Hallo,
sorry für die späte Meldung, es geht nicht um meinen PC sondern um den von einem Kumpel und der ist bereits an Schritt 1 gescheitert
Hier mal das Logfile von Schritt 1
Code:
Alles auswählen Aufklappen ATTFilter
========== OTL ==========
Registry value HKEY_USERS\lech_ON_C\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell:C:\Users\lech\AppData\Roaming\skype.dat deleted successfully.
C:\Users\lech\AppData\Roaming\skype.dat moved successfully.
C:\Users\lech\AppData\Roaming\skype.ini moved successfully.
OTLPE by OldTimer - Version 3.1.48.0 log created on 04182013_125722
Ich werde mich jetzt mal an die restlichen Schritte machen und euch auf dem Laufenden halten.
Code:
Alles auswählen Aufklappen ATTFilter
GMER 2.1.19163 - hxxp://www.gmer.net
Rootkit scan 2013-04-18 13:10:17
Windows 6.0.6002 Service Pack 2 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP2T0L0-2 WDC_WD1002FAEX-00Z3A0 rev.05.01D05 931,51GB
Running: dxlsxrgl.exe; Driver: C:\Users\lech\AppData\Local\Temp\pxldapow.sys
---- Kernel code sections - GMER 2.1 ----
INITKDBG C:\Windows\system32\ntoskrnl.exe suspicious modification
---- User code sections - GMER 2.1 ----
.text C:\Windows\system32\wininit.exe[640] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\system32\winlogon.exe[912] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\System32\svchost.exe[288] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\system32\atiesrxx.exe[492] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\System32\svchost.exe[752] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\System32\svchost.exe[888] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\system32\svchost.exe[652] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\system32\svchost.exe[1372] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 0000000077a517d7 5 bytes JMP 00000001000301f8
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077a53221 5 bytes JMP 00000001000303fc
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 0000000077a69578 5 bytes JMP 0000000100030600
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 0000000077a69608 5 bytes JMP 0000000100030804
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 0000000077a69758 5 bytes JMP 0000000100030c0c
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077a69ab8 5 bytes JMP 0000000100030a08
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 130 0000000076be4228 1 byte [62]
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 00000000759b010d 5 bytes JMP 0000000100080a08
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 00000000759b03d2 5 bytes JMP 0000000100080804
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 00000000759b1b58 5 bytes JMP 0000000100080600
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 00000000759b6530 5 bytes JMP 00000001000803fc
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\USER32.dll!SetWinEventHook 00000000759c653e 5 bytes JMP 00000001000801f8
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 0000000076fd9eb4 5 bytes JMP 00000001000903fc
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\ADVAPI32.dll!DeleteService 0000000076fda07e 5 bytes JMP 0000000100090600
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\ADVAPI32.dll!SetServiceObjectSecurity 0000000077016cd9 5 bytes JMP 0000000100091014
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigA 0000000077016dd9 5 bytes JMP 0000000100090804
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigW 0000000077016f81 5 bytes JMP 0000000100090a08
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2A 0000000077017099 5 bytes JMP 0000000100090c0c
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2W 00000000770171e1 5 bytes JMP 0000000100090e10
.text C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[1088] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000770172a1 5 bytes JMP 00000001000901f8
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 0000000077a517d7 5 bytes JMP 00000001000301f8
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077a53221 5 bytes JMP 00000001000303fc
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 0000000077a69578 5 bytes JMP 0000000100030600
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 0000000077a69608 5 bytes JMP 0000000100030804
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 0000000077a69758 5 bytes JMP 0000000100030c0c
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077a69ab8 5 bytes JMP 0000000100030a08
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 130 0000000076be4228 1 byte [62]
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 00000000759b010d 5 bytes JMP 0000000100080a08
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 00000000759b03d2 5 bytes JMP 0000000100080804
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 00000000759b1b58 5 bytes JMP 0000000100080600
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 00000000759b6530 5 bytes JMP 00000001000803fc
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\USER32.dll!SetWinEventHook 00000000759c653e 5 bytes JMP 00000001000801f8
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 0000000076fd9eb4 5 bytes JMP 00000001000903fc
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\ADVAPI32.dll!DeleteService 0000000076fda07e 5 bytes JMP 0000000100090600
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\ADVAPI32.dll!SetServiceObjectSecurity 0000000077016cd9 5 bytes JMP 0000000100091014
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigA 0000000077016dd9 5 bytes JMP 0000000100090804
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigW 0000000077016f81 5 bytes JMP 0000000100090a08
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2A 0000000077017099 5 bytes JMP 0000000100090c0c
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2W 00000000770171e1 5 bytes JMP 0000000100090e10
.text C:\Program Files (x86)\Nero\Update\NASvc.exe[1804] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000770172a1 5 bytes JMP 00000001000901f8
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 0000000077a517d7 5 bytes JMP 00000001000301f8
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077a53221 5 bytes JMP 00000001000303fc
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 0000000077a69578 5 bytes JMP 0000000100030600
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 0000000077a69608 5 bytes JMP 0000000100030804
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 0000000077a69758 5 bytes JMP 0000000100030c0c
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077a69ab8 5 bytes JMP 0000000100030a08
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 130 0000000076be4228 1 byte [62]
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 0000000076fd9eb4 5 bytes JMP 00000001001a03fc
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\ADVAPI32.dll!DeleteService 0000000076fda07e 5 bytes JMP 00000001001a0600
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\ADVAPI32.dll!SetServiceObjectSecurity 0000000077016cd9 5 bytes JMP 00000001001a1014
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigA 0000000077016dd9 5 bytes JMP 00000001001a0804
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigW 0000000077016f81 5 bytes JMP 00000001001a0a08
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2A 0000000077017099 5 bytes JMP 00000001001a0c0c
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2W 00000000770171e1 5 bytes JMP 00000001001a0e10
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000770172a1 5 bytes JMP 00000001001a01f8
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 00000000759b010d 5 bytes JMP 00000001001b0a08
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 00000000759b03d2 5 bytes JMP 00000001001b0804
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 00000000759b1b58 5 bytes JMP 00000001001b0600
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 00000000759b6530 5 bytes JMP 00000001001b03fc
.text C:\ProgramData\Skype\Toolbars\Skype C2C Service\c2c_service.exe[2364] C:\Windows\syswow64\USER32.dll!SetWinEventHook 00000000759c653e 5 bytes JMP 00000001001b01f8
.text C:\Windows\System32\svchost.exe[2464] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\system32\SearchIndexer.exe[2492] C:\Windows\system32\ntdll.dll!LdrUnloadDll 0000000077876d20 5 bytes JMP 000000010011075c
.text C:\Windows\system32\SearchIndexer.exe[2492] C:\Windows\system32\ntdll.dll!LdrLoadDll 0000000077893bd0 5 bytes JMP 00000001001103a4
.text C:\Windows\system32\SearchIndexer.exe[2492] C:\Windows\system32\ntdll.dll!NtAllocateVirtualMemory 00000000778a6ff0 5 bytes JMP 0000000100110b14
.text C:\Windows\system32\SearchIndexer.exe[2492] C:\Windows\system32\ntdll.dll!NtFreeVirtualMemory 00000000778a7050 5 bytes JMP 0000000100110ecc
.text C:\Windows\system32\SearchIndexer.exe[2492] C:\Windows\system32\ntdll.dll!NtTerminateProcess 00000000778a7130 5 bytes JMP 000000010011163c
.text C:\Windows\system32\SearchIndexer.exe[2492] C:\Windows\system32\ntdll.dll!NtProtectVirtualMemory 00000000778a7370 5 bytes JMP 0000000100111284
.text C:\Windows\system32\SearchIndexer.exe[2492] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\system32\Dwm.exe[2988] C:\Windows\system32\ntdll.dll!LdrUnloadDll 0000000077876d20 5 bytes JMP 000000010016075c
.text C:\Windows\system32\Dwm.exe[2988] C:\Windows\system32\ntdll.dll!LdrLoadDll 0000000077893bd0 5 bytes JMP 00000001001603a4
.text C:\Windows\system32\Dwm.exe[2988] C:\Windows\system32\ntdll.dll!NtAllocateVirtualMemory 00000000778a6ff0 5 bytes JMP 0000000100160b14
.text C:\Windows\system32\Dwm.exe[2988] C:\Windows\system32\ntdll.dll!NtFreeVirtualMemory 00000000778a7050 5 bytes JMP 0000000100160ecc
.text C:\Windows\system32\Dwm.exe[2988] C:\Windows\system32\ntdll.dll!NtTerminateProcess 00000000778a7130 5 bytes JMP 000000010016163c
.text C:\Windows\system32\Dwm.exe[2988] C:\Windows\system32\ntdll.dll!NtProtectVirtualMemory 00000000778a7370 5 bytes JMP 0000000100161284
.text C:\Windows\system32\Dwm.exe[2988] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\Explorer.EXE[3020] C:\Windows\system32\ntdll.dll!LdrUnloadDll 0000000077876d20 5 bytes JMP 000000010012075c
.text C:\Windows\Explorer.EXE[3020] C:\Windows\system32\ntdll.dll!LdrLoadDll 0000000077893bd0 5 bytes JMP 00000001001203a4
.text C:\Windows\Explorer.EXE[3020] C:\Windows\system32\ntdll.dll!NtAllocateVirtualMemory 00000000778a6ff0 5 bytes JMP 0000000100120b14
.text C:\Windows\Explorer.EXE[3020] C:\Windows\system32\ntdll.dll!NtFreeVirtualMemory 00000000778a7050 5 bytes JMP 0000000100120ecc
.text C:\Windows\Explorer.EXE[3020] C:\Windows\system32\ntdll.dll!NtTerminateProcess 00000000778a7130 5 bytes JMP 000000010012163c
.text C:\Windows\Explorer.EXE[3020] C:\Windows\system32\ntdll.dll!NtProtectVirtualMemory 00000000778a7370 5 bytes JMP 0000000100121284
.text C:\Windows\Explorer.EXE[3020] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\system32\taskeng.exe[3052] C:\Windows\system32\ntdll.dll!LdrUnloadDll 0000000077876d20 5 bytes JMP 000000010009075c
.text C:\Windows\system32\taskeng.exe[3052] C:\Windows\system32\ntdll.dll!LdrLoadDll 0000000077893bd0 5 bytes JMP 00000001000903a4
.text C:\Windows\system32\taskeng.exe[3052] C:\Windows\system32\ntdll.dll!NtAllocateVirtualMemory 00000000778a6ff0 5 bytes JMP 0000000100090b14
.text C:\Windows\system32\taskeng.exe[3052] C:\Windows\system32\ntdll.dll!NtFreeVirtualMemory 00000000778a7050 5 bytes JMP 0000000100090ecc
.text C:\Windows\system32\taskeng.exe[3052] C:\Windows\system32\ntdll.dll!NtTerminateProcess 00000000778a7130 5 bytes JMP 000000010009163c
.text C:\Windows\system32\taskeng.exe[3052] C:\Windows\system32\ntdll.dll!NtProtectVirtualMemory 00000000778a7370 5 bytes JMP 0000000100091284
.text C:\Windows\system32\taskeng.exe[3052] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\system32\SearchProtocolHost.exe[1744] C:\Windows\system32\ntdll.dll!LdrUnloadDll 0000000077876d20 5 bytes JMP 00000001001e075c
.text C:\Windows\system32\SearchProtocolHost.exe[1744] C:\Windows\system32\ntdll.dll!LdrLoadDll 0000000077893bd0 5 bytes JMP 00000001001e03a4
.text C:\Windows\system32\SearchProtocolHost.exe[1744] C:\Windows\system32\ntdll.dll!NtAllocateVirtualMemory 00000000778a6ff0 5 bytes JMP 00000001001e0b14
.text C:\Windows\system32\SearchProtocolHost.exe[1744] C:\Windows\system32\ntdll.dll!NtFreeVirtualMemory 00000000778a7050 5 bytes JMP 00000001001e0ecc
.text C:\Windows\system32\SearchProtocolHost.exe[1744] C:\Windows\system32\ntdll.dll!NtTerminateProcess 00000000778a7130 5 bytes JMP 00000001001e163c
.text C:\Windows\system32\SearchProtocolHost.exe[1744] C:\Windows\system32\ntdll.dll!NtProtectVirtualMemory 00000000778a7370 5 bytes JMP 00000001001e1284
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 0000000077a517d7 5 bytes JMP 00000001000301f8
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077a53221 5 bytes JMP 00000001000303fc
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 0000000077a69578 5 bytes JMP 0000000100030600
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 0000000077a69608 5 bytes JMP 0000000100030804
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 0000000077a69758 5 bytes JMP 0000000100030c0c
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077a69ab8 5 bytes JMP 0000000100030a08
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 130 0000000076be4228 1 byte [62]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 0000000076fd9eb4 5 bytes JMP 00000001001c03fc
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\ADVAPI32.dll!DeleteService 0000000076fda07e 5 bytes JMP 00000001001c0600
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\ADVAPI32.dll!SetServiceObjectSecurity 0000000077016cd9 5 bytes JMP 00000001001c1014
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigA 0000000077016dd9 5 bytes JMP 00000001001c0804
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigW 0000000077016f81 5 bytes JMP 00000001001c0a08
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2A 0000000077017099 5 bytes JMP 00000001001c0c0c
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2W 00000000770171e1 5 bytes JMP 00000001001c0e10
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000770172a1 5 bytes JMP 00000001001c01f8
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 00000000759b010d 5 bytes JMP 00000001001d0a08
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 00000000759b03d2 5 bytes JMP 00000001001d0804
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 00000000759b1b58 5 bytes JMP 00000001001d0600
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 00000000759b6530 5 bytes JMP 00000001001d03fc
.text C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe[3176] C:\Windows\syswow64\USER32.dll!SetWinEventHook 00000000759c653e 5 bytes JMP 00000001001d01f8
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 0000000077a517d7 5 bytes JMP 00000001000301f8
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077a53221 5 bytes JMP 00000001000303fc
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 0000000077a69578 5 bytes JMP 0000000100030600
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 0000000077a69608 5 bytes JMP 0000000100030804
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 0000000077a69758 5 bytes JMP 0000000100030c0c
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077a69ab8 5 bytes JMP 0000000100030a08
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 130 0000000076be4228 1 byte [62]
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 00000000759b010d 5 bytes JMP 0000000100080a08
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 00000000759b03d2 5 bytes JMP 0000000100080804
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 00000000759b1b58 5 bytes JMP 0000000100080600
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 00000000759b6530 5 bytes JMP 00000001000803fc
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\USER32.dll!SetWinEventHook 00000000759c653e 5 bytes JMP 00000001000801f8
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 0000000076fd9eb4 5 bytes JMP 00000001000903fc
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\ADVAPI32.dll!DeleteService 0000000076fda07e 5 bytes JMP 0000000100090600
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\ADVAPI32.dll!SetServiceObjectSecurity 0000000077016cd9 5 bytes JMP 0000000100091014
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigA 0000000077016dd9 5 bytes JMP 0000000100090804
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigW 0000000077016f81 5 bytes JMP 0000000100090a08
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2A 0000000077017099 5 bytes JMP 0000000100090c0c
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2W 00000000770171e1 5 bytes JMP 0000000100090e10
.text C:\Program Files (x86)\Ask.com\Updater\Updater.exe[3192] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000770172a1 5 bytes JMP 00000001000901f8
.text C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe[3412] C:\Windows\system32\ntdll.dll!LdrUnloadDll 0000000077876d20 5 bytes JMP 00000001001a075c
.text C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe[3412] C:\Windows\system32\ntdll.dll!LdrLoadDll 0000000077893bd0 5 bytes JMP 00000001001a03a4
.text C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe[3412] C:\Windows\system32\ntdll.dll!NtAllocateVirtualMemory 00000000778a6ff0 5 bytes JMP 00000001001a0b14
.text C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe[3412] C:\Windows\system32\ntdll.dll!NtFreeVirtualMemory 00000000778a7050 5 bytes JMP 00000001001a0ecc
.text C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe[3412] C:\Windows\system32\ntdll.dll!NtTerminateProcess 00000000778a7130 5 bytes JMP 00000001001a163c
.text C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe[3412] C:\Windows\system32\ntdll.dll!NtProtectVirtualMemory 00000000778a7370 5 bytes JMP 00000001001a1284
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\SysWOW64\ntdll.dll!LdrLoadDll 0000000077a517d7 5 bytes JMP 00000001001b01f8
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\SysWOW64\ntdll.dll!LdrUnloadDll 0000000077a53221 5 bytes JMP 00000001001b03fc
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\SysWOW64\ntdll.dll!NtAllocateVirtualMemory 0000000077a69578 5 bytes JMP 00000001001b0600
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\SysWOW64\ntdll.dll!NtFreeVirtualMemory 0000000077a69608 5 bytes JMP 00000001001b0804
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\SysWOW64\ntdll.dll!NtTerminateProcess 0000000077a69758 5 bytes JMP 00000001001b0c0c
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\SysWOW64\ntdll.dll!NtProtectVirtualMemory 0000000077a69ab8 5 bytes JMP 00000001001b0a08
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\KERNEL32.dll!GetBinaryTypeW + 130 0000000076be4228 1 byte [62]
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\USER32.dll!UnhookWindowsHookEx 00000000759b010d 5 bytes JMP 00000001001c0a08
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\USER32.dll!SetWindowsHookExW 00000000759b03d2 5 bytes JMP 00000001001c0804
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\USER32.dll!SetWindowsHookExA 00000000759b1b58 5 bytes JMP 00000001001c0600
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\USER32.dll!UnhookWinEvent 00000000759b6530 5 bytes JMP 00000001001c03fc
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\USER32.dll!SetWinEventHook 00000000759c653e 5 bytes JMP 00000001001c01f8
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceW 0000000076fd9eb4 5 bytes JMP 00000001001d03fc
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\ADVAPI32.dll!DeleteService 0000000076fda07e 5 bytes JMP 00000001001d0600
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\ADVAPI32.dll!SetServiceObjectSecurity 0000000077016cd9 5 bytes JMP 00000001001d1014
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigA 0000000077016dd9 5 bytes JMP 00000001001d0804
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfigW 0000000077016f81 5 bytes JMP 00000001001d0a08
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2A 0000000077017099 5 bytes JMP 00000001001d0c0c
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\ADVAPI32.dll!ChangeServiceConfig2W 00000000770171e1 5 bytes JMP 00000001001d0e10
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM.exe[3976] C:\Windows\syswow64\ADVAPI32.dll!CreateServiceA 00000000770172a1 5 bytes JMP 00000001001d01f8
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM64.exe[3992] C:\Windows\system32\ntdll.dll!LdrUnloadDll 0000000077876d20 5 bytes JMP 000000010034075c
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM64.exe[3992] C:\Windows\system32\ntdll.dll!LdrLoadDll 0000000077893bd0 5 bytes JMP 00000001003403a4
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM64.exe[3992] C:\Windows\system32\ntdll.dll!NtAllocateVirtualMemory 00000000778a6ff0 5 bytes JMP 0000000100340b14
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM64.exe[3992] C:\Windows\system32\ntdll.dll!NtFreeVirtualMemory 00000000778a7050 5 bytes JMP 0000000100340ecc
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM64.exe[3992] C:\Windows\system32\ntdll.dll!NtTerminateProcess 00000000778a7130 5 bytes JMP 000000010034163c
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM64.exe[3992] C:\Windows\system32\ntdll.dll!NtProtectVirtualMemory 00000000778a7370 5 bytes JMP 0000000100341284
.text C:\Program Files (x86)\ATI Technologies\HydraVision\HydraDM64.exe[3992] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe[1064] C:\Windows\system32\ntdll.dll!LdrUnloadDll 0000000077876d20 5 bytes JMP 000000010071075c
.text C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe[1064] C:\Windows\system32\ntdll.dll!LdrLoadDll 0000000077893bd0 5 bytes JMP 00000001007103a4
.text C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe[1064] C:\Windows\system32\ntdll.dll!NtAllocateVirtualMemory 00000000778a6ff0 5 bytes JMP 0000000100710b14
.text C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe[1064] C:\Windows\system32\ntdll.dll!NtFreeVirtualMemory 00000000778a7050 5 bytes JMP 0000000100710ecc
.text C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe[1064] C:\Windows\system32\ntdll.dll!NtTerminateProcess 00000000778a7130 5 bytes JMP 000000010071163c
.text C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe[1064] C:\Windows\system32\ntdll.dll!NtProtectVirtualMemory 00000000778a7370 5 bytes JMP 0000000100711284
.text C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe[1064] C:\Windows\system32\KERNEL32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Program Files\Windows Media Player\wmpnscfg.exe[4636] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe[4748] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 130 0000000076be4228 1 byte [62]
.text C:\Windows\system32\wuauclt.exe[3964] C:\Windows\system32\kernel32.dll!GetBinaryTypeW + 194 0000000077212c52 1 byte [62]
.text C:\Windows\SysWOW64\conime.exe[4732] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 130 0000000076be4228 1 byte [62]
.text C:\Users\lech\Downloads\dxlsxrgl.exe[180] C:\Windows\syswow64\kernel32.dll!GetBinaryTypeW + 130 0000000076be4228 1 byte [62]
---- Kernel code sections - GMER 2.1 ----
INITKDBG C:\Windows\system32\ntoskrnl.exe suspicious modification
INITKDBG C:\Windows\system32\ntoskrnl.exe suspicious modification
INITKDBG C:\Windows\system32\ntoskrnl.exe suspicious modification
INITKDBG C:\Windows\system32\ntoskrnl.exe suspicious modification
INITKDBG C:\Windows\system32\ntoskrnl.exe suspicious modification
INITKDBG C:\Windows\system32\ntoskrnl.exe suspicious modification
---- EOF - GMER 2.1 ----