![]() |
| |||||||
Log-Analyse und Auswertung: Win 8 diverse Funde PUP (Babylon) Win32/installcoreWindows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML. |
| | #2 |
![]() ![]() | Win 8 diverse Funde PUP (Babylon) Win32/installcoreCode:
ATTFilter GMER 2.1.19163 - hxxp://www.gmer.net
Rootkit scan 2013-09-17 21:58:31
Windows 6.2.9200 \Device\Harddisk0\DR0 -> \Device\00000034 ST9250827AS rev.3.AAA 232,89GB
Running: gmer_2.1.19163.exe; Driver: C:\Users\Lib!\AppData\Local\Temp\kxtdapog.sys
---- System - GMER 2.1 ----
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwWriteVirtualMemory [0x8E19776E]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwVdmControl [0x8C02E80E]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwUnloadDriver [0x8E195C42]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwTerminateThread [0x8C02FCF6]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwTerminateProcess [0x8E1978EA]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSystemDebugControl [0x8C02E556]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSuspendThread [0x8C0301C8]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSuspendProcess [0x8C030066]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwShutdownSystem [0x8C02E45C]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetSystemPowerState [0x8C02E4CE]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetSystemInformation [0x8C02E2F8]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetContextThread [0x8C02FD16]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetBootOptions [0x8C02E7A8]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwSetBootEntryOrder [0x8C02E742]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwReplyWaitReceivePortEx [0x8C03122A]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwReplyWaitReceivePort [0x8C0358B4]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwQueueApcThreadEx [0x8C030506]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwQueryObject [0x8C0307F8]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwProtectVirtualMemory [0x8E197822]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenTimer [0x8C03B0DC]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenThread [0x8C03326E]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenSemaphore [0x8C03AEF6]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenSection [0x8C03B036]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenProcess [0x8C032E78]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenMutant [0x8C03AEAC]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenIoCompletion [0x8C03B122]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenEventPair [0x8C03AF86]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwOpenEvent [0x8C03AF42]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwNotifyChangeMultipleKeys [0x8C03092C]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwNotifyChangeKey [0x8C03398C]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwModifyBootEntry [0x8C02E6DC]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwLoadDriver [0x8E195C12]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwFreeVirtualMemory [0x8E1976C2]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwDuplicateObject [0x8C033596]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwDeleteBootEntry [0x8C02E676]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwDebugActiveProcess [0x8C02FE9C]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateTimer [0x8C03B0B8]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateThreadEx [0x8C02F800]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateThread [0x8C02F5E4]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateSemaphore [0x8C03AECE]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwCreateSection [0x8E197992]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateMutant [0x8C03AE86]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateIoCompletion [0x8C03B0FE]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateEventPair [0x8C03AF64]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwCreateEvent [0x8C03AF18]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwAssignProcessToJobObject [0x8C02F0E6]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwAlpcSendWaitReceivePort [0x8C031256]
SSDT \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwAllocateVirtualMemory [0x8E1975FA]
SSDT \SystemRoot\System32\Drivers\aswSnx.SYS (avast! Virtualization Driver/AVAST Software) ZwAddBootEntry [0x8C02E610]
Code \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ZwCreateProcessEx [0x8E1B0E00]
Code \SystemRoot\System32\Drivers\aswSP.SYS (avast! self protection module/AVAST Software) ObMakeTemporaryObject
---- Kernel code sections - GMER 2.1 ----
.text ntoskrnl.exe!ZwCallbackReturn + 118 81AD7E24 4 Bytes CALL E4800A2B
.text ntoskrnl.exe!ZwCallbackReturn + 16C 81AD7E78 12 Bytes [56, E5, 02, 8C, C8, 01, 03, ...]
.text ntoskrnl.exe!ZwCallbackReturn + 604 81AD8310 12 Bytes [B8, B0, 03, 8C, 00, F8, 02, ...]
.text ntoskrnl.exe!ZwReplacePartitionUnit + 26B1 81B4DAB5 1 Byte [06]
.text ntoskrnl.exe!KiDispatchInterrupt + 66A 81B5239A 19 Bytes [E0, 0F, BA, F0, 07, 73, 09, ...] {LOOPNZ 0x11; MOV EDX, 0x97307f0; MOV CR4, EAX; OR AL, 0x80; MOV CR4, EAX; RET ; MOV ECX, CR3}
---- User code sections - GMER 2.1 ----
.text C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[272] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\system32\csrss.exe[432] kernel32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\system32\wininit.exe[496] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\system32\csrss.exe[524] kernel32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\system32\winlogon.exe[564] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text ...
? C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[944] C:\WINDOWS\SYSTEM32\ntdll.dll time/date stamp mismatch;
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[944] ntdll.dll!NtProtectVirtualMemory 76F55940 5 Bytes JMP 698F1986 C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\ushata.dll (Ushata module/Kaspersky Lab ZAO)
? C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[944] C:\WINDOWS\system32\KERNEL32.DLL time/date stamp mismatch; unknown module: 0.dllunknown module: cryptnet.dllunknown module: 0.dllunknown module: KERNELBASE.dll
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[944] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[944] user32.dll!UserClientDllInitialize + 311 74DBC3EC 4 Bytes [F0, 28, 8F, 69]
.text C:\WINDOWS\system32\dwm.exe[968] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\system32\svchost.exe[980] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\System32\svchost.exe[1084] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Classic Shell\ClassicShellService.exe[1220] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\system32\svchost.exe[1264] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text ...
.text C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16.4.4406.1205_x86__8wekyb3d8bbwe\LiveComm.exe[1372] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 006103FC
.text C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16.4.4406.1205_x86__8wekyb3d8bbwe\LiveComm.exe[1372] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 006101F8
.text C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16.4.4406.1205_x86__8wekyb3d8bbwe\LiveComm.exe[1372] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 006D0A08
.text C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16.4.4406.1205_x86__8wekyb3d8bbwe\LiveComm.exe[1372] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 006D0804
.text C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16.4.4406.1205_x86__8wekyb3d8bbwe\LiveComm.exe[1372] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 006D03FC
.text C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16.4.4406.1205_x86__8wekyb3d8bbwe\LiveComm.exe[1372] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 006D01F8
.text C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16.4.4406.1205_x86__8wekyb3d8bbwe\LiveComm.exe[1372] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 006D0600
.text C:\Program Files\AVAST Software\Avast\AvastSvc.exe[1384] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\system32\lxeecoms.exe[1524] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\System32\spoolsv.exe[1620] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\IObit\IObit Malware Fighter\IMFsrv.exe[1672] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Classic Shell\ClassicStartMenu.exe[1764] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text ...
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[2444] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 015803FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[2444] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 015801F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[2444] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[2444] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 015D0A08
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[2444] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 015D0804
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[2444] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 015D03FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[2444] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 015D01F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe[2444] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 015D0600
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe[2576] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 00D603FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe[2576] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 00D601F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe[2576] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe[2576] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00DA0A08
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe[2576] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00DA0804
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe[2576] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 00DA03FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe[2576] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 00DA01F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe[2576] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00DA0600
.text C:\Program Files\Secunia\PSI\PSIA.exe[2672] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 007F03FC
.text C:\Program Files\Secunia\PSI\PSIA.exe[2672] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 007F01F8
.text C:\Program Files\Secunia\PSI\PSIA.exe[2672] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Secunia\PSI\PSIA.exe[2672] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00820A08
.text C:\Program Files\Secunia\PSI\PSIA.exe[2672] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00820804
.text C:\Program Files\Secunia\PSI\PSIA.exe[2672] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 008203FC
.text C:\Program Files\Secunia\PSI\PSIA.exe[2672] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 008201F8
.text C:\Program Files\Secunia\PSI\PSIA.exe[2672] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00820600
.text C:\Program Files\IObit\Start Menu 8\StartMenuServices.exe[2764] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 001F03FC
.text C:\Program Files\IObit\Start Menu 8\StartMenuServices.exe[2764] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 001F01F8
.text C:\Program Files\IObit\Start Menu 8\StartMenuServices.exe[2764] user32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00230A08
.text C:\Program Files\IObit\Start Menu 8\StartMenuServices.exe[2764] user32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00230804
.text C:\Program Files\IObit\Start Menu 8\StartMenuServices.exe[2764] user32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 002303FC
.text C:\Program Files\IObit\Start Menu 8\StartMenuServices.exe[2764] user32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 002301F8
.text C:\Program Files\IObit\Start Menu 8\StartMenuServices.exe[2764] user32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00230600
.text C:\WINDOWS\system32\svchost.exe[2828] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 00AE03FC
.text C:\WINDOWS\system32\svchost.exe[2828] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 00AE01F8
.text C:\WINDOWS\system32\svchost.exe[2828] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00BE0A08
.text C:\WINDOWS\system32\svchost.exe[2828] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00BE0804
.text C:\WINDOWS\system32\svchost.exe[2828] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 00BE03FC
.text C:\WINDOWS\system32\svchost.exe[2828] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 00BE01F8
.text C:\WINDOWS\system32\svchost.exe[2828] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00BE0600
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2864] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 00BC03FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2864] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 00BC01F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2864] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2864] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00C00A08
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2864] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00C00804
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2864] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 00C003FC
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2864] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 00C001F8
.text C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe[2864] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00C00600
.text C:\Program Files\IObit\Start Menu 8\StartMenu8.exe[2972] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 002003FC
.text C:\Program Files\IObit\Start Menu 8\StartMenu8.exe[2972] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 002001F8
.text C:\Program Files\IObit\Start Menu 8\StartMenu8.exe[2972] user32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00240A08
.text C:\Program Files\IObit\Start Menu 8\StartMenu8.exe[2972] user32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00240804
.text C:\Program Files\IObit\Start Menu 8\StartMenu8.exe[2972] user32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 002403FC
.text C:\Program Files\IObit\Start Menu 8\StartMenu8.exe[2972] user32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 002401F8
.text C:\Program Files\IObit\Start Menu 8\StartMenu8.exe[2972] user32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00240600
.text C:\WINDOWS\system32\svchost.exe[3340] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 011003FC
.text C:\WINDOWS\system32\svchost.exe[3340] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 011001F8
.text C:\WINDOWS\system32\svchost.exe[3340] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\system32\svchost.exe[3412] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 00B103FC
.text C:\WINDOWS\system32\svchost.exe[3412] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 00B101F8
.text C:\WINDOWS\system32\svchost.exe[3412] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\WINDOWS\system32\svchost.exe[3412] user32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00B30A08
.text C:\WINDOWS\system32\svchost.exe[3412] user32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00B30804
.text C:\WINDOWS\system32\svchost.exe[3412] user32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 00B303FC
.text C:\WINDOWS\system32\svchost.exe[3412] user32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 00B301F8
.text C:\WINDOWS\system32\svchost.exe[3412] user32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00B30600
.text C:\Windows\System32\WUDFHost.exe[3492] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 001503FC
.text C:\Windows\System32\WUDFHost.exe[3492] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 001501F8
.text C:\Windows\System32\WUDFHost.exe[3492] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Windows\System32\WUDFHost.exe[3492] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00190A08
.text C:\Windows\System32\WUDFHost.exe[3492] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00190804
.text C:\Windows\System32\WUDFHost.exe[3492] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 001903FC
.text C:\Windows\System32\WUDFHost.exe[3492] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 001901F8
.text C:\Windows\System32\WUDFHost.exe[3492] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00190600
.text C:\Program Files\IObit\Start Menu 8\StartMenu_Hook.exe[3512] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 002003FC
.text C:\Program Files\IObit\Start Menu 8\StartMenu_Hook.exe[3512] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 002001F8
.text C:\Program Files\IObit\Start Menu 8\StartMenu_Hook.exe[3512] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\IObit\Start Menu 8\StartMenu_Hook.exe[3512] user32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00240A08
.text C:\Program Files\IObit\Start Menu 8\StartMenu_Hook.exe[3512] user32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00240804
.text C:\Program Files\IObit\Start Menu 8\StartMenu_Hook.exe[3512] user32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 002403FC
.text C:\Program Files\IObit\Start Menu 8\StartMenu_Hook.exe[3512] user32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 002401F8
.text C:\Program Files\IObit\Start Menu 8\StartMenu_Hook.exe[3512] user32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00240600
.text C:\WINDOWS\system32\SearchIndexer.exe[3608] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 004703FC
.text C:\WINDOWS\system32\SearchIndexer.exe[3608] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 004701F8
.text C:\WINDOWS\system32\SearchIndexer.exe[3608] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 004A0A08
.text C:\WINDOWS\system32\SearchIndexer.exe[3608] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 004A0804
.text C:\WINDOWS\system32\SearchIndexer.exe[3608] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 004A03FC
.text C:\WINDOWS\system32\SearchIndexer.exe[3608] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 004A01F8
.text C:\WINDOWS\system32\SearchIndexer.exe[3608] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 004A0600
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 00C003FC
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 5BF6F140 C:\Program Files\Mozilla Firefox\xul.dll (Mozilla Foundation)
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] KERNEL32.dll!InterlockedExchange + 11 76A0153B 7 Bytes JMP 5C58FDF5 C:\Program Files\Mozilla Firefox\xul.dll (Mozilla Foundation)
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] KERNEL32.dll!GetStdHandle + C 76A01B37 7 Bytes JMP 5C58FDD2 C:\Program Files\Mozilla Firefox\xul.dll (Mozilla Foundation)
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] KERNEL32.dll!CreateProcessW + 69 76A04798 7 Bytes JMP 5BF72942 C:\Program Files\Mozilla Firefox\xul.dll (Mozilla Foundation)
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00C10A08
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00C10804
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 00C103FC
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 00C101F8
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00C10600
.text C:\Program Files\Mozilla Firefox\firefox.exe[3860] GDI32.dll!SetWindowOrgEx + 3C7 74A68C9D 7 Bytes JMP 5C58FD53 C:\Program Files\Mozilla Firefox\xul.dll (Mozilla Foundation)
.text C:\Program Files\IObit\Start Menu 8\InstallServices32.exe[3988] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 002003FC
.text C:\Program Files\IObit\Start Menu 8\InstallServices32.exe[3988] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 002001F8
.text C:\Program Files\IObit\Start Menu 8\InstallServices32.exe[3988] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\IObit\Start Menu 8\InstallServices32.exe[3988] user32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00330A08
.text C:\Program Files\IObit\Start Menu 8\InstallServices32.exe[3988] user32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00330804
.text C:\Program Files\IObit\Start Menu 8\InstallServices32.exe[3988] user32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 003303FC
.text C:\Program Files\IObit\Start Menu 8\InstallServices32.exe[3988] user32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 003301F8
.text C:\Program Files\IObit\Start Menu 8\InstallServices32.exe[3988] user32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00330600
.text C:\Program Files\Microsoft IntelliPoint\ipoint.exe[4240] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 006B03FC
.text C:\Program Files\Microsoft IntelliPoint\ipoint.exe[4240] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 006B01F8
.text C:\Program Files\Microsoft IntelliPoint\ipoint.exe[4240] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 006F0A08
.text C:\Program Files\Microsoft IntelliPoint\ipoint.exe[4240] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 006F0804
.text C:\Program Files\Microsoft IntelliPoint\ipoint.exe[4240] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 006F03FC
.text C:\Program Files\Microsoft IntelliPoint\ipoint.exe[4240] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 006F01F8
.text C:\Program Files\Microsoft IntelliPoint\ipoint.exe[4240] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 006F0600
.text C:\Program Files\Apoint2K\Apoint.exe[4252] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 003003FC
.text C:\Program Files\Apoint2K\Apoint.exe[4252] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 003001F8
.text C:\Program Files\Apoint2K\Apoint.exe[4252] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00320A08
.text C:\Program Files\Apoint2K\Apoint.exe[4252] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00320804
.text C:\Program Files\Apoint2K\Apoint.exe[4252] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 003203FC
.text C:\Program Files\Apoint2K\Apoint.exe[4252] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 003201F8
.text C:\Program Files\Apoint2K\Apoint.exe[4252] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00320600
.text C:\Program Files\Lexmark Pro700 Series\lxeemon.exe[4264] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 002103FC
.text C:\Program Files\Lexmark Pro700 Series\lxeemon.exe[4264] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 002101F8
.text C:\Program Files\Lexmark Pro700 Series\lxeemon.exe[4264] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Lexmark Pro700 Series\lxeemon.exe[4264] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00230A08
.text C:\Program Files\Lexmark Pro700 Series\lxeemon.exe[4264] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00230804
.text C:\Program Files\Lexmark Pro700 Series\lxeemon.exe[4264] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 002303FC
.text C:\Program Files\Lexmark Pro700 Series\lxeemon.exe[4264] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 002301F8
.text C:\Program Files\Lexmark Pro700 Series\lxeemon.exe[4264] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00230600
.text C:\Program Files\Lexmark Pro700 Series\ezprint.exe[4276] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 002003FC
.text C:\Program Files\Lexmark Pro700 Series\ezprint.exe[4276] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 002001F8
.text C:\Program Files\Lexmark Pro700 Series\ezprint.exe[4276] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Lexmark Pro700 Series\ezprint.exe[4276] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 004A0A08
.text C:\Program Files\Lexmark Pro700 Series\ezprint.exe[4276] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 004A0804
.text C:\Program Files\Lexmark Pro700 Series\ezprint.exe[4276] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 004A03FC
.text C:\Program Files\Lexmark Pro700 Series\ezprint.exe[4276] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 004A01F8
.text C:\Program Files\Lexmark Pro700 Series\ezprint.exe[4276] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 004A0600
.text C:\WINDOWS\system32\ctfmon.exe[4312] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 00A803FC
.text C:\WINDOWS\system32\ctfmon.exe[4312] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 00A801F8
.text C:\WINDOWS\system32\ctfmon.exe[4312] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00AA0A08
.text C:\WINDOWS\system32\ctfmon.exe[4312] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00AA0804
.text C:\WINDOWS\system32\ctfmon.exe[4312] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 00AA03FC
.text C:\WINDOWS\system32\ctfmon.exe[4312] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 00AA01F8
.text C:\WINDOWS\system32\ctfmon.exe[4312] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00AA0600
.text C:\Program Files\AVAST Software\Avast\AvastUI.exe[4320] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Boxcryptor Classic\BoxcryptorClassic.exe[4424] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 00B303FC
.text C:\Program Files\Boxcryptor Classic\BoxcryptorClassic.exe[4424] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 00B301F8
.text C:\Program Files\Boxcryptor Classic\BoxcryptorClassic.exe[4424] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Boxcryptor Classic\BoxcryptorClassic.exe[4424] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00B60A08
.text C:\Program Files\Boxcryptor Classic\BoxcryptorClassic.exe[4424] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00B60804
.text C:\Program Files\Boxcryptor Classic\BoxcryptorClassic.exe[4424] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 00B603FC
.text C:\Program Files\Boxcryptor Classic\BoxcryptorClassic.exe[4424] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 00B601F8
.text C:\Program Files\Boxcryptor Classic\BoxcryptorClassic.exe[4424] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00B60600
.text C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe[4600] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 005603FC
.text C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe[4600] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 005601F8
.text C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe[4600] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe[4600] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 005A0A08
.text C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe[4600] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 005A0804
.text C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe[4600] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 005A03FC
.text C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe[4600] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 005A01F8
.text C:\Program Files\Microsoft IntelliPoint\dpupdchk.exe[4600] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 005A0600
? C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] C:\WINDOWS\SYSTEM32\ntdll.dll time/date stamp mismatch;
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] ntdll.dll!NtProtectVirtualMemory 76F55940 5 Bytes JMP 698F1986 C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\ushata.dll (Ushata module/Kaspersky Lab ZAO)
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 001803FC
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 001801F8
? C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] C:\WINDOWS\system32\KERNEL32.dll time/date stamp mismatch; unknown module: 0.dllunknown module: cryptnet.dllunknown module: 0.dllunknown module: KERNELBASE.dll
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] user32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 001E0A08
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] user32.dll!UserClientDllInitialize + 311 74DBC3EC 4 Bytes [F0, 28, 8F, 69]
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] user32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 001E0804
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] user32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 001E03FC
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] user32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 001E01F8
.text C:\Program Files\Kaspersky Lab\Kaspersky Security Scan 2.0\kss.exe[4608] user32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 001E0600
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[4640] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 002003FC
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[4640] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 002001F8
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[4640] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[4640] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00220A08
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[4640] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00220804
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[4640] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 002203FC
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[4640] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 002201F8
.text C:\Program Files\Apoint2K\ApMsgFwd.exe[4640] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00220600
.text C:\Program Files\Secunia\PSI\psi_tray.exe[4688] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 00CA03FC
.text C:\Program Files\Secunia\PSI\psi_tray.exe[4688] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 00CA01F8
.text C:\Program Files\Secunia\PSI\psi_tray.exe[4688] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00CC0A08
.text C:\Program Files\Secunia\PSI\psi_tray.exe[4688] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00CC0804
.text C:\Program Files\Secunia\PSI\psi_tray.exe[4688] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 00CC03FC
.text C:\Program Files\Secunia\PSI\psi_tray.exe[4688] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 00CC01F8
.text C:\Program Files\Secunia\PSI\psi_tray.exe[4688] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00CC0600
.text C:\Program Files\Apoint2K\Apntex.exe[4740] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 002003FC
.text C:\Program Files\Apoint2K\Apntex.exe[4740] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 002001F8
.text C:\Program Files\Apoint2K\Apntex.exe[4740] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00220A08
.text C:\Program Files\Apoint2K\Apntex.exe[4740] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00220804
.text C:\Program Files\Apoint2K\Apntex.exe[4740] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 002203FC
.text C:\Program Files\Apoint2K\Apntex.exe[4740] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 002201F8
.text C:\Program Files\Apoint2K\Apntex.exe[4740] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00220600
.text C:\WINDOWS\system32\conhost.exe[4768] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 00D703FC
.text C:\WINDOWS\system32\conhost.exe[4768] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 00D701F8
.text C:\WINDOWS\system32\conhost.exe[4768] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00D90A08
.text C:\WINDOWS\system32\conhost.exe[4768] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00D90804
.text C:\WINDOWS\system32\conhost.exe[4768] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 00D903FC
.text C:\WINDOWS\system32\conhost.exe[4768] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 00D901F8
.text C:\WINDOWS\system32\conhost.exe[4768] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00D90600
.text C:\Users\Lib!\Desktop\gmer_2.1.19163.exe[4816] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Apoint2K\HidFind.exe[4884] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 002003FC
.text C:\Program Files\Apoint2K\HidFind.exe[4884] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 002001F8
.text C:\Program Files\Apoint2K\HidFind.exe[4884] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\Apoint2K\HidFind.exe[4884] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00220A08
.text C:\Program Files\Apoint2K\HidFind.exe[4884] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00220804
.text C:\Program Files\Apoint2K\HidFind.exe[4884] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 002203FC
.text C:\Program Files\Apoint2K\HidFind.exe[4884] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 002201F8
.text C:\Program Files\Apoint2K\HidFind.exe[4884] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00220600
.text C:\Program Files\IObit\IObit Malware Fighter\IMF.exe[5036] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 002103FC
.text C:\Program Files\IObit\IObit Malware Fighter\IMF.exe[5036] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 002101F8
.text C:\Program Files\IObit\IObit Malware Fighter\IMF.exe[5036] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Program Files\IObit\IObit Malware Fighter\IMF.exe[5036] user32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 00390A08
.text C:\Program Files\IObit\IObit Malware Fighter\IMF.exe[5036] user32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 00390804
.text C:\Program Files\IObit\IObit Malware Fighter\IMF.exe[5036] user32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 003903FC
.text C:\Program Files\IObit\IObit Malware Fighter\IMF.exe[5036] user32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 003901F8
.text C:\Program Files\IObit\IObit Malware Fighter\IMF.exe[5036] user32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 00390600
.text C:\Windows\System32\RuntimeBroker.exe[5104] ntdll.dll!LdrUnloadDll 76F62029 5 Bytes JMP 009903FC
.text C:\Windows\System32\RuntimeBroker.exe[5104] ntdll.dll!LdrLoadDll 76F75D29 5 Bytes JMP 009901F8
.text C:\Windows\System32\RuntimeBroker.exe[5104] KERNEL32.dll!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
.text C:\Windows\System32\RuntimeBroker.exe[5104] USER32.dll!UnhookWindowsHookEx 74DBA37A 5 Bytes JMP 009C0A08
.text C:\Windows\System32\RuntimeBroker.exe[5104] USER32.dll!SetWindowsHookExW 74DBF223 5 Bytes JMP 009C0804
.text C:\Windows\System32\RuntimeBroker.exe[5104] USER32.dll!UnhookWinEvent 74DBFE7F 5 Bytes JMP 009C03FC
.text C:\Windows\System32\RuntimeBroker.exe[5104] USER32.dll!SetWinEventHook 74DC938E 5 Bytes JMP 009C01F8
.text C:\Windows\System32\RuntimeBroker.exe[5104] USER32.dll!SetWindowsHookExA 74DD6F76 5 Bytes JMP 009C0600
.text C:\Program Files\ESET\ESET Online Scanner\OnlineScannerApp.exe[5288] KERNEL32.DLL!GetBinaryTypeW + 6F 76A1DDE0 1 Byte [62]
---- Devices - GMER 2.1 ----
Device \FileSystem\Ntfs \Ntfs aswSP.SYS (avast! self protection module/AVAST Software)
AttachedDevice \Driver\tdx \Device\Tcp aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice \Driver\tdx \Device\Udp aswTdi.SYS (avast! TDI Filter Driver/AVAST Software)
AttachedDevice \FileSystem\fastfat \Fat fltmgr.sys (Microsoft Dateisystem-Filter-Manager/Microsoft Corporation)
AttachedDevice \FileSystem\fastfat \Fat cbfs4.sys (Callback File System Driver/EldoS Corporation)
---- Registry - GMER 2.1 ----
Reg HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Kernel\RNG@RNGAuxiliarySeed -1136276321
---- Disk sectors - GMER 2.1 ----
Disk \Device\Harddisk0\DR0 unknown MBR code
---- EOF - GMER 2.1 ----
Code:
ATTFilter C:\Users\Lib!\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7IMQ7W51\pack[1].7z Variante von Win32/bProtector.A Anwendung
C:\Users\Lib!\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QRBR2828\wajam_install[1].exe Win32/Wajam.A Anwendung
C:\Users\Lib!\AppData\Local\Temp\WEM5e3Is.exe.part Variante von Win32/InstallCore.CN Anwendung
C:\Users\Lib!\AppData\Local\Temp\16561674.Uninstall\uninstaller.exe Variante von Win32/InstallCore.AZ Anwendung
C:\Users\Lib!\AppData\Local\Temp\16588241.Uninstall\uninstaller.exe Variante von Win32/InstallCore.AZ Anwendung
C:\Users\Lib!\AppData\Local\Temp\16631079.Uninstall\uninstaller.exe Variante von Win32/InstallCore.AZ Anwendung
C:\Users\Lib!\AppData\Local\Temp\3132765.Uninstall\uninstaller.exe Variante von Win32/InstallCore.AZ Anwendung
C:\Users\Lib!\AppData\Local\Temp\5112230.Uninstall\uninstaller.exe Variante von Win32/InstallCore.AZ Anwendung
C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\BabMaint.exe Win32/Toolbar.Babylon.I Anwendung
C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\ccp.exe Win32/Toolbar.Babylon.M Anwendung
C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\IEHelper.dll Win32/Toolbar.Babylon.E Anwendung
C:\Users\Lib!\AppData\Local\Temp\is357113909\1823777_stp\uninstaller.exe Variante von Win32/InstallCore.AZ Anwendung
C:\Users\Lib!\AppData\Roaming\0D0S1L2Z1P1B0T1P1B2Z\Zip Opener Packages\uninstaller.exe Variante von Win32/InstallCore.AZ Anwendung
C:\Users\Lib!\Downloads\icq8_setup_8.0b6019 - CHIP-Downloader.exe Variante von Win32/DownloadSponsor.A Anwendung
D:\Down\CrystalDiskInfo5_0_2-en.exe Win32/OpenCandy Anwendung
D:\Down\SoftonicDownloader_fuer_unlocker.exe Win32/SoftonicDownloader.E Anwendung
D:\Down\winamp561_full_emusic-7plus_all.exe Win32/OpenCandy Anwendung
D:\Down\winamp5623_full_emusic-7plus_de-de.exe Win32/OpenCandy Anwendung
D:\Down\winamp563_full_emusic-7plus_de-de.exe Win32/OpenCandy Anwendung
Code:
ATTFilter Malwarebytes Anti-Malware 1.75.0.1300 www.malwarebytes.org Datenbank Version: v2013.09.17.07 Windows 8 x86 NTFS Internet Explorer 10.0.9200.16688 Lib! :: LIB-PC [Administrator] 17.09.2013 15:57:48 mbam-log-2013-09-17 (15-57-48).txt Art des Suchlaufs: Quick-Scan Aktivierte Suchlaufeinstellungen: Speicher | Autostart | Registrierung | Dateisystem | Heuristiks/Extra | HeuristiKs/Shuriken | PUP | PUM Deaktivierte Suchlaufeinstellungen: P2P Durchsuchte Objekte: 217202 Laufzeit: 9 Minute(n), 28 Sekunde(n) Infizierte Speicherprozesse: 0 (Keine bösartigen Objekte gefunden) Infizierte Speichermodule: 0 (Keine bösartigen Objekte gefunden) Infizierte Registrierungsschlüssel: 7 HKCR\AppID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3} (PUP.Optional.Delta.A) -> Keine Aktion durchgeführt. HKCR\AppID\{D616A4A2-7B38-4DBC-9093-6FE7A4A21B17} (PUP.Optional.Wajam.A) -> Keine Aktion durchgeführt. HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{A7A6995D-6EE1-4FD1-A258-49395D5BF99C} (PUP.Optional.Wajam) -> Keine Aktion durchgeführt. HKCU\SOFTWARE\DataMngr_Toolbar (PUP.Optional.DataMngr.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. HKCU\Software\DataMngr (PUP.Optional.DataMngr.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. HKCU\Software\BabSolution\Updater (PUP.Optional.Babylon.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. HKCU\SOFTWARE\INSTALLCORE (PUP.Optional.InstallCore.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Registrierungswerte: 1 HKCU\Software\InstallCore|tb (PUP.Optional.InstallCore.A) -> Daten: 0L1N1H2O1S -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Dateiobjekte der Registrierung: 0 (Keine bösartigen Objekte gefunden) Infizierte Verzeichnisse: 3 C:\Users\Lib!\AppData\Roaming\Babylon (PUP.Optional.Babylon.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Roaming\BABSOLUTION (PUP.Optional.BabSolution.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Roaming\BABSOLUTION\Shared (PUP.Optional.BabSolution.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. Infizierte Dateien: 19 C:\ProgramData\DSearchLink\DSearchLink.exe (PUP.Optional.Delta.A) -> Keine Aktion durchgeführt. C:\Users\Lib!\AppData\Local\Temp\ZKRge08m.exe.part (PUP.Optional.Bandoo) -> Keine Aktion durchgeführt. C:\Users\Lib!\AppData\Local\Temp\WEM5e3Is.exe.part (PUP.Optional.Installcore) -> Keine Aktion durchgeführt. C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\BabMaint.exe (PUP.Optional.Babylon.A) -> Keine Aktion durchgeführt. C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\BExternal.dll (PUP.Optional.Babylon.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\CrxInstaller.dll (PUP.Optional.Babylon.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\DSearchLink.exe (PUP.Optional.Delta.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\MntrDLLInstall.dll (PUP.Optional.Babylon.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\MyDeltaTB.exe (PUP.Optional.Delta) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Temp\EFBC509D-BAB0-7891-9EB2-06E06E3E2329\Latest\Setup.exe (PUP.Optional.Babylon.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Temp\is357113909\1823681_stp.EXE (Adware.Agent) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Temp\is357113909\1823334_stp\DeltaTB.exe (PUP.Optional.Babylon.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Temp\is357113909\1823419_stp\wajam_download.exe (PUP.Optional.Wajam) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Temp\is357113909\1823565_stp\OptimizerPro.exe (PUP.Optional.OptimizePro.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Windows\Temp\Optimizer_Pro.exe (PUP.Optional.OptimizerPro.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\Downloads\ZipOpenerSetup.exe (PUP.Optional.Installcore) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Roaming\Babylon\log_file.txt (PUP.Optional.Babylon.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Local\Google\Chrome\User Data\Default\Local Storage\CHROME-EXTENSION_EOONCJEJNPPFJJKLAPAAMHCDMJBILMDE_0.LOCALSTORAGE (PUP.Optional.BrowserDefender.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. C:\Users\Lib!\AppData\Roaming\BABSOLUTION\Shared\BUSolution.dll (PUP.Optional.BabSolution.A) -> Erfolgreich gelöscht und in Quarantäne gestellt. (Ende) |