000,270,336 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.CrossDisplay.Graphics.Dashboard\1.0.0.0__90ba9c70f846762e\CLI.Aspect.CrossDisplay.Graphics.Dashboard.dll
MOD - [2010/01/29 23:20:26 | 000,151,552 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Caste.Graphics.Shared\2.0.3622.19963__90ba9c70f846762e\CLI.Caste.Graphics.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,098,304 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Foundation\2.0.3622.19963__90ba9c70f846762e\CLI.Foundation.dll
MOD - [2010/01/29 23:20:26 | 000,065,536 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceDFP.Graphics.Runtime\2.0.3630.42358__90ba9c70f846762e\CLI.Aspect.DeviceDFP.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:26 | 000,045,056 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\DEM.Graphics.I0601\2.0.2573.17685__90ba9c70f846762e\DEM.Graphics.I0601.dll
MOD - [2010/01/29 23:20:26 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.TransCode.Graphics.Shared\2.0.3622.19973__90ba9c70f846762e\CLI.Aspect.TransCode.Graphics.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DisplaysOptions.Graphics.Runtime\2.0.3630.42364__90ba9c70f846762e\CLI.Aspect.DisplaysOptions.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:26 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DisplaysColour2.Graphics.Runtime\2.0.3630.42340__90ba9c70f846762e\CLI.Aspect.DisplaysColour2.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:26 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceCRT.Graphics.Runtime\2.0.3630.42359__90ba9c70f846762e\CLI.Aspect.DeviceCRT.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:26 | 000,036,864 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceLCD.Graphics.Runtime\2.0.3630.42365__90ba9c70f846762e\CLI.Aspect.DeviceLCD.Graphics.Runtime.dll
MOD - [2010/01/29 23:20:26 | 000,032,768 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\LOG.Foundation\2.0.3622.19962__90ba9c70f846762e\LOG.Foundation.dll
MOD - [2010/01/29 23:20:26 | 000,028,672 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\NEWAEM.Foundation\2.0.3622.19963__90ba9c70f846762e\NEWAEM.Foundation.dll
MOD - [2010/01/29 23:20:26 | 000,028,672 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Foundation.XManifest\2.0.3622.19993__90ba9c70f846762e\CLI.Foundation.XManifest.dll
MOD - [2010/01/29 23:20:26 | 000,024,576 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Dashboard.Shared\2.0.3622.19964__90ba9c70f846762e\CLI.Component.Dashboard.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Wizard.Shared\2.0.3622.19964__90ba9c70f846762e\CLI.Component.Wizard.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Client.Shared\2.0.3622.19963__90ba9c70f846762e\CLI.Component.Client.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.Welcome.Graphics.Shared\2.0.3622.19973__90ba9c70f846762e\CLI.Aspect.Welcome.Graphics.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Plugin.Hotkeys.Shared\2.0.3622.19965__90ba9c70f846762e\AEM.Plugin.Hotkeys.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Actions.CCAA.Shared\2.0.3622.19964__90ba9c70f846762e\AEM.Actions.CCAA.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\MOM.Foundation\2.0.3622.19965__90ba9c70f846762e\MOM.Foundation.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\DEM.Graphics.I0706\2.0.2743.23304__90ba9c70f846762e\DEM.Graphics.I0706.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\DEM.Graphics.I0702\2.0.2594.25693__90ba9c70f846762e\DEM.Graphics.I0702.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\DEM.Graphics\2.0.3622.19974__90ba9c70f846762e\DEM.Graphics.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\DEM.Foundation\2.0.2573.17684__90ba9c70f846762e\DEM.Foundation.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Runtime.Shared\2.0.3622.19965__90ba9c70f846762e\CLI.Component.Runtime.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Caste.Graphics.Wizard.Shared\2.0.3622.19971__90ba9c70f846762e\CLI.Caste.Graphics.Wizard.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Caste.Graphics.Dashboard.Shared\2.0.3622.19966__90ba9c70f846762e\CLI.Caste.Graphics.Dashboard.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Plugin.WinMessages.Shared\2.0.3622.19966__90ba9c70f846762e\AEM.Plugin.WinMessages.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Plugin.REG.Shared\2.0.3622.19978__90ba9c70f846762e\AEM.Plugin.REG.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Plugin.GD.Shared\2.0.3622.19975__90ba9c70f846762e\AEM.Plugin.GD.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Plugin.EEU.Shared\2.0.3622.19967__90ba9c70f846762e\AEM.Plugin.EEU.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Plugin.DPPE.Shared\2.0.3622.19974__90ba9c70f846762e\AEM.Plugin.DPPE.Shared.dll
MOD - [2010/01/29 23:20:26 | 000,007,168 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\atixclib\1.0.0.0__90ba9c70f846762e\atixclib.dll
MOD - [2010/01/29 23:20:25 | 001,220,608 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Dashboard\2.0.3630.42320__90ba9c70f846762e\CLI.Component.Dashboard.dll
MOD - [2010/01/29 23:20:25 | 000,741,376 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\ResourceManagement.Foundation.Implementation\2.0.3630.42427__90ba9c70f846762e\ResourceManagement.Foundation.Implementation.dll
MOD - [2010/01/29 23:20:25 | 000,565,248 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Systemtray\2.0.3630.42393__90ba9c70f846762e\CLI.Component.Systemtray.dll
MOD - [2010/01/29 23:20:25 | 000,405,504 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Wizard\2.0.3630.42329__90ba9c70f846762e\CLI.Component.Wizard.dll
MOD - [2010/01/29 23:20:25 | 000,106,496 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\MOM.Implementation\2.0.3630.42398__90ba9c70f846762e\MOM.Implementation.dll
MOD - [2010/01/29 23:20:25 | 000,065,536 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\LOG.Foundation.Implementation\2.0.3630.42397__90ba9c70f846762e\LOG.Foundation.Implementation.dll
MOD - [2010/01/29 23:20:25 | 000,065,536 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceTV.Graphics.Shared\2.0.3622.19968__90ba9c70f846762e\CLI.Aspect.DeviceTV.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,061,440 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Runtime\2.0.3630.42314__90ba9c70f846762e\CLI.Component.Runtime.dll
MOD - [2010/01/29 23:20:25 | 000,061,440 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.MMVideo.Graphics.Shared\2.0.3622.19966__90ba9c70f846762e\CLI.Aspect.MMVideo.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,061,440 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\APM.Server\2.0.3630.42312__90ba9c70f846762e\APM.Server.dll
MOD - [2010/01/29 23:20:25 | 000,057,344 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.SkinFactory\2.0.3630.42315__90ba9c70f846762e\CLI.Component.SkinFactory.dll
MOD - [2010/01/29 23:20:25 | 000,057,344 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.Radeon3D.Graphics.Shared\2.0.3622.19977__90ba9c70f846762e\CLI.Aspect.Radeon3D.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,053,248 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceDFP.Graphics.Shared\2.0.3622.19966__90ba9c70f846762e\CLI.Aspect.DeviceDFP.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,053,248 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceCRT.Graphics.Shared\2.0.3622.19970__90ba9c70f846762e\CLI.Aspect.DeviceCRT.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,045,056 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Runtime.Shared.Private\2.0.3622.19967__90ba9c70f846762e\CLI.Component.Runtime.Shared.Private.dll
MOD - [2010/01/29 23:20:25 | 000,045,056 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Server\2.0.3630.42313__90ba9c70f846762e\AEM.Server.dll
MOD - [2010/01/29 23:20:25 | 000,045,056 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Plugin.Source.Kit.Server\2.0.3630.42409__90ba9c70f846762e\AEM.Plugin.Source.Kit.Server.dll
MOD - [2010/01/29 23:20:25 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Foundation.Private\2.0.3622.19963__90ba9c70f846762e\CLI.Foundation.Private.dll
MOD - [2010/01/29 23:20:25 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Client.Shared.Private\2.0.3622.19964__90ba9c70f846762e\CLI.Component.Client.Shared.Private.dll
MOD - [2010/01/29 23:20:25 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceProperty.Graphics.Shared\2.0.3622.19965__90ba9c70f846762e\CLI.Aspect.DeviceProperty.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,040,960 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceCV.Graphics.Shared\2.0.3622.19967__90ba9c70f846762e\CLI.Aspect.DeviceCV.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,036,864 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\LOG.Foundation.Private\2.0.3622.19963__90ba9c70f846762e\LOG.Foundation.Private.dll
MOD - [2010/01/29 23:20:25 | 000,032,768 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\ATICCCom\2.0.0.0__90ba9c70f846762e\ATICCCom.dll
MOD - [2010/01/29 23:20:25 | 000,028,672 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.PowerPlayDPPE.Graphics.Shared\2.0.3622.19972__90ba9c70f846762e\CLI.Aspect.PowerPlayDPPE.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,028,672 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DisplaysColour2.Graphics.Shared\2.0.3622.19971__90ba9c70f846762e\CLI.Aspect.DisplaysColour2.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,028,672 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DeviceLCD.Graphics.Shared\2.0.3622.19974__90ba9c70f846762e\CLI.Aspect.DeviceLCD.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,028,672 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.CustomFormats.Graphics.Shared\2.0.3622.19964__90ba9c70f846762e\CLI.Aspect.CustomFormats.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,024,576 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Wizard.Shared.Private\2.0.3622.19965__90ba9c70f846762e\CLI.Component.Wizard.Shared.Private.dll
MOD - [2010/01/29 23:20:25 | 000,024,576 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.PowerXpress.Graphics.Shared\2.0.3622.19977__90ba9c70f846762e\CLI.Aspect.PowerXpress.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,024,576 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.DisplaysOptions.Graphics.Shared\2.0.3622.19968__90ba9c70f846762e\CLI.Aspect.DisplaysOptions.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\ResourceManagement.Foundation.Private\2.0.3622.19964__90ba9c70f846762e\ResourceManagement.Foundation.Private.dll
MOD - [2010/01/29 23:20:25 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\LOG.Foundation.Implementation.Private\2.0.3622.19967__90ba9c70f846762e\LOG.Foundation.Implementation.Private.dll
MOD - [2010/01/29 23:20:25 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Dashboard.Shared.Private\2.0.3622.19967__90ba9c70f846762e\CLI.Component.Dashboard.Shared.Private.dll
MOD - [2010/01/29 23:20:25 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Caste.Graphics.Runtime.Shared.Private\2.0.3622.19968__90ba9c70f846762e\CLI.Caste.Graphics.Runtime.Shared.Private.dll
MOD - [2010/01/29 23:20:25 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Aspect.HotkeysHandling.Graphics.Shared\2.0.3622.19965__90ba9c70f846762e\CLI.Aspect.HotkeysHandling.Graphics.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,020,480 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\APM.Foundation\2.0.3622.19967__90ba9c70f846762e\APM.Foundation.dll
MOD - [2010/01/29 23:20:25 | 000,019,456 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CCC.Implementation\2.0.3630.42398__90ba9c70f846762e\CCC.Implementation.dll
MOD - [2010/01/29 23:20:25 | 000,016,384 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\AEM.Server.Shared\2.0.3622.19965__90ba9c70f846762e\AEM.Server.Shared.dll
MOD - [2010/01/29 23:20:25 | 000,007,168 | ---- | M] () -- C:\windows\assembly\GAC_MSIL\CLI.Component.Runtime.Extension.EEU\2.0.3630.42313__90ba9c70f846762e\CLI.Component.Runtime.Extension.EEU.dll
MOD - [2009/08/31 23:56:04 | 000,016,384 | R--- | M] () -- C:\Program Files\ATI Technologies\ATI.ACE\Branding\Branding.dll
MOD - [2009/06/10 23:23:19 | 000,261,632 | ---- | M] () -- C:\windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll
MOD - [2009/06/10 23:23:17 | 002,933,248 | ---- | M] () -- C:\windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll
MOD - [2006/09/14 09:20:24 | 000,126,464 | ---- | M] () -- C:\Program Files\WinRAR 3.61 Multi\rarext.dll
 
 
========== Win32 Services (SafeList) ==========
 
SRV - [2012/05/02 01:42:28 | 000,086,224 | ---- | M] (Avira Operations GmbH & Co. KG) [Auto | Running] -- C:\Program Files\Avira\AntiVir Desktop\sched.exe -- (AntiVirSchedulerService)
SRV - [2012/05/02 00:55:21 | 000,465,360 | ---- | M] (Avira Operations GmbH & Co. KG) [Auto | Running] -- C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE -- (AntiVirWebService)
SRV - [2012/05/02 00:34:34 | 000,110,032 | ---- | M] (Avira Operations GmbH & Co. KG) [Auto | Running] -- C:\Program Files\Avira\AntiVir Desktop\avguard.exe -- (AntiVirService)
SRV - [2012/04/04 15:56:40 | 000,654,408 | ---- | M] (Malwarebytes Corporation) [Auto | Running] -- C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe -- (MBAMService)
SRV - [2011/07/04 14:43:51 | 000,042,184 | ---- | M] (AVAST Software) [Auto | Start_Pending] -- C:\Program Files\AVAST Software\Avast\AvastSvc.exe -- (avast! Antivirus)
SRV - [2010/03/18 11:19:26 | 000,113,152 | ---- | M] (ArcSoft Inc.) [Auto | Running] -- C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe -- (ACDaemon)
SRV - [2009/12/09 19:14:52 | 000,172,032 | ---- | M] (AMD) [Auto | Running] -- C:\Windows\System32\atiesrxx.exe -- (AMD External Events Utility)
SRV - [2009/10/13 21:25:30 | 000,354,840 | ---- | M] (Intel Corporation) [Auto | Running] -- C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe -- (IAANTMON) Intel(R)
SRV - [2009/09/30 14:01:32 | 002,320,920 | ---- | M] (Intel Corporation) [Auto | Running] -- C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe -- (UNS) Intel(R)
SRV - [2009/09/30 14:01:30 | 000,268,824 | ---- | M] (Intel Corporation) [Auto | Running] -- C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe -- (LMS) Intel(R)
SRV - [2009/07/14 03:16:13 | 000,025,088 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Windows\System32\sensrsvc.dll -- (SensrSvc)
SRV - [2009/07/14 03:15:41 | 000,680,960 | ---- | M] (Microsoft Corporation) [On_Demand | Stopped] -- C:\Program Files\Windows Defender\mpsvc.dll -- (WinDefend)
SRV - [2009/07/10 01:54:42 | 000,160,768 | ---- | M] (Micro-Star International Co., Ltd.) [Auto | Running] -- C:\Program Files\System Control Manager\MSIService.exe -- (Micro Star SCM)
SRV - [2007/05/31 16:21:24 | 000,379,784 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Windows\WindowsMobile\wcescomm.dll -- (WcesComm)
SRV - [2007/05/31 16:21:18 | 000,183,688 | ---- | M] (Microsoft Corporation) [Auto | Running] -- C:\Windows\WindowsMobile\rapimgr.dll -- (RapiMgr)
 
 
========== Driver Services (SafeList) ==========
 
DRV - File not found [Kernel | System | Stopped] --  -- (aswTdi)
DRV - File not found [File_System | Auto | Stopped] -- aswFsBlk.sys -- (aswFsBlk)
DRV - [2012/04/27 10:20:04 | 000,137,928 | ---- | M] (Avira GmbH) [Kernel | System | Running] -- C:\Windows\System32\drivers\avipbb.sys -- (avipbb)
DRV - [2012/04/25 00:32:27 | 000,083,392 | ---- | M] (Avira GmbH) [File_System | Auto | Running] -- C:\Windows\System32\drivers\avgntflt.sys -- (avgntflt)
DRV - [2012/04/16 21:17:40 | 000,036,000 | ---- | M] (Avira GmbH) [Kernel | System | Running] -- C:\Windows\System32\drivers\avkmgr.sys -- (avkmgr)
DRV - [2012/04/04 15:56:40 | 000,022,344 | ---- | M] (Malwarebytes Corporation) [File_System | On_Demand | Running] -- C:\Windows\System32\drivers\mbam.sys -- (MBAMProtector)
DRV - [2012/03/11 19:25:26 | 000,242,240 | ---- | M] (DT Soft Ltd) [Kernel | System | Running] -- C:\Windows\System32\drivers\dtsoftbus01.sys -- (dtsoftbus01)
DRV - [2011/07/04 14:36:43 | 000,441,176 | ---- | M] (AVAST Software) [File_System | System | Stopped] -- C:\windows\System32\drivers\aswSnx.sys -- (aswSnx)
DRV - [2011/07/04 14:36:32 | 000,309,848 | ---- | M] (AVAST Software) [Kernel | System | Running] -- C:\windows\System32\drivers\aswSP.sys -- (aswSP)
DRV - [2011/07/04 14:32:32 | 000,025,432 | ---- | M] () [Kernel | System | Stopped] -- C:\windows\System32\drivers\aswRdr.sys -- (aswRdr)
DRV - [2011/07/04 14:32:20 | 000,054,104 | ---- | M] (AVAST Software) [File_System | Auto | Running] -- C:\Windows\System32\drivers\aswMonFlt.sys -- (aswMonFlt)
DRV - [2011/06/02 07:47:22 | 000,136,808 | ---- | M] (MCCI Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\ssadmdm.sys -- (ssadmdm)
DRV - [2011/06/02 07:47:22 | 000,121,064 | ---- | M] (MCCI Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\ssadbus.sys -- (ssadbus) SAMSUNG Android USB Composite Device driver (WDM)
DRV - [2011/06/02 07:47:22 | 000,012,776 | ---- | M] (MCCI Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\ssadmdfl.sys -- (ssadmdfl) SAMSUNG Android USB Modem (Filter)
DRV - [2010/06/17 15:14:27 | 000,028,520 | ---- | M] (Avira GmbH) [Kernel | System | Running] -- C:\Windows\System32\drivers\ssmdrv.sys -- (ssmdrv)
DRV - [2009/12/09 21:39:45 | 005,147,136 | ---- | M] (ATI Technologies Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\atipmdag.sys -- (amdkmdag)
DRV - [2009/12/09 18:22:19 | 000,121,344 | ---- | M] (Advanced Micro Devices, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\atikmpag.sys -- (amdkmdap)
DRV - [2009/12/09 17:02:47 | 006,229,504 | ---- | M] (Intel Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\igdpmd32.sys -- (intelkmd)
DRV - [2009/12/05 03:50:02 | 000,082,128 | ---- | M] (ENE Technology Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\EUCR6SK.sys -- (EUCR)
DRV - [2009/10/30 00:55:30 | 000,209,920 | ---- | M] (Intel(R) Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\IntcDAud.sys -- (IntcDAud) Intel(R)
DRV - [2009/10/26 06:39:04 | 000,125,696 | ---- | M] (Intel Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\Impcd.sys -- (Impcd)
DRV - [2009/10/05 03:31:50 | 001,221,632 | ---- | M] (Atheros Communications, Inc.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\athr.sys -- (athr)
DRV - [2009/09/25 04:13:12 | 000,159,232 | ---- | M] (Realtek Semiconductor Corp.) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\RtHDMIV.sys -- (RTHDMIAzAudService)
DRV - [2009/09/17 06:54:14 | 000,041,088 | ---- | M] (Intel Corporation) [Kernel | On_Demand | Running] -- C:\Windows\System32\drivers\HECI.sys -- (HECI) Intel(R)
DRV - [2009/07/14 01:52:10 | 000,014,336 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\vwifimp.sys -- (vwifimp)
DRV - [2009/07/14 01:51:11 | 000,034,944 | ---- | M] (Microsoft Corporation) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\winusb.sys -- (WINUSB)
DRV - [2009/07/14 00:13:45 | 001,068,032 | ---- | M] (Motorola Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\smserial.sys -- (smserial)
DRV - [2009/05/27 00:32:02 | 000,017,408 | ---- | M] (ArcSoft, Inc.) [Kernel | On_Demand | Stopped] -- C:\Windows\System32\drivers\ArcSoftKsUFilter.sys -- (ArcSoftKsUFilter)
 
 
========== Standard Registry (SafeList) ==========
 
 
========== Internet Explorer ==========
 
IE - HKLM\..\SearchScopes,DefaultScope = {afdbddaa-5d3f-42ee-b79c-185a7020515b}
IE - HKLM\..\SearchScopes\{9606359B-FBEA-4B26-98FB-5C31BB188E00}: "URL" = hxxp://www.bing.com/search?q={searchTerms}&form=MSITDF&pc=MAMI&src=IE-SearchBox
IE - HKLM\..\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}: "URL" = hxxp://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2431245
 
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://msi.msn.com
IE - HKCU\SOFTWARE\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.google.de/firefox?client=firefox-a&rls=org.mozilla:de:official
IE - HKCU\..\URLSearchHook: {00000000-6E41-4FD3-8538-502F5495E5FC} - C:\Program Files\Ask.com\GenericAskToolbar.dll (Ask)
IE - HKCU\..\SearchScopes,DefaultScope = {afdbddaa-5d3f-42ee-b79c-185a7020515b}
IE - HKCU\..\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}: "URL" = hxxp://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT2431245
IE - HKCU\..\SearchScopes\{C2880F9E-025D-45DB-9D95-45DA92779E06}: "URL" = hxxp://websearch.ask.com/redirect?client=ie&tb=AVR-3&o=APN10395&src=kw&q={searchTerms}&locale=&apn_ptnrs=^ABT&apn_dtid=^YYYYYY^YY^DE&apn_uid=57b62a2b-5ac0-4585-8fe3-c66f2f30b9fa&apn_sauid=E8923FAA-3A1C-4E85-83F0-C26B603B87CF
IE - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings: "ProxyEnable" = 1
 
========== FireFox ==========
 
FF - user.js - File not found
 
FF - HKLM\Software\MozillaPlugins\@adobe.com/FlashPlayer: C:\windows\system32\Macromed\Flash\NPSWF32.dll ()
FF - HKLM\Software\MozillaPlugins\@java.com/DTPlugin,version=10.4.1: C:\windows\system32\npDeployJava1.dll (Oracle Corporation)
FF - HKLM\Software\MozillaPlugins\@java.com/JavaPlugin,version=10.4.1: C:\Program Files\Oracle\JavaFX 2.1 Runtime\bin\plugin2\npjp2.dll (Oracle Corporation)
FF - HKLM\Software\MozillaPlugins\@Microsoft.com/NpCtrl,version=1.0: c:\Program Files\Microsoft Silverlight\4.1.10329.0\npctrl.dll ( Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@microsoft.com/OfficeAuthz,version=14.0: C:\PROGRA~1\MICROS~2\Office14\NPAUTHZ.DLL (Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@microsoft.com/SharePoint,version=14.0: C:\PROGRA~1\MICROS~2\Office14\NPSPWRAP.DLL (Microsoft Corporation)
FF - HKLM\Software\MozillaPlugins\@microsoft.com/WLPG,version=14.0.8081.0709: C:\Program Files\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
 
FF - HKEY_LOCAL_MACHINE\software\mozilla\Firefox\Extensions\\smartwebprinting@hp.com: C:\Program Files\HP\Digital Imaging\Smart Web Printing\MozillaAddOn3 [2012/05/17 20:27:21 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 8.0.1\extensions\\Components: C:\Program Files\Mozilla Firefox\components [2010/08/23 19:31:36 | 000,000,000 | ---D | M]
FF - HKEY_LOCAL_MACHINE\software\mozilla\Mozilla Firefox 8.0.1\extensions\\Plugins: C:\Program Files\Mozilla Firefox\plugins
FF - HKEY_CURRENT_USER\software\mozilla\Firefox\Extensions\\smartwebprinting@hp.com: C:\Program Files\HP\Digital Imaging\Smart Web Printing\MozillaAddOn3 [2012/05/17 20:27:21 | 000,000,000 | ---D | M]
 
[2010/07/02 18:33:39 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Ari\AppData\Roaming\mozilla\Extensions
[2012/06/12 14:36:36 | 000,000,000 | ---D | M] (No name found) -- C:\Users\Ari\AppData\Roaming\mozilla\Firefox\Profiles\8y344oqn.default\extensions
[2012/05/26 21:06:28 | 000,000,000 | ---D | M] (Avira SearchFree Toolbar plus Web Protection) -- C:\Users\Ari\AppData\Roaming\mozilla\Firefox\Profiles\8y344oqn.default\extensions\toolbar@ask.com
[2010/06/08 11:29:10 | 000,000,927 | ---- | M] () -- C:\Users\Ari\AppData\Roaming\Mozilla\Firefox\Profiles\8y344oqn.default\searchplugins\efouTAgfxqjyLerasJgvL
[2012/05/26 21:06:28 | 000,002,344 | ---- | M] () -- C:\Users\Ari\AppData\Roaming\Mozilla\Firefox\Profiles\8y344oqn.default\searchplugins\ounpaeyLUssXDus
[2010/08/23 19:31:36 | 000,000,000 | ---D | M] (No name found) -- C:\Program Files\mozilla firefox\extensions
[2011/11/15 19:09:25 | 000,134,104 | ---- | M] (Mozilla Foundation) -- C:\Program Files\mozilla firefox\components\browsercomps.dll
[2011/11/15 15:00:27 | 000,001,392 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\amazondotcom-de.xml
[2012/05/22 19:56:44 | 000,003,659 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\avg-secure-search.xml
[2011/11/15 14:51:37 | 000,002,252 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\bing.xml
[2011/11/15 15:00:27 | 000,001,153 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\eBay-de.xml
[2011/11/15 15:00:27 | 000,006,805 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\leo_ende_de.xml
[2011/11/15 15:00:27 | 000,001,178 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\wikipedia-de.xml
[2011/11/15 15:00:27 | 000,001,105 | ---- | M] () -- C:\Program Files\mozilla firefox\searchplugins\yahoo-de.xml
 
O1 HOSTS File: ([2009/06/10 23:39:37 | 000,000,824 | ---- | M]) - C:\Windows\System32\drivers\etc\hosts
O2 - BHO: (no name) - {5C255C8A-E604-49b4-9D64-90988571CECB} - No CLSID value found.
O2 - BHO: (Java(tm) Plug-In SSV Helper) - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Oracle\JavaFX 2.1 Runtime\bin\ssv.dll (Oracle Corporation)
O2 - BHO: (Office Document Cache Handler) - {B4F3A835-0E21-4959-BA22-42B3008E02FF} - C:\PROGRA~1\MICROS~2\Office14\URLREDIR.DLL (Microsoft Corporation)
O2 - BHO: (Avira SearchFree Toolbar plus Web Protection) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files\Ask.com\GenericAskToolbar.dll (Ask)
O2 - BHO: (Java(tm) Plug-In 2 SSV Helper) - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Oracle\JavaFX 2.1 Runtime\bin\jp2ssv.dll (Oracle Corporation)
O3 - HKLM\..\Toolbar: (Avira SearchFree Toolbar plus Web Protection) - {D4027C7F-154A-4066-A1AD-4243D8127440} - C:\Program Files\Ask.com\GenericAskToolbar.dll (Ask)
O3 - HKLM\..\Toolbar: (no name) - Locked - No CLSID value found.
O4 - HKLM..\Run: []  File not found
O4 - HKLM..\Run: [ApnUpdater] C:\Program Files\Ask.com\Updater\Updater.exe (Ask)
O4 - HKLM..\Run: [ArcSoft Connection Service] C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe (ArcSoft Inc.)
O4 - HKLM..\Run: [avgnt] C:\Program Files\Avira\AntiVir Desktop\avgnt.exe (Avira Operations GmbH & Co. KG)
O4 - HKLM..\Run: [IAAnotif] C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe (Intel Corporation)
O4 - HKLM..\Run: [KiesTrayAgent] C:\Program Files\Samsung\Kies\KiesTrayAgent.exe (Samsung Electronics Co., Ltd.)
O4 - HKLM..\Run: [Malwarebytes' Anti-Malware] C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe (Malwarebytes Corporation)
O4 - HKLM..\Run: [MGSysCtrl] C:\Program Files\System Control Manager\MGSysCtrl.exe (Micro-Star International Co., Ltd.)
O4 - HKLM..\Run: [StartCCC] C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe (Advanced Micro Devices, Inc.)
O4 - HKCU..\Run: [KiesHelper] C:\Program Files\Samsung\Kies\KiesHelper.exe (Samsung)
O4 - HKCU..\Run: [KiesPDLR] C:\Program Files\Samsung\Kies\External\FirmwareUpdate\KiesPDLR.exe ()
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorAdmin = 5
O6 - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\System: ConsentPromptBehaviorUser = 3
O8 - Extra context menu item: An OneNote s&enden - res://C:\PROGRA~1\MICROS~2\Office14\ONBttnIE.dll/105 File not found
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office12\EXCEL.EXE/3000 File not found
O8 - Extra context menu item: Nach Microsoft E&xcel exportieren - res://C:\PROGRA~1\MICROS~2\Office14\EXCEL.EXE/3000 File not found
O9 - Extra Button: An OneNote senden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files\Microsoft Office\Office14\ONBttnIE.dll (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : An OneNote s&enden - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\Program Files\Microsoft Office\Office14\ONBttnIE.dll (Microsoft Corporation)
O9 - Extra Button: @C:\windows\WindowsMobile\INetRepl.dll,-222 - {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : @C:\windows\WindowsMobile\INetRepl.dll,-223 - {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - C:\Windows\WindowsMobile\INetRepl.dll (Microsoft Corporation)
O9 - Extra Button: Verknüpfte &OneNote-Notizen - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files\Microsoft Office\Office14\ONBttnIELinkedNotes.dll (Microsoft Corporation)
O9 - Extra 'Tools' menuitem : Verknüpfte &OneNote-Notizen - {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - C:\Program Files\Microsoft Office\Office14\ONBttnIELinkedNotes.dll (Microsoft Corporation)
O10 - Protocol_Catalog9\Catalog_Entries\000000000001 - C:\Program Files\Avira\AntiVir Desktop\avsda.dll (Avira Operations GmbH & Co. KG)
O10 - Protocol_Catalog9\Catalog_Entries\000000000002 - C:\Program Files\Avira\AntiVir Desktop\avsda.dll (Avira Operations GmbH & Co. KG)
O10 - Protocol_Catalog9\Catalog_Entries\000000000003 - C:\Program Files\Avira\AntiVir Desktop\avsda.dll (Avira Operations GmbH & Co. KG)
O10 - Protocol_Catalog9\Catalog_Entries\000000000004 - C:\Program Files\Avira\AntiVir Desktop\avsda.dll (Avira Operations GmbH & Co. KG)
O10 - Protocol_Catalog9\Catalog_Entries\000000000005 - C:\Program Files\Avira\AntiVir Desktop\avsda.dll (Avira Operations GmbH & Co. KG)
O10 - Protocol_Catalog9\Catalog_Entries\000000000006 - C:\Program Files\Avira\AntiVir Desktop\avsda.dll (Avira Operations GmbH & Co. KG)
O10 - Protocol_Catalog9\Catalog_Entries\000000000007 - C:\Program Files\Avira\AntiVir Desktop\avsda.dll (Avira Operations GmbH & Co. KG)
O10 - Protocol_Catalog9\Catalog_Entries\000000000008 - C:\Program Files\Avira\AntiVir Desktop\avsda.dll (Avira Operations GmbH & Co. KG)
O10 - Protocol_Catalog9\Catalog_Entries\000000000020 - C:\Program Files\Avira\AntiVir Desktop\avsda.dll (Avira Operations GmbH & Co. KG)
O13 - gopher Prefix: missing
O17 - HKLM\System\CCS\Services\Tcpip\Parameters: DhcpNameServer = 192.168.43.1
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{4D5FA4A3-4169-43CD-B417-D638ADEBE03F}: DhcpNameServer = 192.168.43.1
O17 - HKLM\System\CCS\Services\Tcpip\Parameters\Interfaces\{6CB108C4-C3A3-4681-A8BC-B4F03C71BD96}: DhcpNameServer = 192.168.2.1
O18 - Protocol\Handler\livecall {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\WIC4A1~1\MESSEN~1\MSGRAP~1.DLL (Microsoft Corporation)
O18 - Protocol\Handler\msnim {828030A1-22C1-4009-854F-8E305202313F} - C:\PROGRA~1\WIC4A1~1\MESSEN~1\MSGRAP~1.DLL (Microsoft Corporation)
O20 - HKLM Winlogon: Shell - (explorer.exe) - C:\windows\explorer.exe (Microsoft Corporation)
O20 - HKLM Winlogon: UserInit - (C:\Windows\system32\userinit.exe) - C:\Windows\System32\userinit.exe (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (SystemPropertiesPerformance.exe) - C:\windows\System32\SystemPropertiesPerformance.exe (Microsoft Corporation)
O20 - HKLM Winlogon: VMApplet - (/pagefile) -  File not found
O21 - SSODL: WebCheck - {E6FB5E20-DE35-11CF-9C87-00AA005127ED} - No CLSID value found.
O32 - HKLM CDRom: AutoRun - 1
O32 - AutoRun File - [2009/06/10 23:42:20 | 000,000,024 | ---- | M] () - C:\autoexec.bat -- [ NTFS ]
O33 - MountPoints2\{808a24fc-6b9d-11e1-8290-4061861e300d}\Shell - "" = AutoRun
O33 - MountPoints2\{808a24fc-6b9d-11e1-8290-4061861e300d}\Shell\AutoRun\command - "" = G:\autorun.exe
O34 - HKLM BootExecute: (autocheck autochk *)
O34 - HKLM BootExecute: (C:\PROGRA~1\AVG\AVG2012\avgrsx.exe /sync /restart)
O35 - HKLM\..comfile [open] -- "%1" %*
O35 - HKLM\..exefile [open] -- "%1" %*
O37 - HKLM\...com [@ = comfile] -- "%1" %*
O37 - HKLM\...exe [@ = exefile] -- "%1" %*
O38 - SubSystems\\Windows: (ServerDll=winsrv:UserServerDllInitialization,3)
O38 - SubSystems\\Windows: (ServerDll=winsrv:ConServerDllInitialization,2)
O38 - SubSystems\\Windows: (ServerDll=sxssrv,4)
 
========== Files/Folders - Created Within 30 Days ==========
 
[2012/06/13 14:11:16 | 000,596,480 | ---- | C] (OldTimer Tools) -- C:\Users\Ari\Desktop\OTL.exe
[2012/06/12 15:59:01 | 000,000,000 | ---D | C] -- C:\ProgramData\Sun
[2012/06/12 15:59:00 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\Java
[2012/06/12 15:58:22 | 000,000,000 | ---D | C] -- C:\Program Files\Oracle
[2012/06/12 15:57:12 | 000,000,000 | ---D | C] -- C:\Program Files\Java
[2012/06/12 14:43:51 | 000,000,000 | ---D | C] -- C:\Users\Ari\AppData\Roaming\Malwarebytes
[2012/06/12 14:43:22 | 000,022,344 | ---- | C] (Malwarebytes Corporation) -- C:\windows\System32\drivers\mbam.sys
[2012/06/12 14:43:22 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes' Anti-Malware
[2012/06/12 14:43:22 | 000,000,000 | ---D | C] -- C:\Program Files\Malwarebytes' Anti-Malware
[2012/06/12 14:43:22 | 000,000,000 | ---D | C] -- C:\ProgramData\Malwarebytes
[2012/06/03 16:31:12 | 000,000,000 | ---D | C] -- C:\Users\Ari\AppData\Roaming\Xell
[2012/05/26 21:11:52 | 000,000,000 | ---D | C] -- C:\Users\Ari\AppData\Roaming\Avira
[2012/05/26 21:06:36 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Avira
[2012/05/26 21:06:09 | 000,000,000 | ---D | C] -- C:\Program Files\Ask.com
[2012/05/26 21:04:50 | 000,137,928 | ---- | C] (Avira GmbH) -- C:\windows\System32\drivers\avipbb.sys
[2012/05/26 21:04:50 | 000,083,392 | ---- | C] (Avira GmbH) -- C:\windows\System32\drivers\avgntflt.sys
[2012/05/26 21:04:50 | 000,036,000 | ---- | C] (Avira GmbH) -- C:\windows\System32\drivers\avkmgr.sys
[2012/05/26 21:04:50 | 000,028,520 | ---- | C] (Avira GmbH) -- C:\windows\System32\drivers\ssmdrv.sys
[2012/05/26 21:04:49 | 000,000,000 | ---D | C] -- C:\ProgramData\Avira
[2012/05/26 21:04:49 | 000,000,000 | ---D | C] -- C:\Program Files\Avira
[2012/05/21 18:44:28 | 000,000,000 | ---D | C] -- C:\Program Files\MSXML 4.0
[2012/05/20 13:52:40 | 000,000,000 | -H-D | C] -- C:\ProgramData\Common Files
[2012/05/20 13:51:54 | 000,000,000 | ---D | C] -- C:\ProgramData\AVG2012
[2012/05/20 13:49:29 | 000,000,000 | ---D | C] -- C:\ProgramData\MFAData
[2012/05/17 20:38:47 | 000,000,000 | ---D | C] -- C:\ProgramData\WEBREG
[2012/05/17 20:36:24 | 000,000,000 | ---D | C] -- C:\Users\Ari\AppData\Local\HP
[2012/05/17 20:33:26 | 000,000,000 | ---D | C] -- C:\Users\Ari\AppData\Roaming\HP
[2012/05/17 20:26:47 | 000,000,000 | ---D | C] -- C:\ProgramData\HP Product Assistant
[2012/05/17 20:25:50 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\HP
[2012/05/17 20:25:38 | 000,000,000 | ---D | C] -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\HP
[2012/05/17 20:25:34 | 000,000,000 | ---D | C] -- C:\Program Files\Common Files\Hewlett-Packard
[2012/05/17 20:25:06 | 000,000,000 | ---D | C] -- C:\Program Files\HP
[2012/05/17 20:23:39 | 000,000,000 | ---D | C] -- C:\ProgramData\HP
[1 C:\windows\*.tmp files -> C:\windows\*.tmp -> ]
 
========== Files - Modified Within 30 Days ==========
 
[2012/06/13 14:17:54 | 000,000,156 | ---- | M] () -- C:\Users\Ari\defogger_reenable
[2012/06/13 14:13:24 | 000,022,672 | -H-- | M] () -- C:\windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
[2012/06/13 14:13:24 | 000,022,672 | -H-- | M] () -- C:\windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
[2012/06/13 14:11:22 | 000,596,480 | ---- | M] (OldTimer Tools) -- C:\Users\Ari\Desktop\OTL.exe
[2012/06/13 14:10:33 | 000,050,477 | ---- | M] () -- C:\Users\Ari\Desktop\Defogger.exe
[2012/06/13 14:01:26 | 000,067,584 | --S- | M] () -- C:\windows\bootstat.dat
[2012/06/13 14:01:19 | 2552,381,440 | -HS- | M] () -- C:\hiberfil.sys
[2012/06/12 14:06:45 | 000,002,135 | ---- | M] () -- C:\Users\Public\Desktop\HP Photosmart Essential 3.5.lnk
[2012/05/26 21:06:36 | 000,002,026 | ---- | M] () -- C:\Users\Public\Desktop\Avira Control Center.lnk
[2012/05/25 13:47:34 | 000,014,033 | ---- | M] () -- C:\Users\Ari\Desktop\LUaVplOssqxGQasfX
[2012/05/18 16:17:53 | 000,378,168 | ---- | M] () -- C:\windows\System32\FNTCACHE.DAT
[2012/05/17 20:33:13 | 000,181,697 | ---- | M] () -- C:\windows\hpoins28.dat
[2012/05/17 20:27:08 | 000,001,157 | ---- | M] () -- C:\Users\Public\Desktop\Shop für HP Zubehör.lnk
[2012/05/17 20:26:45 | 000,001,319 | ---- | M] () -- C:\Users\Public\Desktop\HP Solution Center.lnk
[2012/05/17 20:26:28 | 000,002,079 | ---- | M] () -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
[2012/05/14 16:56:27 | 000,694,430 | ---- | M] () -- C:\windows\System32\perfh00C.dat
[2012/05/14 16:56:27 | 000,693,454 | ---- | M] () -- C:\windows\System32\perfh00A.dat
[2012/05/14 16:56:27 | 000,689,108 | ---- | M] () -- C:\windows\System32\perfh010.dat
[2012/05/14 16:56:27 | 000,654,166 | ---- | M] () -- C:\windows\System32\perfh007.dat
[2012/05/14 16:56:27 | 000,616,008 | ---- | M] () -- C:\windows\System32\perfh009.dat
[2012/05/14 16:56:27 | 000,137,062 | ---- | M] () -- C:\windows\System32\perfc00A.dat
[2012/05/14 16:56:27 | 000,130,140 | ---- | M] () -- C:\windows\System32\perfc00C.dat
[2012/05/14 16:56:27 | 000,130,006 | ---- | M] () -- C:\windows\System32\perfc007.dat
[2012/05/14 16:56:27 | 000,127,144 | ---- | M] () -- C:\windows\System32\perfc010.dat
[2012/05/14 16:56:27 | 000,106,388 | ---- | M] () -- C:\windows\System32\perfc009.dat
[1 C:\windows\*.tmp files -> C:\windows\*.tmp -> ]
 
========== Files Created - No Company Name ==========
 
[2012/06/13 14:17:53 | 000,000,156 | ---- | C] () -- C:\Users\Ari\defogger_reenable
[2012/06/13 14:10:32 | 000,050,477 | ---- | C] () -- C:\Users\Ari\Desktop\Defogger.exe
[2012/05/26 21:06:36 | 000,002,026 | ---- | C] () -- C:\Users\Public\Desktop\Avira Control Center.lnk
[2012/05/17 20:27:54 | 000,002,135 | ---- | C] () -- C:\Users\Public\Desktop\HP Photosmart Essential 3.5.lnk
[2012/05/17 20:27:08 | 000,001,157 | ---- | C] () -- C:\Users\Public\Desktop\Shop für HP Zubehör.lnk
[2012/05/17 20:26:45 | 000,001,319 | ---- | C] () -- C:\Users\Public\Desktop\HP Solution Center.lnk
[2012/05/17 20:26:28 | 000,002,079 | ---- | C] () -- C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
[2012/05/17 20:23:52 | 000,181,697 | ---- | C] () -- C:\windows\hpoins28.dat
[2012/05/17 20:23:52 | 000,000,442 | ---- | C] () -- C:\windows\hpomdl28.dat
[2012/03/28 22:11:08 | 000,030,568 | ---- | C] () -- C:\windows\MusiccityDownload.exe
[2012/03/28 22:11:06 | 000,974,848 | ---- | C] () -- C:\windows\System32\cis-2.4.dll
[2012/03/28 22:11:06 | 000,081,920 | ---- | C] () -- C:\windows\System32\issacapi_bs-2.3.dll
[2012/03/28 22:11:06 | 000,065,536 | ---- | C] () -- C:\windows\System32\issacapi_pe-2.3.dll
[2012/03/28 22:11:06 | 000,057,344 | ---- | C] () -- C:\windows\System32\issacapi_se-2.3.dll
[2012/03/11 19:56:26 | 000,025,432 | ---- | C] () -- C:\windows\System32\drivers\aswRdr.sys
 
========== LOP Check ==========
 
[2012/06/07 19:52:42 | 000,000,000 | ---D | M] -- C:\Users\Ari\AppData\Roaming\DAEMON Tools Lite
[2012/05/01 16:57:52 | 000,000,000 | ---D | M] -- C:\Users\Ari\AppData\Roaming\Samsung
[2010/07/18 16:14:35 | 000,000,000 | ---D | M] -- C:\Users\Ari\AppData\Roaming\Scan2PDF
[2012/06/12 15:25:11 | 000,000,000 | ---D | M] -- C:\Users\Ari\AppData\Roaming\Xell
[2012/05/21 18:37:25 | 000,032,640 | ---- | M] () -- C:\windows\Tasks\SCHEDLGU.TXT
 
========== Purity Check ==========
 
 
 
< End of report >
         

Und hier Gmer.txt:

Code:
ATTFilter
GMER 1.0.15.15641 - hxxp://www.gmer.net
Rootkit scan 2012-06-14 16:24:59
Windows 6.1.7600  Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1 FUJITSU_ rev.0000
Running: q0ncg1sr.exe; Driver: C:\Users\Ari\AppData\Local\Temp\fxldrpog.sys
 
 
---- System - GMER 1.0.15 ----
 
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                  ZwAllocateVirtualMemory [0x94995D8C]
SSDT            94EC864E                                                                                                               ZwCreateSection
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                  ZwFreeVirtualMemory [0x94995E3C]
SSDT            \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software)                                  ZwProtectVirtualMemory [0x94995ED4]
SSDT            94EC8658                                                                                                               ZwRequestWaitReplyPort
SSDT            94EC8653                                                                                                               ZwSetContextThread
SSDT            94EC865D                                                                                                               ZwSetSecurityObject
SSDT            94EC8662                                                                                                               ZwSystemDebugControl
SSDT            94EC85EF                                                                                                               ZwTerminateProcess
 
---- Kernel code sections - GMER 1.0.15 ----
 
.text           ntkrnlpa.exe!ZwRollbackTransaction + 13E9                                                                              8345D599 1 Byte  [06]
.text           ntkrnlpa.exe!KiDispatchInterrupt + 5A2                                                                                 83482092 19 Bytes  [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
.text           ntkrnlpa.exe!RtlSidHashLookup + 23C                                                                                    8348988C 4 Bytes  [8C, 5D, 99, 94] {MOV WORD [EBP-0x67], DS; XCHG ESP, EAX}
.text           ntkrnlpa.exe!RtlSidHashLookup + 340                                                                                    83489990 4 Bytes  [4E, 86, EC, 94] {DEC ESI; XCHG AH, CH; XCHG ESP, EAX}
.text           ntkrnlpa.exe!RtlSidHashLookup + 3FC                                                                                    83489A4C 4 Bytes  [3C, 5E, 99, 94] {CMP AL, 0x5e; CDQ ; XCHG ESP, EAX}
.text           ntkrnlpa.exe!RtlSidHashLookup + 54C                                                                                    83489B9C 4 Bytes  [D4, 5E, 99, 94] {AAM 0x5e; CDQ ; XCHG ESP, EAX}
.text           ntkrnlpa.exe!RtlSidHashLookup + 69C                                                                                    83489CEC 4 Bytes  [58, 86, EC, 94] {POP EAX; XCHG AH, CH; XCHG ESP, EAX}
.text           ...                                                                                                                    
.text           C:\windows\system32\DRIVERS\atipmdag.sys                                                                               section is writeable [0x95440000, 0x2CBE50, 0xE8000020]
 
---- User code sections - GMER 1.0.15 ----
 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[424] ntdll.dll!LdrUnloadDll                   7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[424] ntdll.dll!LdrLoadDll                     7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[424] kernel32.dll!GetBinaryTypeW + 70         76CE78FC 1 Byte  [62]
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[424] USER32.dll!UnhookWindowsHookEx           773FCC7B 5 Bytes  JMP 00200A08 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[424] USER32.dll!UnhookWinEvent                773FD924 5 Bytes  JMP 002003FC 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[424] USER32.dll!SetWindowsHookExW             7740210A 5 Bytes  JMP 00200804 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[424] USER32.dll!SetWinEventHook               7740507E 5 Bytes  JMP 002001F8 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[424] USER32.dll!SetWindowsHookExA             77426DFA 5 Bytes  JMP 00200600 
.text           C:\windows\system32\csrss.exe[480] kernel32.dll!GetBinaryTypeW + 70                                                    76CE78FC 1 Byte  [62]
.text           C:\windows\system32\wininit.exe[548] ntdll.dll!LdrUnloadDll                                                            7751BD1F 5 Bytes  JMP 000303FC 
.text           C:\windows\system32\wininit.exe[548] ntdll.dll!LdrLoadDll                                                              7751F425 5 Bytes  JMP 000301F8 
.text           C:\windows\system32\wininit.exe[548] kernel32.dll!GetBinaryTypeW + 70                                                  76CE78FC 1 Byte  [62]
.text           C:\windows\system32\wininit.exe[548] USER32.dll!UnhookWindowsHookEx                                                    773FCC7B 5 Bytes  JMP 00050A08 
.text           C:\windows\system32\wininit.exe[548] USER32.dll!UnhookWinEvent                                                         773FD924 5 Bytes  JMP 000503FC 
.text           C:\windows\system32\wininit.exe[548] USER32.dll!SetWindowsHookExW                                                      7740210A 5 Bytes  JMP 00050804 
.text           C:\windows\system32\wininit.exe[548] USER32.dll!SetWinEventHook                                                        7740507E 5 Bytes  JMP 000501F8 
.text           C:\windows\system32\wininit.exe[548] USER32.dll!SetWindowsHookExA                                                      77426DFA 5 Bytes  JMP 00050600 
.text           C:\windows\system32\csrss.exe[560] kernel32.dll!GetBinaryTypeW + 70                                                    76CE78FC 1 Byte  [62]
.text           C:\windows\system32\services.exe[600] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\services.exe[600] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\services.exe[600] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\services.exe[600] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00130A08 
.text           C:\windows\system32\services.exe[600] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 001303FC 
.text           C:\windows\system32\services.exe[600] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00130804 
.text           C:\windows\system32\services.exe[600] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 001301F8 
.text           C:\windows\system32\services.exe[600] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00130600 
.text           C:\windows\system32\svchost.exe[612] ntdll.dll!LdrUnloadDll                                                            7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\svchost.exe[612] ntdll.dll!LdrLoadDll                                                              7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\svchost.exe[612] kernel32.dll!GetBinaryTypeW + 70                                                  76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[612] USER32.dll!UnhookWindowsHookEx                                                    773FCC7B 5 Bytes  JMP 00420A08 
.text           C:\windows\system32\svchost.exe[612] USER32.dll!UnhookWinEvent                                                         773FD924 5 Bytes  JMP 004203FC 
.text           C:\windows\system32\svchost.exe[612] USER32.dll!SetWindowsHookExW                                                      7740210A 5 Bytes  JMP 00420804 
.text           C:\windows\system32\svchost.exe[612] USER32.dll!SetWinEventHook                                                        7740507E 5 Bytes  JMP 004201F8 
.text           C:\windows\system32\svchost.exe[612] USER32.dll!SetWindowsHookExA                                                      77426DFA 5 Bytes  JMP 00420600 
.text           C:\windows\system32\lsass.exe[628] ntdll.dll!LdrUnloadDll                                                              7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\lsass.exe[628] ntdll.dll!LdrLoadDll                                                                7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\lsass.exe[628] kernel32.dll!GetBinaryTypeW + 70                                                    76CE78FC 1 Byte  [62]
.text           C:\windows\system32\lsm.exe[636] ntdll.dll!LdrUnloadDll                                                                7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\lsm.exe[636] ntdll.dll!LdrLoadDll                                                                  7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\lsm.exe[636] kernel32.dll!GetBinaryTypeW + 70                                                      76CE78FC 1 Byte  [62]
.text           C:\windows\system32\winlogon.exe[696] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000303FC 
.text           C:\windows\system32\winlogon.exe[696] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000301F8 
.text           C:\windows\system32\winlogon.exe[696] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\winlogon.exe[696] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 000C0A08 
.text           C:\windows\system32\winlogon.exe[696] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 000C03FC 
.text           C:\windows\system32\winlogon.exe[696] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 000C0804 
.text           C:\windows\system32\winlogon.exe[696] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 000C01F8 
.text           C:\windows\system32\winlogon.exe[696] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 000C0600 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe[748] ntdll.dll!LdrUnloadDll                 7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe[748] ntdll.dll!LdrLoadDll                   7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe[748] kernel32.dll!GetBinaryTypeW + 70       76CE78FC 1 Byte  [62]
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe[748] USER32.dll!UnhookWindowsHookEx         773FCC7B 5 Bytes  JMP 00200A08 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe[748] USER32.dll!UnhookWinEvent              773FD924 5 Bytes  JMP 002003FC 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe[748] USER32.dll!SetWindowsHookExW           7740210A 5 Bytes  JMP 00200804 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe[748] USER32.dll!SetWinEventHook             7740507E 5 Bytes  JMP 002001F8 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe[748] USER32.dll!SetWindowsHookExA           77426DFA 5 Bytes  JMP 00200600 
.text           C:\windows\system32\svchost.exe[788] ntdll.dll!LdrUnloadDll                                                            7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\svchost.exe[788] ntdll.dll!LdrLoadDll                                                              7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\svchost.exe[788] kernel32.dll!GetBinaryTypeW + 70                                                  76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[788] USER32.dll!UnhookWindowsHookEx                                                    773FCC7B 5 Bytes  JMP 001C0A08 
.text           C:\windows\system32\svchost.exe[788] USER32.dll!UnhookWinEvent                                                         773FD924 5 Bytes  JMP 001C03FC 
.text           C:\windows\system32\svchost.exe[788] USER32.dll!SetWindowsHookExW                                                      7740210A 5 Bytes  JMP 001C0804 
.text           C:\windows\system32\svchost.exe[788] USER32.dll!SetWinEventHook                                                        7740507E 5 Bytes  JMP 001C01F8 
.text           C:\windows\system32\svchost.exe[788] USER32.dll!SetWindowsHookExA                                                      77426DFA 5 Bytes  JMP 001C0600 
.text           C:\windows\system32\svchost.exe[852] ntdll.dll!LdrUnloadDll                                                            7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\svchost.exe[852] ntdll.dll!LdrLoadDll                                                              7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\svchost.exe[852] kernel32.dll!GetBinaryTypeW + 70                                                  76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[900] ntdll.dll!LdrUnloadDll                                                            7751BD1F 5 Bytes  JMP 000A03FC 
.text           C:\windows\system32\svchost.exe[900] ntdll.dll!LdrLoadDll                                                              7751F425 5 Bytes  JMP 000A01F8 
.text           C:\windows\system32\svchost.exe[900] kernel32.dll!GetBinaryTypeW + 70                                                  76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[900] user32.dll!UnhookWindowsHookEx                                                    773FCC7B 5 Bytes  JMP 00330A08 
.text           C:\windows\system32\svchost.exe[900] user32.dll!UnhookWinEvent                                                         773FD924 5 Bytes  JMP 003303FC 
.text           C:\windows\system32\svchost.exe[900] user32.dll!SetWindowsHookExW                                                      7740210A 5 Bytes  JMP 00330804 
.text           C:\windows\system32\svchost.exe[900] user32.dll!SetWinEventHook                                                        7740507E 5 Bytes  JMP 003301F8 
.text           C:\windows\system32\svchost.exe[900] user32.dll!SetWindowsHookExA                                                      77426DFA 5 Bytes  JMP 00330600 
.text           C:\windows\system32\atiesrxx.exe[948] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\windows\system32\atiesrxx.exe[948] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 001601F8 
.text           C:\windows\system32\atiesrxx.exe[948] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\atiesrxx.exe[948] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 001F0A08 
.text           C:\windows\system32\atiesrxx.exe[948] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 001F03FC 
.text           C:\windows\system32\atiesrxx.exe[948] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 001F0804 
.text           C:\windows\system32\atiesrxx.exe[948] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 001F01F8 
.text           C:\windows\system32\atiesrxx.exe[948] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 001F0600 
.text           C:\windows\System32\svchost.exe[1024] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\System32\svchost.exe[1024] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\System32\svchost.exe[1024] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\System32\svchost.exe[1036] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000A03FC 
.text           C:\windows\System32\svchost.exe[1036] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000A01F8 
.text           C:\windows\System32\svchost.exe[1036] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\System32\svchost.exe[1036] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00510A08 
.text           C:\windows\System32\svchost.exe[1036] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 005103FC 
.text           C:\windows\System32\svchost.exe[1036] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00510804 
.text           C:\windows\System32\svchost.exe[1036] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 005101F8 
.text           C:\windows\System32\svchost.exe[1036] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00510600 
.text           C:\windows\System32\svchost.exe[1072] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\System32\svchost.exe[1072] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\System32\svchost.exe[1072] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\System32\svchost.exe[1072] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 003B0A08 
.text           C:\windows\System32\svchost.exe[1072] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 003B03FC 
.text           C:\windows\System32\svchost.exe[1072] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 003B0804 
.text           C:\windows\System32\svchost.exe[1072] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 003B01F8 
.text           C:\windows\System32\svchost.exe[1072] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 003B0600 
.text           C:\windows\system32\svchost.exe[1104] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\svchost.exe[1104] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\svchost.exe[1104] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[1104] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00A30A08 
.text           C:\windows\system32\svchost.exe[1104] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 00A303FC 
.text           C:\windows\system32\svchost.exe[1104] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00A30804 
.text           C:\windows\system32\svchost.exe[1104] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 00A301F8 
.text           C:\windows\system32\svchost.exe[1104] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00A30600 
.text           C:\Program Files\System Control Manager\MSIService.exe[1168] ntdll.dll!LdrUnloadDll                                    7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\System Control Manager\MSIService.exe[1168] ntdll.dll!LdrLoadDll                                      7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\System Control Manager\MSIService.exe[1168] kernel32.dll!GetBinaryTypeW + 70                          76CE78FC 1 Byte  [62]
.text           C:\Program Files\System Control Manager\MSIService.exe[1168] USER32.dll!UnhookWindowsHookEx                            773FCC7B 5 Bytes  JMP 00200A08 
.text           C:\Program Files\System Control Manager\MSIService.exe[1168] USER32.dll!UnhookWinEvent                                 773FD924 5 Bytes  JMP 002003FC 
.text           C:\Program Files\System Control Manager\MSIService.exe[1168] USER32.dll!SetWindowsHookExW                              7740210A 5 Bytes  JMP 00200804 
.text           C:\Program Files\System Control Manager\MSIService.exe[1168] USER32.dll!SetWinEventHook                                7740507E 5 Bytes  JMP 002001F8 
.text           C:\Program Files\System Control Manager\MSIService.exe[1168] USER32.dll!SetWindowsHookExA                              77426DFA 5 Bytes  JMP 00200600 
.text           C:\windows\system32\svchost.exe[1224] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\svchost.exe[1224] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\svchost.exe[1224] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[1224] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00550A08 
.text           C:\windows\system32\svchost.exe[1224] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 005503FC 
.text           C:\windows\system32\svchost.exe[1224] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00550804 
.text           C:\windows\system32\svchost.exe[1224] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 005501F8 
.text           C:\windows\system32\svchost.exe[1224] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00550600 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe[1244] ntdll.dll!LdrUnloadDll                          7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe[1244] ntdll.dll!LdrLoadDll                            7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe[1244] kernel32.dll!GetBinaryTypeW + 70                76CE78FC 1 Byte  [62]
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe[1244] USER32.dll!UnhookWindowsHookEx                  773FCC7B 5 Bytes  JMP 001F0A08 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe[1244] USER32.dll!UnhookWinEvent                       773FD924 5 Bytes  JMP 001F03FC 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe[1244] USER32.dll!SetWindowsHookExW                    7740210A 5 Bytes  JMP 001F0804 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe[1244] USER32.dll!SetWinEventHook                      7740507E 5 Bytes  JMP 001F01F8 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe[1244] USER32.dll!SetWindowsHookExA                    77426DFA 5 Bytes  JMP 001F0600 
.text           C:\windows\system32\atieclxx.exe[1308] ntdll.dll!LdrUnloadDll                                                          7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\windows\system32\atieclxx.exe[1308] ntdll.dll!LdrLoadDll                                                            7751F425 5 Bytes  JMP 001601F8 
.text           C:\windows\system32\atieclxx.exe[1308] kernel32.dll!GetBinaryTypeW + 70                                                76CE78FC 1 Byte  [62]
.text           C:\windows\system32\atieclxx.exe[1308] USER32.dll!UnhookWindowsHookEx                                                  773FCC7B 5 Bytes  JMP 002F0A08 
.text           C:\windows\system32\atieclxx.exe[1308] USER32.dll!UnhookWinEvent                                                       773FD924 5 Bytes  JMP 002F03FC 
.text           C:\windows\system32\atieclxx.exe[1308] USER32.dll!SetWindowsHookExW                                                    7740210A 5 Bytes  JMP 002F0804 
.text           C:\windows\system32\atieclxx.exe[1308] USER32.dll!SetWinEventHook                                                      7740507E 5 Bytes  JMP 002F01F8 
.text           C:\windows\system32\atieclxx.exe[1308] USER32.dll!SetWindowsHookExA                                                    77426DFA 5 Bytes  JMP 002F0600 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1352] ntdll.dll!LdrUnloadDll                                      7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1352] ntdll.dll!LdrLoadDll                                        7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1352] kernel32.dll!GetBinaryTypeW + 70                            76CE78FC 1 Byte  [62]
.text           C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1352] USER32.dll!UnhookWindowsHookEx                              773FCC7B 5 Bytes  JMP 00210A08 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1352] USER32.dll!UnhookWinEvent                                   773FD924 5 Bytes  JMP 002103FC 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1352] USER32.dll!SetWindowsHookExW                                7740210A 5 Bytes  JMP 00210804 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1352] USER32.dll!SetWinEventHook                                  7740507E 5 Bytes  JMP 002101F8 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe[1352] USER32.dll!SetWindowsHookExA                                77426DFA 5 Bytes  JMP 00210600 
.text           C:\windows\system32\svchost.exe[1408] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\svchost.exe[1408] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\svchost.exe[1408] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\System32\spoolsv.exe[1484] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\System32\spoolsv.exe[1484] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\System32\spoolsv.exe[1484] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\System32\spoolsv.exe[1484] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00140A08 
.text           C:\windows\System32\spoolsv.exe[1484] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 001403FC 
.text           C:\windows\System32\spoolsv.exe[1484] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00140804 
.text           C:\windows\System32\spoolsv.exe[1484] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 001401F8 
.text           C:\windows\System32\spoolsv.exe[1484] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00140600 
.text           C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1524] ntdll.dll!LdrUnloadDll                    7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1524] ntdll.dll!LdrLoadDll                      7751F425 5 Bytes  JMP 000601F8 
.text           C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1524] kernel32.dll!GetBinaryTypeW + 70          76CE78FC 1 Byte  [62]
.text           C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1524] USER32.dll!UnhookWindowsHookEx            773FCC7B 5 Bytes  JMP 00090A08 
.text           C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1524] USER32.dll!UnhookWinEvent                 773FD924 5 Bytes  JMP 000903FC 
.text           C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1524] USER32.dll!SetWindowsHookExW              7740210A 5 Bytes  JMP 00090804 
.text           C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1524] USER32.dll!SetWinEventHook                7740507E 5 Bytes  JMP 000901F8 
.text           C:\Program Files\Microsoft\Search Enhancement Pack\SeaPort\SeaPort.exe[1524] USER32.dll!SetWindowsHookExA              77426DFA 5 Bytes  JMP 00090600 
.text           C:\Program Files\AVAST Software\Avast\AvastSvc.exe[1544] kernel32.dll!SetUnhandledExceptionFilter                      76CD30E2 4 Bytes  [C2, 04, 00, 90] {RET 0x4; NOP }
.text           C:\Program Files\AVAST Software\Avast\AvastSvc.exe[1544] kernel32.dll!GetBinaryTypeW + 70                              76CE78FC 1 Byte  [62]
.text           C:\Program Files\Avira\AntiVir Desktop\sched.exe[1584] ntdll.dll!LdrUnloadDll                                          7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\Program Files\Avira\AntiVir Desktop\sched.exe[1584] ntdll.dll!LdrLoadDll                                            7751F425 5 Bytes  JMP 000601F8 
.text           C:\Program Files\Avira\AntiVir Desktop\sched.exe[1584] kernel32.dll!GetBinaryTypeW + 70                                76CE78FC 1 Byte  [62]
.text           C:\Program Files\Avira\AntiVir Desktop\sched.exe[1584] USER32.dll!UnhookWindowsHookEx                                  773FCC7B 5 Bytes  JMP 001F0A08 
.text           C:\Program Files\Avira\AntiVir Desktop\sched.exe[1584] USER32.dll!UnhookWinEvent                                       773FD924 5 Bytes  JMP 001F03FC 
.text           C:\Program Files\Avira\AntiVir Desktop\sched.exe[1584] USER32.dll!SetWindowsHookExW                                    7740210A 5 Bytes  JMP 001F0804 
.text           C:\Program Files\Avira\AntiVir Desktop\sched.exe[1584] USER32.dll!SetWinEventHook                                      7740507E 5 Bytes  JMP 001F01F8 
.text           C:\Program Files\Avira\AntiVir Desktop\sched.exe[1584] USER32.dll!SetWindowsHookExA                                    77426DFA 5 Bytes  JMP 001F0600 
.text           C:\windows\system32\taskhost.exe[1596] ntdll.dll!LdrUnloadDll                                                          7751BD1F 5 Bytes  JMP 000503FC 
.text           C:\windows\system32\taskhost.exe[1596] ntdll.dll!LdrLoadDll                                                            7751F425 5 Bytes  JMP 000501F8 
.text           C:\windows\system32\taskhost.exe[1596] kernel32.dll!GetBinaryTypeW + 70                                                76CE78FC 1 Byte  [62]
.text           C:\windows\system32\taskhost.exe[1596] USER32.dll!UnhookWindowsHookEx                                                  773FCC7B 5 Bytes  JMP 000E0A08 
.text           C:\windows\system32\taskhost.exe[1596] USER32.dll!UnhookWinEvent                                                       773FD924 5 Bytes  JMP 000E03FC 
.text           C:\windows\system32\taskhost.exe[1596] USER32.dll!SetWindowsHookExW                                                    7740210A 5 Bytes  JMP 000E0804 
.text           C:\windows\system32\taskhost.exe[1596] USER32.dll!SetWinEventHook                                                      7740507E 5 Bytes  JMP 000E01F8 
.text           C:\windows\system32\taskhost.exe[1596] USER32.dll!SetWindowsHookExA                                                    77426DFA 5 Bytes  JMP 000E0600 
.text           C:\windows\System32\svchost.exe[1816] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\System32\svchost.exe[1816] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\System32\svchost.exe[1816] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[1900] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\svchost.exe[1900] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\svchost.exe[1900] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[1900] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00240A08 
.text           C:\windows\system32\svchost.exe[1900] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 002403FC 
.text           C:\windows\system32\svchost.exe[1900] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00240804 
.text           C:\windows\system32\svchost.exe[1900] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 002401F8 
.text           C:\windows\system32\svchost.exe[1900] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00240600 
.text           C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1932] ntdll.dll!LdrUnloadDll                                        7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1932] ntdll.dll!LdrLoadDll                                          7751F425 5 Bytes  JMP 000601F8 
.text           C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1932] kernel32.dll!GetBinaryTypeW + 70                              76CE78FC 1 Byte  [62]
.text           C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1932] USER32.dll!UnhookWindowsHookEx                                773FCC7B 5 Bytes  JMP 000F0A08 
.text           C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1932] USER32.dll!UnhookWinEvent                                     773FD924 5 Bytes  JMP 000F03FC 
.text           C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1932] USER32.dll!SetWindowsHookExW                                  7740210A 5 Bytes  JMP 000F0804 
.text           C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1932] USER32.dll!SetWinEventHook                                    7740507E 5 Bytes  JMP 000F01F8 
.text           C:\Program Files\Avira\AntiVir Desktop\avguard.exe[1932] USER32.dll!SetWindowsHookExA                                  77426DFA 5 Bytes  JMP 000F0600 
.text           C:\windows\system32\Dwm.exe[2028] ntdll.dll!LdrUnloadDll                                                               7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\Dwm.exe[2028] ntdll.dll!LdrLoadDll                                                                 7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\Dwm.exe[2028] kernel32.dll!GetBinaryTypeW + 70                                                     76CE78FC 1 Byte  [62]
.text           C:\windows\system32\Dwm.exe[2028] USER32.dll!UnhookWindowsHookEx                                                       773FCC7B 5 Bytes  JMP 000F0A08 
.text           C:\windows\system32\Dwm.exe[2028] USER32.dll!UnhookWinEvent                                                            773FD924 5 Bytes  JMP 000F03FC 
.text           C:\windows\system32\Dwm.exe[2028] USER32.dll!SetWindowsHookExW                                                         7740210A 5 Bytes  JMP 000F0804 
.text           C:\windows\system32\Dwm.exe[2028] USER32.dll!SetWinEventHook                                                           7740507E 5 Bytes  JMP 000F01F8 
.text           C:\windows\system32\Dwm.exe[2028] USER32.dll!SetWindowsHookExA                                                         77426DFA 5 Bytes  JMP 000F0600 
.text           C:\windows\Explorer.EXE[2036] ntdll.dll!LdrUnloadDll                                                                   7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\Explorer.EXE[2036] ntdll.dll!LdrLoadDll                                                                     7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\Explorer.EXE[2036] kernel32.dll!GetBinaryTypeW + 70                                                         76CE78FC 1 Byte  [62]
.text           C:\windows\Explorer.EXE[2036] USER32.dll!UnhookWindowsHookEx                                                           773FCC7B 5 Bytes  JMP 00150A08 
.text           C:\windows\Explorer.EXE[2036] USER32.dll!UnhookWinEvent                                                                773FD924 5 Bytes  JMP 001503FC 
.text           C:\windows\Explorer.EXE[2036] USER32.dll!SetWindowsHookExW                                                             7740210A 5 Bytes  JMP 00150804 
.text           C:\windows\Explorer.EXE[2036] USER32.dll!SetWinEventHook                                                               7740507E 5 Bytes  JMP 001501F8 
.text           C:\windows\Explorer.EXE[2036] USER32.dll!SetWindowsHookExA                                                             77426DFA 5 Bytes  JMP 00150600 
.text           C:\Program Files\Samsung\Kies\KiesHelper.exe[2080] KERNEL32.dll!GetBinaryTypeW + 70                                    76CE78FC 1 Byte  [62]
.text           C:\Program Files\Samsung\Kies\External\FirmwareUpdate\KiesPDLR.exe[2252] ntdll.dll!DbgUiRemoteBreakin                  7755D5CB 1 Byte  [C3]
.text           C:\Program Files\Samsung\Kies\External\FirmwareUpdate\KiesPDLR.exe[2252] KERNEL32.dll!GetBinaryTypeW + 70              76CE78FC 1 Byte  [62]
.text           C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[2464] ntdll.dll!LdrUnloadDll                                       7751BD1F 5 Bytes  JMP 000503FC 
.text           C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[2464] ntdll.dll!LdrLoadDll                                         7751F425 5 Bytes  JMP 000501F8 
.text           C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[2464] kernel32.dll!GetBinaryTypeW + 70                             76CE78FC 1 Byte  [62]
.text           C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[2464] USER32.dll!UnhookWindowsHookEx                               773FCC7B 5 Bytes  JMP 00080A08 
.text           C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[2464] USER32.dll!UnhookWinEvent                                    773FD924 5 Bytes  JMP 000803FC 
.text           C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[2464] USER32.dll!SetWindowsHookExW                                 7740210A 5 Bytes  JMP 00080804 
.text           C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[2464] USER32.dll!SetWinEventHook                                   7740507E 5 Bytes  JMP 000801F8 
.text           C:\Program Files\Avira\AntiVir Desktop\avshadow.exe[2464] USER32.dll!SetWindowsHookExA                                 77426DFA 5 Bytes  JMP 00080600 
.text           C:\windows\system32\conhost.exe[2472] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000303FC 
.text           C:\windows\system32\conhost.exe[2472] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000301F8 
.text           C:\windows\system32\conhost.exe[2472] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\conhost.exe[2472] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00100A08 
.text           C:\windows\system32\conhost.exe[2472] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 001003FC 
.text           C:\windows\system32\conhost.exe[2472] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00100804 
.text           C:\windows\system32\conhost.exe[2472] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 001001F8 
.text           C:\windows\system32\conhost.exe[2472] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00100600 
.text           C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE[2496] ntdll.dll!LdrUnloadDll                                       7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE[2496] ntdll.dll!LdrLoadDll                                         7751F425 5 Bytes  JMP 000601F8 
.text           C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE[2496] kernel32.dll!GetBinaryTypeW + 70                             76CE78FC 1 Byte  [62]
.text           C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE[2496] USER32.dll!UnhookWindowsHookEx                               773FCC7B 5 Bytes  JMP 000F0A08 
.text           C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE[2496] USER32.dll!UnhookWinEvent                                    773FD924 5 Bytes  JMP 000F03FC 
.text           C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE[2496] USER32.dll!SetWindowsHookExW                                 7740210A 5 Bytes  JMP 000F0804 
.text           C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE[2496] USER32.dll!SetWinEventHook                                   7740507E 5 Bytes  JMP 000F01F8 
.text           C:\Program Files\Avira\AntiVir Desktop\AVWEBGRD.EXE[2496] USER32.dll!SetWindowsHookExA                                 77426DFA 5 Bytes  JMP 000F0600 
.text           C:\windows\system32\svchost.exe[2824] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\svchost.exe[2824] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\svchost.exe[2824] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[2824] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00190A08 
.text           C:\windows\system32\svchost.exe[2824] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 001903FC 
.text           C:\windows\system32\svchost.exe[2824] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00190804 
.text           C:\windows\system32\svchost.exe[2824] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 001901F8 
.text           C:\windows\system32\svchost.exe[2824] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00190600 
.text           C:\Windows\System32\hkcmd.exe[2936] ntdll.dll!LdrUnloadDll                                                             7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Windows\System32\hkcmd.exe[2936] ntdll.dll!LdrLoadDll                                                               7751F425 5 Bytes  JMP 001601F8 
.text           C:\Windows\System32\hkcmd.exe[2936] kernel32.dll!GetBinaryTypeW + 70                                                   76CE78FC 1 Byte  [62]
.text           C:\Windows\System32\hkcmd.exe[2936] USER32.dll!UnhookWindowsHookEx                                                     773FCC7B 5 Bytes  JMP 00210A08 
.text           C:\Windows\System32\hkcmd.exe[2936] USER32.dll!UnhookWinEvent                                                          773FD924 5 Bytes  JMP 002103FC 
.text           C:\Windows\System32\hkcmd.exe[2936] USER32.dll!SetWindowsHookExW                                                       7740210A 5 Bytes  JMP 00210804 
.text           C:\Windows\System32\hkcmd.exe[2936] USER32.dll!SetWinEventHook                                                         7740507E 5 Bytes  JMP 002101F8 
.text           C:\Windows\System32\hkcmd.exe[2936] USER32.dll!SetWindowsHookExA                                                       77426DFA 5 Bytes  JMP 00210600 
.text           C:\Windows\System32\igfxpers.exe[2964] ntdll.dll!LdrUnloadDll                                                          7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Windows\System32\igfxpers.exe[2964] ntdll.dll!LdrLoadDll                                                            7751F425 5 Bytes  JMP 001601F8 
.text           C:\Windows\System32\igfxpers.exe[2964] kernel32.dll!GetBinaryTypeW + 70                                                76CE78FC 1 Byte  [62]
.text           C:\Windows\System32\igfxpers.exe[2964] USER32.dll!UnhookWindowsHookEx                                                  773FCC7B 5 Bytes  JMP 00200A08 
.text           C:\Windows\System32\igfxpers.exe[2964] USER32.dll!UnhookWinEvent                                                       773FD924 5 Bytes  JMP 002003FC 
.text           C:\Windows\System32\igfxpers.exe[2964] USER32.dll!SetWindowsHookExW                                                    7740210A 5 Bytes  JMP 00200804 
.text           C:\Windows\System32\igfxpers.exe[2964] USER32.dll!SetWinEventHook                                                      7740507E 5 Bytes  JMP 002001F8 
.text           C:\Windows\System32\igfxpers.exe[2964] USER32.dll!SetWindowsHookExA                                                    77426DFA 5 Bytes  JMP 00200600 
.text           C:\windows\system32\igfxsrvc.exe[2972] ntdll.dll!LdrUnloadDll                                                          7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\windows\system32\igfxsrvc.exe[2972] ntdll.dll!LdrLoadDll                                                            7751F425 5 Bytes  JMP 001601F8 
.text           C:\windows\system32\igfxsrvc.exe[2972] kernel32.dll!GetBinaryTypeW + 70                                                76CE78FC 1 Byte  [62]
.text           C:\windows\system32\igfxsrvc.exe[2972] USER32.dll!UnhookWindowsHookEx                                                  773FCC7B 5 Bytes  JMP 002F0A08 
.text           C:\windows\system32\igfxsrvc.exe[2972] USER32.dll!UnhookWinEvent                                                       773FD924 5 Bytes  JMP 002F03FC 
.text           C:\windows\system32\igfxsrvc.exe[2972] USER32.dll!SetWindowsHookExW                                                    7740210A 5 Bytes  JMP 002F0804 
.text           C:\windows\system32\igfxsrvc.exe[2972] USER32.dll!SetWinEventHook                                                      7740507E 5 Bytes  JMP 002F01F8 
.text           C:\windows\system32\igfxsrvc.exe[2972] USER32.dll!SetWindowsHookExA                                                    77426DFA 5 Bytes  JMP 002F0600 
.text           C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe[3056] KERNEL32.dll!GetBinaryTypeW + 70                   76CE78FC 1 Byte  [62]
.text           C:\windows\system32\AUDIODG.EXE[3120] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3184] ntdll.dll!LdrUnloadDll                                           7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3184] ntdll.dll!LdrLoadDll                                             7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3184] kernel32.dll!GetBinaryTypeW + 70                                 76CE78FC 1 Byte  [62]
.text           C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3184] USER32.dll!UnhookWindowsHookEx                                   773FCC7B 5 Bytes  JMP 00200A08 
.text           C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3184] USER32.dll!UnhookWinEvent                                        773FD924 5 Bytes  JMP 002003FC 
.text           C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3184] USER32.dll!SetWindowsHookExW                                     7740210A 5 Bytes  JMP 00200804 
.text           C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3184] USER32.dll!SetWinEventHook                                       7740507E 5 Bytes  JMP 002001F8 
.text           C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe[3184] USER32.dll!SetWindowsHookExA                                     77426DFA 5 Bytes  JMP 00200600 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe[3196] ntdll.dll!LdrUnloadDll                          7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe[3196] ntdll.dll!LdrLoadDll                            7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe[3196] kernel32.dll!GetBinaryTypeW + 70                76CE78FC 1 Byte  [62]
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe[3196] USER32.dll!UnhookWindowsHookEx                  773FCC7B 5 Bytes  JMP 001F0A08 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe[3196] USER32.dll!UnhookWinEvent                       773FD924 5 Bytes  JMP 001F03FC 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe[3196] USER32.dll!SetWindowsHookExW                    7740210A 5 Bytes  JMP 001F0804 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe[3196] USER32.dll!SetWinEventHook                      7740507E 5 Bytes  JMP 001F01F8 
.text           C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe[3196] USER32.dll!SetWindowsHookExA                    77426DFA 5 Bytes  JMP 001F0600 
.text           C:\Program Files\System Control Manager\MGSysCtrl.exe[3228] ntdll.dll!LdrUnloadDll                                     7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\System Control Manager\MGSysCtrl.exe[3228] ntdll.dll!LdrLoadDll                                       7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\System Control Manager\MGSysCtrl.exe[3228] kernel32.dll!GetBinaryTypeW + 70                           76CE78FC 1 Byte  [62]
.text           C:\Program Files\System Control Manager\MGSysCtrl.exe[3228] USER32.dll!UnhookWindowsHookEx                             773FCC7B 5 Bytes  JMP 00300A08 
.text           C:\Program Files\System Control Manager\MGSysCtrl.exe[3228] USER32.dll!UnhookWinEvent                                  773FD924 5 Bytes  JMP 003003FC 
.text           C:\Program Files\System Control Manager\MGSysCtrl.exe[3228] USER32.dll!SetWindowsHookExW                               7740210A 5 Bytes  JMP 00300804 
.text           C:\Program Files\System Control Manager\MGSysCtrl.exe[3228] USER32.dll!SetWinEventHook                                 7740507E 5 Bytes  JMP 003001F8 
.text           C:\Program Files\System Control Manager\MGSysCtrl.exe[3228] USER32.dll!SetWindowsHookExA                               77426DFA 5 Bytes  JMP 00300600 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe[3324] ntdll.dll!LdrUnloadDll                 7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe[3324] ntdll.dll!LdrLoadDll                   7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe[3324] kernel32.dll!GetBinaryTypeW + 70       76CE78FC 1 Byte  [62]
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe[3324] USER32.dll!UnhookWindowsHookEx         773FCC7B 5 Bytes  JMP 001F0A08 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe[3324] USER32.dll!UnhookWinEvent              773FD924 5 Bytes  JMP 001F03FC 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe[3324] USER32.dll!SetWindowsHookExW           7740210A 5 Bytes  JMP 001F0804 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe[3324] USER32.dll!SetWinEventHook             7740507E 5 Bytes  JMP 001F01F8 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe[3324] USER32.dll!SetWindowsHookExA           77426DFA 5 Bytes  JMP 001F0600 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac[3464] ntdll.dll!LdrUnloadDll                    7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac[3464] ntdll.dll!LdrLoadDll                      7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac[3464] kernel32.dll!GetBinaryTypeW + 70          76CE78FC 1 Byte  [62]
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac[3464] USER32.dll!UnhookWindowsHookEx            773FCC7B 5 Bytes  JMP 00540A08 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac[3464] USER32.dll!UnhookWinEvent                 773FD924 5 Bytes  JMP 005403FC 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac[3464] USER32.dll!SetWindowsHookExW              7740210A 5 Bytes  JMP 00540804 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac[3464] USER32.dll!SetWinEventHook                7740507E 5 Bytes  JMP 005401F8 
.text           C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ArcCon.ac[3464] USER32.dll!SetWindowsHookExA              77426DFA 5 Bytes  JMP 00540600 
.text           C:\windows\system32\wbem\unsecapp.exe[3476] ntdll.dll!LdrUnloadDll                                                     7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\wbem\unsecapp.exe[3476] ntdll.dll!LdrLoadDll                                                       7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\wbem\unsecapp.exe[3476] kernel32.dll!GetBinaryTypeW + 70                                           76CE78FC 1 Byte  [62]
.text           C:\windows\system32\wbem\unsecapp.exe[3476] USER32.dll!UnhookWindowsHookEx                                             773FCC7B 5 Bytes  JMP 000F0A08 
.text           C:\windows\system32\wbem\unsecapp.exe[3476] USER32.dll!UnhookWinEvent                                                  773FD924 5 Bytes  JMP 000F03FC 
.text           C:\windows\system32\wbem\unsecapp.exe[3476] USER32.dll!SetWindowsHookExW                                               7740210A 5 Bytes  JMP 000F0804 
.text           C:\windows\system32\wbem\unsecapp.exe[3476] USER32.dll!SetWinEventHook                                                 7740507E 5 Bytes  JMP 000F01F8 
.text           C:\windows\system32\wbem\unsecapp.exe[3476] USER32.dll!SetWindowsHookExA                                               77426DFA 5 Bytes  JMP 000F0600 
.text           C:\Windows\WindowsMobile\wmdc.exe[3520] ntdll.dll!LdrUnloadDll                                                         7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\Windows\WindowsMobile\wmdc.exe[3520] ntdll.dll!LdrLoadDll                                                           7751F425 5 Bytes  JMP 000601F8 
.text           C:\Windows\WindowsMobile\wmdc.exe[3520] kernel32.dll!GetBinaryTypeW + 70                                               76CE78FC 1 Byte  [62]
.text           C:\Windows\WindowsMobile\wmdc.exe[3520] USER32.dll!UnhookWindowsHookEx                                                 773FCC7B 5 Bytes  JMP 00140A08 
.text           C:\Windows\WindowsMobile\wmdc.exe[3520] USER32.dll!UnhookWinEvent                                                      773FD924 5 Bytes  JMP 001403FC 
.text           C:\Windows\WindowsMobile\wmdc.exe[3520] USER32.dll!SetWindowsHookExW                                                   7740210A 5 Bytes  JMP 00140804 
.text           C:\Windows\WindowsMobile\wmdc.exe[3520] USER32.dll!SetWinEventHook                                                     7740507E 5 Bytes  JMP 001401F8 
.text           C:\Windows\WindowsMobile\wmdc.exe[3520] USER32.dll!SetWindowsHookExA                                                   77426DFA 5 Bytes  JMP 00140600 
.text           C:\windows\system32\wbem\wmiprvse.exe[3532] ntdll.dll!LdrUnloadDll                                                     7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\wbem\wmiprvse.exe[3532] ntdll.dll!LdrLoadDll                                                       7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\wbem\wmiprvse.exe[3532] kernel32.dll!GetBinaryTypeW + 70                                           76CE78FC 1 Byte  [62]
.text           C:\windows\system32\wbem\wmiprvse.exe[3532] USER32.dll!UnhookWindowsHookEx                                             773FCC7B 5 Bytes  JMP 00140A08 
.text           C:\windows\system32\wbem\wmiprvse.exe[3532] USER32.dll!UnhookWinEvent                                                  773FD924 5 Bytes  JMP 001403FC 
.text           C:\windows\system32\wbem\wmiprvse.exe[3532] USER32.dll!SetWindowsHookExW                                               7740210A 5 Bytes  JMP 00140804 
.text           C:\windows\system32\wbem\wmiprvse.exe[3532] USER32.dll!SetWinEventHook                                                 7740507E 5 Bytes  JMP 001401F8 
.text           C:\windows\system32\wbem\wmiprvse.exe[3532] USER32.dll!SetWindowsHookExA                                               77426DFA 5 Bytes  JMP 00140600 
.text           C:\windows\system32\SearchIndexer.exe[3572] ntdll.dll!LdrUnloadDll                                                     7751BD1F 5 Bytes  JMP 000D03FC 
.text           C:\windows\system32\SearchIndexer.exe[3572] ntdll.dll!LdrLoadDll                                                       7751F425 5 Bytes  JMP 000D01F8 
.text           C:\windows\system32\SearchIndexer.exe[3572] kernel32.dll!GetBinaryTypeW + 70                                           76CE78FC 1 Byte  [62]
.text           C:\windows\system32\SearchIndexer.exe[3572] USER32.dll!UnhookWindowsHookEx                                             773FCC7B 5 Bytes  JMP 00170A08 
.text           C:\windows\system32\SearchIndexer.exe[3572] USER32.dll!UnhookWinEvent                                                  773FD924 5 Bytes  JMP 001703FC 
.text           C:\windows\system32\SearchIndexer.exe[3572] USER32.dll!SetWindowsHookExW                                               7740210A 5 Bytes  JMP 00170804 
.text           C:\windows\system32\SearchIndexer.exe[3572] USER32.dll!SetWinEventHook                                                 7740507E 5 Bytes  JMP 001701F8 
.text           C:\windows\system32\SearchIndexer.exe[3572] USER32.dll!SetWindowsHookExA                                               77426DFA 5 Bytes  JMP 00170600 
.text           C:\Program Files\Samsung\Kies\KiesTrayAgent.exe[3672] ntdll.dll!LdrUnloadDll                                           7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Samsung\Kies\KiesTrayAgent.exe[3672] ntdll.dll!LdrLoadDll                                             7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Samsung\Kies\KiesTrayAgent.exe[3672] kernel32.dll!GetBinaryTypeW + 70                                 76CE78FC 1 Byte  [62]
.text           C:\Program Files\Samsung\Kies\KiesTrayAgent.exe[3672] USER32.dll!UnhookWindowsHookEx                                   773FCC7B 5 Bytes  JMP 001F0A08 
.text           C:\Program Files\Samsung\Kies\KiesTrayAgent.exe[3672] USER32.dll!UnhookWinEvent                                        773FD924 5 Bytes  JMP 001F03FC 
.text           C:\Program Files\Samsung\Kies\KiesTrayAgent.exe[3672] USER32.dll!SetWindowsHookExW                                     7740210A 5 Bytes  JMP 001F0804 
.text           C:\Program Files\Samsung\Kies\KiesTrayAgent.exe[3672] USER32.dll!SetWinEventHook                                       7740507E 5 Bytes  JMP 001F01F8 
.text           C:\Program Files\Samsung\Kies\KiesTrayAgent.exe[3672] USER32.dll!SetWindowsHookExA                                     77426DFA 5 Bytes  JMP 001F0600 
.text           C:\Program Files\ATI Technologies\ATI.ACE\Core-Static\CCC.exe[3700] KERNEL32.dll!GetBinaryTypeW + 70                   76CE78FC 1 Byte  [62]
.text           C:\windows\system32\svchost.exe[3712] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\svchost.exe[3712] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\svchost.exe[3712] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[3736] ntdll.dll!LdrUnloadDll                                      7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[3736] ntdll.dll!LdrLoadDll                                        7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[3736] kernel32.dll!GetBinaryTypeW + 70                            76CE78FC 1 Byte  [62]
.text           C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[3736] USER32.dll!UnhookWindowsHookEx                              773FCC7B 5 Bytes  JMP 002F0A08 
.text           C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[3736] USER32.dll!UnhookWinEvent                                   773FD924 5 Bytes  JMP 002F03FC 
.text           C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[3736] USER32.dll!SetWindowsHookExW                                7740210A 5 Bytes  JMP 002F0804 
.text           C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[3736] USER32.dll!SetWinEventHook                                  7740507E 5 Bytes  JMP 002F01F8 
.text           C:\Program Files\HP\HP Software Update\hpwuSchd2.exe[3736] USER32.dll!SetWindowsHookExA                                77426DFA 5 Bytes  JMP 002F0600 
.text           C:\Program Files\Ask.com\Updater\Updater.exe[3824] ntdll.dll!LdrUnloadDll                                              7751BD1F 5 Bytes  JMP 000703FC 
.text           C:\Program Files\Ask.com\Updater\Updater.exe[3824] ntdll.dll!LdrLoadDll                                                7751F425 5 Bytes  JMP 000701F8 
.text           C:\Program Files\Ask.com\Updater\Updater.exe[3824] kernel32.dll!GetBinaryTypeW + 70                                    76CE78FC 1 Byte  [62]
.text           C:\Program Files\Ask.com\Updater\Updater.exe[3824] USER32.dll!UnhookWindowsHookEx                                      773FCC7B 5 Bytes  JMP 00100A08 
.text           C:\Program Files\Ask.com\Updater\Updater.exe[3824] USER32.dll!UnhookWinEvent                                           773FD924 5 Bytes  JMP 001003FC 
.text           C:\Program Files\Ask.com\Updater\Updater.exe[3824] USER32.dll!SetWindowsHookExW                                        7740210A 5 Bytes  JMP 00100804 
.text           C:\Program Files\Ask.com\Updater\Updater.exe[3824] USER32.dll!SetWinEventHook                                          7740507E 5 Bytes  JMP 001001F8 
.text           C:\Program Files\Ask.com\Updater\Updater.exe[3824] USER32.dll!SetWindowsHookExA                                        77426DFA 5 Bytes  JMP 00100600 
.text           C:\Program Files\Avira\AntiVir Desktop\avgnt.exe[3908] ntdll.dll!LdrUnloadDll                                          7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\Program Files\Avira\AntiVir Desktop\avgnt.exe[3908] ntdll.dll!LdrLoadDll                                            7751F425 5 Bytes  JMP 000601F8 
.text           C:\Program Files\Avira\AntiVir Desktop\avgnt.exe[3908] kernel32.dll!GetBinaryTypeW + 70                                76CE78FC 1 Byte  [62]
.text           C:\Program Files\Avira\AntiVir Desktop\avgnt.exe[3908] USER32.dll!UnhookWindowsHookEx                                  773FCC7B 5 Bytes  JMP 000F0A08 
.text           C:\Program Files\Avira\AntiVir Desktop\avgnt.exe[3908] USER32.dll!UnhookWinEvent                                       773FD924 5 Bytes  JMP 000F03FC 
.text           C:\Program Files\Avira\AntiVir Desktop\avgnt.exe[3908] USER32.dll!SetWindowsHookExW                                    7740210A 5 Bytes  JMP 000F0804 
.text           C:\Program Files\Avira\AntiVir Desktop\avgnt.exe[3908] USER32.dll!SetWinEventHook                                      7740507E 5 Bytes  JMP 000F01F8 
.text           C:\Program Files\Avira\AntiVir Desktop\avgnt.exe[3908] USER32.dll!SetWindowsHookExA                                    77426DFA 5 Bytes  JMP 000F0600 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[3920] ntdll.dll!LdrUnloadDll                                   7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[3920] ntdll.dll!LdrLoadDll                                     7751F425 5 Bytes  JMP 000601F8 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[3920] kernel32.dll!GetBinaryTypeW + 70                         76CE78FC 1 Byte  [62]
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[3920] USER32.dll!UnhookWindowsHookEx                           773FCC7B 5 Bytes  JMP 00110A08 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[3920] USER32.dll!UnhookWinEvent                                773FD924 5 Bytes  JMP 001103FC 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[3920] USER32.dll!SetWindowsHookExW                             7740210A 5 Bytes  JMP 00110804 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[3920] USER32.dll!SetWinEventHook                               7740507E 5 Bytes  JMP 001101F8 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[3920] USER32.dll!SetWindowsHookExA                             77426DFA 5 Bytes  JMP 00110600 
.text           C:\Program Files\Common Files\Java\Java Update\jusched.exe[3936] ntdll.dll!LdrUnloadDll                                7751BD1F 5 Bytes  JMP 001703FC 
.text           C:\Program Files\Common Files\Java\Java Update\jusched.exe[3936] ntdll.dll!LdrLoadDll                                  7751F425 5 Bytes  JMP 001701F8 
.text           C:\Program Files\Common Files\Java\Java Update\jusched.exe[3936] kernel32.dll!GetBinaryTypeW + 70                      76CE78FC 1 Byte  [62]
.text           C:\Program Files\Common Files\Java\Java Update\jusched.exe[3936] USER32.dll!UnhookWindowsHookEx                        773FCC7B 5 Bytes  JMP 00210A08 
.text           C:\Program Files\Common Files\Java\Java Update\jusched.exe[3936] USER32.dll!UnhookWinEvent                             773FD924 5 Bytes  JMP 002103FC 
.text           C:\Program Files\Common Files\Java\Java Update\jusched.exe[3936] USER32.dll!SetWindowsHookExW                          7740210A 5 Bytes  JMP 00210804 
.text           C:\Program Files\Common Files\Java\Java Update\jusched.exe[3936] USER32.dll!SetWinEventHook                            7740507E 5 Bytes  JMP 002101F8 
.text           C:\Program Files\Common Files\Java\Java Update\jusched.exe[3936] USER32.dll!SetWindowsHookExA                          77426DFA 5 Bytes  JMP 00210600 
.text           C:\windows\system32\wuauclt.exe[4188] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000703FC 
.text           C:\windows\system32\wuauclt.exe[4188] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000701F8 
.text           C:\windows\system32\wuauclt.exe[4188] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\wuauclt.exe[4188] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00110A08 
.text           C:\windows\system32\wuauclt.exe[4188] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 001103FC 
.text           C:\windows\system32\wuauclt.exe[4188] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00110804 
.text           C:\windows\system32\wuauclt.exe[4188] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 001101F8 
.text           C:\windows\system32\wuauclt.exe[4188] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00110600 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[4220] ntdll.dll!LdrUnloadDll                                      7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[4220] ntdll.dll!LdrLoadDll                                        7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[4220] kernel32.dll!GetBinaryTypeW + 70                            76CE78FC 1 Byte  [62]
.text           C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[4220] USER32.dll!UnhookWindowsHookEx                              773FCC7B 5 Bytes  JMP 001F0A08 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[4220] USER32.dll!UnhookWinEvent                                   773FD924 5 Bytes  JMP 001F03FC 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[4220] USER32.dll!SetWindowsHookExW                                7740210A 5 Bytes  JMP 001F0804 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[4220] USER32.dll!SetWinEventHook                                  7740507E 5 Bytes  JMP 001F01F8 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe[4220] USER32.dll!SetWindowsHookExA                                77426DFA 5 Bytes  JMP 001F0600 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[4268] ntdll.dll!LdrUnloadDll                                      7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[4268] ntdll.dll!LdrLoadDll                                        7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[4268] kernel32.dll!GetBinaryTypeW + 70                            76CE78FC 1 Byte  [62]
.text           C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[4268] USER32.dll!UnhookWindowsHookEx                              773FCC7B 5 Bytes  JMP 00180A08 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[4268] USER32.dll!UnhookWinEvent                                   773FD924 5 Bytes  JMP 001803FC 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[4268] USER32.dll!SetWindowsHookExW                                7740210A 5 Bytes  JMP 00180804 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[4268] USER32.dll!SetWinEventHook                                  7740507E 5 Bytes  JMP 001801F8 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe[4268] USER32.dll!SetWindowsHookExA                                77426DFA 5 Bytes  JMP 00180600 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[4324] ntdll.dll!LdrUnloadDll                                      7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[4324] ntdll.dll!LdrLoadDll                                        7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[4324] kernel32.dll!GetBinaryTypeW + 70                            76CE78FC 1 Byte  [62]
.text           C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[4324] USER32.dll!UnhookWindowsHookEx                              773FCC7B 5 Bytes  JMP 001F0A08 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[4324] USER32.dll!UnhookWinEvent                                   773FD924 5 Bytes  JMP 001F03FC 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[4324] USER32.dll!SetWindowsHookExW                                7740210A 5 Bytes  JMP 001F0804 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[4324] USER32.dll!SetWinEventHook                                  7740507E 5 Bytes  JMP 001F01F8 
.text           C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe[4324] USER32.dll!SetWindowsHookExA                                77426DFA 5 Bytes  JMP 001F0600 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe[4332] ntdll.dll!LdrUnloadDll                    7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe[4332] ntdll.dll!LdrLoadDll                      7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe[4332] kernel32.dll!SetUnhandledExceptionFilter  76CD30E2 5 Bytes  JMP 00468140 C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe (DeviceManager.exe/Mobileleader Co., Ltd.)
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe[4332] kernel32.dll!GetBinaryTypeW + 70          76CE78FC 1 Byte  [62]
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe[4332] USER32.dll!UnhookWindowsHookEx            773FCC7B 5 Bytes  JMP 001F0A08 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe[4332] USER32.dll!UnhookWinEvent                 773FD924 5 Bytes  JMP 001F03FC 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe[4332] USER32.dll!SetWindowsHookExW              7740210A 5 Bytes  JMP 001F0804 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe[4332] USER32.dll!SetWinEventHook                7740507E 5 Bytes  JMP 001F01F8 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\DeviceManager.exe[4332] USER32.dll!SetWindowsHookExA              77426DFA 5 Bytes  JMP 001F0600 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\ConnectionManager.exe[4356] ntdll.dll!LdrUnloadDll                7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\ConnectionManager.exe[4356] ntdll.dll!LdrLoadDll                  7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\ConnectionManager.exe[4356] kernel32.dll!GetBinaryTypeW + 70      76CE78FC 1 Byte  [62]
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\ConnectionManager.exe[4356] USER32.dll!UnhookWindowsHookEx        773FCC7B 5 Bytes  JMP 00200A08 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\ConnectionManager.exe[4356] USER32.dll!UnhookWinEvent             773FD924 5 Bytes  JMP 002003FC 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\ConnectionManager.exe[4356] USER32.dll!SetWindowsHookExW          7740210A 5 Bytes  JMP 00200804 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\ConnectionManager.exe[4356] USER32.dll!SetWinEventHook            7740507E 5 Bytes  JMP 002001F8 
.text           C:\Program Files\Samsung\Kies\External\DeviceModules\ConnectionManager.exe[4356] USER32.dll!SetWindowsHookExA          77426DFA 5 Bytes  JMP 00200600 
.text           C:\windows\system32\taskeng.exe[4536] ntdll.dll!LdrUnloadDll                                                           7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\windows\system32\taskeng.exe[4536] ntdll.dll!LdrLoadDll                                                             7751F425 5 Bytes  JMP 000601F8 
.text           C:\windows\system32\taskeng.exe[4536] kernel32.dll!GetBinaryTypeW + 70                                                 76CE78FC 1 Byte  [62]
.text           C:\windows\system32\taskeng.exe[4536] USER32.dll!UnhookWindowsHookEx                                                   773FCC7B 5 Bytes  JMP 00130A08 
.text           C:\windows\system32\taskeng.exe[4536] USER32.dll!UnhookWinEvent                                                        773FD924 5 Bytes  JMP 001303FC 
.text           C:\windows\system32\taskeng.exe[4536] USER32.dll!SetWindowsHookExW                                                     7740210A 5 Bytes  JMP 00130804 
.text           C:\windows\system32\taskeng.exe[4536] USER32.dll!SetWinEventHook                                                       7740507E 5 Bytes  JMP 001301F8 
.text           C:\windows\system32\taskeng.exe[4536] USER32.dll!SetWindowsHookExA                                                     77426DFA 5 Bytes  JMP 00130600 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[4752] ntdll.dll!LdrUnloadDll                               7751BD1F 5 Bytes  JMP 000603FC 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[4752] ntdll.dll!LdrLoadDll                                 7751F425 5 Bytes  JMP 000601F8 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[4752] kernel32.dll!GetBinaryTypeW + 70                     76CE78FC 1 Byte  [62]
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[4752] USER32.dll!UnhookWindowsHookEx                       773FCC7B 5 Bytes  JMP 00AB0A08 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[4752] USER32.dll!UnhookWinEvent                            773FD924 5 Bytes  JMP 00AB03FC 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[4752] USER32.dll!SetWindowsHookExW                         7740210A 5 Bytes  JMP 00AB0804 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[4752] USER32.dll!SetWinEventHook                           7740507E 5 Bytes  JMP 00AB01F8 
.text           C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[4752] USER32.dll!SetWindowsHookExA                         77426DFA 5 Bytes  JMP 00AB0600 
.text           C:\Users\Ari\Downloads\q0ncg1sr.exe[5504] ntdll.dll!LdrUnloadDll                                                       7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Users\Ari\Downloads\q0ncg1sr.exe[5504] ntdll.dll!LdrLoadDll                                                         7751F425 5 Bytes  JMP 001601F8 
.text           C:\Users\Ari\Downloads\q0ncg1sr.exe[5504] kernel32.dll!GetBinaryTypeW + 70                                             76CE78FC 1 Byte  [62]
.text           C:\Users\Ari\Downloads\q0ncg1sr.exe[5504] USER32.dll!UnhookWindowsHookEx                                               773FCC7B 5 Bytes  JMP 00210A08 
.text           C:\Users\Ari\Downloads\q0ncg1sr.exe[5504] USER32.dll!UnhookWinEvent                                                    773FD924 5 Bytes  JMP 002103FC 
.text           C:\Users\Ari\Downloads\q0ncg1sr.exe[5504] USER32.dll!SetWindowsHookExW                                                 7740210A 5 Bytes  JMP 00210804 
.text           C:\Users\Ari\Downloads\q0ncg1sr.exe[5504] USER32.dll!SetWinEventHook                                                   7740507E 5 Bytes  JMP 002101F8 
.text           C:\Users\Ari\Downloads\q0ncg1sr.exe[5504] USER32.dll!SetWindowsHookExA                                                 77426DFA 5 Bytes  JMP 00210600 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5684] ntdll.dll!LdrUnloadDll                  7751BD1F 5 Bytes  JMP 001603FC 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5684] ntdll.dll!LdrLoadDll                    7751F425 5 Bytes  JMP 001601F8 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5684] kernel32.dll!GetBinaryTypeW + 70        76CE78FC 1 Byte  [62]
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5684] USER32.dll!UnhookWindowsHookEx          773FCC7B 5 Bytes  JMP 00340A08 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5684] USER32.dll!UnhookWinEvent               773FD924 5 Bytes  JMP 003403FC 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5684] USER32.dll!SetWindowsHookExW            7740210A 5 Bytes  JMP 00340804 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5684] USER32.dll!SetWinEventHook              7740507E 5 Bytes  JMP 003401F8 
.text           C:\Program Files\Intel\Intel(R) Management Engine Components\UNS\UNS.exe[5684] USER32.dll!SetWindowsHookExA            77426DFA 5 Bytes  JMP 00340600 
 
---- Devices - GMER 1.0.15 ----
 
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume1                                                                                 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume2                                                                                 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume3                                                                                 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
AttachedDevice  \Driver\volmgr \Device\HarddiskVolume4                                                                                 fvevol.sys (BitLocker Drive Encryption Driver/Microsoft Corporation)
 
Device          \Driver\ACPI_HAL \Device\0000004e                                                                                      halmacpi.dll (Hardware Abstraction Layer DLL/Microsoft Corporation)
 
---- Threads - GMER 1.0.15 ----
 
Thread          System [4:1660]                                                                                                        BCE32F2E
 
---- Registry - GMER 1.0.15 ----
 
Reg             HKLM\SYSTEM\CurrentControlSet\services\BTHPORT\Parameters\Keys\002421d25b11                                            
Reg             HKLM\SYSTEM\ControlSet002\services\BTHPORT\Parameters\Keys\002421d25b11 (not active ControlSet)                        
 
---- EOF - GMER 1.0.15 ----
         

 

Themen zu Windows-Verschlüsselungs-Trojaner auf Win7
administrator, anti-malware, appdata, audiodg.exe, autostart, avira searchfree toolbar, branding, bösartige, ccc.exe, code, dateien, dateisystem, daten, device driver, document, erfolgreich, explorer, gelöscht, heuristiks/extra, heuristiks/shuriken, locker, malwarebytes, microsoft, minute, mom.exe, ntdll.dll, plug-in, quarantäne, registrierung, roaming, searchscopes, software, speicher, test, trojan.fakealert, trojaner, version, version=1.0, win7, windows




Ähnliche Themen: Windows-Verschlüsselungs-Trojaner auf Win7


  1. Hilfe Win7 mit Verschlüsselungs Trojaner mit Dateibezeichnung AaynjEyLjEqnQrJgQNv
    Plagegeister aller Art und deren Bekämpfung - 21.11.2012 (15)
  2. SUISA-Trojaner (Verschlüsselungs-Trojaner) befall auf HP-Pro-Laptop Win7 64Bit
    Plagegeister aller Art und deren Bekämpfung - 06.09.2012 (19)
  3. Windows-Verschlüsselungs-Trojaner unter Windows 7 auf einem MAC
    Log-Analyse und Auswertung - 14.06.2012 (3)
  4. Windows Verschlüsselungs Trojaner
    Plagegeister aller Art und deren Bekämpfung - 13.06.2012 (1)
  5. Windows Verschlüsselungs Trojaner
    Plagegeister aller Art und deren Bekämpfung - 07.06.2012 (7)
  6. Willkomen bei Windows Update, Sie haben sich mit einen Windows-Verschlüsselungs Trojaner infiziert.
    Log-Analyse und Auswertung - 06.06.2012 (1)
  7. 100€ Windows Verschlüsselungs-Trojaner
    Plagegeister aller Art und deren Bekämpfung - 06.06.2012 (33)
  8. Windows- Verschlüsselungs Trojaner
    Plagegeister aller Art und deren Bekämpfung - 25.05.2012 (10)
  9. Windows Verschlüsselungs-Trojaner / OTL log
    Log-Analyse und Auswertung - 22.05.2012 (6)
  10. windows verschlüsselungs trojaner win7
    Log-Analyse und Auswertung - 20.05.2012 (1)
  11. Windows 7 (64bit) Virus/Trojaner (evtl. Windows Verschlüsselungs Trojaner)
    Plagegeister aller Art und deren Bekämpfung - 07.05.2012 (19)
  12. Infiziert mit Windows-Verschlüsselungs Trojaner -Mail mit Telefonrechnung - windows vista
    Plagegeister aller Art und deren Bekämpfung - 06.05.2012 (12)
  13. Verschlüsselungs-Trojaner Win7
    Plagegeister aller Art und deren Bekämpfung - 03.05.2012 (3)
  14. Windows Verschlüsselungs-Trojaner
    Plagegeister aller Art und deren Bekämpfung - 02.05.2012 (6)
  15. Windows verschlüsselungs Trojaner
    Log-Analyse und Auswertung - 30.04.2012 (23)
  16. "Willkommen bei Windows Update Sie haben sich mit einen Windows-Verschlüsselungs Trojaner infiziert.
    Log-Analyse und Auswertung - 27.04.2012 (3)
  17. Windows Verschlüsselungs-Trojaner
    Log-Analyse und Auswertung - 25.04.2012 (1)

Zum Thema Windows-Verschlüsselungs-Trojaner auf Win7 - Hallo, auch wir haben uns den Trojaner eingefangen. System: Windows 7, 32bit-Version Hier die Daten des Scans: Code: Alles auswählen Aufklappen ATTFilter Malwarebytes Anti-Malware (Test) 1.61.0.1400 www.malwarebytes.org Datenbank Version: v2012.06.12.03 - Windows-Verschlüsselungs-Trojaner auf Win7...
Archiv
Du betrachtest: Windows-Verschlüsselungs-Trojaner auf Win7 auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.