Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Windows 7: Programme stürzen ab nach Virusfund

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.

Antwort
Alt 15.11.2014, 12:53   #1
Melanie3107
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Hallo,

Antivir hat "TR/Rootkit.Gen2" als Virus/unerwünschtes Programm gemeldet.
Dieses lässt sich allerdings nicht entfernen und die Meldung taucht alle 2 Tage wieder auf.
Seit dem stürzen sämtliche Programme (Z.B. MS Office, Mozilla Firefox, ITunes) ab und reagieren nicht mehr. Teilweise hängt sich der Laptop komplett auf, sodass neu gestartet werden muss, was extrem lange dauert.

Die in der Checkliste beschriebenen Programme habe ich alle durchgeführt. FRST hat sich auch immer wieder aufgehängt (keine Rückmeldung). GMER lief extrem lange (über 36h).

Vielen Dank schon mal im Voraus!

Hier meine Logfiles:

Code:
ATTFilter
defogger_disable by jpshortstuff (23.02.10.1)
Log created at 20:56 on 11/11/2014 (Melanie)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...


-=E.O.F=-
         
Code:
ATTFilter
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 10-11-2014
Ran by Melanie (administrator) on MELANIE-TOSH on 12-11-2014 18:16:23
Running from C:\Users\Melanie\Desktop
Loaded Profiles: Melanie &  (Available profiles: Melanie)
Platform: Windows 7 Home Premium Service Pack 1 (X64) OS Language: Deutsch (Deutschland)
Internet Explorer Version 11
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(AMD) C:\Windows\System32\atiesrxx.exe
(Check Point Software Technologies LTD) C:\Program Files (x86)\CheckPoint\ZoneAlarm\vsmon.exe
(AMD) C:\Windows\System32\atieclxx.exe
(Microsoft Corporation) C:\Windows\System32\wlanext.exe
(Check Point Software Technologies) C:\Program Files\CheckPoint\ZAForceField\ISWSVC.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe
(Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
(SRS Labs, Inc.) C:\Program Files\SRS Labs\SRS Control Panel\SRSPanel_64.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TECO\Teco.exe
(Check Point Software Technologies) C:\Program Files\CheckPoint\ZAForceField\ForceField.exe
(Toshiba Europe GmbH) C:\Program Files (x86)\Toshiba TEMPRO\TemproTray.exe
(TOSHIBA) C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\TOPI.exe
(Google Inc.) C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
(Microsoft Corporation) C:\Program Files\Windows Sidebar\sidebar.exe
(Toshiba) C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIMonitor.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(Malwarebytes Corporation) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe
(Adobe Systems Incorporated) C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
(TOSHIBA Corporation) C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe
(Advanced Micro Devices Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
(TOSHIBA) C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe
(Check Point Software Technologies LTD) C:\Program Files (x86)\CheckPoint\ZoneAlarm\zatray.exe
(Apple Inc.) C:\Users\Melanie\Music\iTunes\iTunesHelper.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\My Avira\Avira.OE.Systray.exe
(Malwarebytes Corporation) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe
(Malwarebytes Corporation) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbam.exe
(ATI Technologies Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
(TOSHIBA Corporation) C:\Windows\System32\TODDSrv.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avshadow.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TECO\TecoService.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avwebgrd.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe
(TOSHIBA Corporation) C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSENotify.exe
(Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TPHM\TPCHSrv.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TPHM\TPCHWMsg.exe
(Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
(Advanced Micro Devices, Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MMLoadDrv.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe


==================== Registry (Whitelisted) ==================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [] => [X]
HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [12446824 2012-02-01] (Realtek Semiconductor)
HKLM\...\Run: [SynTPEnh] => C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [2867984 2011-12-23] (Synaptics Incorporated)
HKLM\...\Run: [SRS Premium Sound HD] => C:\Program Files\SRS Labs\SRS Control Panel\SRSPanel_64.exe [2165120 2012-02-06] (SRS Labs, Inc.)
HKLM\...\Run: [TPwrMain] => C:\Program Files\TOSHIBA\Power Saver\TPwrMain.EXE [590256 2011-09-23] (TOSHIBA Corporation)
HKLM\...\Run: [TCrdMain] => C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [989056 2011-12-14] (TOSHIBA Corporation)
HKLM\...\Run: [Teco] => C:\Program Files\TOSHIBA\TECO\Teco.exe [1548208 2011-11-24] (TOSHIBA Corporation)
HKLM\...\Run: [TosWaitSrv] => C:\Program Files\TOSHIBA\TPHM\TosWaitSrv.exe [712096 2011-12-14] (TOSHIBA Corporation)
HKLM\...\Run: [TosSENotify] => C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosWaitSrv.exe [710560 2011-11-26] (TOSHIBA Corporation)
HKLM\...\Run: [TosVolRegulator] => C:\Program Files\TOSHIBA\TosVolRegulator\TosVolRegulator.exe [24376 2009-11-11] (TOSHIBA Corporation)
HKLM\...\Run: [Toshiba TEMPRO] => C:\Program Files (x86)\Toshiba TEMPRO\TemproTray.exe [1546720 2011-02-10] (Toshiba Europe GmbH)
HKLM\...\Run: [Toshiba Registration] => C:\Program Files\TOSHIBA\Registration\ToshibaReminder.exe [150992 2012-03-07] (Toshiba Europe GmbH)
HKLM\...\Run: [ISW] => C:\Program Files\CheckPoint\ZAForceField\ForceField.exe [1126528 2012-04-30] (Check Point Software Technologies)
HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [NBAgent] => C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe [1492264 2011-11-18] (Nero AG)
HKLM-x32\...\Run: [StartCCC] => C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe [343168 2012-01-20] (Advanced Micro Devices, Inc.)
HKLM-x32\...\Run: [ITSecMng] => C:\Program Files (x86)\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe [80840 2011-04-02] (TOSHIBA CORPORATION)
HKLM-x32\...\Run: [USB3MON] => C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291608 2012-01-05] (Intel Corporation)
HKLM-x32\...\Run: [ToshibaServiceStation] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe [1298816 2011-07-12] (TOSHIBA Corporation)
HKLM-x32\...\Run: [TSleepSrv] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe [253312 2011-11-21] (TOSHIBA)
HKLM-x32\...\Run: [ZoneAlarm] => C:\Program Files (x86)\CheckPoint\ZoneAlarm\zatray.exe [73392 2012-06-01] (Check Point Software Technologies LTD)
HKLM-x32\...\Run: [BCSSync] => C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe [89184 2012-11-05] (Microsoft Corporation)
HKLM-x32\...\Run: [APSDaemon] => C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe [43848 2014-02-12] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] => C:\Users\Melanie\Music\iTunes\iTunesHelper.exe [152392 2014-05-26] (Apple Inc.)
HKLM-x32\...\Run: [avgnt] => C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe [348624 2012-05-01] (Avira Operations GmbH & Co. KG)
HKLM-x32\...\Run: [Avira Systray] => C:\Program Files (x86)\Avira\My Avira\Avira.OE.Systray.exe [164656 2014-08-27] (Avira Operations GmbH & Co. KG)
HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-19\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-19-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-20\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-20-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000\...\Run: [swg] => C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2012-03-07] (Google Inc.)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [swg] => C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2012-03-07] (Google Inc.)
HKU\S-1-5-18\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Toshiba Places Icon Utility.lnk
ShortcutTarget: Toshiba Places Icon Utility.lnk -> C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIMonitor.exe (Toshiba)
Startup: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRDCReminder.lnk
ShortcutTarget: TRDCReminder.lnk -> C:\Program Files (x86)\TOSHIBA\TRDCReminder\TRDCReminder.exe (TOSHIBA Europe)
Startup: C:\Users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRDCReminder.lnk
ShortcutTarget: TRDCReminder.lnk -> C:\Program Files (x86)\TOSHIBA\TRDCReminder\TRDCReminder.exe (TOSHIBA Europe)

==================== Internet (All) ===========================

HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\windows\system32\blank.htm
HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.google.com/ig/redirectdomain?brand=TEUA&bmod=TEUA
HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://www.google.com/ig/redirectdomain?brand=TEUA&bmod=TEUA
HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\System32\blank.htm
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://go.microsoft.com/fwlink/p/?LinkId=255141
HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://go.microsoft.com/fwlink/p/?LinkId=255141
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://go.microsoft.com/fwlink/p/?LinkId=255141
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = hxxp://go.microsoft.com/fwlink/p/?LinkId=255141
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896
URLSearchHook: HKCU - Microsoft Url Search Hook - {CFBFAE00-17A6-11D0-99CB-00C04FD64497} - C:\Windows\System32\ieframe.dll (Microsoft Corporation)
URLSearchHook: HKCU - Microsoft Url Search Hook - {CFBFAE00-17A6-11D0-99CB-00C04FD64497} - C:\Windows\SysWOW64\ieframe.dll (Microsoft Corporation)
StartMenuInternet: IEXPLORE.EXE - C:\Program Files\Internet Explorer\iexplore.exe
SearchScopes: HKLM - DefaultScope {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM - {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKLM-x32 - DefaultScope {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKLM-x32 - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM-x32 - {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKCU - DefaultScope {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA_deDE489
SearchScopes: HKCU - {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA_deDE489
BHO: Groove GFS Browser Helper -> {72853161-30C5-4D22-B7F9-0BBC1D38A37E} -> C:\Program Files\Microsoft Office\Office14\GROOVEEX.DLL (Microsoft Corporation)
BHO: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files\Microsoft Office\Office14\URLREDIR.DLL (Microsoft Corporation)
BHO-x32: Groove GFS Browser Helper -> {72853161-30C5-4D22-B7F9-0BBC1D38A37E} -> C:\Program Files (x86)\Microsoft Office\Office14\GROOVEEX.DLL (Microsoft Corporation)
BHO-x32: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files (x86)\Microsoft Office\Office14\URLREDIR.DLL (Microsoft Corporation)
Toolbar: HKLM - ZoneAlarm Security Engine - {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - C:\Program Files\CheckPoint\ZAForceField\TrustChecker\bin\TrustCheckerIEPlugin.dll (Check Point Software Technologies)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
Toolbar: HKLM-x32 - ZoneAlarm Security Engine - {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - C:\Program Files\CheckPoint\ZAForceField\WOW64\TrustChecker\bin\TrustCheckerIEPlugin.dll (Check Point Software Technologies)
Toolbar: HKLM-x32 - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
Toolbar: HKU\S-1-5-21-3119111728-3156756977-804979122-1000 -> Google Toolbar - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
Toolbar: HKU\S-1-5-21-3119111728-3156756977-804979122-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0 -> Google Toolbar - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
DPF: HKLM-x32 {8AD9C840-044E-11D1-B3E9-00805F499D93} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: HKLM-x32 {CAFEEFAC-0016-0000-0030-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: HKLM-x32 {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
         
Code:
ATTFilter
Additional scan result of Farbar Recovery Scan Tool (x64) Version: 10-11-2014
Ran by Melanie at 2014-11-12 08:46:58
Running from C:\Users\Melanie\Desktop
Boot Mode: Normal
==========================================================


==================== Security Center ========================

(If an entry is included in the fixlist, it will be removed.)

AV: ZoneAlarm Antivirus (Enabled - Up to date) {DE038A5B-9EDD-18A9-2361-FF7D98D43730}
AV: Avira Desktop (Enabled - Out of date) {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
AS: Avira Desktop (Enabled - Out of date) {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
AS: Windows Defender (Enabled - Out of date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: ZoneAlarm Anti-Spyware (Enabled - Up to date) {65626BBF-B8E7-1727-19D1-C40FE3537D8D}
FW: ZoneAlarm Firewall (Enabled) {E6380B7E-D4B2-19F1-083E-56486607704B}

==================== Installed Programs ======================

(Only the adware programs with "hidden" flag could be added to the fixlist to unhide them. The adware programs should be uninstalled manually.)

Adobe Flash Player 15 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 15.0.0.167 - Adobe Systems Incorporated)
Adobe Flash Player 15 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 15.0.0.152 - Adobe Systems Incorporated)
Adobe Reader X (10.1.9) MUI (HKLM-x32\...\{AC76BA86-7AD7-FFFF-7B44-AA0000000001}) (Version: 10.1.9 - Adobe Systems Incorporated)
Agatha Christie - Death on the Nile (x32 Version: 2.2.0.98 - WildTangent) Hidden
Aloha TriPeaks (x32 Version: 2.2.0.98 - WildTangent) Hidden
AMD Catalyst Install Manager (HKLM\...\{F856881A-D370-B1A7-2AFF-128F4AA93558}) (Version: 3.0.859.0 - Advanced Micro Devices, Inc.)
Apple Application Support (HKLM-x32\...\{D9DAD0FF-495A-472B-9F10-BAE430A26682}) (Version: 3.0.3 - Apple Inc.)
Apple Mobile Device Support (HKLM\...\{787136D2-F0F8-4625-AA3F-72D7795AC842}) (Version: 7.1.1.3 - Apple Inc.)
Apple Software Update (HKLM-x32\...\{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}) (Version: 2.1.3.127 - Apple Inc.)
Atheros Bluetooth Filter Driver Package (HKLM\...\{65486209-5C54-439C-8383-8AC9BBE25932}) (Version: 1.0.0.12 - Atheros Communications)
Atheros Communications Inc.(R) AR81Family Gigabit/Fast Ethernet Driver (HKLM-x32\...\{3108C217-BE83-42E4-AE9E-A56A2A92E549}) (Version: 2.0.12.13 - Atheros Communications Inc.)
Atheros Driver Installation Program (HKLM-x32\...\{C3A32068-8AB1-4327-BB16-BED9C6219DC7}) (Version: 9.2 - Atheros)
Avira (HKLM-x32\...\{70e83cd8-4bd5-4039-ab5a-6b94a8abb641}) (Version: 1.1.21.25162 - Avira Operations GmbH & Co. KG)
Avira (x32 Version: 1.1.21.25162 - Avira Operations GmbH & Co. KG) Hidden
Avira Free Antivirus (HKLM-x32\...\Avira AntiVir Desktop) (Version: 12.0.0.1125 - Avira)
Bejeweled 3 (x32 Version: 2.2.0.98 - WildTangent) Hidden
Bluetooth Stack for Windows by Toshiba (HKLM\...\{CEBB6BFB-D708-4F99-A633-BC2600E01EF6}) (Version: v9.00.00(T) - TOSHIBA CORPORATION)
Bonjour (HKLM\...\{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}) (Version: 3.0.0.10 - Apple Inc.)
Cake Mania (x32 Version: 2.2.0.98 - WildTangent) Hidden
Chuzzle Deluxe (x32 Version: 2.2.0.95 - WildTangent) Hidden
Contrôle ActiveX Windows Live Mesh pour connexions à distance (HKLM-x32\...\{55D003F4-9599-44BF-BA9E-95D060730DD3}) (Version: 15.4.5722.2 - Microsoft Corporation)
D3DX10 (x32 Version: 15.4.2368.0902 - Microsoft) Hidden
ElsterFormular (HKLM-x32\...\ElsterFormular) (Version: 15.2.20140326 - Landesfinanzdirektion Thüringen)
Galerie de photos Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Google Chrome (HKLM-x32\...\Google Chrome) (Version: 12.0.742.91 - Google Inc.)
Google Toolbar for Internet Explorer (HKLM-x32\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.3.2710.138 - Google Inc.)
Google Toolbar for Internet Explorer (x32 Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (x32 Version: 1.3.21.111 - Google Inc.) Hidden
High-Definition Video Playback (x32 Version: 11.1.10500.2.65 - Nero AG) Hidden
Insaniquarium Deluxe (x32 Version: 2.2.0.97 - WildTangent) Hidden
Intel(R) Management Engine Components (HKLM-x32\...\{65153EA5-8B6E-43B6-857B-C6E4FC25798A}) (Version: 8.0.1.1399 - Intel Corporation)
Intel(R) Rapid Storage Technology (HKLM-x32\...\{3E29EE6C-963A-4aae-86C1-DC237C4A49FC}) (Version: 11.0.0.1032 - Intel Corporation)
Intel(R) USB 3.0 eXtensible Host Controller Driver (HKLM-x32\...\{240C3DDD-C5E9-4029-9DF7-95650D040CF2}) (Version: 1.0.1.209 - Intel Corporation)
iTunes (HKLM\...\{5A68A656-979F-4168-8795-E2E368AA4DC2}) (Version: 11.2.2.3 - Apple Inc.)
Java(TM) 6 Update 30 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83216030FF}) (Version: 6.0.300 - Oracle)
Jewel Quest Solitaire 2 (x32 Version: 2.2.0.98 - WildTangent) Hidden
Junk Mail filter update (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Malwarebytes Anti-Malware Version 2.0.3.1025 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.0.3.1025 - Malwarebytes Corporation)
Mesh Runtime (x32 Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft Office 2010 (HKLM-x32\...\{95140000-0070-0000-0000-0000000FF1CE}) (Version: 14.0.4763.1000 - Microsoft Corporation)
Microsoft Office Professional Plus 2010 (HKLM-x32\...\Office14.PROPLUSR) (Version: 14.0.7015.1000 - Microsoft Corporation)
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30514.0 - Microsoft Corporation)
Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (x64) (HKLM\...\{ad8a2fa1-06e7-4b0d-927d-6e54b3d31028}) (Version: 8.0.61000 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30411 (HKLM-x32\...\{5DA8F6CD-C70E-39D8-8430-3D9808D6BD17}) (Version: 9.0.30411 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (HKLM-x32\...\{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}) (Version: 9.0.30729.4148 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Mozilla Firefox 31.0 (x86 de) (HKLM-x32\...\Mozilla Firefox 31.0 (x86 de)) (Version: 31.0 - Mozilla)
Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 29.0.1 - Mozilla)
Mystery P.I. - The London Caper (x32 Version: 2.2.0.95 - WildTangent) Hidden
Nero 11 Essentials (HKLM-x32\...\{F8635CF8-B797-4EFD-80BC-DE2D26C65D4F}) (Version: 11.0.00300 - Nero AG)
Nero Backup Drivers (HKLM\...\{D600D357-5CB9-4DE9-8FD4-14E208BD1970}) (Version: 1.0.11100.8.0 - Nero AG)
OpenOffice.org 3.4 (HKLM-x32\...\{4C552FD3-2CCD-4E00-AC64-0681DBB3F8B5}) (Version: 3.4.9590 - OpenOffice.org)
Plants vs. Zombies - Game of the Year (x32 Version: 2.2.0.98 - WildTangent) Hidden
PlayReady PC Runtime amd64 (HKLM\...\{BCA9334F-B6C9-4F65-9A73-AC5A329A4D04}) (Version: 1.3.0 - Microsoft Corporation)
Polar Bowler (x32 Version: 2.2.0.97 - WildTangent) Hidden
Premium Sound HD (HKLM\...\{439A73C2-8CFA-4630-8484-36BCA2AEBB0A}) (Version: 1.12.0300 - SRS Labs, Inc.)
Raccolta foto di Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.6559 - Realtek Semiconductor Corp.)
Realtek USB 2.0 Reader Driver (HKLM-x32\...\{62BBB2F0-E220-4821-A564-730807D2C34D}) (Version: 6.1.7601.39013 - Realtek Semiconductor Corp.)
Service Pack 2 for Microsoft Office 2010 (KB2687455) 32-Bit Edition (HKLM-x32\...\{91140000-0011-0000-0000-0000000FF1CE}_Office14.PROPLUSR_{DE28B448-32E8-4E8F-84F0-A52B21A49B5B}) (Version:  - Microsoft)
Skype™ 6.11 (HKLM-x32\...\{4E76FF7E-AEBA-4C87-B788-CD47E5425B9D}) (Version: 6.11.102 - Skype Technologies S.A.)
Synaptics Pointing Device Driver (HKLM\...\SynTPDeinstKey) (Version: 15.3.39.0 - Synaptics Incorporated)
TOSHIBA Assist (HKLM-x32\...\{C2A276E3-154E-44DC-AAF1-FFDD7FD30E35}) (Version: 4.2.3.1 - TOSHIBA CORPORATION)
TOSHIBA Disc Creator (HKLM\...\{5DA0E02F-970B-424B-BF41-513A5018E4C0}) (Version: 2.1.0.11 for x64 - TOSHIBA Corporation)
TOSHIBA eco Utility (HKLM\...\{2C486987-D447-4E36-8D61-86E48E24199C}) (Version: 1.3.10.64 - TOSHIBA Corporation)
TOSHIBA Hardware Setup (HKLM-x32\...\{97965331-BC5D-4D9F-B6DF-5C0A123E4AE0}) (Version: 2.1.0.8 - TOSHIBA Corporation)
TOSHIBA HDD/SSD Alert (HKLM\...\{D4322448-B6AF-4316-B859-D8A0E84DCB38}) (Version: 3.1.64.11 - TOSHIBA Corporation)
Toshiba Manuals (HKLM-x32\...\{90FF4432-21B7-4AF6-BA6E-FB8C1FED9173}) (Version: 10.04 - TOSHIBA)
TOSHIBA Media Controller (HKLM-x32\...\{C7A4F26F-F9B0-41B2-8659-99181108CDE3}) (Version: 1.0.87.4 - TOSHIBA CORPORATION)
TOSHIBA Media Controller Plug-in (HKLM-x32\...\{F26FDF57-483E-42C8-A9C9-EEE1EDB256E0}) (Version: 1.0.7.7 - TOSHIBA CORPORATION)
TOSHIBA Online Product Information (HKLM-x32\...\{2290A680-4083-410A-ADCC-7092C67FC052}) (Version: 4.01.0000 - TOSHIBA)
TOSHIBA PC Health Monitor (HKLM\...\{9DECD0F9-D3E8-48B0-A390-1CF09F54E3A4}) (Version: 1.7.15.64 - TOSHIBA Corporation)
TOSHIBA Places Icon Utility (HKLM-x32\...\{461F6F0D-7173-4902-9604-AB1A29108AF2}) (Version: 1.1.1.4 - TOSHIBA Corporation)
TOSHIBA Recovery Media Creator (HKLM-x32\...\{B65BBB06-1F8E-48F5-8A54-B024A9E15FDF}) (Version: 2.1.6.52020009 - TOSHIBA CORPORATION)
TOSHIBA Recovery Media Creator Reminder (HKLM-x32\...\InstallShield_{773970F1-5EBA-4474-ADEE-1EA3B0A59492}) (Version: 1.00.0019 - TOSHIBA)
TOSHIBA Resolution+ Plug-in for Windows Media Player (HKLM-x32\...\{6CB76C9D-80C2-4CB3-A4CD-D96B239E3F94}) (Version: 1.1.2004 - TOSHIBA Corporation)
TOSHIBA Service Station (HKLM-x32\...\{AC6569FA-6919-442A-8552-073BE69E247A}) (Version: 2.2.13 - TOSHIBA)
TOSHIBA Sleep Utility (HKLM-x32\...\{654F7484-88C5-46DC-AB32-C66BCB0E2102}) (Version: 1.4.0022.000104 - TOSHIBA Corporation)
TOSHIBA Supervisor Password (HKLM-x32\...\{0AF17224-CF88-40B8-BB1A-D179369847B4}) (Version: 2.1.0.3 - TOSHIBA Corporation)
TOSHIBA TEMPRO (HKLM-x32\...\{F082CB11-4794-4259-99A1-D91BA762AD15}) (Version: 3.35 - Toshiba Europe GmbH)
TOSHIBA Value Added Package (HKLM-x32\...\InstallShield_{066CFFF8-12BF-4390-A673-75F95EFF188E}) (Version: 1.6.0021.640203 - TOSHIBA Corporation)
TOSHIBA Web Camera Application (HKLM-x32\...\InstallShield_{6F3C8901-EBD3-470D-87F8-AC210F6E5E02}) (Version: 2.0.3.33 - TOSHIBA Corporation)
Virtual Villagers 4 - The Tree of Life (x32 Version: 2.2.0.98 - WildTangent) Hidden
welcome (x32 Version: 11.0.22500.0.0 - Nero AG) Hidden
WildTangent Games (HKLM-x32\...\WildTangent toshiba Master Uninstall) (Version: 1.0.2.5 - WildTangent)
Windows Live Essentials (HKLM-x32\...\WinLiveSuite) (Version: 15.4.3538.0513 - Microsoft Corporation)
Windows Live Mesh - ActiveX-besturingselement voor externe verbindingen (HKLM-x32\...\{C32CE55C-12BA-4951-8797-0967FDEF556F}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{2902F983-B4C1-44BA-B85D-5C6D52E2C441}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX control for remote connections (HKLM-x32\...\{C5398A89-516C-4DAF-BA07-EE7949090E56}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{C63A1E60-B6A4-440B-89A5-1FC6E4AC1C94}) (Version: 15.4.5722.2 - Microsoft Corporation)
ZoneAlarm Antivirus (x32 Version: 10.2.057.000 - Check Point Software Technologies Ltd.) Hidden
ZoneAlarm Firewall (x32 Version: 10.2.057.000 - Check Point Software Technologies Ltd.) Hidden
ZoneAlarm Free Antivirus + Firewall (HKLM-x32\...\ZoneAlarm Free Antivirus + Firewall) (Version: 10.2.047.000 - Check Point)
ZoneAlarm LTD Toolbar (HKLM\...\ZoneAlarm LTD Toolbar) (Version:  - Check Point Software Technologies)
ZoneAlarm Security (x32 Version: 10.2.057.000 - Check Point Software Technologies Ltd.) Hidden

==================== Custom CLSID (selected items): ==========================

(If an entry is included in the fixlist, it will be removed from registry. Any eventual file will not be moved.)

CustomCLSID: HKU\S-1-5-21-3119111728-3156756977-804979122-1000_Classes\CLSID\{00000001-0E3A-4123-8B32-4B68A91E104A}\InprocServer32 -> C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIBasePlace.dll (Toshiba Corporation)

==================== Restore Points  =========================

25-07-2014 17:14:01 Windows Update
29-07-2014 13:29:10 Windows Update
31-07-2014 15:57:42 Windows Update
01-08-2014 13:44:08 Windows Update
05-08-2014 15:15:17 Windows Update
15-08-2014 14:14:04 Windows Update
15-08-2014 18:59:31 Windows Update

==================== Hosts content: ==========================

(If needed Hosts: directive could be included in the fixlist to reset Hosts.)

2009-07-14 03:34 - 2009-06-10 22:00 - 00000824 ____A C:\windows\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

(If an entry is included in the fixlist, it will be removed from registry. Any associated file could be listed separately to be moved.)

Task: {6F65B2F6-61E0-4982-9C30-32581D5DBC3D} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07] (Google Inc.)
Task: {AD56B3A2-9D11-49C8-9504-B3294E685B9B} - System32\Tasks\Apple\AppleSoftwareUpdate => C:\Program Files (x86)\Apple Software Update\SoftwareUpdate.exe [2011-06-01] (Apple Inc.)
Task: {B693A355-823C-455A-8CD7-2097843D95FD} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07] (Google Inc.)
Task: {D5564931-3368-4DA3-B8A9-59FE6E3576DE} - System32\Tasks\Adobe Flash Player Updater => C:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2014-10-19] (Adobe Systems Incorporated)
Task: C:\windows\Tasks\Adobe Flash Player Updater.job => C:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
Task: C:\windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Task: C:\windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe

==================== Loaded Modules (whitelisted) =============

2013-09-05 00:17 - 2013-09-05 00:17 - 04300456 _____ () C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODF
2011-08-22 23:19 - 2011-08-22 23:19 - 11204992 _____ () C:\Program Files\TOSHIBA\FlashCards\BlackPng.dll
2011-11-24 21:20 - 2011-11-24 21:20 - 00593856 _____ () C:\Program Files\TOSHIBA\TECO\TecoPower.dll
2010-12-15 23:19 - 2010-12-15 23:19 - 00124320 _____ () C:\Program Files\TOSHIBA\TECO\MUIHelp.dll
2012-03-07 01:01 - 2011-02-22 11:16 - 00559104 _____ () C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\de\Humphrey.resources.dll
2012-03-07 01:05 - 2011-12-15 15:56 - 00022400 _____ () C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\de\TosDILangPack.resources.dll
2012-03-07 01:05 - 2011-12-15 15:55 - 00063360 _____ () C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIInternal.XmlSerializers.dll
2012-01-20 12:13 - 2012-01-20 12:13 - 00369152 _____ () C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLI.Aspect.CrossDisplay.Graphics.Dashboard.dll
2011-11-09 17:55 - 2011-11-09 17:55 - 00016384 _____ () C:\Program Files (x86)\ATI Technologies\ATI.ACE\Branding\Branding.dll
2011-11-26 02:51 - 2011-11-26 02:51 - 00079784 _____ () C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosIPCWraper.dll
2014-08-18 16:15 - 2012-04-16 22:11 - 00398288 _____ () C:\Program Files (x86)\Avira\AntiVir Desktop\sqlite3.dll
2014-01-20 13:17 - 2014-01-20 13:17 - 00073544 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\zlib1.dll
2014-01-20 13:16 - 2014-01-20 13:16 - 01044808 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\libxml2.dll
2013-09-05 00:14 - 2013-09-05 00:14 - 04300456 _____ () C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\OFFICE.ODF

==================== Alternate Data Streams (whitelisted) =========

(If an entry is included in the fixlist, only the Alternate Data Streams will be removed.)


==================== Safe Mode (whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. The "AlternateShell" will be restored.)

HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\vsmon => ""="Service"

==================== EXE Association (whitelisted) =============

(If an entry is included in the fixlist, the default will be restored. None default entries will be removed.)


==================== MSCONFIG/TASK MANAGER disabled items =========

(Currently there is no automatic fix for this section.)


========================= Accounts: ==========================

Administrator (S-1-5-21-3119111728-3156756977-804979122-500 - Administrator - Disabled)
Gast (S-1-5-21-3119111728-3156756977-804979122-501 - Limited - Disabled)
HomeGroupUser$ (S-1-5-21-3119111728-3156756977-804979122-1002 - Limited - Enabled)
Melanie (S-1-5-21-3119111728-3156756977-804979122-1000 - Administrator - Enabled) => C:\Users\Melanie

==================== Faulty Device Manager Devices =============

Name: TSSTcorp CDDVDW SN-208AB
Description: CD-ROM-Laufwerk
Class Guid: {4d36e965-e325-11ce-bfc1-08002be10318}
Manufacturer: (Standard-CD-ROM-Laufwerke)
Service: cdrom
Problem: : Windows cannot start this hardware device because its configuration information (in the registry) is incomplete or damaged. (Code 19)
Resolution: A registry problem was detected.
 This can occur when more than one service is defined for a device, if there is a failure opening the service subkey, or if the driver name cannot be obtained from the service subkey. Try these options:
On the "General Properties" tab of the device, click "Troubleshoot" to start the troubleshooting wizard.
Click "Uninstall", and then click "Scan for hardware changes" to load a usable driver.


==================== Event log errors: =========================

Application errors:
==================
Error: (11/12/2014 09:11:30 AM) (Source: Avira Antivirus) (EventID: 4118) (User: NT-AUTORITÄT)
Description: AUSNAHMEFEHLER beim Aufruf der Funktion AVEPROC_TestFile() für die Datei
C:\Users\Melanie\Pictures\Justin Timberlake 2014\209 (3).jpg.
 [ACCESS_VIOLATION Exception!! EIP = 0x1a85c92]
 Bitte Avira informieren und die obige Datei übersenden!

Error: (11/12/2014 08:28:10 AM) (Source: Avira Antivirus) (EventID: 4118) (User: NT-AUTORITÄT)
Description: AUSNAHMEFEHLER beim Aufruf der Funktion AVEPROC_TestFile() für die Datei
C:\Users\Melanie\Pictures\WAGO Wiesn\396.jpg.
 [ACCESS_VIOLATION Exception!! EIP = 0x1a85c92]
 Bitte Avira informieren und die obige Datei übersenden!

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 42760

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 42760

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 41715

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 41715

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/11/2014 11:31:21 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 40716

Error: (11/11/2014 11:31:21 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 40716


System errors:
=============
Error: (11/12/2014 09:26:24 AM) (Source: DCOM) (EventID: 10010) (User: )
Description: {752073A1-23F2-4396-85F0-8FDB879ED0ED}

Error: (11/12/2014 08:49:39 AM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Der Dienst "Microsoft-Softwareschattenkopie-Anbieter" wurde aufgrund folgenden Fehlers nicht gestartet: 
%%1053

Error: (11/12/2014 08:49:39 AM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Microsoft-Softwareschattenkopie-Anbieter erreicht.

Error: (11/12/2014 08:49:39 AM) (Source: DCOM) (EventID: 10005) (User: )
Description: 1053swprv{65EE1DBA-8FF4-4A58-AC1C-3470EE2F376A}

Error: (11/12/2014 08:48:26 AM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Der Dienst "Volumeschattenkopie" wurde aufgrund folgenden Fehlers nicht gestartet: 
%%1053

Error: (11/12/2014 08:48:26 AM) (Source: DCOM) (EventID: 10005) (User: )
Description: 1053VSS{E579AB5F-1CC4-44B4-BED9-DE0991FF0623}

Error: (11/12/2014 08:48:18 AM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Volumeschattenkopie erreicht.

Error: (11/11/2014 10:54:57 PM) (Source: DCOM) (EventID: 10010) (User: )
Description: {995C996E-D918-4A8C-A302-45719A6F4EA7}

Error: (11/11/2014 10:45:43 PM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Der Dienst "Mozilla Maintenance Service" wurde aufgrund folgenden Fehlers nicht gestartet: 
%%1053

Error: (11/11/2014 10:45:43 PM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Mozilla Maintenance Service erreicht.


Microsoft Office Sessions:
=========================
Error: (11/12/2014 09:11:30 AM) (Source: Avira Antivirus) (EventID: 4118) (User: NT-AUTORITÄT)
Description: C:\Users\Melanie\Pictures\Justin Timberlake 2014\209 (3).jpgACCESS_VIOLATION0x1a85c92AVEPROC_TestFile()

Error: (11/12/2014 08:28:10 AM) (Source: Avira Antivirus) (EventID: 4118) (User: NT-AUTORITÄT)
Description: C:\Users\Melanie\Pictures\WAGO Wiesn\396.jpgACCESS_VIOLATION0x1a85c92AVEPROC_TestFile()

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 42760

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 42760

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 41715

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 41715

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/11/2014 11:31:21 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 40716

Error: (11/11/2014 11:31:21 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 40716


CodeIntegrity Errors:
===================================
  Date: 2014-11-12 07:34:26.569
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-12 06:50:11.789
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 23:02:11.492
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 21:08:47.971
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 20:47:01.058
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 20:28:20.337
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 20:10:26.555
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-09 21:10:56.055
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-09 20:47:50.984
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-09 20:02:25.124
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.


==================== Memory info =========================== 

Processor: Intel(R) Core(TM) i5-3210M CPU @ 2.50GHz
Percentage of memory in use: 33%
Total physical RAM: 8154.8 MB
Available physical RAM: 5429.94 MB
Total Pagefile: 16307.79 MB
Available Pagefile: 12838.94 MB
Total Virtual: 8192 MB
Available Virtual: 8191.83 MB

==================== Drives ================================

Drive c: (TI30886900A) (Fixed) (Total:578.84 GB) (Free:460.69 GB) NTFS ==>[System with boot components (obtained from reading drive)]

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or Vista) (Size: 596.2 GB) (Disk ID: 1780111D)
Partition 1: (Active) - (Size=1.5 GB) - (Type=27)
Partition 2: (Not Active) - (Size=578.8 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=15.9 GB) - (Type=17)

==================== End Of Log ============================
         
Code:
ATTFilter
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-11-15 13:22:40
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-0 TOSHIBA_ rev.GT00 596,17GB
Running: Gmer-19357.exe; Driver: C:\Users\Melanie\AppData\Local\Temp\pxriipoc.sys


---- User code sections - GMER 2.1 ----

.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\wininit.exe[652] C:\windows\system32\USER32.dll!FindWindowW                                                                                             0000000076e6d264 5 bytes JMP 00000001222ff174
.text   C:\windows\system32\wininit.exe[652] C:\windows\system32\USER32.dll!FindWindowA                                                                                             0000000076e88270 5 bytes JMP 00000001222ff1c4
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\services.exe[748] C:\windows\system32\USER32.dll!FindWindowW                                                                                            0000000076e6d264 5 bytes JMP 00000001222ff174
.text   C:\windows\system32\services.exe[748] C:\windows\system32\USER32.dll!FindWindowA                                                                                            0000000076e88270 5 bytes JMP 00000001222ff1c4
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                    0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                  0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                              0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                        0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                              0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\lsass.exe[756] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                          000007fefe12b521 3 bytes [5D, 4B, FA]
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                      0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                    0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                                0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                          0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                                0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[952] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                        000007fefe12b521 3 bytes [5D, 4B, DD]
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\System32\svchost.exe[848] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                        000007fefe12b521 4 bytes {JMP 0xfffffffffedc4b62}
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1048] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                       000007fefe12b521 4 bytes {JMP 0xfffffffffedc4b62}
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1308] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                       000007fefe12b521 3 bytes [5D, 4B, DD]
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1932] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                       000007fefe12b521 3 bytes [5D, 4B, DD]
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                    000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                  000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                        0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                              00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\kernel32.dll!OpenProcess                                                             0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                         0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\USER32.dll!FindWindowW                                                               00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\USER32.dll!FindWindowA                                                               000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                          0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                              0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                    000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                  000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                        0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort              00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\kernel32.dll!OpenProcess                             0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                         0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                          0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient              0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\USER32.dll!FindWindowW                               00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\USER32.dll!FindWindowA                               000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                      0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                    0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                          0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                            000007fefe12b521 3 bytes [5D, 4B, FA]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                              000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                            000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                  0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                        00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\kernel32.dll!OpenProcess                                                       0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                   0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                    0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                        0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\USER32.dll!FindWindowW                                                         00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\USER32.dll!FindWindowA                                                         000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                                            00000000763e1465 2 bytes [3E, 76]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 155                                           00000000763e14bb 2 bytes [3E, 76]
.text   ...                                                                                                                                                                         * 2
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                000000007715fb28 5 bytes JMP 00000001026489ab
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                              000000007715fb70 5 bytes JMP 0000000102648d58
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                    0000000077160240 5 bytes JMP 0000000102648791
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                          00000000771604c0 5 bytes JMP 0000000102648dd9
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\kernel32.dll!OpenProcess                                                         0000000076401952 5 bytes JMP 000000010264846c
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\USER32.dll!FindWindowW                                                           00000000767298fd 5 bytes JMP 000000010264825a
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\USER32.dll!FindWindowA                                                           000000007672ffe6 5 bytes JMP 000000010264828f
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                      0000000074d2c76e 5 bytes JMP 0000000102649036
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                          0000000074d63475 5 bytes JMP 0000000102648e5d
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                                              00000000763e1465 2 bytes [3E, 76]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 155                                             00000000763e14bb 2 bytes [3E, 76]
.text   ...                                                                                                                                                                         * 2
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                               0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                             0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                         0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                   0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                         0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                         0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                       0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                   0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                             0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                   0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                               000007fefe12b521 4 bytes {JMP 0xfffffffffee34b62}
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                  000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                      0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                            00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\syswow64\KERNEL32.dll!OpenProcess                                                           0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\syswow64\KERNEL32.dll!OpenProcess + 4                                                       0000000076401956 1 byte [AA]
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                        0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                      0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                  0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                            0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                  0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                   0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                 0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                             0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                       0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                             0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                    0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                  0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                              0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                        0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                              0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbam.exe[3824] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                                                     00000000763e1465 2 bytes [3E, 76]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbam.exe[3824] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 155                                                    00000000763e14bb 2 bytes [3E, 76]
.text   ...                                                                                                                                                                         * 2
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                           0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                         0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                     0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                               0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                     0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                  000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                      0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                            00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\kernel32.dll!OpenProcess                                           0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                       0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                        0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                            0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\USER32.dll!FindWindowW                                             00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\USER32.dll!FindWindowA                                             000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess        000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort      000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType            0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort  00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\kernel32.dll!OpenProcess                 0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\kernel32.dll!OpenProcess + 4             0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\USER32.dll!FindWindowW                   00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\USER32.dll!FindWindowA                   000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken              0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient  0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                              000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                            000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                  0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                        00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\kernel32.dll!OpenProcess                                                       0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                   0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\USER32.dll!FindWindowW                                                         00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\USER32.dll!FindWindowA                                                         000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                    0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                        0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                                    000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                                  000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                                        0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                                              00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\kernel32.dll!OpenProcess                                                                             0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                                         0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\USER32.dll!FindWindowW                                                                               00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\USER32.dll!FindWindowA                                                                               000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                                          0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                                              0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                                  000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                                000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                                      0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                                            00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\kernel32.dll!OpenProcess                                                                           0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                                       0000000076401956 1 byte [AA]
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                                        0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                                            0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\USER32.dll!FindWindowW                                                                             00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\USER32.dll!FindWindowA                                                                             000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                          000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                        000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                              0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                                    00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\syswow64\kernel32.dll!OpenProcess                                                                   0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                               0000000076401956 1 byte [AA]
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                       0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                     0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                 0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                           0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                 0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                                         000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                                       000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                                             0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                   00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\kernel32.dll!OpenProcess                                                                                  0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                                              0000000076401956 1 byte [AA]
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\USER32.dll!FindWindowW                                                                                    00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\USER32.dll!FindWindowA                                                                                    000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                                               0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                                                   0000000074d63475 5 bytes JMP 0000000120cb8e5d

---- Threads - GMER 2.1 ----

Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:3084]                                                                                                      0000000076d27587
Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:3156]                                                                                                      0000000073cd7712
Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:3816]                                                                                                      0000000077192e65
Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:4456]                                                                                                      0000000077193e85
Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:4644]                                                                                                      0000000077193e85
Thread  C:\windows\System32\svchost.exe [4628:4972]                                                                                                                                 000007fef4be9688
Thread  C:\Program Files\Windows Media Player\wmpnetwk.exe [3672:5036]                                                                                                              000007fefb0d2bf8

---- Disk sectors - GMER 2.1 ----

Disk    \Device\Harddisk0\DR0                                                                                                                                                       unknown MBR code

---- EOF - GMER 2.1 ----
         
Code:
ATTFilter
Exportierte Ereignisse:

11.11.2014 21:01 [System Scanner] Malware gefunden
      Die Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\TEMPORARYFOLDER\bases\sw2\k
      lavasyswatch.dll'
      enthielt einen Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan].
      Durchgeführte Aktion(en):
      Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '509ec47a.qua' 
      verschoben!

11.11.2014 19:37 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\TEMPORARYFOLDER\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

11.11.2014 19:36 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\TEMPORARYFOLDER\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

11.11.2014 19:28 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

11.11.2014 19:28 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

09.11.2014 18:00 [System Scanner] Malware gefunden
      Die Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      enthielt einen Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan].
      Durchgeführte Aktion(en):
      Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '51663c80.qua' 
      verschoben!

09.11.2014 17:13 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

09.11.2014 17:13 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

09.11.2014 17:13 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

09.11.2014 17:13 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

09.11.2014 09:57 [System Scanner] Malware gefunden
      Die Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      enthielt einen Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan].
      Durchgeführte Aktion(en):
      Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '52c78676.qua' 
      verschoben!

09.11.2014 09:39 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

09.11.2014 09:39 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

19.10.2014 17:42 [System Scanner] Malware gefunden
      Die Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      enthielt einen Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan].
      Durchgeführte Aktion(en):
      Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '50f37295.qua' 
      verschoben!

19.10.2014 17:36 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

19.10.2014 17:36 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern
         

Alt 15.11.2014, 13:02   #2
M-K-D-B
/// TB-Ausbilder
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund






Mein Name ist Matthias und ich werde dir bei der Bereinigung deines Computers helfen.


Bitte beachte folgende Hinweise:
  • Falls wir Hinweise auf illegal erworbene Software finden, werden wir den Support unterbrechen bis jegliche Art von illegaler Software vom Rechner entfernt wurde.
  • Lies dir die Anleitungen sorgfältig durch. Solltest du Probleme haben, stoppe mit deiner Bearbeitung und beschreibe mir dein Problem so gut es geht.
  • Solltest du mir nicht innerhalb von 3 Tagen antworten, gehe ich davon aus, dass du keine Hilfe mehr benötigst. Dann lösche ich dein Thema aus meinem Abo. Solltest du einmal länger abwesend sein, so gib mir bitte Bescheid!
  • Während der Bereinigung bitte nichts installieren oder deinstallieren, außer ich bitte dich darum!
  • Bitte beachten: Download bei filepony.de: So ladet Ihr unsere Tools richtig!
  • Alle zu verwendenen Programme sind auf dem Desktop abzuspeichern und von dort zu starten!


Bitte arbeite alle Schritte in der vorgegebenen Reihefolge nacheinander ab und poste alle Logdateien in CODE-Tags:
So funktioniert es:
Posten in CODE-Tags
Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR, 7Z-Archive zu packen erschwert deinem Helfer massiv die Arbeit, es sei denn natürlich die Datei wäre ansonsten zu groß für das Forum. Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
  • Markiere das gesamte Logfile (geht meist mit STRG+A) und kopiere es in die Zwischenablage mit STRG+C.
  • Klicke im Editor auf das #-Symbol. Es erscheinen zwei Klammerausdrücke [CODE] [/CODE].
  • Setze den Curser zwischen die CODE-Tags und drücke STRG+V.
  • Klicke aauf Erweitert/Vorschau, um so prüfen, ob du es richtig gemacht hast. Wenn alles stimmt ... auf Antworten.

Danke für deine Mitarbeit!







Downloade dir bitte TDSSKiller TDSSKiller.exe und speichere diese Datei auf dem Desktop
  • Starte die TDSSKiller.exe - Einstellen wie in der Anleitung zu TDSSKiller beschrieben.
  • Drücke Start Scan
  • Sollten infizierte Objekte gefunden werden, wähle keinesfalls Cure. Wähle Skip und klicke auf Continue.
    TDSSKiller wird eine Logfile auf deinem Systemlaufwerk speichern (Meistens C:\)
    Als Beispiel: C:\TDSSKiller.<Version_Datum_Uhrzeit>log.txt
Poste den Inhalt bitte in jedem Fall hier in deinen Thread.
__________________

__________________

Alt 16.11.2014, 09:15   #3
Melanie3107
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Hallo Matthias,

vielen Dank für deine super schnelle Antwort.
Der TDSSKiller hat nichts gefunden.

Code:
ATTFilter
09:58:41.0807 0x1320  TDSS rootkit removing tool 3.0.0.41 Oct 28 2014 17:58:34
09:58:55.0239 0x1320  ============================================================
09:58:55.0239 0x1320  Current date / time: 2014/11/16 09:58:55.0239
09:58:55.0239 0x1320  SystemInfo:
09:58:55.0239 0x1320  
09:58:55.0239 0x1320  OS Version: 6.1.7601 ServicePack: 1.0
09:58:55.0239 0x1320  Product type: Workstation
09:58:55.0239 0x1320  ComputerName: MELANIE-TOSH
09:58:55.0239 0x1320  UserName: Melanie
09:58:55.0239 0x1320  Windows directory: C:\windows
09:58:55.0239 0x1320  System windows directory: C:\windows
09:58:55.0239 0x1320  Running under WOW64
09:58:55.0239 0x1320  Processor architecture: Intel x64
09:58:55.0239 0x1320  Number of processors: 4
09:58:55.0239 0x1320  Page size: 0x1000
09:58:55.0239 0x1320  Boot type: Normal boot
09:58:55.0239 0x1320  ============================================================
09:58:56.0310 0x1320  KLMD registered as C:\windows\system32\drivers\27715312.sys
09:58:57.0550 0x1320  System UUID: {E1DEDAD7-A295-45E1-A539-847AB566B6D6}
09:58:58.0890 0x1320  Drive \Device\Harddisk0\DR0 - Size: 0x950B056000 ( 596.17 Gb ), SectorSize: 0x200, Cylinders: 0x13001, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
09:58:58.0890 0x1320  ============================================================
09:58:58.0890 0x1320  \Device\Harddisk0\DR0:
09:58:58.0890 0x1320  MBR partitions:
09:58:58.0890 0x1320  \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x2EE800, BlocksNum 0x485AC000
09:58:58.0890 0x1320  ============================================================
09:58:58.0941 0x1320  C: <-> \Device\Harddisk0\DR0\Partition1
09:58:58.0941 0x1320  ============================================================
09:58:58.0941 0x1320  Initialize success
09:58:58.0941 0x1320  ============================================================
10:00:07.0977 0x0c9c  ============================================================
10:00:07.0977 0x0c9c  Scan started
10:00:07.0977 0x0c9c  Mode: Manual; SigCheck; TDLFS; 
10:00:15.0409 0x0c9c  ============================================================
10:00:15.0409 0x0c9c  KSN ping started
10:00:18.0029 0x0c9c  KSN ping finished: true
10:00:23.0881 0x0c9c  ================ Scan system memory ========================
10:00:23.0881 0x0c9c  System memory - ok
10:00:23.0881 0x0c9c  ================ Scan services =============================
10:00:24.0251 0x0c9c  [ A87D604AEA360176311474C87A63BB88, B1507868C382CD5D2DBC0D62114FCFBF7A780904A2E3CA7C7C1DD0844ADA9A8F ] 1394ohci        C:\windows\system32\drivers\1394ohci.sys
10:00:24.0431 0x0c9c  1394ohci - ok
10:00:24.0531 0x0c9c  [ D81D9E70B8A6DD14D42D7B4EFA65D5F2, FDAAB7E23012B4D31537C5BDEF245BB0A12FA060A072C250E21C68E18B22E002 ] ACPI            C:\windows\system32\drivers\ACPI.sys
10:00:24.0571 0x0c9c  ACPI - ok
10:00:24.0731 0x0c9c  [ 99F8E788246D495CE3794D7E7821D2CA, F91615463270AD2601F882CAED43B88E7EDA115B9FD03FC56320E48119F15F76 ] AcpiPmi         C:\windows\system32\drivers\acpipmi.sys
10:00:24.0921 0x0c9c  AcpiPmi - ok
10:00:25.0031 0x0c9c  [ B362181ED3771DC03B4141927C80F801, 69514E5177A0AEA89C27C2234712F9F82E8D8F99E1FD4273898C9324C6FF7472 ] AdobeARMservice C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
10:00:25.0061 0x0c9c  AdobeARMservice - ok
10:00:25.0391 0x0c9c  [ D51145F6B0CE987850F13A61DAD5E531, 67CB6AB8C42781FA717CBEF81F3C658747E3B7814383056A56EDA99583FDBFD5 ] AdobeFlashPlayerUpdateSvc C:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
10:00:25.0411 0x0c9c  AdobeFlashPlayerUpdateSvc - ok
10:00:25.0501 0x0c9c  [ 2F6B34B83843F0C5118B63AC634F5BF4, 43E3F5FBFB5D33981AC503DEE476868EC029815D459E7C36C4ABC2D2F75B5735 ] adp94xx         C:\windows\system32\drivers\adp94xx.sys
10:00:25.0551 0x0c9c  adp94xx - ok
10:00:25.0651 0x0c9c  [ 597F78224EE9224EA1A13D6350CED962, DA7FD99BE5E3B7B98605BF5C13BF3F1A286C0DE1240617570B46FE4605E59BDC ] adpahci         C:\windows\system32\drivers\adpahci.sys
10:00:25.0701 0x0c9c  adpahci - ok
10:00:25.0751 0x0c9c  [ E109549C90F62FB570B9540C4B148E54, E804563735153EA00A00641814244BC8A347B578E7D63A16F43FB17566EE5559 ] adpu320         C:\windows\system32\drivers\adpu320.sys
10:00:25.0781 0x0c9c  adpu320 - ok
10:00:25.0821 0x0c9c  [ 4B78B431F225FD8624C5655CB1DE7B61, 198A5AF2125C7C41F531A652D200C083A55A97DC541E3C0B5B253C7329949156 ] AeLookupSvc     C:\windows\System32\aelupsvc.dll
10:00:26.0382 0x0c9c  AeLookupSvc - ok
10:00:26.0482 0x0c9c  [ FA886682CFC5D36718D3E436AACF10B9, F80AB4F91AA6B5C7ECCB000D8E1BC2CF776DC3D69B3D9EBC2558C19035A6B3AB ] AFD             C:\windows\system32\drivers\afd.sys
10:00:26.0722 0x0c9c  AFD - ok
10:00:26.0792 0x0c9c  [ 608C14DBA7299D8CB6ED035A68A15799, 45360F89640BF1127C82A32393BD76205E4FA067889C40C491602F370C09282A ] agp440          C:\windows\system32\drivers\agp440.sys
10:00:26.0822 0x0c9c  agp440 - ok
10:00:26.0892 0x0c9c  [ 3290D6946B5E30E70414990574883DDB, 0E9294E1991572256B3CDA6B031DB9F39CA601385515EE59F1F601725B889663 ] ALG             C:\windows\System32\alg.exe
10:00:27.0032 0x0c9c  ALG - ok
10:00:27.0192 0x0c9c  [ 5812713A477A3AD7363C7438CA2EE038, A7316299470D2E57A11499C752A711BF4A71EB11C9CBA731ED0945FF6A966721 ] aliide          C:\windows\system32\drivers\aliide.sys
10:00:27.0212 0x0c9c  aliide - ok
10:00:27.0302 0x0c9c  [ 2437C0697BA89FC5FCF2ADE491BDC2B3, D29D34C1A1CA2F5773C64B2914113E62DD5990CC1FA92C6056EB956003761D7D ] AMD External Events Utility C:\windows\system32\atiesrxx.exe
10:00:27.0542 0x0c9c  AMD External Events Utility - ok
10:00:27.0712 0x0c9c  [ 1FF8B4431C353CE385C875F194924C0C, 3EA3A7F426B0FFC2461EDF4FDB4B58ACC9D0730EDA5B728D1EA1346EA0A02720 ] amdide          C:\windows\system32\drivers\amdide.sys
10:00:27.0752 0x0c9c  amdide - ok
10:00:27.0862 0x0c9c  [ 7024F087CFF1833A806193EF9D22CDA9, E7F27E488C38338388103D3B7EEDD61D05E14FB140992AEE6F492FFC821BF529 ] AmdK8           C:\windows\system32\drivers\amdk8.sys
10:00:27.0962 0x0c9c  AmdK8 - ok
10:00:29.0462 0x0c9c  [ 184F11D8B76FACFE16390C4C47D32B5D, 712A89DD1E803254A206A796C134E1B9F5BAAF54303591BDA384AD7754FAD6AF ] amdkmdag        C:\windows\system32\DRIVERS\atikmdag.sys
10:00:30.0318 0x0c9c  amdkmdag - ok
10:00:30.0498 0x0c9c  [ 54BC6F0E471033D8B22FB5E5BEA343EE, D8D75D2B43BBD4CF6B773BF01F4013F4F2BAD0807561A9CE2042FA0D575A69D0 ] amdkmdap        C:\windows\system32\DRIVERS\atikmpag.sys
10:00:30.0548 0x0c9c  amdkmdap - ok
10:00:30.0578 0x0c9c  [ 1E56388B3FE0D031C44144EB8C4D6217, E88CA76FD47BA0EB427D59CB9BE040DE133D89D4E62D03A8D622624531D27487 ] AmdPPM          C:\windows\system32\drivers\amdppm.sys
10:00:30.0658 0x0c9c  AmdPPM - ok
10:00:30.0778 0x0c9c  [ D4121AE6D0C0E7E13AA221AA57EF2D49, 626F43C099BD197BE56648C367B711143C2BCCE96496BBDEF19F391D52FA01D0 ] amdsata         C:\windows\system32\drivers\amdsata.sys
10:00:30.0808 0x0c9c  amdsata - ok
10:00:31.0338 0x0c9c  [ F67F933E79241ED32FF46A4F29B5120B, D6EF539058F159CC4DD14CA9B1FD924998FEAC9D325C823C7A2DD21FEF1DC1A8 ] amdsbs          C:\windows\system32\drivers\amdsbs.sys
10:00:31.0368 0x0c9c  amdsbs - ok
10:00:31.0418 0x0c9c  [ 540DAF1CEA6094886D72126FD7C33048, 296578572A93F5B74E1AD443E000B79DC99D1CBD25082E02704800F886A3065F ] amdxata         C:\windows\system32\drivers\amdxata.sys
10:00:31.0438 0x0c9c  amdxata - ok
10:00:31.0848 0x0c9c  [ 466A0D95960DAD3222C896D2CEA99993, 98B29D5010A1985AA2CFD016C8730AC81BDF1A2BCFF6B2B77ED205A1301F390B ] AntiVirSchedulerService C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe
10:00:31.0878 0x0c9c  AntiVirSchedulerService - ok
10:00:31.0958 0x0c9c  [ A489BE6BB0AA1FF406B488B60542314B, 511421991E63EFE11A62B5E3BA564F7BBB8A266F7605E0006B80CDF4F261022E ] AntiVirService  C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe
10:00:31.0978 0x0c9c  AntiVirService - ok
10:00:32.0248 0x0c9c  [ 676894FA57B671FEC5C3F05F8929E03B, B4F0CA314ABD892D299A1732BEB00FA2C8D8EB31DF1B7BB07F295F9F10548E90 ] AntiVirWebService C:\Program Files (x86)\Avira\AntiVir Desktop\AVWEBGRD.EXE
10:00:32.0288 0x0c9c  AntiVirWebService - ok
10:00:32.0408 0x0c9c  [ 89A69C3F2F319B43379399547526D952, 8ABDB4B8E106F96EBBA0D4D04C4F432296516E107E7BA5644ED2E50CF9BB491A ] AppID           C:\windows\system32\drivers\appid.sys
10:00:33.0959 0x0c9c  AppID - ok
10:00:34.0059 0x0c9c  [ 0BC381A15355A3982216F7172F545DE1, C33AF13CB218F7BF52E967452573DF2ADD20A95C6BF99229794FEF07C4BBE725 ] AppIDSvc        C:\windows\System32\appidsvc.dll
10:00:34.0159 0x0c9c  AppIDSvc - ok
10:00:34.0249 0x0c9c  [ 9D2A2369AB4B08A4905FE72DB104498F, D6FA1705018BABABFA2362E05691A0D6408D14DE7B76129B16D0A1DAD6378E58 ] Appinfo         C:\windows\System32\appinfo.dll
10:00:34.0289 0x0c9c  Appinfo - ok
10:00:34.0669 0x0c9c  [ 221564CC7BE37611FE15EACF443E1BF6, 381BDF17418C779D72332431BA174C2AD76CD9C7C1711FF5142EA9B05D5555E4 ] Apple Mobile Device C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
10:00:34.0689 0x0c9c  Apple Mobile Device - ok
10:00:34.0739 0x0c9c  [ C484F8CEB1717C540242531DB7845C4E, C507CE26716EB923B864ED85E8FA0B24591E2784A2F4F0E78AEED7E9953311F6 ] arc             C:\windows\system32\drivers\arc.sys
10:00:34.0769 0x0c9c  arc - ok
10:00:34.0939 0x0c9c  [ 019AF6924AEFE7839F61C830227FE79C, 5926B9DDFC9198043CDD6EA0B384C83B001EC225A8125628C4A45A3E6C42C72A ] arcsas          C:\windows\system32\drivers\arcsas.sys
10:00:35.0019 0x0c9c  arcsas - ok
10:00:35.0439 0x0c9c  [ 9A262EDD17F8473B91B333D6B031A901, 05DFBD3A7D83FDE1D062EA719ACA9EC48CB7FD42D17DDD88B82E5D25469ADD23 ] aspnet_state    C:\windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
10:00:35.0469 0x0c9c  aspnet_state - ok
10:00:35.0529 0x0c9c  [ 769765CE2CC62867468CEA93969B2242, 0D8F19D49869DF93A3876B4C2E249D12E83F9CE11DAE8917D368E292043D4D26 ] AsyncMac        C:\windows\system32\DRIVERS\asyncmac.sys
10:00:35.0629 0x0c9c  AsyncMac - ok
10:00:35.0729 0x0c9c  [ 02062C0B390B7729EDC9E69C680A6F3C, 0261683C6DC2706DCE491A1CDC954AC9C9E649376EC30760BB4E225E18DC5273 ] atapi           C:\windows\system32\drivers\atapi.sys
10:00:35.0749 0x0c9c  atapi - ok
10:00:36.0199 0x0c9c  [ 3660381F5EA18E14A06C98591B533AD6, F94E7D73989480CF37EDE0710A0111E9A5E51A527EAE6B8D4C84810958107EBE ] athr            C:\windows\system32\DRIVERS\athrx.sys
10:00:36.0819 0x0c9c  athr - ok
10:00:36.0879 0x06b8  Object required for P2P: [ D51145F6B0CE987850F13A61DAD5E531 ] AdobeFlashPlayerUpdateSvc
10:00:36.0919 0x0c9c  [ 2B3B05C0A7768BF033217EB8F33F9C35, F7B13158440CAE46EC93F29BA47A960194A5A2AD71B5BF628AF4661CEE096402 ] AtiHDAudioService C:\windows\system32\drivers\AtihdW76.sys
10:00:36.0989 0x0c9c  AtiHDAudioService - ok
10:00:37.0119 0x0c9c  [ F23FEF6D569FCE88671949894A8BECF1, FCE7B156ED663471CF9A736915F00302E93B50FC647563D235313A37FCE8F0F6 ] AudioEndpointBuilder C:\windows\System32\Audiosrv.dll
10:00:37.0280 0x0c9c  AudioEndpointBuilder - ok
10:00:37.0340 0x0c9c  [ F23FEF6D569FCE88671949894A8BECF1, FCE7B156ED663471CF9A736915F00302E93B50FC647563D235313A37FCE8F0F6 ] AudioSrv        C:\windows\System32\Audiosrv.dll
10:00:37.0440 0x0c9c  AudioSrv - ok
10:00:37.0550 0x0c9c  [ 26E38B5A58C6C55FAFBC563EEDDB0867, 8830E097F43AA87E9A9AC8F9EB3EBB4ED668B0F7C99D69405844E03CDC25E817 ] avgntflt        C:\windows\system32\DRIVERS\avgntflt.sys
10:00:37.0590 0x0c9c  avgntflt - ok
10:00:37.0630 0x0c9c  [ 9D1F00BEFF84CBBF46D7F052BC7E0565, 3EBF9755AF50AC32890628AEA36C3D6AABA2C35A0A5D9908E7CD01F0420E78BB ] avipbb          C:\windows\system32\DRIVERS\avipbb.sys
10:00:37.0670 0x0c9c  avipbb - ok
10:00:37.0910 0x0c9c  [ F21955927D1C99206A8B91DE2CCE85E1, 26A6155CF46123C489CBE19B5B3E3B0D9ED02C9388E57058724B0FFB7D7C08B5 ] Avira.OE.ServiceHost C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe
10:00:37.0958 0x0c9c  Avira.OE.ServiceHost - ok
10:00:38.0082 0x0c9c  [ 248DB59FC86DE44D2779F4C7FB1A567D, BE1D2A5A94ECDE11749B2E5DEBFEAB26C26666BE402CC8A8E5633A0075D6F265 ] avkmgr          C:\windows\system32\DRIVERS\avkmgr.sys
10:00:38.0102 0x0c9c  avkmgr - ok
10:00:38.0232 0x0c9c  [ A6BF31A71B409DFA8CAC83159E1E2AFF, CBB83F73FFD3C3FB4F96605067739F8F7A4A40B2B05417FA49E575E95628753F ] AxInstSV        C:\windows\System32\AxInstSV.dll
10:00:38.0392 0x0c9c  AxInstSV - ok
10:00:38.0482 0x0c9c  [ 3E5B191307609F7514148C6832BB0842, DE011CB7AA4A2405FAF21575182E0793A1D83DFFC44E9A7864D59F3D51D8D580 ] b06bdrv         C:\windows\system32\drivers\bxvbda.sys
10:00:38.0614 0x0c9c  b06bdrv - ok
10:00:38.0684 0x0c9c  [ B5ACE6968304A3900EEB1EBFD9622DF2, 1DAA118D8CA3F97B34DF3D3CDA1C78EAB2ED225699FEABE89D331AE0CB7679FA ] b57nd60a        C:\windows\system32\DRIVERS\b57nd60a.sys
10:00:38.0794 0x0c9c  b57nd60a - ok
10:00:38.0874 0x0c9c  [ FDE360167101B4E45A96F939F388AEB0, 8D1457E866BBD645C4B9710DFBFF93405CC1193BF9AE42326F2382500B713B82 ] BDESVC          C:\windows\System32\bdesvc.dll
10:00:38.0964 0x0c9c  BDESVC - ok
10:00:39.0056 0x0c9c  [ 16A47CE2DECC9B099349A5F840654746, 77C008AEDB07FAC66413841D65C952DDB56FE7DCA5E9EF9C8F4130336B838024 ] Beep            C:\windows\system32\drivers\Beep.sys
10:00:39.0184 0x0c9c  Beep - ok
10:00:39.0278 0x0c9c  [ 82974D6A2FD19445CC5171FC378668A4, 075D25F47C0D2277E40AF8615571DAA5EB16B1824563632A9A7EC62505C29A4A ] BFE             C:\windows\System32\bfe.dll
10:00:39.0390 0x0c9c  BFE - ok
10:00:39.0460 0x0c9c  [ 1EA7969E3271CBC59E1730697DC74682, D511A34D63A6E0E6E7D1879068E2CD3D87ABEAF4936B2EA8CDDAD9F79D60FA04 ] BITS            C:\windows\System32\qmgr.dll
10:00:39.0540 0x06b8  Object send P2P result: true
10:00:39.0622 0x0c9c  BITS - ok
10:00:39.0652 0x0c9c  [ 61583EE3C3A17003C4ACD0475646B4D3, 17E4BECC309C450E7E44F59A9C0BBC24D21BDC66DFBA65B8F198A00BB47A9811 ] blbdrive        C:\windows\system32\DRIVERS\blbdrive.sys
10:00:39.0702 0x0c9c  blbdrive - ok
10:00:39.0994 0x0c9c  [ EBBCD5DFBB1DE70E8F4AF8FA59E401FD, 17BFFC5DF609CE3B2F0CAB4BD6C118608C66A3AD86116A47E90B2BB7D8954122 ] Bonjour Service C:\Program Files\Bonjour\mDNSResponder.exe
10:00:40.0024 0x0c9c  Bonjour Service - ok
10:00:40.0094 0x0c9c  [ 6C02A83164F5CC0A262F4199F0871CF5, AD4632A6A203CB40970D848315D8ADB9C898349E20D8DF4107C2AE2703A2CF28 ] bowser          C:\windows\system32\DRIVERS\bowser.sys
10:00:40.0184 0x0c9c  bowser - ok
10:00:40.0314 0x0c9c  [ F09EEE9EDC320B5E1501F749FDE686C8, 66691114C42E12F4CC6DC4078D4D2FA4029759ACDAF1B59D17383487180E84E3 ] BrFiltLo        C:\windows\system32\drivers\BrFiltLo.sys
10:00:40.0464 0x0c9c  BrFiltLo - ok
10:00:40.0534 0x0c9c  [ B114D3098E9BDB8BEA8B053685831BE6, 0ED23C1897F35FA00B9C2848DE4ED200E18688AA7825674888054BBC3A3EB92C ] BrFiltUp        C:\windows\system32\drivers\BrFiltUp.sys
10:00:40.0584 0x0c9c  BrFiltUp - ok
10:00:40.0634 0x0c9c  [ 05F5A0D14A2EE1D8255C2AA0E9E8E694, 40011138869F5496A3E78D38C9900B466B6F3877526AC22952DCD528173F4645 ] Browser         C:\windows\System32\browser.dll
10:00:40.0754 0x0c9c  Browser - ok
10:00:40.0904 0x0c9c  [ 43BEA8D483BF1870F018E2D02E06A5BD, 4E6F5A5FD8C796A110B0DC9FF29E31EA78C04518FC1C840EF61BABD58AB10272 ] Brserid         C:\windows\System32\Drivers\Brserid.sys
10:00:41.0054 0x0c9c  Brserid - ok
10:00:41.0104 0x0c9c  [ A6ECA2151B08A09CACECA35C07F05B42, E2875BB7768ABAF38C3377007AA0A3C281503474D1831E396FB6599721586B0C ] BrSerWdm        C:\windows\System32\Drivers\BrSerWdm.sys
10:00:41.0184 0x0c9c  BrSerWdm - ok
10:00:41.0256 0x0c9c  [ B79968002C277E869CF38BD22CD61524, 50631836502237AF4893ECDCEA43B9031C3DE97433F594D46AF7C3C77F331983 ] BrUsbMdm        C:\windows\System32\Drivers\BrUsbMdm.sys
10:00:41.0346 0x0c9c  BrUsbMdm - ok
10:00:41.0358 0x0c9c  [ A87528880231C54E75EA7A44943B38BF, 4C8BBB29FDA76A96840AA47A8613C15D4466F9273A13941C19507008629709C9 ] BrUsbSer        C:\windows\System32\Drivers\BrUsbSer.sys
10:00:41.0418 0x0c9c  BrUsbSer - ok
10:00:41.0558 0x0c9c  [ D31303617FE09F5F788BC34EB8028FB5, B76240466D69CF2F0CD30F1F2A529E52B7525A01A96B73C002A90A33262EBB79 ] BtFilter        C:\windows\system32\DRIVERS\btfilter.sys
10:00:41.0598 0x0c9c  BtFilter - ok
10:00:41.0648 0x0c9c  [ 9DA669F11D1F894AB4EB69BF546A42E8, B498B8B6CEF957B73179D1ADAF084BBB57BB3735D810F9BE2C7B1D58A4FD25A4 ] BTHMODEM        C:\windows\system32\drivers\bthmodem.sys
10:00:41.0750 0x0c9c  BTHMODEM - ok
10:00:41.0852 0x0c9c  [ 95F9C2976059462CBBF227F7AAB10DE9, 2797AE919FF7606B070FB039CECDB0707CD2131DCAC09C5DF14F443D881C9F34 ] bthserv         C:\windows\system32\bthserv.dll
10:00:42.0020 0x0c9c  bthserv - ok
10:00:42.0106 0x0c9c  [ B8BD2BB284668C84865658C77574381A, 6C55BA288B626DF172FDFEA0BD7027FAEBA1F44EF20AB55160D7C7DC6E717D65 ] cdfs            C:\windows\system32\DRIVERS\cdfs.sys
10:00:42.0218 0x0c9c  cdfs - ok
10:00:42.0298 0x0c9c  [ F036CE71586E93D94DAB220D7BDF4416, BD07AAD9E20CEAF9FC84E4977C55EA2C45604A2C682AC70B9B9A2199B6713D5B ] cdrom           C:\windows\system32\DRIVERS\cdrom.sys
10:00:42.0378 0x0c9c  cdrom - ok
10:00:42.0468 0x0c9c  [ F17D1D393BBC69C5322FBFAFACA28C7F, 62A1A92B3C52ADFD0B808D7F69DD50238B5F202421F1786F7EAEAA63F274B3E8 ] CertPropSvc     C:\windows\System32\certprop.dll
10:00:42.0550 0x0c9c  CertPropSvc - ok
10:00:42.0650 0x0c9c  [ D7CD5C4E1B71FA62050515314CFB52CF, 513B5A849899F379F0BC6AB3A8A05C3493C2393C95F036612B96EC6E252E1C64 ] circlass        C:\windows\system32\drivers\circlass.sys
10:00:42.0700 0x0c9c  circlass - ok
10:00:42.0750 0x0c9c  [ FE1EC06F2253F691FE36217C592A0206, B9F122DB5E665ECDF29A5CB8BB6B531236F31A54A95769D6C5C1924C87FE70CE ] CLFS            C:\windows\system32\CLFS.sys
10:00:42.0800 0x0c9c  CLFS - ok
10:00:42.0880 0x0c9c  [ F13EC8A783E0CB0D6DC26A3CA848B7B8, 0809E3B71709F1343086EEB6C820543C1A7119E74EEF8AC1AEE1F81093ABEC66 ] clr_optimization_v2.0.50727_32 C:\windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
10:00:42.0910 0x0c9c  clr_optimization_v2.0.50727_32 - ok
10:00:42.0940 0x0c9c  [ B4D73F04E9BC076F7CDAC4327DF636BB, 1ADED20D5A0D0A76E2F85CB778FD06BAB814868D35F8532E17D67045FF4770C2 ] clr_optimization_v2.0.50727_64 C:\windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
10:00:42.0972 0x0c9c  clr_optimization_v2.0.50727_64 - ok
10:00:43.0152 0x0c9c  [ E87213F37A13E2B54391E40934F071D0, 7EB221127EFB5BF158FB03D18EFDA2C55FB6CE3D1A1FE69C01D70DBED02C87E5 ] clr_optimization_v4.0.30319_32 C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
10:00:43.0182 0x0c9c  clr_optimization_v4.0.30319_32 - ok
10:00:43.0224 0x0c9c  [ 4AEDAB50F83580D0B4D6CF78191F92AA, D113C47013B018B45161911B96E93AF96A2F3B34FA47061BF6E7A71FBA03194A ] clr_optimization_v4.0.30319_64 C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
10:00:43.0254 0x0c9c  clr_optimization_v4.0.30319_64 - ok
10:00:43.0296 0x0c9c  [ 0840155D0BDDF1190F84A663C284BD33, 696039FA63CFEB33487FAA8FD7BBDB220141E9C6E529355D768DFC87999A9C3A ] CmBatt          C:\windows\system32\DRIVERS\CmBatt.sys
10:00:43.0366 0x0c9c  CmBatt - ok
10:00:43.0386 0x0c9c  [ E19D3F095812725D88F9001985B94EDD, 46243C5CCC4981CAC6FA6452FFCEC33329BF172448F1852D52592C9342E0E18B ] cmdide          C:\windows\system32\drivers\cmdide.sys
10:00:43.0406 0x0c9c  cmdide - ok
10:00:43.0538 0x0c9c  [ EBF28856F69CF094A902F884CF989706, AD6C9F0BC20AA49EEE5478DA0F856F0EA2B414B63208C5FFB03C9D7F5B59765F ] CNG             C:\windows\system32\Drivers\cng.sys
10:00:43.0611 0x0c9c  CNG - ok
10:00:43.0670 0x0c9c  [ 102DE219C3F61415F964C88E9085AD14, CD74CB703381F1382C32CF892FF2F908F4C9412E1BC77234F8FEA5D4666E1BF1 ] Compbatt        C:\windows\system32\drivers\compbatt.sys
10:00:43.0704 0x0c9c  Compbatt - ok
10:00:43.0748 0x0c9c  [ 03EDB043586CCEBA243D689BDDA370A8, 0E4523AA332E242D5C2C61C5717DBA5AB6E42DADB5A7E512505FC2B6CC224959 ] CompositeBus    C:\windows\system32\DRIVERS\CompositeBus.sys
10:00:43.0872 0x0c9c  CompositeBus - ok
10:00:43.0892 0x0c9c  COMSysApp - ok
10:00:43.0922 0x0c9c  [ 1C827878A998C18847245FE1F34EE597, 41EF7443D8B2733AA35CAC64B4F5F74FAC8BB0DA7D3936B69EC38E2DC3972E60 ] crcdisk         C:\windows\system32\drivers\crcdisk.sys
10:00:43.0942 0x0c9c  crcdisk - ok
10:00:44.0012 0x0c9c  [ 6B400F211BEE880A37A1ED0368776BF4, 2F27C6FA96A1C8CBDA467846DA57E63949A7EA37DB094B13397DDD30114295BD ] CryptSvc        C:\windows\system32\cryptsvc.dll
10:00:44.0124 0x0c9c  CryptSvc - ok
10:00:44.0314 0x0c9c  [ 5C627D1B1138676C0A7AB2C2C190D123, C5003F2C912C5CA990E634818D3B4FD72F871900AF2948BD6C4D6400B354B401 ] DcomLaunch      C:\windows\system32\rpcss.dll
10:00:44.0394 0x0c9c  DcomLaunch - ok
10:00:44.0434 0x0c9c  [ 3CEC7631A84943677AA8FA8EE5B6B43D, 32061DAC9ED6C1EBA3B367B18D0E965AEEC2DF635DCF794EC39D086D32503AC5 ] defragsvc       C:\windows\System32\defragsvc.dll
10:00:44.0524 0x0c9c  defragsvc - ok
10:00:44.0566 0x0c9c  [ 9BB2EF44EAA163B29C4A4587887A0FE4, 03667BC3EA5003F4236929C10F23D8F108AFCB29DB5559E751FB26DFB318636F ] DfsC            C:\windows\system32\Drivers\dfsc.sys
10:00:44.0646 0x0c9c  DfsC - ok
10:00:44.0736 0x0c9c  [ 43D808F5D9E1A18E5EEB5EBC83969E4E, C10D1155D71EABE4ED44C656A8F13078A8A4E850C4A8FBB92D52D173430972B8 ] Dhcp            C:\windows\system32\dhcpcore.dll
10:00:44.0796 0x0c9c  Dhcp - ok
10:00:45.0438 0x0c9c  [ 13096B05847EC78F0977F2C0F79E9AB3, 1E44981B684F3E56F5D2439BB7FA78BD1BC876BB2265AE089AEC68F241B05B26 ] discache        C:\windows\system32\drivers\discache.sys
10:00:45.0618 0x0c9c  discache - ok
10:00:45.0808 0x0c9c  [ 9819EEE8B5EA3784EC4AF3B137A5244C, 571BC886E87C888DA96282E381A746D273B58B9074E84D4CA91275E26056D427 ] Disk            C:\windows\system32\drivers\disk.sys
10:00:45.0838 0x0c9c  Disk - ok
10:00:45.0988 0x0c9c  [ 16835866AAA693C7D7FCEBA8FFF706E4, 15891558F7C1F2BB57A98769601D447ED0D952354A8BB347312D034DC03E0242 ] Dnscache        C:\windows\System32\dnsrslvr.dll
10:00:46.0058 0x0c9c  Dnscache - ok
10:00:46.0108 0x0c9c  [ B1FB3DDCA0FDF408750D5843591AFBC6, AB6AD9C5E7BA2E3646D0115B67C4800D1CB43B4B12716397657C7ADEEE807304 ] dot3svc         C:\windows\System32\dot3svc.dll
10:00:46.0198 0x0c9c  dot3svc - ok
10:00:46.0258 0x0c9c  [ B26F4F737E8F9DF4F31AF6CF31D05820, 394BBBED4EC7FAD4110F62A43BFE0801D4AC56FFAC6C741C69407B26402311C7 ] DPS             C:\windows\system32\dps.dll
10:00:46.0398 0x0c9c  DPS - ok
10:00:46.0458 0x0c9c  [ 9B19F34400D24DF84C858A421C205754, 967AF267B4124BADA8F507CEBF25F2192D146A4D63BE71B45BFC03C5DA7F21A7 ] drmkaud         C:\windows\system32\drivers\drmkaud.sys
10:00:46.0548 0x0c9c  drmkaud - ok
10:00:46.0948 0x0c9c  [ 87CE5C8965E101CCCED1F4675557E868, 077D98F0F130B2FC710208BA34016EF2B2506EE2BD71740B228145E34A3046F1 ] DXGKrnl         C:\windows\System32\drivers\dxgkrnl.sys
10:00:47.0038 0x0c9c  DXGKrnl - ok
10:00:47.0108 0x0c9c  [ E2DDA8726DA9CB5B2C4000C9018A9633, 0C967DBC3636A76A696997192A158AA92A1AF19F01E3C66D5BF91818A8FAEA76 ] EapHost         C:\windows\System32\eapsvc.dll
10:00:47.0208 0x0c9c  EapHost - ok
10:00:47.0688 0x0c9c  [ DC5D737F51BE844D8C82C695EB17372F, 6D4022D9A46EDE89CEF0FAEADCC94C903234DFC460C0180D24FF9E38E8853017 ] ebdrv           C:\windows\system32\drivers\evbda.sys
10:00:49.0789 0x0c9c  ebdrv - ok
10:00:49.0879 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] EFS             C:\windows\System32\lsass.exe
10:00:49.0929 0x0c9c  EFS - ok
10:00:50.0039 0x0c9c  [ C4002B6B41975F057D98C439030CEA07, 3D2484FBB832EFB90504DD406ED1CF3065139B1FE1646471811F3A5679EF75F1 ] ehRecvr         C:\windows\ehome\ehRecvr.exe
10:00:50.0381 0x0c9c  ehRecvr - ok
10:00:50.0451 0x0c9c  [ 4705E8EF9934482C5BB488CE28AFC681, 359E9EC5693CE0BE89082E1D5D8F5C5439A5B985010FF0CB45C11E3CFE30637D ] ehSched         C:\windows\ehome\ehsched.exe
10:00:50.0501 0x0c9c  ehSched - ok
10:00:50.0551 0x0c9c  [ 0E5DA5369A0FCAEA12456DD852545184, 9A64AC5396F978C3B92794EDCE84DCA938E4662868250F8C18FA7C2C172233F8 ] elxstor         C:\windows\system32\drivers\elxstor.sys
10:00:50.0601 0x0c9c  elxstor - ok
10:00:50.0631 0x0c9c  [ 34A3C54752046E79A126E15C51DB409B, 7D5B5E150C7C73666F99CBAFF759029716C86F16B927E0078D77F8A696616D75 ] ErrDev          C:\windows\system32\drivers\errdev.sys
10:00:50.0681 0x0c9c  ErrDev - ok
10:00:50.0791 0x0c9c  [ 4166F82BE4D24938977DD1746BE9B8A0, 24121751B7306225AD1C808442D7B030DEF377E9316AA0A3C5C7460E87317881 ] EventSystem     C:\windows\system32\es.dll
10:00:50.0911 0x0c9c  EventSystem - ok
10:00:50.0951 0x0c9c  [ A510C654EC00C1E9BDD91EEB3A59823B, 76CD277730F7B08D375770CD373D786160F34D1481AF0536BA1A5D2727E255F5 ] exfat           C:\windows\system32\drivers\exfat.sys
10:00:51.0041 0x0c9c  exfat - ok
10:00:51.0111 0x0c9c  [ 0ADC83218B66A6DB380C330836F3E36D, 798D6F83B5DBCC1656595E0A96CF12087FCCBE19D1982890D0CE5F629B328B29 ] fastfat         C:\windows\system32\drivers\fastfat.sys
10:00:51.0211 0x0c9c  fastfat - ok
10:00:51.0292 0x0c9c  [ DBEFD454F8318A0EF691FDD2EAAB44EB, 7F52AE222FF28503B6FC4A5852BD0CAEAF187BE69AF4B577D3DE474C24366099 ] Fax             C:\windows\system32\fxssvc.exe
10:00:51.0404 0x0c9c  Fax - ok
10:00:51.0446 0x0c9c  [ D765D19CD8EF61F650C384F62FAC00AB, 9F0A483A043D3BA873232AD3BA5F7BF9173832550A27AF3E8BD433905BD2A0EE ] fdc             C:\windows\system32\drivers\fdc.sys
10:00:51.0496 0x0c9c  fdc - ok
10:00:51.0536 0x0c9c  [ 0438CAB2E03F4FB61455A7956026FE86, 6D4DDC2973DB25CE0C7646BC85EFBCC004EBE35EA683F62162AE317C6F1D8DFE ] fdPHost         C:\windows\system32\fdPHost.dll
10:00:51.0675 0x0c9c  fdPHost - ok
10:00:51.0692 0x0c9c  [ 802496CB59A30349F9A6DD22D6947644, 52D59D3D628D5661F83F090F33F744F6916E0CC1F76E5A33983E06EB66AE19F8 ] FDResPub        C:\windows\system32\fdrespub.dll
10:00:51.0758 0x0c9c  FDResPub - ok
10:00:51.0988 0x0c9c  [ 655661BE46B5F5F3FD454E2C3095B930, 549C8E2A2A37757E560D55FFA6BFDD838205F17E40561E67F0124C934272CD1A ] FileInfo        C:\windows\system32\drivers\fileinfo.sys
10:00:52.0018 0x0c9c  FileInfo - ok
10:00:52.0018 0x0c9c  [ 5F671AB5BC87EEA04EC38A6CD5962A47, 6B61D3363FF3F9C439BD51102C284972EAE96ACC0683B9DC7E12D25D0ADC51B6 ] Filetrace       C:\windows\system32\drivers\filetrace.sys
10:00:52.0108 0x0c9c  Filetrace - ok
10:00:52.0208 0x0c9c  [ C172A0F53008EAEB8EA33FE10E177AF5, 9175A95B323696D1B35C9EFEB7790DD64E6EE0B7021E6C18E2F81009B169D77B ] flpydisk        C:\windows\system32\drivers\flpydisk.sys
10:00:52.0228 0x0c9c  flpydisk - ok
10:00:52.0518 0x0c9c  [ DA6B67270FD9DB3697B20FCE94950741, F621A4462C9F2904063578C427FAF22D7D66AE9967605C11C798099817CE5331 ] FltMgr          C:\windows\system32\drivers\fltmgr.sys
10:00:52.0588 0x0c9c  FltMgr - ok
10:00:53.0148 0x0c9c  [ C4C183E6551084039EC862DA1C945E3D, 0874A2ACDD24D64965AA9A76E9C818E216880AE4C9A2E07ED932EE404585CEE6 ] FontCache       C:\windows\system32\FntCache.dll
10:00:53.0318 0x0c9c  FontCache - ok
10:00:53.0438 0x0c9c  [ A8B7F3818AB65695E3A0BB3279F6DCE6, 89FCF10F599767E67A1E011753E34DA44EAA311F105DBF69549009ED932A60F0 ] FontCache3.0.0.0 C:\windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
10:00:53.0458 0x0c9c  FontCache3.0.0.0 - ok
10:00:53.0478 0x0c9c  [ D43703496149971890703B4B1B723EAC, F06397B2EDCA61629249D2EF1CBB7827A8BEAB8488246BD85EF6AE1363C0DA6E ] FsDepends       C:\windows\system32\drivers\FsDepends.sys
10:00:53.0498 0x0c9c  FsDepends - ok
10:00:53.0548 0x0c9c  [ 6BD9295CC032DD3077C671FCCF579A7B, 83622FBB0CB923798E7E584BF53CAAF75B8C016E3FF7F0FA35880FF34D1DFE33 ] Fs_Rec          C:\windows\system32\drivers\Fs_Rec.sys
10:00:53.0568 0x0c9c  Fs_Rec - ok
10:00:53.0648 0x0c9c  [ 8F6322049018354F45F05A2FD2D4E5E0, 73BF0FB4EBD7887E992DDEBB79E906958D6678F8D1107E8C368F5A0514D80359 ] fvevol          C:\windows\system32\DRIVERS\fvevol.sys
10:00:53.0688 0x0c9c  fvevol - ok
10:00:53.0778 0x0c9c  [ 60ACB128E64C35C2B4E4AAB1B0A5C293, 7B476AB5E95529A894F95397C753662F4C58D1FE89F4648271251DA77C5A3FA9 ] FwLnk           C:\windows\system32\DRIVERS\FwLnk.sys
10:00:53.0818 0x0c9c  FwLnk - ok
10:00:53.0858 0x0c9c  [ 8C778D335C9D272CFD3298AB02ABE3B6, 85F0B13926B0F693FA9E70AA58DE47100E4B6F893772EBE4300C37D9A36E6005 ] gagp30kx        C:\windows\system32\drivers\gagp30kx.sys
10:00:53.0888 0x0c9c  gagp30kx - ok
10:00:54.0108 0x0c9c  [ 277BBC7E1AA1EE957F573A10ECA7EF3A, 2EE60B924E583E847CC24E78B401EF95C69DB777A5B74E1EC963E18D47B94D24 ] gpsvc           C:\windows\System32\gpsvc.dll
10:00:54.0238 0x0c9c  gpsvc - ok
10:00:54.0348 0x0c9c  [ F02A533F517EB38333CB12A9E8963773, 1F72CD1CF660766FA8F912E40B7323A0192A300B376186C10F6803DC5EFE28DF ] gupdate         C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
10:00:54.0378 0x0c9c  gupdate - ok
10:00:54.0378 0x0c9c  [ F02A533F517EB38333CB12A9E8963773, 1F72CD1CF660766FA8F912E40B7323A0192A300B376186C10F6803DC5EFE28DF ] gupdatem        C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
10:00:54.0408 0x0c9c  gupdatem - ok
10:00:54.0498 0x0c9c  [ CC839E8D766CC31A7710C9F38CF3E375, 327D57F18B4A2D1CB06C5682D3364097ECD3CF40C2719AA1F41D0B49A26003E4 ] gusvc           C:\Program Files (x86)\Google\Common\Google Updater\GoogleUpdaterService.exe
10:00:54.0528 0x0c9c  gusvc - ok
10:00:54.0578 0x0c9c  [ F2523EF6460FC42405B12248338AB2F0, B2F3DE8DE1F512D871BC2BC2E8D0E33AB03335BFBC07627C5F88B65024928E19 ] hcw85cir        C:\windows\system32\drivers\hcw85cir.sys
10:00:54.0648 0x0c9c  hcw85cir - ok
10:00:54.0748 0x0c9c  [ 975761C778E33CD22498059B91E7373A, 8304E15FBE6876BE57263A03621365DA8C88005EAC532A770303C06799D915D9 ] HdAudAddService C:\windows\system32\drivers\HdAudio.sys
10:00:54.0868 0x0c9c  HdAudAddService - ok
10:00:54.0918 0x0c9c  [ 97BFED39B6B79EB12CDDBFEED51F56BB, 3CF981D668FB2381E52AF2E51E296C6CFB47B0D62249645278479D0111A47955 ] HDAudBus        C:\windows\system32\DRIVERS\HDAudBus.sys
10:00:55.0058 0x0c9c  HDAudBus - ok
10:00:55.0088 0x0c9c  [ 78E86380454A7B10A5EB255DC44A355F, 11F3ED7ACFFA3024B9BD504F81AC39F5B4CED5A8A425E8BADF7132EFEDB9BD64 ] HidBatt         C:\windows\system32\drivers\HidBatt.sys
10:00:55.0178 0x0c9c  HidBatt - ok
10:00:55.0278 0x0c9c  [ 7FD2A313F7AFE5C4DAB14798C48DD104, 94CBFD4506CBDE4162CEB3367BAB042D19ACA6785954DC0B554D4164B9FCD0D4 ] HidBth          C:\windows\system32\drivers\hidbth.sys
10:00:55.0358 0x0c9c  HidBth - ok
10:00:55.0408 0x0c9c  [ 0A77D29F311B88CFAE3B13F9C1A73825, 8615DC6CEFB591505CE16E054A71A4F371B827DDFD5E980777AB4233DCFDA01D ] HidIr           C:\windows\system32\drivers\hidir.sys
10:00:55.0448 0x0c9c  HidIr - ok
10:00:55.0508 0x0c9c  [ BD9EB3958F213F96B97B1D897DEE006D, 4D01CBF898B528B3A4E5A683DF2177300AFABD7D4CB51F1A7891B1B545499631 ] hidserv         C:\windows\system32\hidserv.dll
10:00:55.0648 0x0c9c  hidserv - ok
10:00:55.0718 0x0c9c  [ 9592090A7E2B61CD582B612B6DF70536, FD11D5E02C32D658B28FCC35688AB66CCB5D3A0A0D74C82AE0F0B6C67B568A0F ] HidUsb          C:\windows\system32\drivers\hidusb.sys
10:00:55.0798 0x0c9c  HidUsb - ok
10:00:55.0858 0x0c9c  [ 387E72E739E15E3D37907A86D9FF98E2, 9935BE2E58788E79328293AF2F202CB0F6042441B176F75ACC5AEA93C8E05531 ] hkmsvc          C:\windows\system32\kmsvc.dll
10:00:55.0948 0x0c9c  hkmsvc - ok
10:00:56.0058 0x0c9c  [ EFDFB3DD38A4376F93E7985173813ABD, 70402FA73A5A2A8BB557AAC8F531E373077D28DE5F40A1F3F14B940BE01CD2E1 ] HomeGroupListener C:\windows\system32\ListSvc.dll
10:00:56.0178 0x0c9c  HomeGroupListener - ok
10:00:56.0248 0x0c9c  [ 908ACB1F594274965A53926B10C81E89, 7D34A742AC486294D82676F8465A3EF26C8AC3317C32B63F62031CB007CFC208 ] HomeGroupProvider C:\windows\system32\provsvc.dll
10:00:56.0339 0x0c9c  HomeGroupProvider - ok
10:00:56.0449 0x0c9c  [ 39D2ABCD392F3D8A6DCE7B60AE7B8EFC, E9E6A1665740CFBC2DD321010007EF42ABA2102AEB9772EE8AA3354664B1E205 ] HpSAMD          C:\windows\system32\drivers\HpSAMD.sys
10:00:56.0489 0x0c9c  HpSAMD - ok
10:00:56.0619 0x0c9c  [ 0EA7DE1ACB728DD5A369FD742D6EEE28, 21C489412EB33A12B22290EB701C19BA57006E8702E76F730954F0784DDE9779 ] HTTP            C:\windows\system32\drivers\HTTP.sys
10:00:56.0799 0x0c9c  HTTP - ok
10:00:56.0869 0x0c9c  [ A5462BD6884960C9DC85ED49D34FF392, 53E65841AF5B06A2844D0BB6FC4DD3923A323FFA0E4BFC89B3B5CAFB592A3D53 ] hwpolicy        C:\windows\system32\drivers\hwpolicy.sys
10:00:56.0889 0x0c9c  hwpolicy - ok
10:00:56.0929 0x0c9c  [ FA55C73D4AFFA7EE23AC4BE53B4592D3, 65CDDC62B89A60E942C5642C9D8B539EFB69DA8069B4A2E54978154B314531CD ] i8042prt        C:\windows\system32\DRIVERS\i8042prt.sys
10:00:56.0979 0x0c9c  i8042prt - ok
10:00:57.0179 0x0c9c  [ C224331A54571C8C9162F7714400BBBD, C2CA4881ACD46071E67435BE5E3DB133D0743B026FD20D6D6E26B2FE7A03FCAA ] iaStor          C:\windows\system32\DRIVERS\iaStor.sys
10:00:57.0239 0x0c9c  iaStor - ok
10:00:57.0409 0x0c9c  [ AAAF44DB3BD0B9D1FB6969B23ECC8366, 805AA4A9464002D1AB3832E4106B2AAA1331F4281367E75956062AAE99699385 ] iaStorV         C:\windows\system32\drivers\iaStorV.sys
10:00:57.0479 0x0c9c  iaStorV - ok
10:00:57.0639 0x0c9c  [ C98A5B9D932430AD8EEBD3EF73756EF7, DF7E1D391A0F3345AD61154363922C27BD557DEEACE395A6A8A8A16BFD1BB9A8 ] idsvc           C:\windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\infocard.exe
10:00:57.0781 0x0c9c  idsvc - ok
10:00:57.0911 0x0c9c  IEEtwCollectorService - ok
10:00:57.0931 0x0c9c  [ 5C18831C61933628F5BB0EA2675B9D21, 5CD9DE2F8C0256623A417B5C55BF55BB2562BD7AB2C3C83BB3D9886C2FBDA4E4 ] iirsp           C:\windows\system32\drivers\iirsp.sys
10:00:57.0951 0x0c9c  iirsp - ok
10:00:58.0031 0x0c9c  [ 344789398EC3EE5A4E00C52B31847946, 3DA5F08E4B46F4E63456AA588D49E39A6A09A97D0509880C00F327623DB6122D ] IKEEXT          C:\windows\System32\ikeext.dll
10:00:58.0161 0x0c9c  IKEEXT - ok
10:00:58.0902 0x0c9c  [ F242E36CDA231701CFA702641C20FAEC, 47350EF8474F83249A9126AB6894145732CA0B68DA2EE001940C9E4AEF128B88 ] IntcAzAudAddService C:\windows\system32\drivers\RTKVHD64.sys
10:00:59.0102 0x0c9c  IntcAzAudAddService - ok
10:00:59.0132 0x0c9c  [ F00F20E70C6EC3AA366910083A0518AA, E2F3E9FFD82C802C8BAC309893A3664ACF16A279959C0FDECCA64C3D3C60FD22 ] intelide        C:\windows\system32\drivers\intelide.sys
10:00:59.0152 0x0c9c  intelide - ok
10:00:59.0252 0x0c9c  [ ADA036632C664CAA754079041CF1F8C1, F2386CC09AC6DE4C54189154F7D91C1DB7AA120B13FAE8BA5B579ACF99FCC610 ] intelppm        C:\windows\system32\DRIVERS\intelppm.sys
10:00:59.0282 0x0c9c  intelppm - ok
10:00:59.0342 0x0c9c  [ 098A91C54546A3B878DAD6A7E90A455B, 044CCE2A0DF56EBE1EFD99B4F6F0A5B9EE12498CA358CF4B2E3A1CFD872823AA ] IPBusEnum       C:\windows\system32\ipbusenum.dll
10:00:59.0422 0x0c9c  IPBusEnum - ok
10:00:59.0462 0x0c9c  [ C9F0E1BD74365A8771590E9008D22AB6, 728BC5A6AAE499FDC50EB01577AF16D83C2A9F3B09936DD2A89C01E074BA8E51 ] IpFilterDriver  C:\windows\system32\DRIVERS\ipfltdrv.sys
10:00:59.0604 0x0c9c  IpFilterDriver - ok
10:00:59.0654 0x0c9c  [ 08C2957BB30058E663720C5606885653, E13EDF6701512E2A9977A531454932CA5023087CB50E1D2F416B8BCDD92B67BE ] iphlpsvc        C:\windows\System32\iphlpsvc.dll
10:00:59.0774 0x0c9c  iphlpsvc - ok
10:00:59.0805 0x0c9c  [ 0FC1AEA580957AA8817B8F305D18CA3A, 7161E4DE91AAFC3FA8BF24FAE4636390C2627DB931505247C0D52C75A31473D9 ] IPMIDRV         C:\windows\system32\drivers\IPMIDrv.sys
10:00:59.0866 0x0c9c  IPMIDRV - ok
10:00:59.0876 0x0c9c  [ AF9B39A7E7B6CAA203B3862582E9F2D0, 67128BE7EADBE6BD0205B050F96E268948E8660C4BAB259FB0BE03935153D04E ] IPNAT           C:\windows\system32\drivers\ipnat.sys
10:00:59.0996 0x0c9c  IPNAT - ok
10:01:00.0256 0x0c9c  [ 835FC2EA0631B734BB06C12B0665F01D, B8A8B0148C6C3AFC40835B44E3D6508CB9EEE8AC430A7904711C8B51C2116A8D ] iPod Service    C:\Program Files\iPod\bin\iPodService.exe
10:01:00.0306 0x0c9c  iPod Service - ok
10:01:00.0378 0x0c9c  [ 3ABF5E7213EB28966D55D58B515D5CE9, A352BCC5B6B9A28805B15CAFB235676F1FAFF0D2394F88C03089EB157D6188AE ] IRENUM          C:\windows\system32\drivers\irenum.sys
10:01:00.0418 0x0c9c  IRENUM - ok
10:01:00.0478 0x0c9c  [ 2F7B28DC3E1183E5EB418DF55C204F38, D40410A760965925D6F10959B2043F7BD4F68EAFCF5E743AF11AD860BD136548 ] isapnp          C:\windows\system32\drivers\isapnp.sys
10:01:00.0498 0x0c9c  isapnp - ok
10:01:00.0558 0x0c9c  [ 96BB922A0981BC7432C8CF52B5410FE6, 236C05509B1040059B15021CBBDBDAF3B9C0F00910142BE5887B2C7561BAAFBA ] iScsiPrt        C:\windows\system32\drivers\msiscsi.sys
10:01:00.0588 0x0c9c  iScsiPrt - ok
10:01:00.0878 0x0c9c  [ 1152F8BEB568F2F72F1C5C32A1F4E529, CE39F872972BFEF14BB75C66F8A9CCD88EFA991B42C6D2E232988B7FFAB754EE ] ISWKL           C:\Program Files\CheckPoint\ZAForceField\ISWKL.sys
10:01:00.0948 0x0c9c  ISWKL - ok
10:01:01.0058 0x0c9c  [ EF46EF3A790C42BBA9B5AFA2586448DB, 5FDC8D4EFDE7DAE89A7B6B6DBFD7D0E9756BFEC8B2265D3E433423736B531A54 ] IswSvc          C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe
10:01:01.0108 0x0c9c  IswSvc - ok
10:01:01.0268 0x0c9c  [ 8E4577C6E0D3114170509159DE658907, 2FC7F96766537716503AB1BAD7EBDB2F16F3CE1584AF4261D57C6A4E00E1A417 ] iusb3hcs        C:\windows\system32\DRIVERS\iusb3hcs.sys
10:01:01.0288 0x0c9c  iusb3hcs - ok
10:01:01.0328 0x0c9c  [ FE76346E9B57DA575BD1B3BD0CCAD7FF, 8961A08326F66E9FDF63912797C605FEEC23F9B0453D132AB6897DA98BC9AEAB ] iusb3hub        C:\windows\system32\DRIVERS\iusb3hub.sys
10:01:01.0359 0x0c9c  iusb3hub - ok
10:01:01.0429 0x0c9c  [ 1008CD90DA2198FFD250298DEB9DF160, 2CBA5FF2369861E8F8A55799AFFFC8E5B331A8BD17B559641E87A4C6C0D70206 ] iusb3xhc        C:\windows\system32\DRIVERS\iusb3xhc.sys
10:01:01.0486 0x0c9c  iusb3xhc - ok
10:01:01.0521 0x0c9c  [ BC02336F1CBA7DCC7D1213BB588A68A5, 450C5BAD54CCE2AFCDFF1B6E7F8E1A8446D9D3255DF9D36C29A8F848048AAD93 ] kbdclass        C:\windows\system32\DRIVERS\kbdclass.sys
10:01:01.0541 0x0c9c  kbdclass - ok
10:01:01.0633 0x0c9c  [ 0705EFF5B42A9DB58548EEC3B26BB484, 86C6824ED7ED6FA8F306DB6319A0FD688AA91295AE571262F9D8E96A32225E99 ] kbdhid          C:\windows\system32\DRIVERS\kbdhid.sys
10:01:01.0673 0x0c9c  kbdhid - ok
10:01:01.0753 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] KeyIso          C:\windows\system32\lsass.exe
10:01:01.0773 0x0c9c  KeyIso - ok
10:01:01.0883 0x0c9c  [ E656FE10D6D27794AFA08136685A69E8, 2D38603B546235B555978340A63E052D06CA7E7EF117CF148F9A002D423B2949 ] KL1             C:\windows\system32\DRIVERS\kl1.sys
10:01:01.0923 0x0c9c  KL1 - ok
10:01:02.0023 0x0c9c  [ D865DD8B0448E3F963D68C04C532858F, AD51013E65289CA8FD1313780A93610132B1570F7A85C7A2E7DD8FD1FBE8701D ] kl2             C:\windows\system32\DRIVERS\kl2.sys
10:01:02.0033 0x0c9c  kl2 - ok
10:01:02.0203 0x0c9c  [ 055790D38D7EC73AEF03E4AA7F67BA03, 37B4EA9C0C511CAA1B36CB3BBF81DD042F92B7C1DF6C4465D65EF62F05FC40DC ] KLIF            C:\windows\system32\DRIVERS\klif.sys
10:01:02.0243 0x0c9c  KLIF - ok
10:01:02.0413 0x0c9c  [ 353009DEDF918B2A51414F330CF72DEC, BF157D6E329F26E02FA16271B751B421396040DBB1D7BF9B2E0A21BC569672E2 ] KSecDD          C:\windows\system32\Drivers\ksecdd.sys
10:01:02.0433 0x0c9c  KSecDD - ok
10:01:02.0773 0x0c9c  [ 1C2D8E18AA8FD50CD04C15CC27F7F5AB, 4BA3B0F9F01BD47D66091D3AD86B69A523981D61DFB4D677F2CD39405B2DA989 ] KSecPkg         C:\windows\system32\Drivers\ksecpkg.sys
10:01:02.0803 0x0c9c  KSecPkg - ok
10:01:02.0873 0x0c9c  [ 6869281E78CB31A43E969F06B57347C4, 866A23E69B32A78D378D6CB3B3DA3695FFDFF0FEC3C9F68C8C3F988DF417044B ] ksthunk         C:\windows\system32\drivers\ksthunk.sys
10:01:02.0953 0x0c9c  ksthunk - ok
10:01:03.0033 0x0c9c  [ 6AB66E16AA859232F64DEB66887A8C9C, 5F2B579BEA8098A2994B0DECECDAE7B396E7B5DC5F09645737B9F28BEEA77FFF ] KtmRm           C:\windows\system32\msdtckrm.dll
10:01:03.0103 0x0c9c  KtmRm - ok
10:01:03.0233 0x0c9c  [ 3CE6A9BEF066BF9488E6BC4D6C62F77E, CDE0A0DCD9A5A2E49DE55E720B5A6FFF502EE139C0EC8793638560E75BF2118C ] L1C             C:\windows\system32\DRIVERS\L1C62x64.sys
10:01:03.0253 0x0c9c  L1C - ok
10:01:03.0423 0x0c9c  [ D9F42719019740BAA6D1C6D536CBDAA6, 8757599D0AE5302C4CE50861BEBA3A8DD14D7B0DBD916FD5404133688CDFCC40 ] LanmanServer    C:\windows\system32\srvsvc.dll
10:01:03.0503 0x0c9c  LanmanServer - ok
10:01:03.0593 0x0c9c  [ 851A1382EED3E3A7476DB004F4EE3E1A, B1C67F47DD594D092E6E258F01DF5E7150227CE3131A908A244DEE9F8A1FABF9 ] LanmanWorkstation C:\windows\System32\wkssvc.dll
10:01:03.0783 0x0c9c  LanmanWorkstation - ok
10:01:03.0863 0x0c9c  [ 1538831CF8AD2979A04C423779465827, E1729B0CC4CEEE494A0B8817A8E98FF232E3A32FB023566EF0BC71A090262C0C ] lltdio          C:\windows\system32\DRIVERS\lltdio.sys
10:01:03.0933 0x0c9c  lltdio - ok
10:01:04.0033 0x0c9c  [ C1185803384AB3FEED115F79F109427F, 0414FE73532DCAB17E906438A14711E928CECCD5F579255410C62984DD652700 ] lltdsvc         C:\windows\System32\lltdsvc.dll
10:01:04.0123 0x0c9c  lltdsvc - ok
10:01:04.0353 0x0c9c  [ F993A32249B66C9D622EA5592A8B76B8, EE64672A990C6145DC5601E2B8CDBE089272A72732F59AF9865DCBA8B1717E70 ] lmhosts         C:\windows\System32\lmhsvc.dll
10:01:04.0823 0x0c9c  lmhosts - ok
10:01:04.0983 0x0c9c  [ AB41542FA180CB3317F597ED7E7D5C5D, EA8108F81B94D7BB98ACFAF579F70A61FB3887937D1EF57E6225B70036AEC061 ] LMS             C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
10:01:05.0033 0x0c9c  LMS - ok
10:01:05.0103 0x0c9c  [ 1A93E54EB0ECE102495A51266DCDB6A6, DB6AA86AA36C3A7988BE96E87B5D3251BE7617C54EE8F894D9DC2E267FE3255B ] LSI_FC          C:\windows\system32\drivers\lsi_fc.sys
10:01:05.0143 0x0c9c  LSI_FC - ok
10:01:05.0193 0x0c9c  [ 1047184A9FDC8BDBFF857175875EE810, F2251EDB7736A26D388A0C5CC2FE5FB9C5E109CBB1E3800993554CB21D81AE4B ] LSI_SAS         C:\windows\system32\drivers\lsi_sas.sys
10:01:05.0273 0x0c9c  LSI_SAS - ok
10:01:05.0323 0x0c9c  [ 30F5C0DE1EE8B5BC9306C1F0E4A75F93, 88D5740A4E9CC3FA80FA18035DAB441BDC5A039622D666BFDAA525CC9686BD06 ] LSI_SAS2        C:\windows\system32\drivers\lsi_sas2.sys
10:01:05.0803 0x0c9c  LSI_SAS2 - ok
10:01:06.0183 0x0c9c  [ 0504EACAFF0D3C8AED161C4B0D369D4A, 4D272237C189646F5C80822FD3CBA7C2728E482E2DAAF7A09C8AEF811C89C54D ] LSI_SCSI        C:\windows\system32\drivers\lsi_scsi.sys
10:01:06.0263 0x0c9c  LSI_SCSI - ok
10:01:06.0313 0x0c9c  [ 43D0F98E1D56CCDDB0D5254CFF7B356E, 5BA498183B5C4996C694CB0A9A6B66CE6C7A460F6C91BEB9F305486FCC3B7B22 ] luafv           C:\windows\system32\drivers\luafv.sys
10:01:06.0544 0x0c9c  luafv - ok
10:01:07.0675 0x0c9c  [ 5C3669B71657F22E67A1D4BD49D2CBE7, 7CAE59AA6CA9CBBD70BBD707A155FB169BF3F71096275BF7C0F415B6A092C671 ] MBAMProtector   C:\windows\system32\drivers\mbam.sys
10:01:08.0075 0x0c9c  MBAMProtector - ok
10:01:10.0005 0x0c9c  [ 6D8A2EE4244630B290A837E79C0F37A1, 6783BBC0BDC93E4D6D43531A1AD0DF5CD26C3BBFA6384927C5CF65AD97FB04AD ] MBAMScheduler   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe
10:01:10.0095 0x0c9c  MBAMScheduler - ok
10:01:11.0255 0x0c9c  [ 09D4503CBB6ADB3A54E7C7A75090B728, 6139EA3338FD64205481EDEC813A44F8D395FDA7B67AA431DA61F3631C3EDAE6 ] MBAMService     C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe
10:01:11.0345 0x0c9c  MBAMService - ok
10:01:11.0715 0x0c9c  [ 26C43960C99EE861A5D0EDC4DCF3B1C3, 6238FB8E785652040CCE3E7044EA52066CE1BF173A1467474D64A3AB214B6BCD ] MBAMSwissArmy   C:\windows\system32\drivers\MBAMSwissArmy.sys
10:01:11.0745 0x0c9c  MBAMSwissArmy - ok
10:01:11.0865 0x0c9c  [ 95EF63A7827D4E3A229CBBCB42619E93, FA38DD035B2C4FC82B60868F49D45A39FBBC96096AAD5A2C8BD752A250255BA7 ] MBAMWebAccessControl C:\windows\system32\drivers\mwac.sys
10:01:11.0885 0x0c9c  MBAMWebAccessControl - ok
10:01:11.0915 0x0c9c  [ 0BE09CD858ABF9DF6ED259D57A1A1663, 2FD28889B93C8E801F74C1D0769673A461671E0189D0A22C94509E3F0EEB7428 ] Mcx2Svc         C:\windows\system32\Mcx2Svc.dll
10:01:12.0105 0x0c9c  Mcx2Svc - ok
10:01:12.0145 0x0c9c  [ A55805F747C6EDB6A9080D7C633BD0F4, 2DA0E83BF3C8ADEF6F551B6CC1C0A3F6149CDBE6EC60413BA1767C4DE425A728 ] megasas         C:\windows\system32\drivers\megasas.sys
10:01:12.0195 0x0c9c  megasas - ok
10:01:12.0235 0x0c9c  [ BAF74CE0072480C3B6B7C13B2A94D6B3, 85CBB4949C090A904464F79713A3418338753D20D7FB811E68F287FDAC1DD834 ] MegaSR          C:\windows\system32\drivers\MegaSR.sys
10:01:12.0295 0x0c9c  MegaSR - ok
10:01:12.0527 0x0c9c  [ 6B01B7414A105B9E51652089A03027CF, 9B113DC22F7D0D0B376E577C6D7083F9EDC09BBFE47726393E16D4FDAAAE21FE ] MEIx64          C:\windows\system32\DRIVERS\HECIx64.sys
10:01:12.0577 0x0c9c  MEIx64 - ok
10:01:13.0479 0x0c9c  Microsoft SharePoint Workspace Audit Service - ok
10:01:13.0919 0x0c9c  [ E40E80D0304A73E8D269F7141D77250B, 0DB4AC13A264F19A84DC0BCED54E8E404014CC09C993B172002B1561EC7E265A ] MMCSS           C:\windows\system32\mmcss.dll
10:01:14.0079 0x0c9c  MMCSS - ok
10:01:14.0229 0x0c9c  [ 800BA92F7010378B09F9ED9270F07137, 94F9AF9E1BE80AE6AC39A2A74EF9FAB115DCAACC011D07DFA8D6A1DDC8A93342 ] Modem           C:\windows\system32\drivers\modem.sys
10:01:14.0369 0x0c9c  Modem - ok
10:01:14.0409 0x0c9c  [ B03D591DC7DA45ECE20B3B467E6AADAA, 701FB0CAD8138C58507BE28845D3E24CE269A040737C29885944A0D851238732 ] monitor         C:\windows\system32\DRIVERS\monitor.sys
10:01:14.0459 0x0c9c  monitor - ok
10:01:14.0579 0x0c9c  [ 7D27EA49F3C1F687D357E77A470AEA99, 7FE7CAF95959F127C6D932C01D539C06D80273C49A09761F6E8331C05B1A7EE7 ] mouclass        C:\windows\system32\DRIVERS\mouclass.sys
10:01:14.0599 0x0c9c  mouclass - ok
10:01:14.0689 0x0c9c  [ D3BF052C40B0C4166D9FD86A4288C1E6, 5E65264354CD94E844BF1838CA1B8E49080EFA34605A32CF2F6A47A2B97FC183 ] mouhid          C:\windows\system32\DRIVERS\mouhid.sys
10:01:15.0719 0x0c9c  mouhid - ok
10:01:15.0899 0x0c9c  [ 32E7A3D591D671A6DF2DB515A5CBE0FA, 47CED0B9067AE8BF5EEF60B17ADEE5906BEDCC56E4CB460B7BFBC12BB9A69E63 ] mountmgr        C:\windows\system32\drivers\mountmgr.sys
10:01:15.0919 0x0c9c  mountmgr - ok
10:01:16.0449 0x0c9c  [ DEA022193DF8C88F6E2B3E33D148A5DB, 97DFC47DB83E04A975A1969AA120385463FCAF4E1A9984FD3220442D7026B45A ] MozillaMaintenance C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
10:01:16.0489 0x0c9c  MozillaMaintenance - ok
10:01:16.0829 0x0c9c  [ A44B420D30BD56E145D6A2BC8768EC58, B1E4DCA5A1008FA7A0492DC091FB2B820406AE13FD3D44F124E89B1037AF09B8 ] mpio            C:\windows\system32\drivers\mpio.sys
10:01:16.0869 0x0c9c  mpio - ok
10:01:16.0959 0x0c9c  [ 6C38C9E45AE0EA2FA5E551F2ED5E978F, 5A3FA2F110029CB4CC4384998EDB59203FDD65EC45E01B897FB684F8956EAD20 ] mpsdrv          C:\windows\system32\drivers\mpsdrv.sys
10:01:17.0109 0x0c9c  mpsdrv - ok
10:01:17.0810 0x0c9c  [ 54FFC9C8898113ACE189D4AA7199D2C1, 65F585C87F3F710FD5793FDFA96B740AD8D4317B0C120F4435CCF777300EA4F2 ] MpsSvc          C:\windows\system32\mpssvc.dll
10:01:18.0210 0x0c9c  MpsSvc - ok
10:01:18.0330 0x0c9c  [ 1A4F75E63C9FB84B85DFFC6B63FD5404, 01AFA6DBB4CDE55FE4EA05BBE8F753A4266F8D072EA1EE01DB79F5126780C21F ] MRxDAV          C:\windows\system32\drivers\mrxdav.sys
10:01:18.0470 0x0c9c  MRxDAV - ok
10:01:18.0730 0x0c9c  [ A5D9106A73DC88564C825D317CAC68AC, 0457B2AEA4E05A91D0E43F317894A614434D8CEBE35020785387F307E231FBE4 ] mrxsmb          C:\windows\system32\DRIVERS\mrxsmb.sys
10:01:20.0251 0x0c9c  mrxsmb - ok
10:01:20.0301 0x0c9c  [ D711B3C1D5F42C0C2415687BE09FC163, 9B3013AC60BD2D0FF52086658BA5FF486ADE15954A552D7DD590580E8BAE3EFF ] mrxsmb10        C:\windows\system32\DRIVERS\mrxsmb10.sys
10:01:20.0431 0x0c9c  mrxsmb10 - ok
10:01:20.0521 0x0c9c  [ 9423E9D355C8D303E76B8CFBD8A5C30C, 220B33F120C2DD937FE4D5664F4B581DC0ACF78D62EB56B7720888F67B9644CC ] mrxsmb20        C:\windows\system32\DRIVERS\mrxsmb20.sys
10:01:20.0731 0x0c9c  mrxsmb20 - ok
10:01:20.0941 0x0c9c  [ C25F0BAFA182CBCA2DD3C851C2E75796, 643E158A0948DF331807AEAA391F23960362E46C0A0CF6D22A99020EAE7B10F8 ] msahci          C:\windows\system32\drivers\msahci.sys
10:01:20.0971 0x0c9c  msahci - ok
10:01:21.0141 0x0c9c  [ DB801A638D011B9633829EB6F663C900, B34FD33A215ACCF2905F4B7D061686CDB1CB9C652147AF56AE14686C1F6E3C74 ] msdsm           C:\windows\system32\drivers\msdsm.sys
10:01:21.0171 0x0c9c  msdsm - ok
10:01:21.0621 0x0c9c  [ DE0ECE52236CFA3ED2DBFC03F28253A8, 2FBBEC4CACB5161F68D7C2935852A5888945CA0F107CF8A1C01F4528CE407DE3 ] MSDTC           C:\windows\System32\msdtc.exe
10:01:21.0641 0x0c9c  MSDTC - ok
10:01:22.0041 0x0c9c  [ AA3FB40E17CE1388FA1BEDAB50EA8F96, 69F93E15536644C8FD679A20190CFE577F4985D3B1B4A4AA250A168615AE1E99 ] Msfs            C:\windows\system32\drivers\Msfs.sys
10:01:22.0471 0x0c9c  Msfs - ok
10:01:22.0511 0x0c9c  [ F9D215A46A8B9753F61767FA72A20326, 6F76642B45E0A7EF6BCAB8B37D55CCE2EAA310ED07B76D43FCB88987C2174141 ] mshidkmdf       C:\windows\System32\drivers\mshidkmdf.sys
10:01:22.0631 0x0c9c  mshidkmdf - ok
10:01:23.0061 0x0c9c  [ D916874BBD4F8B07BFB7FA9B3CCAE29D, B229DA150713DEDBC4F05386C9D9DC3BC095A74F44F3081E88311AB73BC992A1 ] msisadrv        C:\windows\system32\drivers\msisadrv.sys
10:01:23.0091 0x0c9c  msisadrv - ok
10:01:23.0171 0x0c9c  [ 808E98FF49B155C522E6400953177B08, F873F5BFF0984C5165DF67E92874D3F6EB8D86F9B5AD17013A0091CA33A1A3D5 ] MSiSCSI         C:\windows\system32\iscsiexe.dll
10:01:23.0531 0x0c9c  MSiSCSI - ok
10:01:23.0531 0x0c9c  msiserver - ok
10:01:23.0721 0x0c9c  [ 49CCF2C4FEA34FFAD8B1B59D49439366, E5752EA57C7BDAD5F53E3BC441A415E909AC602CAE56234684FB8789A20396C7 ] MSKSSRV         C:\windows\system32\drivers\MSKSSRV.sys
10:01:23.0851 0x0c9c  MSKSSRV - ok
10:01:24.0021 0x0c9c  [ BDD71ACE35A232104DDD349EE70E1AB3, 27464A66868513BE6A01B75D7FC5B0D6B71842E4E20CE3F76B15C071A0618BBB ] MSPCLOCK        C:\windows\system32\drivers\MSPCLOCK.sys
10:01:24.0111 0x0c9c  MSPCLOCK - ok
10:01:24.0191 0x0c9c  [ 4ED981241DB27C3383D72092B618A1D0, E12F121E641249DB3491141851B59E1496F4413EDF58E863388F1C229838DFCC ] MSPQM           C:\windows\system32\drivers\MSPQM.sys
10:01:24.0291 0x0c9c  MSPQM - ok
10:01:24.0321 0x0c9c  [ 759A9EEB0FA9ED79DA1FB7D4EF78866D, 64E3BC613EC4872B1B344CBF71EE15BE195592E3244C1EE099C6F8B95A40F133 ] MsRPC           C:\windows\system32\drivers\MsRPC.sys
10:01:24.0371 0x0c9c  MsRPC - ok
10:01:24.0411 0x0c9c  [ 0EED230E37515A0EAEE3C2E1BC97B288, B1D8F8A75006B6E99214CA36D27A8594EF8D952F315BEB201E9BAC9DE3E64D42 ] mssmbios        C:\windows\system32\DRIVERS\mssmbios.sys
10:01:24.0439 0x0c9c  mssmbios - ok
10:01:24.0483 0x0c9c  [ 2E66F9ECB30B4221A318C92AC2250779, DF175E1AB6962303E57F26DAE5C5C1E40B8640333F3E352A64F6A5F1301586CD ] MSTEE           C:\windows\system32\drivers\MSTEE.sys
10:01:24.0563 0x0c9c  MSTEE - ok
10:01:24.0645 0x0c9c  [ 7EA404308934E675BFFDE8EDF0757BCD, 306CD02D89CFCFE576242360ED5F9EEEDCAFC43CD43B7D2977AE960F9AEC3232 ] MTConfig        C:\windows\system32\drivers\MTConfig.sys
10:01:24.0705 0x0c9c  MTConfig - ok
10:01:24.0775 0x0c9c  [ F9A18612FD3526FE473C1BDA678D61C8, 32F7975B5BAA447917F832D9E3499B4B6D3E90D73F478375D0B70B36C524693A ] Mup             C:\windows\system32\Drivers\mup.sys
10:01:24.0885 0x0c9c  Mup - ok
10:01:25.0515 0x0c9c  [ 582AC6D9873E31DFA28A4547270862DD, BD540499F74E8F59A020D935D18E36A3A97C1A6EC59C8208436469A31B16B260 ] napagent        C:\windows\system32\qagentRT.dll
10:01:25.0835 0x0c9c  napagent - ok
10:01:25.0955 0x0c9c  [ 1EA3749C4114DB3E3161156FFFFA6B33, 54C2E77BCE1037711A11313AC25B8706109098C10A31AA03AEB7A185E97800D7 ] NativeWifiP     C:\windows\system32\DRIVERS\nwifi.sys
10:01:26.0085 0x0c9c  NativeWifiP - ok
10:01:26.0435 0x0c9c  [ DFE14D63F0F649EE94A9E3442B7C8F2C, D4DA9DFF92F0E9DD14192AC77ABA1556C01DB27085731CEA3425F613FD317050 ] NAUpdate        C:\Program Files (x86)\Nero\Update\NASvc.exe
10:01:26.0495 0x0c9c  NAUpdate - ok
10:01:26.0895 0x0c9c  [ DACA803A8D732FE5EEAA024EC342F81D, 2DDEA48CD417EDD657D487BADA7C31C05F35DA328AAC5AA63A99FDFD44F2BF02 ] NBVol           C:\windows\system32\DRIVERS\NBVol.sys
10:01:26.0915 0x0c9c  NBVol - ok
10:01:27.0305 0x0c9c  [ 6208F622E9E35860DFB0753DFF56F0C0, AF7730B4AB642E0E45C05AE1429C7B3D90B0889CF94B21AC7869790D4DB6FDBE ] NBVolUp         C:\windows\system32\DRIVERS\NBVolUp.sys
10:01:27.0325 0x0c9c  NBVolUp - ok
10:01:28.0365 0x0c9c  [ 760E38053BF56E501D562B70AD796B88, F856E81A975D44F8684A6F2466549CEEDFAEB3950191698555A93A1206E0A42D ] NDIS            C:\windows\system32\drivers\ndis.sys
10:01:28.0605 0x0c9c  NDIS - ok
10:01:28.0755 0x0c9c  [ 9F9A1F53AAD7DA4D6FEF5BB73AB811AC, D7E5446E83909AE25506BB98FBDD878A529C87963E3C1125C4ABAB25823572BC ] NdisCap         C:\windows\system32\DRIVERS\ndiscap.sys
10:01:28.0875 0x0c9c  NdisCap - ok
10:01:28.0905 0x0c9c  [ 30639C932D9FEF22B31268FE25A1B6E5, 32873D95339600F6EEFA51847D12C563FF01F320DC59055B242FA2887C99F9D6 ] NdisTapi        C:\windows\system32\DRIVERS\ndistapi.sys
10:01:28.0975 0x0c9c  NdisTapi - ok
10:01:29.0175 0x0c9c  [ 136185F9FB2CC61E573E676AA5402356, BA3AD0A33416DA913B4242C6BE8C3E5812AD2B20BA6C11DD3094F2E8EB56E683 ] Ndisuio         C:\windows\system32\DRIVERS\ndisuio.sys
10:01:29.0245 0x0c9c  Ndisuio - ok
10:01:29.0255 0x0c9c  [ 53F7305169863F0A2BDDC49E116C2E11, 881E9346D3C02405B7850ADC37E720990712EC9C666A0CE96E252A487FD2CE77 ] NdisWan         C:\windows\system32\DRIVERS\ndiswan.sys
10:01:29.0415 0x0c9c  NdisWan - ok
10:01:30.0285 0x0c9c  [ 015C0D8E0E0421B4CFD48CFFE2825879, 4242E2D42CCFC859B2C0275C5331798BC0BDA68E51CF4650B6E64B1332071023 ] NDProxy         C:\windows\system32\drivers\NDProxy.sys
10:01:31.0255 0x0c9c  NDProxy - ok
10:01:31.0656 0x0c9c  [ 86743D9F5D2B1048062B14B1D84501C4, DBF6D6A60AB774FCB0F464FF2D285A7521D0A24006687B243AB46B17D8032062 ] NetBIOS         C:\windows\system32\DRIVERS\netbios.sys
10:01:31.0946 0x0c9c  NetBIOS - ok
10:01:32.0736 0x0c9c  [ 09594D1089C523423B32A4229263F068, 7426A9B8BA27D3225928DDEFBD399650ABB90798212F56B7D12158AC22CCCE37 ] NetBT           C:\windows\system32\DRIVERS\netbt.sys
10:01:33.0006 0x0c9c  NetBT - ok
10:01:33.0086 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] Netlogon        C:\windows\system32\lsass.exe
10:01:33.0116 0x0c9c  Netlogon - ok
10:01:33.0586 0x0c9c  [ 847D3AE376C0817161A14A82C8922A9E, 37AE692B3481323134125EF58F2C3CBC20177371AF2F5874F53DD32A827CB936 ] Netman          C:\windows\System32\netman.dll
10:01:34.0146 0x0c9c  Netman - ok
10:01:34.0737 0x0c9c  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetMsmqActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
10:01:34.0777 0x0c9c  NetMsmqActivator - ok
10:01:35.0727 0x0c9c  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetPipeActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
10:01:35.0757 0x0c9c  NetPipeActivator - ok
10:01:36.0277 0x0c9c  [ 5F28111C648F1E24F7DBC87CDEB091B8, 2E8645285921EDB98BB2173E11E57459C888D52E80D85791D169C869DE8813B9 ] netprofm        C:\windows\System32\netprofm.dll
10:01:36.0777 0x0c9c  netprofm - ok
10:01:37.0887 0x0c9c  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetTcpActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
10:01:37.0917 0x0c9c  NetTcpActivator - ok
10:01:38.0307 0x0c9c  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetTcpPortSharing C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
10:01:38.0377 0x0c9c  NetTcpPortSharing - ok
10:01:38.0547 0x0c9c  [ 77889813BE4D166CDAB78DDBA990DA92, 2EF531AE502B943632EEC66A309A8BFCDD36120A5E1473F4AAF3C2393AD0E6A3 ] nfrd960         C:\windows\system32\drivers\nfrd960.sys
10:01:38.0577 0x0c9c  nfrd960 - ok
10:01:39.0277 0x0c9c  [ 8AD77806D336673F270DB31645267293, E23F324913554A23CD043DD27D4305AF62F48C0561A0FC7B7811E55B74B1BE79 ] NlaSvc          C:\windows\System32\nlasvc.dll
10:01:39.0587 0x0c9c  NlaSvc - ok
10:01:39.0927 0x0c9c  [ 1E4C4AB5C9B8DD13179BBDC75A2A01F7, D8957EF7060A69DBB3CD6B2C45B1E4143592AB8D018471E17AC04668157DC67F ] Npfs            C:\windows\system32\drivers\Npfs.sys
10:01:40.0317 0x0c9c  Npfs - ok
10:01:40.0367 0x0c9c  [ D54BFDF3E0C953F823B3D0BFE4732528, 497A1DCC5646EC22119273216DF10D5442D16F83E4363770F507518CF6EAA53A ] nsi             C:\windows\system32\nsisvc.dll
10:01:40.0467 0x0c9c  nsi - ok
10:01:40.0927 0x0c9c  [ E7F5AE18AF4168178A642A9247C63001, 133023B7E4BA8049C4CAED3282BDD25571D1CC25FAC3B820C7F981D292689D76 ] nsiproxy        C:\windows\system32\drivers\nsiproxy.sys
10:01:41.0357 0x0c9c  nsiproxy - ok
10:01:41.0567 0x0c9c  [ 1A29A59A4C5BA6F8C85062A613B7E2B2, CC137F499A12C724D4166C2D85E9F447413419A0683DAC6F1A802B7F210C77F1 ] Ntfs            C:\windows\system32\drivers\Ntfs.sys
10:01:41.0757 0x0c9c  Ntfs - ok
10:01:41.0807 0x0c9c  [ 9899284589F75FA8724FF3D16AED75C1, 181188599FD5D4DE33B97010D9E0CAEABAB9A3EF50712FE7F9AA0735CD0666D6 ] Null            C:\windows\system32\drivers\Null.sys
10:01:42.0937 0x0c9c  Null - ok
10:01:43.0117 0x0c9c  [ 0A92CB65770442ED0DC44834632F66AD, 581327F07A68DBD5CC749214BE5F1211FC2CE41C7A4F0656B680AFB51A35ACE7 ] nvraid          C:\windows\system32\drivers\nvraid.sys
10:01:43.0147 0x0c9c  nvraid - ok
10:01:43.0537 0x0c9c  [ DAB0E87525C10052BF65F06152F37E4A, AD9BFF0D5FD3FFB95C758B478E1F6A9FE45E7B37AEC71EB5070D292FEAAEDF37 ] nvstor          C:\windows\system32\drivers\nvstor.sys
10:01:43.0567 0x0c9c  nvstor - ok
10:01:43.0577 0x0c9c  [ 270D7CD42D6E3979F6DD0146650F0E05, 752489E54C9004EDCBE1F1F208FFD864DA5C83E59A2DDE6B3E0D63ECA996F76F ] nv_agp          C:\windows\system32\drivers\nv_agp.sys
10:01:43.0617 0x0c9c  nv_agp - ok
10:01:43.0857 0x0c9c  [ 3589478E4B22CE21B41FA1BFC0B8B8A0, AD2469FC753FE552CB809FF405A9AB23E7561292FE89117E3B3B62057EFF0203 ] ohci1394        C:\windows\system32\drivers\ohci1394.sys
10:01:43.0897 0x0c9c  ohci1394 - ok
10:01:44.0457 0x0c9c  [ 9D10F99A6712E28F8ACD5641E3A7EA6B, 70964A0ED9011EA94044E15FA77EDD9CF535CC79ED8E03A3721FF007E69595CC ] ose             C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
10:01:44.0487 0x0c9c  ose - ok
10:01:46.0478 0x0c9c  [ 61BFFB5F57AD12F83AB64B7181829B34, 1DD0DD35E4158F95765EE6639F217DF03A0A19E624E020DBA609268C08A13846 ] osppsvc         C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
10:01:46.0878 0x0c9c  osppsvc - ok
10:01:46.0948 0x0c9c  [ 3EAC4455472CC2C97107B5291E0DCAFE, E51F373F2DBEAEE516B42BAE8C1B5BB68D00B881323E842CB6EDEC0A183CFFC3 ] p2pimsvc        C:\windows\system32\pnrpsvc.dll
10:01:46.0998 0x0c9c  p2pimsvc - ok
10:01:47.0118 0x0c9c  [ 927463ECB02179F88E4B9A17568C63C3, FEFD3447692C277D59EEC7BF218552C8BB6B8C98C26E973675549628408B94CE ] p2psvc          C:\windows\system32\p2psvc.dll
10:01:47.0188 0x0c9c  p2psvc - ok
10:01:47.0288 0x0c9c  [ 0086431C29C35BE1DBC43F52CC273887, 0D116D49EF9ABB57DA005764F25E692622210627FC2048F06A989B12FA8D0A80 ] Parport         C:\windows\system32\drivers\parport.sys
10:01:47.0328 0x0c9c  Parport - ok
10:01:47.0558 0x0c9c  [ E9766131EEADE40A27DC27D2D68FBA9C, 63C295EC96DBD25F1A8B908295CCB86B54F2A77A02AAA11E5D9160C2C1A492B6 ] partmgr         C:\windows\system32\drivers\partmgr.sys
10:01:47.0588 0x0c9c  partmgr - ok
10:01:48.0998 0x0c9c  [ 9665402B7FA59302D520AD845DDFC026, 7FFE81F5402005FBD947A7440C12A206C58F3FDAE33F3E96987C334057CDB79E ] Partner Service C:\ProgramData\Partner\Partner.exe
10:01:49.0038 0x0c9c  Partner Service - ok
10:01:49.0248 0x0c9c  [ 3AEAA8B561E63452C655DC0584922257, 04C072969B58657602EB0C21CEDF24FCEE14E61B90A0F758F93925EF2C9FC32D ] PcaSvc          C:\windows\System32\pcasvc.dll
10:01:49.0318 0x0c9c  PcaSvc - ok
10:01:49.0568 0x0c9c  [ 94575C0571D1462A0F70BDE6BD6EE6B3, 7139BAC653EA94A3DD3821CAB35FC5E22F4CCA5ACC2BAABDAA27E4C3C8B27FC9 ] pci             C:\windows\system32\drivers\pci.sys
10:01:49.0598 0x0c9c  pci - ok
10:01:50.0148 0x0c9c  [ B5B8B5EF2E5CB34DF8DCF8831E3534FA, F2A7CC645B96946CC65BF60E14E70DC09C848D27C7943CE5DEA0C01A6B863480 ] pciide          C:\windows\system32\drivers\pciide.sys
10:01:50.0178 0x0c9c  pciide - ok
10:01:50.0228 0x0c9c  [ B2E81D4E87CE48589F98CB8C05B01F2F, 6763BEE7270A4873B3E131BFB92313E2750FCBD0AD73C23D1C4F98F7DF73DE14 ] pcmcia          C:\windows\system32\drivers\pcmcia.sys
10:01:50.0268 0x0c9c  pcmcia - ok
10:01:50.0388 0x0c9c  [ D6B9C2E1A11A3A4B26A182FFEF18F603, BBA5FE08B1DDD6243118E11358FD61B10E850F090F061711C3CB207CE5FBBD36 ] pcw             C:\windows\system32\drivers\pcw.sys
10:01:50.0418 0x0c9c  pcw - ok
10:01:50.0558 0x0c9c  [ 68769C3356B3BE5D1C732C97B9A80D6E, FB2D61145980A2899D1B7729184C54070315B0E63C9A22400A76CCD39E00029C ] PEAUTH          C:\windows\system32\drivers\peauth.sys
10:01:50.0918 0x0c9c  PEAUTH - ok
10:01:51.0118 0x0c9c  [ E495E408C93141E8FC72DC0C6046DDFA, 489B957DADA0DC128A09468F1AD082DCC657E86053208EA06A12937BE86FB919 ] PerfHost        C:\windows\SysWow64\perfhost.exe
10:01:51.0198 0x0c9c  PerfHost - ok
10:01:51.0418 0x0c9c  [ 91111CEBBDE8015E822C46120ED9537C, 255B85FEF663C2E0652CECF3F9B67B12B576F924A34415DEE13F0F5137E1E7F7 ] PGEffect        C:\windows\system32\DRIVERS\pgeffect.sys
10:01:51.0448 0x0c9c  PGEffect - ok
10:01:52.0468 0x0c9c  [ C7CF6A6E137463219E1259E3F0F0DD6C, 08D7244F52AA17DD669AA6F77C291DAC88E7B2D1887DE422509C1F83EC85F3DD ] pla             C:\windows\system32\pla.dll
10:01:52.0948 0x0c9c  pla - ok
10:01:53.0408 0x0c9c  [ 25FBDEF06C4D92815B353F6E792C8129, 57D9764AE6BCE33B242C399CDFC10DD405975BD6411CA8C75FBCD06EEB8442A9 ] PlugPlay        C:\windows\system32\umpnpmgr.dll
10:01:53.0628 0x0c9c  PlugPlay - ok
10:01:53.0848 0x0c9c  [ 7195581CEC9BB7D12ABE54036ACC2E38, 9C4E5D6EA984148F2663DC529083408B2248DFF6DAAC85D9195F80A722782315 ] PNRPAutoReg     C:\windows\system32\pnrpauto.dll
10:01:54.0098 0x0c9c  PNRPAutoReg - ok
10:01:54.0158 0x0c9c  [ 3EAC4455472CC2C97107B5291E0DCAFE, E51F373F2DBEAEE516B42BAE8C1B5BB68D00B881323E842CB6EDEC0A183CFFC3 ] PNRPsvc         C:\windows\system32\pnrpsvc.dll
10:01:54.0198 0x0c9c  PNRPsvc - ok
10:01:54.0318 0x0c9c  [ 4F15D75ADF6156BF56ECED6D4A55C389, 2ADA3EA69A5D7EC2A4D2DD89178DB94EAFDDF95F07B0070D654D9F7A5C12A044 ] PolicyAgent     C:\windows\System32\ipsecsvc.dll
10:01:54.0438 0x0c9c  PolicyAgent - ok
10:01:54.0508 0x0c9c  [ A2CCA4FB273E6050F17A0A416CFF2FCD, C42BA18DF0C8E3F7358669A784E51E4DC7A4112096345EA699EDC95F561E0255 ] Power           C:\windows\system32\umpo.dll
10:01:54.0558 0x0c9c  Power - ok
10:01:54.0878 0x0c9c  [ F92A2C41117A11A00BE01CA01A7FCDE9, 38ADC6052696D110CA5F393BC586791920663F5DA66934C2A824DDA9CD89C763 ] PptpMiniport    C:\windows\system32\DRIVERS\raspptp.sys
10:01:54.0998 0x0c9c  PptpMiniport - ok
10:01:55.0038 0x0c9c  [ 0D922E23C041EFB1C3FAC2A6F943C9BF, 855418A6A58DCAFB181A1A68613B3E203AFB0A9B3D9D26D0C521F9F613B4EAD5 ] Processor       C:\windows\system32\drivers\processr.sys
10:01:55.0108 0x0c9c  Processor - ok
10:01:55.0268 0x0c9c  [ 53E83F1F6CF9D62F32801CF66D8352A8, 1225FED810BE8E0729EEAE5B340035CCBB9BACD3EF247834400F9B72D05ACE48 ] ProfSvc         C:\windows\system32\profsvc.dll
10:01:55.0338 0x0c9c  ProfSvc - ok
10:01:55.0368 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] ProtectedStorage C:\windows\system32\lsass.exe
10:01:55.0398 0x0c9c  ProtectedStorage - ok
10:01:55.0618 0x0c9c  [ 0557CF5A2556BD58E26384169D72438D, F6F83A616B1F1C6C0DF6D2EC2513E6C23FD4FAA6D36518B8676C619AB74957B4 ] Psched          C:\windows\system32\DRIVERS\pacer.sys
10:01:55.0738 0x0c9c  Psched - ok
10:01:56.0128 0x0c9c  [ A53A15A11EBFD21077463EE2C7AFEEF0, 6002B012A75045DEA62640A864A8721EADE2F8B65BEB5F5BA76D8CD819774489 ] ql2300          C:\windows\system32\drivers\ql2300.sys
10:01:56.0248 0x0c9c  ql2300 - ok
10:01:56.0278 0x0c9c  [ 4F6D12B51DE1AAEFF7DC58C4D75423C8, FB6ABAB741CED66A79E31A45111649F2FA3E26CEE77209B5296F789F6F7D08DE ] ql40xx          C:\windows\system32\drivers\ql40xx.sys
10:01:56.0298 0x0c9c  ql40xx - ok
10:01:56.0358 0x0c9c  [ 906191634E99AEA92C4816150BDA3732, A0305436384104C3B559F9C73902DA19B96B518413379E397C5CDAB0B2B9418F ] QWAVE           C:\windows\system32\qwave.dll
10:01:56.0408 0x0c9c  QWAVE - ok
10:01:56.0499 0x0c9c  [ 76707BB36430888D9CE9D705398ADB6C, 35C1D1D05F98AC29A33D3781F497A0B40A3CB9CDF25FE1F28F574E40DDF70535 ] QWAVEdrv        C:\windows\system32\drivers\qwavedrv.sys
10:01:56.0579 0x0c9c  QWAVEdrv - ok
10:01:56.0659 0x0c9c  [ 5A0DA8AD5762FA2D91678A8A01311704, 8A64EB5DBAB7048A9E42A21CEB62CCD5B007A80C199892D7F8C69B48E8A255EF ] RasAcd          C:\windows\system32\DRIVERS\rasacd.sys
10:01:56.0749 0x0c9c  RasAcd - ok
10:01:56.0899 0x0c9c  [ 7ECFF9B22276B73F43A99A15A6094E90, 62C70DA127F48F796F8897BBFA23AB6EB080CC923F0F091DFA384A93F5C90CA1 ] RasAgileVpn     C:\windows\system32\DRIVERS\AgileVpn.sys
10:01:56.0979 0x0c9c  RasAgileVpn - ok
10:01:57.0009 0x0c9c  [ 8F26510C5383B8DBE976DE1CD00FC8C7, 60E618C010E8A723960636415573FA17EA0BBEF79647196B3BC0B8DEE680E090 ] RasAuto         C:\windows\System32\rasauto.dll
10:01:57.0109 0x0c9c  RasAuto - ok
10:01:57.0189 0x0c9c  [ 471815800AE33E6F1C32FB1B97C490CA, 27307265F743DE3A3A3EC1B2C472A3D85FDD0AEC458E0B1177593141EE072698 ] Rasl2tp         C:\windows\system32\DRIVERS\rasl2tp.sys
10:01:57.0259 0x0c9c  Rasl2tp - ok
10:01:57.0299 0x0c9c  [ EE867A0870FC9E4972BA9EAAD35651E2, 1B848D81705081FD2E18AC762DA7F51455657DAF860BF363DC15925A148BCADA ] RasMan          C:\windows\System32\rasmans.dll
10:01:57.0409 0x0c9c  RasMan - ok
10:01:57.0439 0x0c9c  [ 855C9B1CD4756C5E9A2AA58A15F58C25, A514F8A9C304D54BDA8DC60F5A64259B057EC83A1CAAF6D2B58CFD55E9561F72 ] RasPppoe        C:\windows\system32\DRIVERS\raspppoe.sys
10:01:57.0559 0x0c9c  RasPppoe - ok
10:01:57.0689 0x0c9c  [ E8B1E447B008D07FF47D016C2B0EEECB, FEC789F82B912F3E14E49524D40FEAA4373B221156F14045E645D7C37859258C ] RasSstp         C:\windows\system32\DRIVERS\rassstp.sys
10:01:57.0789 0x0c9c  RasSstp - ok
10:01:58.0029 0x0c9c  [ 77F665941019A1594D887A74F301FA2F, 1FDC6F6853400190C086042933F157814D915C54F26793CAD36CD2607D8810DA ] rdbss           C:\windows\system32\DRIVERS\rdbss.sys
10:01:58.0169 0x0c9c  rdbss - ok
10:01:58.0219 0x0c9c  [ 302DA2A0539F2CF54D7C6CC30C1F2D8D, 1DF3501BBFFB56C3ECC39DBCC4287D3302216C2208CE22428B8C4967E5DE9D17 ] rdpbus          C:\windows\system32\drivers\rdpbus.sys
10:01:58.0299 0x0c9c  rdpbus - ok
10:01:58.0329 0x0c9c  [ CEA6CC257FC9B7715F1C2B4849286D24, A78144D18352EA802C39D9D42921CF97A3E0211766B2169B6755C6FC2D77A804 ] RDPCDD          C:\windows\system32\DRIVERS\RDPCDD.sys
10:01:58.0389 0x0c9c  RDPCDD - ok
10:01:58.0399 0x0c9c  [ BB5971A4F00659529A5C44831AF22365, 9AAA5C0D448E821FD85589505D99DF7749715A046BBD211F139E4E652ADDE41F ] RDPENCDD        C:\windows\system32\drivers\rdpencdd.sys
10:01:58.0469 0x0c9c  RDPENCDD - ok
10:01:58.0489 0x0c9c  [ 216F3FA57533D98E1F74DED70113177A, 60C126A1409D1E9C39F1C9E95F70115BF4AF07780AB499F6E10A612540F173F4 ] RDPREFMP        C:\windows\system32\drivers\rdprefmp.sys
10:01:58.0619 0x0c9c  RDPREFMP - ok
10:01:58.0899 0x0c9c  [ E61608AA35E98999AF9AAEEEA6114B0A, F754CDE89DC96786D2A3C4D19EE2AEF1008E634E4DE3C0CBF927436DE90C04A6 ] RDPWD           C:\windows\system32\drivers\RDPWD.sys
10:01:59.0029 0x0c9c  RDPWD - ok
10:01:59.0119 0x0c9c  [ 34ED295FA0121C241BFEF24764FC4520, AAEE5F00CAA763A5BA51CF56BD7262C03409CD72BD5601490E3EC3FFF929BB5F ] rdyboost        C:\windows\system32\drivers\rdyboost.sys
10:01:59.0159 0x0c9c  rdyboost - ok
10:01:59.0199 0x0c9c  [ 254FB7A22D74E5511C73A3F6D802F192, 3D0FB5840364200DE394F8CC28DA0E334C2B5FA8FF28A41656EE72287F3D3836 ] RemoteAccess    C:\windows\System32\mprdim.dll
10:01:59.0319 0x0c9c  RemoteAccess - ok
10:01:59.0369 0x0c9c  [ E4D94F24081440B5FC5AA556C7C62702, 147CAA03568DC480F9506E30B84891AB7E433B5EBC05F34FF10F72B00E1C6B22 ] RemoteRegistry  C:\windows\system32\regsvc.dll
10:01:59.0499 0x0c9c  RemoteRegistry - ok
10:01:59.0590 0x0c9c  [ E4DC58CF7B3EA515AE917FF0D402A7BB, 665B5CD9FE905B0EE3F59A7B1A94760F5393EBEE729877D8584349754C2867E8 ] RpcEptMapper    C:\windows\System32\RpcEpMap.dll
10:01:59.0680 0x0c9c  RpcEptMapper - ok
10:01:59.0760 0x0c9c  [ D5BA242D4CF8E384DB90E6A8ED850B8C, CB4CB2608B5E31B55FB1A2CF4051E6D08A0C2A5FB231B2116F95938D7577334E ] RpcLocator      C:\windows\system32\locator.exe
10:01:59.0820 0x0c9c  RpcLocator - ok
10:01:59.0910 0x0c9c  [ 5C627D1B1138676C0A7AB2C2C190D123, C5003F2C912C5CA990E634818D3B4FD72F871900AF2948BD6C4D6400B354B401 ] RpcSs           C:\windows\system32\rpcss.dll
10:02:00.0060 0x0c9c  RpcSs - ok
10:02:00.0120 0x0c9c  [ DDC86E4F8E7456261E637E3552E804FF, D250C69CCC75F2D88E7E624FCC51300E75637333317D53908CCA7E0F117173DD ] rspndr          C:\windows\system32\DRIVERS\rspndr.sys
10:02:00.0220 0x0c9c  rspndr - ok
10:02:00.0360 0x0c9c  [ 36FCA0C67BCDC0DA047F5F36743B5CB9, 55B8F43B78B55900DA055206644D1DAD60AE453DB1A8D4527B86FAC346EEE587 ] RSUSBVSTOR      C:\windows\system32\Drivers\RtsUVStor.sys
10:02:00.0390 0x0c9c  RSUSBVSTOR - ok
10:02:00.0480 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] SamSs           C:\windows\system32\lsass.exe
10:02:00.0510 0x0c9c  SamSs - ok
10:02:00.0571 0x0c9c  [ AC03AF3329579FFFB455AA2DAABBE22B, 7AD3B62ADFEC166F9E256F9FF8BAA0568B2ED7308142BF8F5269E6EAA5E0A656 ] sbp2port        C:\windows\system32\drivers\sbp2port.sys
10:02:00.0621 0x0c9c  sbp2port - ok
10:02:00.0663 0x0c9c  [ 9B7395789E3791A3B6D000FE6F8B131E, E5F067F3F212BF5481668BE1779CBEF053F511F8967589BE2E865ACB9A620024 ] SCardSvr        C:\windows\System32\SCardSvr.dll
10:02:00.0786 0x0c9c  SCardSvr - ok
10:02:00.0805 0x0c9c  [ 253F38D0D7074C02FF8DEB9836C97D2B, CB5CAFCB8628BB22877F74ACF1DED0BBAED8F4573A74DA7FE94BBBA584889116 ] scfilter        C:\windows\system32\DRIVERS\scfilter.sys
10:02:00.0895 0x0c9c  scfilter - ok
10:02:01.0037 0x0c9c  [ 262F6592C3299C005FD6BEC90FC4463A, 54095E37F0B6CC677A3E9BDD40F4647C713273D197DB341063AA7F342A60C4A7 ] Schedule        C:\windows\system32\schedsvc.dll
10:02:01.0198 0x0c9c  Schedule - ok
10:02:01.0229 0x0c9c  [ F17D1D393BBC69C5322FBFAFACA28C7F, 62A1A92B3C52ADFD0B808D7F69DD50238B5F202421F1786F7EAEAA63F274B3E8 ] SCPolicySvc     C:\windows\System32\certprop.dll
10:02:01.0299 0x0c9c  SCPolicySvc - ok
10:02:01.0339 0x0c9c  [ 6EA4234DC55346E0709560FE7C2C1972, 64011E044C16E2F92689E5F7E4666A075E27BBFA61F3264E5D51CE1656C1D5B8 ] SDRSVC          C:\windows\System32\SDRSVC.dll
10:02:01.0409 0x0c9c  SDRSVC - ok
10:02:01.0469 0x0c9c  [ 3EA8A16169C26AFBEB544E0E48421186, 34BBB0459C96B3DE94CCB0D73461562935C583D7BF93828DA4E20A6BC9B7301D ] secdrv          C:\windows\system32\drivers\secdrv.sys
10:02:01.0539 0x0c9c  secdrv - ok
10:02:01.0579 0x0c9c  [ BC617A4E1B4FA8DF523A061739A0BD87, 10C4057F6B321EB5237FF619747B74F5401BC17D15A8C7060829E8204A2297F9 ] seclogon        C:\windows\system32\seclogon.dll
10:02:01.0649 0x0c9c  seclogon - ok
10:02:01.0686 0x0c9c  [ C32AB8FA018EF34C0F113BD501436D21, E0EB8E80B51E45CA7EB061E705DA0BC07878759418A8519AE6E12326FE79E7C7 ] SENS            C:\windows\System32\sens.dll
10:02:01.0761 0x0c9c  SENS - ok
10:02:01.0811 0x0c9c  [ 0336CFFAFAAB87A11541F1CF1594B2B2, 8B8A6A33E78A12FB05E29B2E2775850626574AFD2EF88748D65E690A07B10B8D ] SensrSvc        C:\windows\system32\sensrsvc.dll
10:02:01.0851 0x0c9c  SensrSvc - ok
10:02:01.0931 0x0c9c  [ CB624C0035412AF0DEBEC78C41F5CA1B, A4D937F11E06CAE914347CA1362F4C98EC5EE0C0C80321E360EA1ABD6726F8D4 ] Serenum         C:\windows\system32\drivers\serenum.sys
10:02:01.0971 0x0c9c  Serenum - ok
10:02:02.0051 0x0c9c  [ C1D8E28B2C2ADFAEC4BA89E9FDA69BD6, 8F9776FB84C5D11068EAF1FF1D1A46466C655D64D256A8B1E31DC0C23B5DD22D ] Serial          C:\windows\system32\drivers\serial.sys
10:02:02.0101 0x0c9c  Serial - ok
10:02:02.0131 0x0c9c  [ 1C545A7D0691CC4A027396535691C3E3, 065C30BE598FF4DC55C37E0BBE0CEDF10A370AE2BF5404B42EBBB867A3FFED6D ] sermouse        C:\windows\system32\drivers\sermouse.sys
10:02:02.0181 0x0c9c  sermouse - ok
10:02:02.0221 0x0c9c  [ 0B6231BF38174A1628C4AC812CC75804, E569BF1F7F5689E2E917FA6516DB53388A5B8B1C6699DEE030147E853218811D ] SessionEnv      C:\windows\system32\sessenv.dll
10:02:02.0341 0x0c9c  SessionEnv - ok
10:02:02.0361 0x0c9c  [ A554811BCD09279536440C964AE35BBF, DA8F893722F803E189D7D4D6C6232ED34505B63A64ED3A0132A5BB7A2BABDE55 ] sffdisk         C:\windows\system32\drivers\sffdisk.sys
10:02:02.0391 0x0c9c  sffdisk - ok
10:02:02.0421 0x0c9c  [ FF414F0BAEFEBA59BC6C04B3DB0B87BF, B81EF5D26AEB572CAB590F7AD7CA8C89F296420089EF5E6148E972F2DBCA1042 ] sffp_mmc        C:\windows\system32\drivers\sffp_mmc.sys
10:02:02.0481 0x0c9c  sffp_mmc - ok
10:02:02.0491 0x0c9c  [ DD85B78243A19B59F0637DCF284DA63C, 6730D4F2BAE7E24615746ACC41B42D01DB6068D6504982008ADA1890DE900197 ] sffp_sd         C:\windows\system32\drivers\sffp_sd.sys
10:02:02.0541 0x0c9c  sffp_sd - ok
10:02:02.0541 0x0c9c  [ A9D601643A1647211A1EE2EC4E433FF4, 7AC60B4AB48D4BBF1F9681C12EC2A75C72E6E12D30FABC564A24394310E9A5F9 ] sfloppy         C:\windows\system32\drivers\sfloppy.sys
10:02:02.0581 0x0c9c  sfloppy - ok
10:02:02.0681 0x0c9c  [ B95F6501A2F8B2E78C697FEC401970CE, 758B73A32902299A313348CE7EC189B20EB4CB398D0180E4EE24B84DAD55F291 ] SharedAccess    C:\windows\System32\ipnathlp.dll
10:02:02.0751 0x0c9c  SharedAccess - ok
10:02:02.0831 0x0c9c  [ AAF932B4011D14052955D4B212A4DA8D, 2A3BFD0FA9569288E91AE3E72CA1EC39E1450D01E6473CE51157E0F138257923 ] ShellHWDetection C:\windows\System32\shsvcs.dll
10:02:02.0961 0x0c9c  ShellHWDetection - ok
10:02:02.0981 0x0c9c  [ 843CAF1E5FDE1FFD5FF768F23A51E2E1, 89CA9F516E42A6B905474D738CDA2C121020A07DBD4E66CFE569DD77D79D7820 ] SiSRaid2        C:\windows\system32\drivers\SiSRaid2.sys
10:02:03.0021 0x0c9c  SiSRaid2 - ok
10:02:03.0041 0x0c9c  [ 6A6C106D42E9FFFF8B9FCB4F754F6DA4, 87B85C66DF7EB6FDB8A2341D05FAA5261FF68A90CCFC63F0E4A03824F1E33E5E ] SiSRaid4        C:\windows\system32\drivers\sisraid4.sys
10:02:03.0081 0x0c9c  SiSRaid4 - ok
10:02:03.0233 0x0c9c  [ 50D9949020E02B847CD48F1243FCB895, 5BDAD5E44DE5B412645142810C5FCE4B2D9685F928FF4A6B836A9DCE7725BD78 ] SkypeUpdate     C:\Program Files (x86)\Skype\Updater\Updater.exe
10:02:03.0343 0x0c9c  SkypeUpdate - ok
10:02:03.0443 0x0c9c  [ 548260A7B8654E024DC30BF8A7C5BAA4, 4A7E58331D7765A12F53DC2371739DC9A463940B13E16157CE10DB80E958D740 ] Smb             C:\windows\system32\DRIVERS\smb.sys
10:02:03.0553 0x0c9c  Smb - ok
10:02:03.0593 0x0c9c  [ E922286ED6677104AEBB210B9F0BF6F3, 080334BA6E82C8FC0D4EFB67313204D46C174CFEBFB2B4BD70CE503B6066EC32 ] SmbDrv          C:\windows\system32\DRIVERS\Smb_driver.sys
10:02:03.0623 0x0c9c  SmbDrv - ok
10:02:03.0713 0x0c9c  [ 6313F223E817CC09AA41811DAA7F541D, D787061043BEEDB9386B048CB9E680E6A88A1CBAE9BD4A8C0209155BFB76C630 ] SNMPTRAP        C:\windows\System32\snmptrap.exe
10:02:03.0763 0x0c9c  SNMPTRAP - ok
10:02:03.0833 0x0c9c  [ B9E31E5CACDFE584F34F730A677803F9, 21A5130BD00089C609522A372018A719F8E37103D2DD22C59EACB393BE35A063 ] spldr           C:\windows\system32\drivers\spldr.sys
10:02:03.0863 0x0c9c  spldr - ok
10:02:04.0003 0x0c9c  [ 85DAA09A98C9286D4EA2BA8D0E644377, F9C324E2EF81193FE831C7EECC44A100CA06F82FA731BF555D9EA4D91DA13329 ] Spooler         C:\windows\System32\spoolsv.exe
10:02:04.0083 0x0c9c  Spooler - ok
10:02:04.0423 0x0c9c  [ E17E0188BB90FAE42D83E98707EFA59C, FC075F7B39E86CC8EF6DA4E339FE946917E319C347AC70FB0C50AAF36F97E27F ] sppsvc          C:\windows\system32\sppsvc.exe
10:02:04.0923 0x0c9c  sppsvc - ok
10:02:04.0943 0x0c9c  [ 93D7D61317F3D4BC4F4E9F8A96A7DE45, 36D48B23B8243BE5229707375FCD11C2DCAC96983199345365F065A0CBF33314 ] sppuinotify     C:\windows\system32\sppuinotify.dll
10:02:05.0043 0x0c9c  sppuinotify - ok
10:02:05.0093 0x0c9c  [ 441FBA48BFF01FDB9D5969EBC1838F0B, 306128F1AD489F87161A089D1BDC1542A4CB742D91A0C12A7CD1863FDB8932C0 ] srv             C:\windows\system32\DRIVERS\srv.sys
10:02:05.0153 0x0c9c  srv - ok
10:02:05.0195 0x0c9c  [ B4ADEBBF5E3677CCE9651E0F01F7CC28, 726DB2283113AB2A9681E8E9F61132303D6D86E9CD034C40EE4A8C9DB29E87F7 ] srv2            C:\windows\system32\DRIVERS\srv2.sys
10:02:05.0295 0x0c9c  srv2 - ok
10:02:05.0425 0x0c9c  [ 27E461F0BE5BFF5FC737328F749538C3, AFA4704ED8FFC1A0BAB40DFB81D3AE3F3D933A3C9BF54DDAF39FF9AF3646D9E6 ] srvnet          C:\windows\system32\DRIVERS\srvnet.sys
10:02:05.0535 0x0c9c  srvnet - ok
10:02:05.0615 0x0c9c  [ 51B52FBD583CDE8AA9BA62B8B4298F33, 2E2403F8AA39E79D1281CA006B51B43139C32A5FDD64BD34DAA4B935338BD740 ] SSDPSRV         C:\windows\System32\ssdpsrv.dll
10:02:05.0715 0x0c9c  SSDPSRV - ok
10:02:05.0825 0x0c9c  [ AB7AEBF58DAD8DAAB7A6C45E6A8885CB, D21CDBC4C2AA0DB5B4455D5108B0CAF4282A2E664B9035708F212CC094569D9D ] SstpSvc         C:\windows\system32\sstpsvc.dll
10:02:05.0895 0x0c9c  SstpSvc - ok
10:02:06.0125 0x0c9c  [ F3817967ED533D08327DC73BC4D5542A, 1B204454408A690C0A86447F3E4AA9E7C58A9CFB567C94C17C21920BA648B4D5 ] stexstor        C:\windows\system32\drivers\stexstor.sys
10:02:06.0155 0x0c9c  stexstor - ok
10:02:06.0325 0x0c9c  [ 8DD52E8E6128F4B2DA92CE27402871C1, 1101C38BE8FC383B5F2F9FA402F9652B23B88A764DE2B584DFE62B88B11DEF92 ] stisvc          C:\windows\System32\wiaservc.dll
10:02:06.0415 0x0c9c  stisvc - ok
10:02:06.0465 0x0c9c  [ D01EC09B6711A5F8E7E6564A4D0FBC90, 3CB922291DBADC92B46B9E28CCB6810CD8CCDA3E74518EC9522B58B998E1F969 ] swenum          C:\windows\system32\DRIVERS\swenum.sys
10:02:06.0495 0x0c9c  swenum - ok
10:02:06.0595 0x0c9c  [ E08E46FDD841B7184194011CA1955A0B, 9C3725BB1F08F92744C980A22ED5C874007D3B5863C7E1F140F50061052AC418 ] swprv           C:\windows\System32\swprv.dll
10:02:06.0805 0x0c9c  swprv - ok
10:02:06.0875 0x0c9c  [ 92F4AFC1FDE7A4CA0C88F9143F4DD323, FF8796BD6CD15853E22FE2A7B4B10F189316A00F78E52A1BD9CE4F8667452F1B ] SynTP           C:\windows\system32\DRIVERS\SynTP.sys
10:02:07.0005 0x0c9c  SynTP - ok
10:02:07.0175 0x0c9c  [ BF9CCC0BF39B418C8D0AE8B05CF95B7D, 3C13217548BE61F2BDB8BD41F77345CDDA1F97BF0AE17241C335B9807EB3DBB8 ] SysMain         C:\windows\system32\sysmain.dll
10:02:07.0385 0x0c9c  SysMain - ok
10:02:07.0565 0x0c9c  [ E3C61FD7B7C2557E1F1B0B4CEC713585, 01F0E116606D185BF93B540868075BFB1A398197F6AABD994983DBFF56B3A8A0 ] TabletInputService C:\windows\System32\TabSvc.dll
10:02:07.0746 0x0c9c  TabletInputService - ok
10:02:07.0856 0x0c9c  [ 40F0849F65D13EE87B9A9AE3C1DD6823, E251A7EF3D0FD2973AF33A62FC457A7E8D5E8694208F811F52455F7C2426121F ] TapiSrv         C:\windows\System32\tapisrv.dll
10:02:07.0956 0x0c9c  TapiSrv - ok
10:02:08.0266 0x0c9c  [ 1BE03AC720F4D302EA01D40F588162F6, AB644862BF1D2E824FD846180DEC4E2C0FAFCC517451486DE5A92E5E78A952E4 ] TBS             C:\windows\System32\tbssvc.dll
10:02:08.0336 0x0c9c  TBS - ok
10:02:08.0886 0x0c9c  [ 04ADD18EE5CC9FBEDAEC1DD1CD0CB45E, F05C0C4CA3DD234AD5D60CF1EF763C9A1D9EC3C157E180C2D75CC07E6B02A611 ] Tcpip           C:\windows\system32\drivers\tcpip.sys
10:02:09.0016 0x0c9c  Tcpip - ok
10:02:09.0346 0x0c9c  [ 04ADD18EE5CC9FBEDAEC1DD1CD0CB45E, F05C0C4CA3DD234AD5D60CF1EF763C9A1D9EC3C157E180C2D75CC07E6B02A611 ] TCPIP6          C:\windows\system32\DRIVERS\tcpip.sys
10:02:09.0406 0x0c9c  TCPIP6 - ok
10:02:09.0446 0x0c9c  [ 1B16D0BD9841794A6E0CDE0CEF744ABC, 7EB8BA97339199EEE7F2B09DA2DA6279DA64A510D4598D42CF86415D67CD674C ] tcpipreg        C:\windows\system32\drivers\tcpipreg.sys
10:02:09.0526 0x0c9c  tcpipreg - ok
10:02:10.0036 0x0c9c  [ FD542B661BD22FA69CA789AD0AC58C29, 75FFAF1834B1E22DF37608ED451F161052FF1FE3C681B4E20A68DCA92CC7FD8C ] tdcmdpst        C:\windows\system32\DRIVERS\tdcmdpst.sys
10:02:10.0046 0x0c9c  tdcmdpst - ok
10:02:10.0136 0x0c9c  [ 3371D21011695B16333A3934340C4E7C, 7416F9BBFC1BA9D875EA7D1C7A0D912FC6977B49A865D67E3F9C4E18A965082D ] TDPIPE          C:\windows\system32\drivers\tdpipe.sys
10:02:10.0256 0x0c9c  TDPIPE - ok
10:02:10.0306 0x0c9c  [ 51C5ECEB1CDEE2468A1748BE550CFBC8, 4E8F83877330B421F7B5D8393D34BC44C6450E69209DAA95B29CB298166A5DF9 ] TDTCP           C:\windows\system32\drivers\tdtcp.sys
10:02:10.0396 0x0c9c  TDTCP - ok
10:02:10.0576 0x0c9c  [ DDAD5A7AB24D8B65F8D724F5C20FD806, B71F2967A4EE7395E4416C1526CB85368AEA988BDD1F2C9719C48B08FAFA9661 ] tdx             C:\windows\system32\DRIVERS\tdx.sys
10:02:10.0736 0x0c9c  tdx - ok
10:02:10.0876 0x0c9c  [ 1B709733A04DCC41A63F9CD1F76A4EBE, 3973F7BA3CC5395040F68B60950A836D729B487BF7F732D31915064F7DA4C838 ] TemproMonitoringService C:\Program Files (x86)\Toshiba TEMPRO\TemproSvc.exe
10:02:10.0896 0x0c9c  TemproMonitoringService - ok
10:02:10.0956 0x0c9c  [ 561E7E1F06895D78DE991E01DD0FB6E5, 83BFA50A528762EC52A011302AC3874636FB7E26628CD7ACFBF2BDC9FAA8110D ] TermDD          C:\windows\system32\DRIVERS\termdd.sys
10:02:10.0976 0x0c9c  TermDD - ok
10:02:11.0116 0x0c9c  [ 2E648163254233755035B46DD7B89123, 6FA0D07CE18A3A69D82EE49D875F141E39406E92C34EAC76AC4EB052E6EBCBCD ] TermService     C:\windows\System32\termsrv.dll
10:02:11.0286 0x0c9c  TermService - ok
10:02:11.0346 0x0c9c  [ F0344071948D1A1FA732231785A0664C, DB9886C2C858FAF45AEA15F8E42860343F73EB8685C53EC2E8CCC10586CB0832 ] Themes          C:\windows\system32\themeservice.dll
10:02:11.0546 0x0c9c  Themes - ok
10:02:11.0756 0x0c9c  [ E40E80D0304A73E8D269F7141D77250B, 0DB4AC13A264F19A84DC0BCED54E8E404014CC09C993B172002B1561EC7E265A ] THREADORDER     C:\windows\system32\mmcss.dll
10:02:11.0806 0x0c9c  THREADORDER - ok
10:02:11.0986 0x0c9c  [ 71C321649B28638EE80A2EEB164C1DC8, D75D296B506DCC38A4DED82C71141388AEB60B065785DCC5BC2F4B3B77ACEDC7 ] TMachInfo       C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe
10:02:11.0996 0x0c9c  TMachInfo - ok
10:02:12.0126 0x0c9c  [ 8E2C799D3476EAC32C3BA0DF7CE6AF19, CFE8A69E3F2A42C3BA2B38EC9233076D0AD32C441500E6407219F2E866905D9B ] TODDSrv         C:\windows\system32\TODDSrv.exe
10:02:12.0136 0x0c9c  TODDSrv - ok
10:02:12.0256 0x0c9c  [ 4AE80C5F7772C4FB2A762F70AD4A111E, C86F4878D497BD998639A3A01C26F46E5A31F4BBC35FA4B7E9BF66F7799D2511 ] TosCoSrv        C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
10:02:12.0276 0x0c9c  TosCoSrv - ok
10:02:12.0346 0x0c9c  [ A22DEB5EC05FEBFDCA1D3FF70FA1FF46, 3D3F68DC994C99436E31B72AEE15F4F46437AC3F2C2CD1D477C738E16397CB50 ] TOSHIBA Bluetooth Service C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
10:02:12.0366 0x0c9c  TOSHIBA Bluetooth Service - ok
10:02:12.0446 0x0c9c  [ 6E2330FB032ED3EBEFC1349AD7081A98, 14009203935221FED275288E2B9801FBA4401854C2566E4F5B4003EB28DE97E6 ] TOSHIBA eco Utility Service C:\Program Files\TOSHIBA\TECO\TecoService.exe
10:02:12.0466 0x0c9c  TOSHIBA eco Utility Service - ok
10:02:12.0546 0x0c9c  [ 9338C2DEB14CA2804BCB3276CB7EB4FD, 4204B49D3BE2777E10A442C45A8677E559AF9DF03CB96A9C2FDE5D21A0538623 ] TOSHIBA HDD SSD Alert Service C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe
10:02:12.0556 0x0c9c  TOSHIBA HDD SSD Alert Service - ok
10:02:12.0597 0x0c9c  Tosrfcom - ok
10:02:12.0667 0x0c9c  [ F5E3AC4CBCD154EE80849B21887FD0B0, 7D68AF88F1B01BCA6456FBAEB91580419A49A77D31EFC0BA6A1C50301899BA03 ] tosrfec         C:\windows\system32\DRIVERS\tosrfec.sys
10:02:12.0677 0x0c9c  tosrfec - ok
10:02:12.0697 0x0c9c  [ AF8A0D2E2A41043A77CA77CCBDB8D9C2, B215C6357E30A0E669FD0D4B9BB9D84B1D30B2177B6ED626B3C70D96C8FF4497 ] Tosrfusb        C:\windows\system32\DRIVERS\tosrfusb.sys
10:02:12.0707 0x0c9c  Tosrfusb - ok
10:02:12.0797 0x0c9c  [ 36CDD894395BEC46EFB14F49D77D3D82, A285DBF83605756B52E09548B78C67C00A814E6FDF8BA761701FA520EF9D94BF ] TPCHSrv         C:\Program Files\TOSHIBA\TPHM\TPCHSrv.exe
10:02:12.0827 0x0c9c  TPCHSrv - ok
10:02:12.0897 0x0c9c  [ 7E7AFD841694F6AC397E99D75CEAD49D, DE87F203FD8E6BDCCFCA1860A85F283301A365846FB703D9BB86278D8AC96B07 ] TrkWks          C:\windows\System32\trkwks.dll
10:02:12.0987 0x0c9c  TrkWks - ok
10:02:13.0037 0x0c9c  [ 773212B2AAA24C1E31F10246B15B276C, F2EF85F5ABA307976D9C649D710B408952089458DDE97D4DEF321DF14E46A046 ] TrustedInstaller C:\windows\servicing\TrustedInstaller.exe
10:02:13.0077 0x0c9c  TrustedInstaller - ok
10:02:13.0197 0x0c9c  [ 4CE278FC9671BA81A138D70823FCAA09, CBE501436696E32A3701B9F377B823AC36647B6626595F76CC63E2396AD7D300 ] tssecsrv        C:\windows\system32\DRIVERS\tssecsrv.sys
10:02:13.0277 0x0c9c  tssecsrv - ok
10:02:13.0337 0x0c9c  [ D11C783E3EF9A3C52C0EBE83CC5000E9, A136C355D4C8945729163D15801364A614E23217B15F9313C85BA45BB71A74EB ] TsUsbFlt        C:\windows\system32\drivers\tsusbflt.sys
10:02:13.0387 0x0c9c  TsUsbFlt - ok
10:02:13.0397 0x0c9c  [ 9CC2CCAE8A84820EAECB886D477CBCB8, 50D8AA2D7477A6618A0C31BB4D1C4887B457865FB1105E2E7B984EEFA337B804 ] TsUsbGD         C:\windows\system32\drivers\TsUsbGD.sys
10:02:13.0477 0x0c9c  TsUsbGD - ok
10:02:13.0697 0x0c9c  [ 3566A8DAAFA27AF944F5D705EAA64894, AE9D8B648DA08AF667B9456C3FE315489859C157510A258559F18238F2CC92B8 ] tunnel          C:\windows\system32\DRIVERS\tunnel.sys
10:02:13.0767 0x0c9c  tunnel - ok
10:02:13.0807 0x0c9c  [ 550B567F9364D8F7684C3FB3EA665A72, A214BBBBAB9F0DD525FA5A818CEB8E9294B4A96676317255D7ACF6049049C933 ] TVALZ           C:\windows\system32\DRIVERS\TVALZ_O.SYS
10:02:13.0817 0x0c9c  TVALZ - ok
10:02:13.0977 0x0c9c  [ 9C7191F4B2E49BFF47A6C1144B5923FA, DF4E663499946F4E68B7528CA399574D1EB69797FF81F681943B84F3E5E6A40E ] TVALZFL         C:\windows\system32\DRIVERS\TVALZFL.sys
10:02:13.0987 0x0c9c  TVALZFL - ok
10:02:13.0997 0x0c9c  [ B4DD609BD7E282BFC683CEC7EAAAAD67, EF131DB6F6411CAD36A989A421AF93F89DD61601AC524D2FF11C10FF6E3E9123 ] uagp35          C:\windows\system32\drivers\uagp35.sys
10:02:14.0007 0x0c9c  uagp35 - ok
10:02:14.0077 0x0c9c  [ FF4232A1A64012BAA1FD97C7B67DF593, D8591B4EB056899C7B604E4DD852D82D4D9809F508ABCED4A03E1BE6D5D456E3 ] udfs            C:\windows\system32\DRIVERS\udfs.sys
10:02:14.0167 0x0c9c  udfs - ok
10:02:14.0237 0x0c9c  [ 3CBDEC8D06B9968ABA702EBA076364A1, B8DAB8AA804FC23021BFEBD7AE4D40FBE648D6C6BA21CC008E26D1C084972F9B ] UI0Detect       C:\windows\system32\UI0Detect.exe
10:02:14.0267 0x0c9c  UI0Detect - ok
10:02:14.0287 0x0c9c  [ 4BFE1BC28391222894CBF1E7D0E42320, 5918B1ED2030600DF77BDACF1C808DF6EADDD8BF3E7003AF1D72050D8B102B3A ] uliagpkx        C:\windows\system32\drivers\uliagpkx.sys
10:02:14.0297 0x0c9c  uliagpkx - ok
10:02:14.0357 0x0c9c  [ DC54A574663A895C8763AF0FA1FF7561, 09A3F3597E91CBEB2F38E96E75134312B60CAE5574B2AD4606C2D3E992AEDDFE ] umbus           C:\windows\system32\DRIVERS\umbus.sys
10:02:14.0387 0x0c9c  umbus - ok
10:02:14.0467 0x0c9c  [ B2E8E8CB557B156DA5493BBDDCC1474D, F547509A08C0679ACB843E20C9C0CF51BED1B06530BBC529DFB0944504564A43 ] UmPass          C:\windows\system32\drivers\umpass.sys
10:02:14.0497 0x0c9c  UmPass - ok
10:02:14.0547 0x0c9c  [ D47EC6A8E81633DD18D2436B19BAF6DE, 0FB461E2D5E0B75BB5958F6362F4880BFA4C36AD930542609BCAF574941AA7AE ] upnphost        C:\windows\System32\upnphost.dll
10:02:14.0607 0x0c9c  upnphost - ok
10:02:14.0677 0x0c9c  [ C9E9D59C0099A9FF51697E9306A44240, 78D9A7A5E5742962B6978F475BF06CB32262F1D214699D3D40538476A58012A1 ] USBAAPL64       C:\windows\system32\Drivers\usbaapl64.sys
10:02:14.0687 0x0c9c  USBAAPL64 - ok
10:02:14.0817 0x0c9c  [ DCA68B0943D6FA415F0C56C92158A83A, BEE5A5B33B22D1DF50B884D46D89FC3B8286EB16E38AD5A20F0A49E5C6766C57 ] usbccgp         C:\windows\system32\DRIVERS\usbccgp.sys
10:02:14.0837 0x0c9c  usbccgp - ok
10:02:14.0957 0x0c9c  [ 80B0F7D5CCF86CEB5D402EAAF61FEC31, 140C62116A425DEAD25FE8D82DE283BC92C482A9F643658D512F9F67061F28AD ] usbcir          C:\windows\system32\drivers\usbcir.sys
10:02:15.0007 0x0c9c  usbcir - ok
10:02:15.0037 0x0c9c  [ 18A85013A3E0F7E1755365D287443965, 811C5EDF38C765BCF71BCE25CB6626FF6988C3699F5EF1846240EA0052F34C33 ] usbehci         C:\windows\system32\drivers\usbehci.sys
10:02:15.0087 0x0c9c  usbehci - ok
10:02:15.0277 0x0c9c  [ 8D1196CFBB223621F2C67D45710F25BA, B5D7AFE51833B24FC9576F3AED3D8A2B290E5846060E73F9FFFAC1890A8B6003 ] usbhub          C:\windows\system32\DRIVERS\usbhub.sys
10:02:15.0307 0x0c9c  usbhub - ok
10:02:15.0357 0x0c9c  [ 765A92D428A8DB88B960DA5A8D6089DC, 56DE8A2ED58E53B202C399CA7BACB1551136303C2EE0AB426BDBBF880E3C542C ] usbohci         C:\windows\system32\drivers\usbohci.sys
10:02:15.0387 0x0c9c  usbohci - ok
10:02:15.0557 0x0c9c  [ 73188F58FB384E75C4063D29413CEE3D, B485463933306036B1D490722CB1674DC85670753D79FA0EF7EBCA7BBAAD9F7C ] usbprint        C:\windows\system32\DRIVERS\usbprint.sys
10:02:15.0587 0x0c9c  usbprint - ok
10:02:15.0667 0x0c9c  [ 9661DA76B4531B2DA272ECCE25A8AF24, FEA93254A21E71A7EB8AD35FCCAD2C1E41F7329EC33B1734F5B41307A34D8637 ] usbscan         C:\windows\system32\drivers\usbscan.sys
10:02:15.0687 0x0c9c  usbscan - ok
10:02:15.0807 0x0c9c  [ FED648B01349A3C8395A5169DB5FB7D6, DC4D7594C24ADD076927B9347F1B50B91CF03A4ABDB284248D5711D9C19DEB96 ] USBSTOR         C:\windows\system32\DRIVERS\USBSTOR.SYS
10:02:15.0867 0x0c9c  USBSTOR - ok
10:02:15.0917 0x0c9c  [ DD253AFC3BC6CBA412342DE60C3647F3, 146F8613F1057AC054DC3593E84BC52899DA27EA33B0E72ACFB78C3699ADCDE7 ] usbuhci         C:\windows\system32\drivers\usbuhci.sys
10:02:15.0957 0x0c9c  usbuhci - ok
10:02:16.0067 0x0c9c  [ 1F775DA4CF1A3A1834207E975A72E9D7, 6D3DE5BD3EF3A76E997E5BAF900C51D25308F5A9682D1F62017F577A24095B90 ] usbvideo        C:\windows\System32\Drivers\usbvideo.sys
10:02:16.0207 0x0c9c  usbvideo - ok
10:02:16.0257 0x0c9c  [ EDBB23CBCF2CDF727D64FF9B51A6070E, 7202484C8E1BFB2AFD64D8C81668F3EDE0E3BF5EB27572877A0A7B337AE5AE42 ] UxSms           C:\windows\System32\uxsms.dll
10:02:16.0367 0x0c9c  UxSms - ok
10:02:16.0387 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] VaultSvc        C:\windows\system32\lsass.exe
10:02:16.0417 0x0c9c  VaultSvc - ok
10:02:16.0467 0x0c9c  [ C5C876CCFC083FF3B128F933823E87BD, 6FE0FBB6C3207E09300E0789E2168F76668D87C317FE9F263E733827ADCFBE0D ] vdrvroot        C:\windows\system32\drivers\vdrvroot.sys
10:02:16.0527 0x0c9c  vdrvroot - ok
10:02:16.0637 0x0c9c  [ 8D6B481601D01A456E75C3210F1830BE, A2CEF483F4231367138EEF7E67FD5BE5364FC0780C44CA1368E36CE4AA3D0633 ] vds             C:\windows\System32\vds.exe
10:02:16.0877 0x0c9c  vds - ok
10:02:17.0087 0x0c9c  [ DA4DA3F5E02943C2DC8C6ED875DE68DD, EDE604536DB78C512D68C92B26DA77C8811AC109D1F0A473673F0A82D15A2838 ] vga             C:\windows\system32\DRIVERS\vgapnp.sys
10:02:17.0167 0x0c9c  vga - ok
10:02:17.0257 0x0c9c  [ 53E92A310193CB3C03BEA963DE7D9CFC, 45898604375B42EB1246C17A22D91C2440F11C746FF6459AD38027C1BC2E3125 ] VgaSave         C:\windows\System32\drivers\vga.sys
10:02:17.0427 0x0c9c  VgaSave - ok
10:02:17.0547 0x0c9c  [ 2CE2DF28C83AEAF30084E1B1EB253CBB, D1946816A1CB89F825CBEA58F94A4C9D0CE7249355CD3915563F54054EE564BF ] vhdmp           C:\windows\system32\drivers\vhdmp.sys
10:02:17.0827 0x0c9c  vhdmp - ok
10:02:17.0897 0x0c9c  [ E5689D93FFE4E5D66C0178761240DD54, 6D35CED80681B12AAF63BFA0DA1C386E71D3838839B68A686990AA8031949D27 ] viaide          C:\windows\system32\drivers\viaide.sys
10:02:18.0497 0x0c9c  viaide - ok
10:02:18.0617 0x0c9c  [ D2AAFD421940F640B407AEFAAEBD91B0, 31EF342A60AF04F4108759A71F8FB7B8C8819216CF3D16A95B2BA0E33A8A9161 ] volmgr          C:\windows\system32\drivers\volmgr.sys
10:02:19.0187 0x0c9c  volmgr - ok
10:02:19.0627 0x0c9c  [ A255814907C89BE58B79EF2F189B843B, 463DB771851352185B6AC323BD93B9084D47291E53C1F7B628B65D6918B2E28F ] volmgrx         C:\windows\system32\drivers\volmgrx.sys
10:02:19.0727 0x0c9c  volmgrx - ok
10:02:19.0767 0x0c9c  [ DF8126BD41180351A093A3AD2FC8903B, AEFF4AA89CDDAAAD43CDE17C6B6EB2A397A0AC1651CBD51B889161EC2BC6527A ] volsnap         C:\windows\system32\drivers\volsnap.sys
10:02:19.0807 0x0c9c  volsnap - ok
10:02:20.0327 0x0c9c  [ 239D8D72730226CD460BDC8CA0A23D43, B38AE7D21C227DA55A1E8FAAA7383F2DB45BD80206A4BAC9FCF76727480150ED ] Vsdatant        C:\windows\system32\DRIVERS\vsdatant.sys
10:02:20.0367 0x0c9c  Vsdatant - ok
10:02:21.0058 0x0c9c  vsmon - ok
10:02:21.0108 0x0c9c  [ 5E2016EA6EBACA03C04FEAC5F330D997, 53106EB877459FE55A459111F7AB0EE320BB3B4C954D3DB6FA1642396001F2AC ] vsmraid         C:\windows\system32\drivers\vsmraid.sys
10:02:21.0148 0x0c9c  vsmraid - ok
10:02:21.0889 0x0c9c  [ B60BA0BC31B0CB414593E169F6F21CC2, 47B801E623254CF0202B3591CB5C019CABFB52F123C7D47E29D19B32F1F2B915 ] VSS             C:\windows\system32\vssvc.exe
10:02:22.0039 0x0c9c  VSS - ok
10:02:22.0069 0x0c9c  [ 36D4720B72B5C5D9CB2B9C29E9DF67A1, 3254523C85C70EBA2DBAC05DB2DBA89EDF8E9195F390F7C21F96458FB6B2E3D7 ] vwifibus        C:\windows\system32\DRIVERS\vwifibus.sys
10:02:22.0149 0x0c9c  vwifibus - ok
10:02:22.0199 0x0c9c  [ 6A3D66263414FF0D6FA754C646612F3F, 30F6BA594B0D3B94113064015A16D97811CD989DF1715CCE21CEAB9894C1B4FB ] vwififlt        C:\windows\system32\DRIVERS\vwififlt.sys
10:02:22.0289 0x0c9c  vwififlt - ok
10:02:22.0349 0x0c9c  [ 6A638FC4BFDDC4D9B186C28C91BD1A01, 5521F1DC515586777EC4837E0AEAA3E613CC178AF1074031C4D0D0C695A93168 ] vwifimp         C:\windows\system32\DRIVERS\vwifimp.sys
10:02:22.0389 0x0c9c  vwifimp - ok
10:02:22.0459 0x0c9c  [ 1C9D80CC3849B3788048078C26486E1A, 34A89F31E53F6B6C209B286F580CC2257AE6D057E4E20741F241C9C167947962 ] W32Time         C:\windows\system32\w32time.dll
10:02:22.0559 0x0c9c  W32Time - ok
10:02:22.0819 0x0c9c  [ 4E9440F4F152A7B944CB1663D3935A3E, 8FE04EBD3BC612EE943A21A3E56F37E5C9B578CDACA6044048181DAD81816D53 ] WacomPen        C:\windows\system32\drivers\wacompen.sys
10:02:22.0899 0x0c9c  WacomPen - ok
10:02:23.0039 0x0c9c  [ 356AFD78A6ED4457169241AC3965230C, CE4D1EE3525C10AC658B20776C3E444DE44874C837713DC5311386EDFCB18399 ] WANARP          C:\windows\system32\DRIVERS\wanarp.sys
10:02:23.0129 0x0c9c  WANARP - ok
10:02:23.0139 0x0c9c  [ 356AFD78A6ED4457169241AC3965230C, CE4D1EE3525C10AC658B20776C3E444DE44874C837713DC5311386EDFCB18399 ] Wanarpv6        C:\windows\system32\DRIVERS\wanarp.sys
10:02:23.0199 0x0c9c  Wanarpv6 - ok
10:02:23.0409 0x0c9c  [ 78F4E7F5C56CB9716238EB57DA4B6A75, 46A4E78CE5F2A4B26F4E9C3FF04A99D9B727A82AC2E390A82A1611C3F6E0C9AF ] wbengine        C:\windows\system32\wbengine.exe
10:02:23.0679 0x0c9c  wbengine - ok
10:02:23.0769 0x0c9c  [ 3AA101E8EDAB2DB4131333F4325C76A3, 4F7BD3DA5E58B18BFF106CFF7B45E75FD13EE556D433C695BA23EC80827E49DE ] WbioSrvc        C:\windows\System32\wbiosrvc.dll
10:02:23.0969 0x0c9c  WbioSrvc - ok
10:02:23.0989 0x0c9c  [ 7368A2AFD46E5A4481D1DE9D14848EDD, 8039C478FC2D9F095F5883A4FA47F9E6EDF57CC88A4AA74F07C88445F90DED57 ] wcncsvc         C:\windows\System32\wcncsvc.dll
10:02:24.0029 0x0c9c  wcncsvc - ok
10:02:24.0119 0x0c9c  [ 20F7441334B18CEE52027661DF4A6129, 7B8E0247234B740FED2BE9B833E9CE8DD7453340123AB43F6B495A7E6A27B0DD ] WcsPlugInService C:\windows\System32\WcsPlugInService.dll
10:02:24.0239 0x0c9c  WcsPlugInService - ok
10:02:24.0489 0x0c9c  [ 72889E16FF12BA0F235467D6091B17DC, F2FD0BBD075E33608D93F350D216F97442AB89ABD540513C2D568C78096E12A8 ] Wd              C:\windows\system32\drivers\wd.sys
10:02:24.0519 0x0c9c  Wd - ok
10:02:24.0819 0x0c9c  [ E2C933EDBC389386EBE6D2BA953F43D8, AF1DEADD5F1267CCEBD226E8EEB971D1946EA6A5A9645A36F5D111F758AF2F07 ] Wdf01000        C:\windows\system32\drivers\Wdf01000.sys
10:02:24.0899 0x0c9c  Wdf01000 - ok
10:02:24.0969 0x0c9c  [ BF1FC3F79B863C914687A737C2F3D681, B2DF47AC4931ACFB243775767B77065CC0D98778FC0243C793A3E219EB961209 ] WdiServiceHost  C:\windows\system32\wdi.dll
10:02:25.0029 0x0c9c  WdiServiceHost - ok
10:02:25.0039 0x0c9c  [ BF1FC3F79B863C914687A737C2F3D681, B2DF47AC4931ACFB243775767B77065CC0D98778FC0243C793A3E219EB961209 ] WdiSystemHost   C:\windows\system32\wdi.dll
10:02:25.0089 0x0c9c  WdiSystemHost - ok
10:02:25.0189 0x0c9c  [ 0EB0E5D22B1760F2DBCE632F2DD7A54D, B8A4CC62F88768947FB0A161CF9564DB28FD9C1C037B5475DF192982DE035C22 ] WebClient       C:\windows\System32\webclnt.dll
10:02:25.0299 0x0c9c  WebClient - ok
10:02:25.0349 0x0c9c  [ C749025A679C5103E575E3B48E092C43, B71171D07EE7AB085A24BF3A1072FF2CE7EA021AAE695F6A90640E6EE8EB55C1 ] Wecsvc          C:\windows\system32\wecsvc.dll
10:02:25.0511 0x0c9c  Wecsvc - ok
10:02:25.0581 0x0c9c  [ 7E591867422DC788B9E5BD337A669A08, 484E6BCCDF7ADCE9A1AACAD1BC7C7D7694B9E40FA90D94B14D80C607784F6C75 ] wercplsupport   C:\windows\System32\wercplsupport.dll
10:02:25.0682 0x0c9c  wercplsupport - ok
10:02:25.0752 0x0c9c  [ 6D137963730144698CBD10F202E9F251, A9F522A125158D94F540544CCD4DBF47B9DCE2EA878C33675AFE40F80E8F4979 ] WerSvc          C:\windows\System32\WerSvc.dll
10:02:25.0862 0x0c9c  WerSvc - ok
10:02:25.0922 0x0c9c  [ 611B23304BF067451A9FDEE01FBDD725, 0AF2734B978165FC6FD22B64862132CCE32528A21C698A49D176129446E099C8 ] WfpLwf          C:\windows\system32\DRIVERS\wfplwf.sys
10:02:26.0012 0x0c9c  WfpLwf - ok
10:02:26.0032 0x0c9c  [ 05ECAEC3E4529A7153B3136CEB49F0EC, 9995CB2CEC70A633EA33CBB0DEAD2BB28CB67132B41E9444BDAB9E75744C9A50 ] WIMMount        C:\windows\system32\drivers\wimmount.sys
10:02:26.0062 0x0c9c  WIMMount - ok
10:02:26.0142 0x0c9c  WinDefend - ok
10:02:26.0162 0x0c9c  WinHttpAutoProxySvc - ok
10:02:26.0282 0x0c9c  [ 19B07E7E8915D701225DA41CB3877306, D6555E8D276DBB11358246E0FE215F76F1FB358791C76B88D82C2A66A42DA19F ] Winmgmt         C:\windows\system32\wbem\WMIsvc.dll
10:02:26.0372 0x0c9c  Winmgmt - ok
10:02:26.0762 0x0c9c  [ BCB1310604AA415C4508708975B3931E, 9D943F086D454345153A0DD426B4432532A44FD87950386B186E1CAD2AC70565 ] WinRM           C:\windows\system32\WsmSvc.dll
10:02:27.0002 0x0c9c  WinRM - ok
10:02:27.0122 0x0c9c  [ FE88B288356E7B47B74B13372ADD906D, A16B166F6BB32EF9D2A142F27B9EC54CBC7B3AC915799783CF4C40E525BC9E03 ] WinUsb          C:\windows\system32\DRIVERS\WinUsb.sys
10:02:27.0212 0x0c9c  WinUsb - ok
10:02:27.0272 0x0c9c  [ 4FADA86E62F18A1B2F42BA18AE24E6AA, CE1683386886BF34862681A46199EA7E7FB4232A186047DA7FBD8EC240AF6726 ] Wlansvc         C:\windows\System32\wlansvc.dll
10:02:27.0382 0x0c9c  Wlansvc - ok
10:02:27.0482 0x0c9c  [ 06C8FA1CF39DE6A735B54D906BA791C6, D8FEC7DE227781CDA876904701B2AA995268F74DCD6CB34AA0296C557FC283B6 ] wlcrasvc        C:\Program Files\Windows Live\Mesh\wlcrasvc.exe
10:02:27.0502 0x0c9c  wlcrasvc - ok
10:02:28.0132 0x0c9c  [ 2BACD71123F42CEA603F4E205E1AE337, 1FEF20554110371D738F462ECFFA999158EFEED02062414C58C1B61C422BF0B9 ] wlidsvc         C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
10:02:28.0232 0x0c9c  wlidsvc - ok
10:02:28.0272 0x0c9c  [ F6FF8944478594D0E414D3F048F0D778, 6F75E0AE6127B33A92A88E59D4B048FD4C15F997807BE7BF0EFE76F95235B1D9 ] WmiAcpi         C:\windows\system32\drivers\wmiacpi.sys
10:02:28.0302 0x0c9c  WmiAcpi - ok
10:02:28.0352 0x0c9c  [ 38B84C94C5A8AF291ADFEA478AE54F93, 1AC267AC73670BEA5F3785C9AD9DB146F8E993A862C843742B21FDB90D102B2A ] wmiApSrv        C:\windows\system32\wbem\WmiApSrv.exe
10:02:28.0422 0x0c9c  wmiApSrv - ok
10:02:28.0552 0x0c9c  WMPNetworkSvc - ok
10:02:28.0632 0x0c9c  [ 96C6E7100D724C69FCF9E7BF590D1DCA, 2E63C9B0893B4FC03B7A71BAEA6202D3D3DB1B52F3643467829B5A573FD7655B ] WPCSvc          C:\windows\System32\wpcsvc.dll
10:02:28.0662 0x0c9c  WPCSvc - ok
10:02:28.0762 0x0c9c  [ 93221146D4EBBF314C29B23CD6CC391D, C0750858A65BF51E210CD244C825C121D67E025CD2D2455139991AAC289A90FE ] WPDBusEnum      C:\windows\system32\wpdbusenum.dll
10:02:28.0802 0x0c9c  WPDBusEnum - ok
10:02:28.0942 0x0c9c  [ 6BCC1D7D2FD2453957C5479A32364E52, E48554D31FBDCF8F985C1C72524CAA9106F5B7CC2B79064F8F5E2562D517F090 ] ws2ifsl         C:\windows\system32\drivers\ws2ifsl.sys
10:02:29.0032 0x0c9c  ws2ifsl - ok
10:02:29.0252 0x0c9c  [ E8B1FE6669397D1772D8196DF0E57A9E, 39FE0819360719F756BD31A1884A0508A1E2371ACC723E25E005CBEC0A7B02FA ] wscsvc          C:\windows\System32\wscsvc.dll
10:02:29.0282 0x0c9c  wscsvc - ok
10:02:29.0292 0x0c9c  WSearch - ok
10:02:29.0983 0x0c9c  [ 61FF576450CCC80564B850BC3FB6713A, B2843BC9E2F62D27DCF6787D063378926748CE75002BADA1873DCB5039883705 ] wuauserv        C:\windows\system32\wuaueng.dll
10:02:30.0063 0x0c9c  wuauserv - ok
10:02:30.0243 0x0c9c  [ AB886378EEB55C6C75B4F2D14B6C869F, D6C4602EB8F291DADEDF3CD211013D4AC752DDE7E799C2D8D74AA4F5477CAED6 ] WudfPf          C:\windows\system32\drivers\WudfPf.sys
10:02:30.0363 0x0c9c  WudfPf - ok
10:02:30.0473 0x0c9c  [ DDA4CAF29D8C0A297F886BFE561E6659, 94E5DD649B5D86FA1A7C7D30FCF9644D0EE048D312E626111458ADF66BFBE978 ] WUDFRd          C:\windows\system32\DRIVERS\WUDFRd.sys
10:02:30.0533 0x0c9c  WUDFRd - ok
10:02:30.0603 0x0c9c  [ B20F051B03A966392364C83F009F7D17, 88ECEB55AE91F58F592B96EBC10B572747D5A2F9B7629E8F371761E4F7408A65 ] wudfsvc         C:\windows\System32\WUDFSvc.dll
10:02:30.0763 0x0c9c  wudfsvc - ok
10:02:30.0873 0x0c9c  [ 04F82965C09CBDF646B487E145060301, 2CD8533EDBE24C3E42EB7550E20F8A2EB9E5E345B165DEF543163A6BC1FDD18B ] WwanSvc         C:\windows\System32\wwansvc.dll
10:02:30.0933 0x0c9c  WwanSvc - ok
10:02:31.0043 0x0c9c  ================ Scan global ===============================
10:02:31.0233 0x0c9c  [ BA0CD8C393E8C9F83354106093832C7B, 18D8A4780A2BAA6CEF7FBBBDA0EF6BF2DADF146E1E578A618DD5859E8ADBF1A8 ] C:\windows\system32\basesrv.dll
10:02:31.0413 0x0c9c  [ 88EDD0B34EED542745931E581AD21A32, DC2B93E1CEF5B0BCEE08D72669BB0F3AD0E8E6E75BDC08858407ED92F6FFA031 ] C:\windows\system32\winsrv.dll
10:02:31.0433 0x0c9c  [ 88EDD0B34EED542745931E581AD21A32, DC2B93E1CEF5B0BCEE08D72669BB0F3AD0E8E6E75BDC08858407ED92F6FFA031 ] C:\windows\system32\winsrv.dll
10:02:31.0483 0x0c9c  [ D6160F9D869BA3AF0B787F971DB56368, 0033E6212DD8683E4EE611B290931FDB227B4795F0B17C309DC686C696790529 ] C:\windows\system32\sxssrv.dll
10:02:31.0663 0x0c9c  [ 24ACB7E5BE595468E3B9AA488B9B4FCB, 63541E3432FCE953F266AE553E7A394978D6EE3DB52388D885F668CF42C5E7E2 ] C:\windows\system32\services.exe
10:02:31.0683 0x0c9c  [ Global ] - ok
10:02:31.0683 0x0c9c  ================ Scan MBR ==================================
10:02:31.0693 0x0c9c  [ 5B5E648D12FCADC244C1EC30318E1EB9 ] \Device\Harddisk0\DR0
10:02:32.0933 0x0c9c  \Device\Harddisk0\DR0 - ok
10:02:32.0943 0x0c9c  ================ Scan VBR ==================================
10:02:32.0973 0x0c9c  [ AB309C756438CF022017234B4B204DCB ] \Device\Harddisk0\DR0\Partition1
10:02:32.0973 0x0c9c  \Device\Harddisk0\DR0\Partition1 - ok
10:02:32.0973 0x0c9c  ================ Scan generic autorun ======================
10:02:33.0203 0x0c9c  [ 048EA4B978851788E9F5E8E4F081DF7A, EB62719AC0DCC18FF056F2CD84438BF14B61E38F0619617C81961C6257BDFCEC ] C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
10:02:33.0263 0x0c9c  Adobe ARM - ok
10:02:33.0593 0x0c9c  [ C70ACA307E929DE43F0B55BD9B8EA55B, F4817B9F5180B7052198DB7A73EDD5D3D19C7AF01C6E6A9BF093E162C9EA44B9 ] C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe
10:02:33.0683 0x0c9c  NBAgent - ok
10:02:34.0043 0x0c9c  [ 1B6E310EA9D99D340D00D7954F42E1E4, 123B77ED9A42F84B6F621C5835E20E9458C6A4BEFFE30B1B000E17EE283B640A ] C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe
10:02:34.0073 0x0c9c  StartCCC - ok
10:02:34.0143 0x0c9c  [ C8AEBDDAAD605E68DBCCD41CD58FC841, 97243EB73BD358D23E74AEEA8998A45B2DF23637282E892D39FDA0EFCB2EFB69 ] C:\Program Files (x86)\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe
10:02:34.0183 0x0c9c  ITSecMng - ok
10:02:34.0393 0x0c9c  [ 6364FA7D825B600251A4D1DE7D6FF695, 1BEDD2E9DCE4C50FE7FE644D5DDD447DF79975D666CE128F945DD776E46AFC60 ] C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
10:02:34.0433 0x0c9c  USB3MON - ok
10:02:34.0774 0x0c9c  [ 1705B6E6E1D883965F32C7D3B8E78CE6, 8C7208DB10158087FD6CFA3AB439AE4C403BE3FF7689CAB79C4ED5C7A44A65C2 ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe
10:02:34.0904 0x0c9c  ToshibaServiceStation - ok
10:02:34.0984 0x0c9c  [ 4169FFB6158D630463DBE8FAA1BFEAE3, C8F36FB1C7E10D8A294A8015E5A1E275D76A11D01BF5DF4A6F26EB1377801AD7 ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe
10:02:35.0024 0x0c9c  TSleepSrv - ok
10:02:35.0054 0x0c9c  [ A7AAA3E9E6C195378C8372EAC520D5D3, B17EAD050ADD37BA612FF2A35231015F760E621C7E0EF8A4240638C751454819 ] C:\Program Files (x86)\CheckPoint\ZoneAlarm\zatray.exe
10:02:35.0084 0x0c9c  ZoneAlarm - ok
10:02:35.0364 0x0c9c  [ 187F4C75A89E3F412322C94526320074, D78FA7EF93C8C7B4326A5B6DB04A92ADD091DF00658FA8731D07C5D3BE29ED04 ] C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
10:02:35.0394 0x0c9c  BCSSync - ok
10:02:35.0604 0x0c9c  [ 94A4D6915D4F572309DF6137E1846528, E46BDF83CAA6683AA655DBA3D2C8DC7AC06251E952466A20CFDA3A16B1840455 ] C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe
10:02:35.0624 0x0c9c  APSDaemon - ok
10:02:36.0234 0x0c9c  [ D2E3E6D94A9E1CFA1561D9C748136FD0, C8CD851F1872086D18A329B47C7DEFAD2CE2E3A8F4321411247D06D07B2DB1D3 ] C:\Users\Melanie\Music\iTunes\iTunesHelper.exe
10:02:36.0264 0x0c9c  iTunesHelper - ok
10:02:36.0694 0x0c9c  [ 382BBC7FE9D818B94FE5A8BAA7F4577E, DD27EC2CCA5048C49CD17D5B3EA79EFE7D4158CD3ADEC9A5FAC253D7B529AA41 ] C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe
10:02:36.0734 0x0c9c  avgnt - ok
10:02:37.0074 0x0c9c  [ 5909C378DF9132FC91F50AF70A53455A, E13CE76ABAFA459BFDB4B7806E73BF57217D0800206FC24805E66573F3670604 ] C:\Program Files (x86)\Avira\My Avira\Avira.OE.Systray.exe
10:02:37.0104 0x0c9c  Avira Systray - ok
10:02:37.0404 0x0c9c  [ DCCA4B04AF87E52EF9EAA2190E06CBAC, 8858CFD159BB32AE9FCCA1A79EA83C876D481A286E914071D48F42FCA5B343D8 ] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe
10:02:37.0554 0x0c9c  Sidebar - ok
10:02:37.0724 0x0c9c  [ 446E4DE3F5C4FD2A3956DCEDF82DEEC9, 6D628699551000C785B5BC399021D5A4E27235D4B57A1FBB8DE47E577A0F6B5D ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe
10:02:37.0771 0x0c9c  TOPI.EXE - ok
10:02:37.0921 0x0c9c  [ 0FA760BF380B08D0B67B5507CD8B32AA, 0F73A7F64C4FDAB98CD3A865CC54B3A7195761530FCB115B725CC5A9FB738739 ] C:\Windows\System32\mctadmin.exe
10:02:37.0991 0x0c9c  mctadmin - ok
10:02:38.0081 0x0c9c  [ DCCA4B04AF87E52EF9EAA2190E06CBAC, 8858CFD159BB32AE9FCCA1A79EA83C876D481A286E914071D48F42FCA5B343D8 ] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe
10:02:38.0161 0x0c9c  Sidebar - ok
10:02:38.0421 0x0c9c  [ 446E4DE3F5C4FD2A3956DCEDF82DEEC9, 6D628699551000C785B5BC399021D5A4E27235D4B57A1FBB8DE47E577A0F6B5D ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe
10:02:38.0481 0x0c9c  TOPI.EXE - ok
10:02:38.0511 0x0c9c  [ 0FA760BF380B08D0B67B5507CD8B32AA, 0F73A7F64C4FDAB98CD3A865CC54B3A7195761530FCB115B725CC5A9FB738739 ] C:\Windows\System32\mctadmin.exe
10:02:38.0551 0x0c9c  mctadmin - ok
10:02:38.0731 0x0c9c  [ 446E4DE3F5C4FD2A3956DCEDF82DEEC9, 6D628699551000C785B5BC399021D5A4E27235D4B57A1FBB8DE47E577A0F6B5D ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe
10:02:38.0781 0x0c9c  TOPI.EXE - ok
10:02:38.0931 0x0c9c  [ 5D61BE7DB55B026A5D61A3EED09D0EAD, D32CC7B31A6F98C60ABC313ABC7D1143681F72DE2BB2604711A0BA20710CAAAE ] C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
10:02:38.0961 0x0c9c  swg - ok
10:02:39.0201 0x0c9c  [ E3BF29CED96790CDAAFA981FFDDF53A3, 76CB27EF7B27E5636EDA9D95229519B2A2870729A0BB694F1FD11CD602BAC4DC ] C:\Program Files\Windows Sidebar\sidebar.exe
10:02:39.0301 0x0c9c  Sidebar - ok
10:02:39.0311 0x0c9c  Waiting for KSN requests completion. In queue: 210
10:02:40.0311 0x0c9c  Waiting for KSN requests completion. In queue: 210
10:02:41.0311 0x0c9c  Waiting for KSN requests completion. In queue: 210
10:02:42.0381 0x0c9c  AV detected via SS2: ZoneAlarm Antivirus, C:\Program Files (x86)\CheckPoint\ZoneAlarm\\MultiFix.exe ( 10.2.57.0 ), 0x41000 ( enabled : updated )
10:02:42.0471 0x0c9c  AV detected via SS2: Avira Desktop, C:\Program Files (x86)\Avira\AntiVir Desktop\wsctool.exe ( 12.3.0.15 ), 0x41010 ( enabled : outofdate )
10:02:42.0471 0x0c9c  FW detected via SS2: ZoneAlarm Firewall, C:\Program Files (x86)\CheckPoint\ZoneAlarm\\MultiFix.exe ( 10.2.57.0 ), 0x41010 ( enabled )
10:02:44.0893 0x0c9c  ============================================================
10:02:44.0893 0x0c9c  Scan finished
10:02:44.0893 0x0c9c  ============================================================
10:02:44.0903 0x1144  Detected object count: 0
10:02:44.0903 0x1144  Actual detected object count: 0
         
__________________

Alt 16.11.2014, 11:18   #4
M-K-D-B
/// TB-Ausbilder
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Servus,


das ist schon mal gut...




Scan mit Combofix
WARNUNG an die MITLESER:
Combofix sollte ausschließlich ausgeführt werden, wenn dies von einem Teammitglied angewiesen wurde!

Downloade dir bitte Combofix vom folgenden Downloadspiegel: Link
  • WICHTIG: Speichere Combofix auf deinem Desktop.
  • Deaktiviere bitte alle deine Antivirensoftware sowie Malware/Spyware Scanner. Diese können Combofix bei der Arbeit stören. Combofix meckert auch manchmal trotzdem noch, das kannst du dann ignorieren, mir aber bitte mitteilen.
  • Starte die Combofix.exe und folge den Anweisungen auf dem Bildschirm.
  • Während Combofix läuft bitte nicht am Computer arbeiten, die Maus bewegen oder ins Combofixfenster klicken!
  • Wenn Combofix fertig ist, wird es ein Logfile erstellen.
  • Bitte poste die C:\Combofix.txt in deiner nächsten Antwort (möglichst in CODE-Tags).
Hinweis: Solltest du nach dem Neustart folgende Fehlermeldung erhalten
Es wurde versucht, einen Registrierungsschlüssel einem ungültigen Vorgang zu unterziehen, der zum Löschen markiert wurde.
starte den Rechner einfach neu. Dies sollte das Problem beheben.


Alt 16.11.2014, 17:47   #5
Melanie3107
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



So, nachdem Combofix ca. 2,5h gelaufen ist, hier die Log-Datei.
Code:
ATTFilter
ComboFix 14-11-15.01 - Melanie 16.11.2014  15:56:48.1.4 - x64
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.49.1031.18.8155.5108 [GMT 1:00]
ausgeführt von:: c:\users\Melanie\Desktop\ComboFix.exe
AV: Avira Desktop *Disabled/Outdated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
AV: ZoneAlarm Antivirus *Disabled/Updated* {DE038A5B-9EDD-18A9-2361-FF7D98D43730}
FW: ZoneAlarm Firewall *Disabled* {E6380B7E-D4B2-19F1-083E-56486607704B}
SP: Avira Desktop *Disabled/Outdated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: ZoneAlarm Anti-Spyware *Disabled/Updated* {65626BBF-B8E7-1727-19D1-C40FE3537D8D}
.
.
((((((((((((((((((((((((((((((((((((   Weitere Löschungen   ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
C:\install.exe
c:\users\Melanie\AppData\Local\Temp\IswTmp\WH\0
.
.
(((((((((((((((((((((((   Dateien erstellt von 2014-10-16 bis 2014-11-16  ))))))))))))))))))))))))))))))
.
.
2014-11-16 17:29 . 2014-11-16 17:29	--------	d-----w-	c:\users\Default\AppData\Local\temp
2014-11-16 17:29 . 2014-11-16 17:29	--------	d-----w-	C:\a3b8f0c12346eba325124f0f
2014-11-15 12:52 . 2014-10-20 01:37	11627712	----a-w-	c:\programdata\Microsoft\Windows Defender\Definition Updates\{07B84924-26C5-42ED-9047-CE717B7F3D36}\mpengine.dll
2014-11-15 12:28 . 2014-11-15 12:28	3231832	----a-w-	c:\program files (x86)\Mozilla Firefox\d3dcompiler_46.dll
2014-11-15 12:28 . 2014-11-15 12:28	220784	----a-w-	c:\program files (x86)\Mozilla Firefox\sandboxbroker.dll
2014-11-11 20:10 . 2014-11-12 17:16	--------	d-----w-	C:\FRST
2014-10-19 15:53 . 2014-11-16 14:29	129752	----a-w-	c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-10-19 15:41 . 2014-10-01 10:11	63704	----a-w-	c:\windows\system32\drivers\mwac.sys
2014-10-19 15:41 . 2014-10-01 10:11	93400	----a-w-	c:\windows\system32\drivers\mbamchameleon.sys
2014-10-19 15:41 . 2014-10-01 10:11	25816	----a-w-	c:\windows\system32\drivers\mbam.sys
2014-10-19 15:41 . 2014-11-09 11:11	--------	d-----w-	c:\program files (x86)\ Malwarebytes Anti-Malware 
.
.
.
((((((((((((((((((((((((((((((((((((   Find3M Bericht   ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-11-16 08:53 . 2012-03-07 00:05	71344	----a-w-	c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2014-11-16 08:53 . 2012-03-07 00:05	701104	----a-w-	c:\windows\SysWow64\FlashPlayerApp.exe
2014-11-04 13:30 . 2010-11-21 03:27	275080	------w-	c:\windows\system32\MpSigStub.exe
2014-10-31 22:26 . 2012-06-23 11:31	103374192	----a-w-	c:\windows\system32\MRT.exe
2014-09-07 07:55 . 2011-03-28 17:36	23256	----a-w-	c:\programdata\Microsoft\IdentityCRL\production\ppcrlconfig600.dll
.
.
((((((((((((((((((((((((((((   Autostartpunkte der Registrierung   ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt. 
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOPI.EXE"="c:\program files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe" [2011-05-16 846936]
"swg"="c:\program files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2012-03-07 39408]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2010-11-21 1475584]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-11-21 959904]
"NBAgent"="c:\program files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe" [2011-11-18 1492264]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2012-01-20 343168]
"ITSecMng"="c:\program files (x86)\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe" [2011-04-02 80840]
"USB3MON"="c:\program files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe" [2012-01-05 291608]
"ToshibaServiceStation"="c:\program files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe" [2011-07-12 1298816]
"ZoneAlarm"="c:\program files (x86)\CheckPoint\ZoneAlarm\zatray.exe" [2012-06-01 73392]
"BCSSync"="c:\program files (x86)\Microsoft Office\Office14\BCSSync.exe" [2012-11-05 89184]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2014-02-12 43848]
"iTunesHelper"="c:\users\Melanie\Music\iTunes\iTunesHelper.exe" [2014-05-26 152392]
"avgnt"="c:\program files (x86)\Avira\AntiVir Desktop\avgnt.exe" [2012-05-01 348624]
"Avira Systray"="c:\program files (x86)\Avira\My Avira\Avira.OE.Systray.exe" [2014-10-22 124208]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"TOPI.EXE"="c:\program files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe" [2011-05-16 846936]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Toshiba Places Icon Utility.lnk - c:\program files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIMonitor.exe [2012-3-7 1492352]
.
c:\users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
TRDCReminder.lnk - c:\program files (x86)\TOSHIBA\TRDCReminder\TRDCReminder.exe [2009-9-1 481184]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"EnableLinkedConnections"= 1 (0x1)
.
R2 Avira.OE.ServiceHost;Avira Service Host;c:\program files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe;c:\program files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe [x]
R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe;c:\program files (x86)\Skype\Updater\Updater.exe [x]
R3 BtFilter;Bluetooth LowerFilter Class Filter Driver;c:\windows\system32\DRIVERS\btfilter.sys;c:\windows\SYSNATIVE\DRIVERS\btfilter.sys [x]
R3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\IEEtwCollector.exe;c:\windows\SYSNATIVE\IEEtwCollector.exe [x]
R3 Partner Service;Partner Service;c:\programdata\Partner\Partner.exe;c:\programdata\Partner\Partner.exe [x]
R3 TemproMonitoringService;Notebook Performance Tuning Service (TEMPRO);c:\program files (x86)\Toshiba TEMPRO\TemproSvc.exe;c:\program files (x86)\Toshiba TEMPRO\TemproSvc.exe [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys;c:\windows\SYSNATIVE\drivers\TsUsbGD.sys [x]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys;c:\windows\SYSNATIVE\Drivers\usbaapl64.sys [x]
R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe;c:\program files\Windows Live\Mesh\wlcrasvc.exe [x]
S0 iusb3hcs;Intel(R) USB 3.0 Host Controller Switch Driver;c:\windows\system32\DRIVERS\iusb3hcs.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3hcs.sys [x]
S0 NBVol;Nero Backup Volume Filter Driver;c:\windows\system32\DRIVERS\NBVol.sys;c:\windows\SYSNATIVE\DRIVERS\NBVol.sys [x]
S0 NBVolUp;Nero Backup Volume Upper Filter Driver;c:\windows\system32\DRIVERS\NBVolUp.sys;c:\windows\SYSNATIVE\DRIVERS\NBVolUp.sys [x]
S1 avkmgr;avkmgr;c:\windows\system32\DRIVERS\avkmgr.sys;c:\windows\SYSNATIVE\DRIVERS\avkmgr.sys [x]
S1 kl2;kl2;c:\windows\system32\DRIVERS\kl2.sys;c:\windows\SYSNATIVE\DRIVERS\kl2.sys [x]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe;c:\windows\SYSNATIVE\atiesrxx.exe [x]
S2 AntiVirSchedulerService;Avira Planer;c:\program files (x86)\Avira\AntiVir Desktop\sched.exe;c:\program files (x86)\Avira\AntiVir Desktop\sched.exe [x]
S2 AntiVirWebService;Avira Browser-Schutz;c:\program files (x86)\Avira\AntiVir Desktop\AVWEBGRD.EXE;c:\program files (x86)\Avira\AntiVir Desktop\AVWEBGRD.EXE [x]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [x]
S2 ISWKL;ZoneAlarm LTD Toolbar ISWKL;c:\program files\CheckPoint\ZAForceField\ISWKL.sys;c:\program files\CheckPoint\ZAForceField\ISWKL.sys [x]
S2 IswSvc;ZoneAlarm LTD Toolbar IswSvc;c:\program files\CheckPoint\ZAForceField\IswSvc.exe;c:\program files\CheckPoint\ZAForceField\IswSvc.exe [x]
S2 MBAMScheduler;MBAMScheduler;c:\program files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe;c:\program files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe [x]
S2 MBAMService;MBAMService;c:\program files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe;c:\program files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe [x]
S2 NAUpdate;Nero Update;c:\program files (x86)\Nero\Update\NASvc.exe;c:\program files (x86)\Nero\Update\NASvc.exe [x]
S2 TOSHIBA eco Utility Service;TOSHIBA eco Utility Service;c:\program files\TOSHIBA\TECO\TecoService.exe;c:\program files\TOSHIBA\TECO\TecoService.exe [x]
S2 TVALZFL;TOSHIBA ACPI-Based Value Added Logical and General Purpose Device Filter Driver;c:\windows\system32\DRIVERS\TVALZFL.sys;c:\windows\SYSNATIVE\DRIVERS\TVALZFL.sys [x]
S3 AtiHDAudioService;AMD Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdW76.sys;c:\windows\SYSNATIVE\drivers\AtihdW76.sys [x]
S3 FwLnk;FwLnk Driver;c:\windows\system32\DRIVERS\FwLnk.sys;c:\windows\SYSNATIVE\DRIVERS\FwLnk.sys [x]
S3 iusb3hub;Intel(R) USB 3.0 Hub Driver;c:\windows\system32\DRIVERS\iusb3hub.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3hub.sys [x]
S3 iusb3xhc;Intel(R) USB 3.0 eXtensible Host Controller Driver;c:\windows\system32\DRIVERS\iusb3xhc.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3xhc.sys [x]
S3 L1C;NDIS Miniport Driver for Atheros AR81xx PCI-E Ethernet Controller;c:\windows\system32\DRIVERS\L1C62x64.sys;c:\windows\SYSNATIVE\DRIVERS\L1C62x64.sys [x]
S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys;c:\windows\SYSNATIVE\drivers\mbam.sys [x]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\MBAMSwissArmy.sys;c:\windows\SYSNATIVE\drivers\MBAMSwissArmy.sys [x]
S3 MBAMWebAccessControl;MBAMWebAccessControl;c:\windows\system32\drivers\mwac.sys;c:\windows\SYSNATIVE\drivers\mwac.sys [x]
S3 PGEffect;Pangu effect driver;c:\windows\system32\DRIVERS\pgeffect.sys;c:\windows\SYSNATIVE\DRIVERS\pgeffect.sys [x]
S3 RSUSBVSTOR;RtsUVStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUVStor.sys;c:\windows\SYSNATIVE\Drivers\RtsUVStor.sys [x]
S3 SmbDrv;SmbDrv;c:\windows\system32\DRIVERS\Smb_driver.sys;c:\windows\SYSNATIVE\DRIVERS\Smb_driver.sys [x]
S3 TMachInfo;TMachInfo;c:\program files (x86)\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe;c:\program files (x86)\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe [x]
S3 TOSHIBA HDD SSD Alert Service;TOSHIBA HDD SSD Alert Service;c:\program files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe;c:\program files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe [x]
S3 TPCHSrv;TPCH Service;c:\program files\TOSHIBA\TPHM\TPCHSrv.exe;c:\program files\TOSHIBA\TPHM\TPCHSrv.exe [x]
.
.
--- Andere Dienste/Treiber im Speicher ---
.
*NewlyCreated* - 13872800
*NewlyCreated* - MBAMSWISSARMY
*Deregistered* - 13872800
.
Inhalt des "geplante Tasks" Ordners
.
2014-11-16 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-03-07 08:53]
.
2014-11-16 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07 00:21]
.
2014-11-16 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07 00:21]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2012-02-01 12446824]
"SRS Premium Sound HD"="c:\program files\SRS Labs\SRS Control Panel\SRSPanel_64.exe" [2012-02-06 2165120]
"TosSENotify"="c:\program files\TOSHIBA\TOSHIBA HDD SSD Alert\TosWaitSrv.exe" [2011-11-26 710560]
"TosVolRegulator"="c:\program files\TOSHIBA\TosVolRegulator\TosVolRegulator.exe" [2009-11-11 24376]
"Toshiba TEMPRO"="c:\program files (x86)\Toshiba TEMPRO\TemproTray.exe" [2011-02-10 1546720]
"Toshiba Registration"="c:\program files\TOSHIBA\Registration\ToshibaReminder.exe" [2012-03-07 150992]
.
------- Zusätzlicher Suchlauf -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = hxxp://www.google.com/ig/redirectdomain?brand=TEUA&bmod=TEUA
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = *.local
IE: An OneNote s&enden - c:\progra~2\MICROS~3\Office14\ONBttnIE.dll/105
IE: Nach Microsoft E&xcel exportieren - c:\progra~2\MICROS~3\Office14\EXCEL.EXE/3000
LSP: c:\program files (x86)\Avira\AntiVir Desktop\avsda.dll
TCP: DhcpNameServer = 192.168.0.1
FF - ProfilePath - c:\users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.de/
.
- - - - Entfernte verwaiste Registrierungseinträge - - - -
.
Toolbar-Locked - (no file)
Wow6432Node-HKLM-Run-TSleepSrv - %ProgramFiles(x86)%\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe
HKLM_Wow6432Node-ActiveSetup-{2D46B6DC-2207-486B-B523-A557E6D54B47} - start
Toolbar-Locked - (no file)
HKLM-Run-SynTPEnh - c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe
HKLM-Run-TPwrMain - c:\program files (x86)\TOSHIBA\Power Saver\TPwrMain.EXE
HKLM-Run-TCrdMain - c:\program files (x86)\TOSHIBA\FlashCards\TCrdMain.exe
HKLM-Run-Teco - c:\program files (x86)\TOSHIBA\TECO\Teco.exe
HKLM-Run-TosWaitSrv - c:\program files (x86)\TOSHIBA\TPHM\TosWaitSrv.exe
HKLM-Run-ISW - (no file)
.
.
.
--------------------- Gesperrte Registrierungsschluessel ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\windows\\system32\\Macromed\\Flash\\FlashUtil64_15_0_0_223_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\LocalServer32]
@="c:\\windows\\system32\\Macromed\\Flash\\FlashUtil64_15_0_0_223_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}]
@Denied: (A 2) (Everyone)
@="IFlashBroker6"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_15_0_0_223_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\LocalServer32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_15_0_0_223_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_15_0_0_223.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.15"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_15_0_0_223.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_15_0_0_223.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_15_0_0_223.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}]
@Denied: (A 2) (Everyone)
@="IFlashBroker6"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\McAfee]
"SymbolicLinkValue"=hex(6):5c,00,72,00,65,00,67,00,69,00,73,00,74,00,72,00,79,
   00,5c,00,6d,00,61,00,63,00,68,00,69,00,6e,00,65,00,5c,00,53,00,6f,00,66,00,\
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\Common\Smart Tag\Actions\{B7EFF951-E52F-45CC-9EF7-57124F2177CC}]
@Denied: (A) (Everyone)
"Solution"="{15727DE6-F92D-4E46-ACB4-0E2C58B31A18}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3]
@Denied: (A) (Everyone)
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3\0]
"Key"="ActionsPane3"
"Location"="c:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTO\\ActionsPane3.xsd"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Zeit der Fertigstellung: 2014-11-16  18:36:42
ComboFix-quarantined-files.txt  2014-11-16 17:36
.
Vor Suchlauf: 11 Verzeichnis(se), 503.410.843.648 Bytes frei
Nach Suchlauf: 14 Verzeichnis(se), 503.527.837.696 Bytes frei
.
- - End Of File - - FE16C7AE3040ED62A4AEECB31B35D985
         


Alt 17.11.2014, 19:22   #6
M-K-D-B
/// TB-Ausbilder
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Mehrere Anti-Virus-Programme

Code:
ATTFilter
ZoneAlarm
Avira
         
Mir ist aufgefallen, dass Du mehr als ein Anti-Virus-Programm mit Hintergrundwächter laufen hast. Das ist gefährlich, da sich die Programme in die Quere kommen können und dadurch Viren erst recht auf dem Rechner landen können. Ausserdem bremst es auch das System aus. Entscheide Dich für eine Variante und deinstalliere die andere über Systemsteuerung => Software.
Berichte, für welches Anti-Virus-Programm Du Dich entschieden hast.

Zitat:
Speedy hat letztens eine einleuchtende Erklärung dazu geliefert: "Man stelle sich einen Torwart vor, der das Tor hüten soll (Anti-Virus-Programm), der Ball kommt angeflogen (Virus), der Torhüter konzentriert sich auf den Ball und fängt ihn. Jetzt stelle Dir zwei Torhüter im Tor vor ...., die knallen aneinander und der Ball kann ungehindert ins Tor wandern."






Schritt 1
Downloade Dir bitte AdwCleaner Logo Icon AdwCleaner auf deinen Desktop.
  • Schließe alle offenen Programme und Browser. Bebilderte Anleitung zu AdwCleaner.
  • Starte die AdwCleaner.exe mit einem Doppelklick.
  • Stimme den Nutzungsbedingungen zu.
  • Klicke auf Optionen und vergewissere dich, dass die folgenden Punkte ausgewählt sind:
    • "Tracing" Schlüssel löschen
    • Winsock Einstellungen zurücksetzen
    • Proxy Einstellungen zurücksetzen
    • Internet Explorer Richtlinien zurücksetzen
    • Chrome Richtlinien zurücksetzen
    • Stelle sicher, dass alle 5 Optionen wie hier dargestellt, ausgewählt sind
  • Klicke auf Suchlauf und warte bis dieser abgeschlossen ist.
  • Klicke nun auf Löschen und bestätige auftretende Hinweise mit Ok.
  • Dein Rechner wird automatisch neu gestartet. Nach dem Neustart öffnet sich eine Textdatei. Poste mir deren Inhalt mit deiner nächsten Antwort.
  • Die Logdatei findest du auch unter C:\AdwCleaner\AdwCleaner[Cx].txt. (x = fortlaufende Nummer).





Schritt 2
Downloade Dir bitte Malwarebytes Anti-Malware
  • Installiere das Programm in den vorgegebenen Pfad. (Bebilderte Anleitung zu MBAM)
  • Starte Malwarebytes' Anti-Malware (MBAM).
  • Klicke im Anschluss auf Scannen, wähle den Bedrohungssuchlauf aus und klicke auf Suchlauf starten.
  • Lass am Ende des Suchlaufs alle Funde (falls vorhanden) in die Quarantäne verschieben. Klicke dazu auf Auswahl entfernen.
  • Lass deinen Rechner ggf. neu starten, um die Bereinigung abzuschließen.
  • Starte MBAM, klicke auf Verlauf und dann auf Anwendungsprotokolle.
  • Wähle das neueste Scan-Protokoll aus und klicke auf Export. Wähle Textdatei (.txt) aus und speichere die Datei als mbam.txt auf dem Desktop ab. Das Logfile von MBAM findest du hier.
  • Füge den Inhalt der mbam.txt mit deiner nächsten Antwort hinzu.







Schritt 3
Bitte deaktiviere dein Anti-Viren-Programm, da es das Ergebnis beeinflussen oder ggf. die Bereinigung stören kann.
Bitte lade dir zoek.exe von hier: http://hijackthis.nl/smeenk/ und speichere die Datei auf deinem Desktop.
  • Starte Zoek.exe mit einem Doppelklick.
  • Achtung: Das folgende Skript wurde nur für diesen speziellen Fall geschrieben und könnte andere Computer beschädigen.
  • Kopiere den Text der folgenden Box in das Skriptfenster von zoek:
    Code:
    ATTFilter
    iedefaults;
    resetIEproxy;
    FFdefaults;
    CHRdefaults;
    emptyclsid;
             
  • Nun klicke auf "Run script" und sei geduldig bis das Skript durchgelaufen ist.
  • Wenn das Tool fertig ist, wird sich Notepad mit der Logdatei öffnen (ggf. erst nach einem Neustart). Das Log befindet sich aber auch noch unter c:\ .
  • Bitte poste mir das ZOEK-Log (möglichst in CODE-Tags - #-Symbol im Antwortfenster klicken).





Schritt 4
  • Starte die FRST.exe erneut. Setze einen Haken vor Addition.txt und drücke auf Scan.
  • FRST erstellt wieder zwei Logdateien (FRST.txt und Addition.txt).
  • Poste mir beide Logdateien mit deiner nächsten Antwort.






Bitte poste mit deiner nächsten Antwort
  • die Logdatei von AdwCleaner,
  • die Logdatei von MBAM,
  • die Logdatei von Zoek,
  • die beiden neuen Logdateien von FRST.
__________________
--> Windows 7: Programme stürzen ab nach Virusfund

Alt 17.11.2014, 21:43   #7
Melanie3107
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Hallo,

ich habe Antivir deinstalliert. Jetzt läuft nur noch ZoneAlarm.

Beim Neustart nach dem AdwCleaner haben sich Windows-Updates installiert.
Bei ca. 35% Ladefortschritt kam eine Meldung, dass es beim Update einen Fehler gab und alle Änderungen rückgängig gemacht werden. Ist das irgendwie relevant?

Danke und Gruß

Code:
ATTFilter
# AdwCleaner v4.101 - Bericht erstellt am 17/11/2014 um 21:22:08
# Aktualisiert 09/11/2014 von Xplode
# Database : 2014-11-16.1 [Live]
# Betriebssystem : Windows 7 Home Premium Service Pack 1 (64 bits)
# Benutzername : Melanie - MELANIE-TOSH
# Gestartet von : C:\Users\Melanie\Desktop\AdwCleaner_4.101.exe
# Option : Löschen

***** [ Dienste ] *****

[#] Dienst Gelöscht : Partner Service

***** [ Dateien / Ordner ] *****

Ordner Gelöscht : C:\ProgramData\Partner
Ordner Gelöscht : C:\Users\Melanie\AppData\Roaming\CheckPoint\ZoneAlarm LTD Toolbar

***** [ Tasks ] *****


***** [ Verknüpfungen ] *****


***** [ Registrierungsdatenbank ] *****

Wert Gelöscht : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [{FFB96CC1-7EB3-449D-B827-DB661701C6BB}]
Wert Gelöscht : [x64] HKLM\SOFTWARE\Mozilla\Firefox\Extensions [{FFB96CC1-7EB3-449D-B827-DB661701C6BB}]
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\AppID\kt_bho_dll.dll
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\kt_bho.KettleBho
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\kt_bho.KettleBho.1
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\protector_dll.protectorbho
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\protector_dll.protectorbho.1
Schlüssel Gelöscht : HKLM\SOFTWARE\MozillaPlugins\@checkpoint.com/FFApi
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\AppID\{28A88B70-D874-4F73-BBBA-9B2B222FB7D6}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\CLSID\{83FF80F4-8C74-4B80-B5BA-C8DDD434E5C4}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\Interface\{FFB96CC1-7EB3-449D-B827-DB661701C6BB}
Schlüssel Gelöscht : HKLM\SOFTWARE\Classes\TypeLib\{86676E13-D6D8-4652-9FCF-F2047F1FB000}
Schlüssel Gelöscht : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{83FF80F4-8C74-4B80-B5BA-C8DDD434E5C4}
Schlüssel Gelöscht : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{83FF80F4-8C74-4B80-B5BA-C8DDD434E5C4}
Schlüssel Gelöscht : [x64] HKLM\SOFTWARE\Classes\CLSID\{83FF80F4-8C74-4B80-B5BA-C8DDD434E5C4}
Schlüssel Gelöscht : [x64] HKLM\SOFTWARE\Classes\Interface\{FFB96CC1-7EB3-449D-B827-DB661701C6BB}
Schlüssel Gelöscht : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoneAlarm LTD Toolbar

***** [ Browser ] *****

-\\ Internet Explorer v11.0.9600.17239


-\\ Mozilla Firefox v33.1 (x86 de)


*************************

AdwCleaner[R0].txt - [2554 octets] - [17/11/2014 21:18:15]
AdwCleaner[S0].txt - [2463 octets] - [17/11/2014 21:22:08]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [2523 octets] ##########
         
Malewarebytes Anti-Malware hatte ich bereits installiert:

Code:
ATTFilter
 Malwarebytes Anti-Malware 
www.malwarebytes.org

Suchlauf Datum: 17.11.2014
Suchlauf-Zeit: 21:42:17
Logdatei: mbam.txt
Administrator: Ja

Version: 2.00.3.1025
Malware Datenbank: v2014.11.17.06
Rootkit Datenbank: v2014.11.12.01
Lizenz: Testversion
Malware Schutz: Aktiviert
Bösartiger Webseiten Schutz: Aktiviert
Selbstschutz: Deaktiviert

Betriebssystem: Windows 7 Service Pack 1
CPU: x64
Dateisystem: NTFS
Benutzer: Melanie

Suchlauf-Art: Bedrohungs-Suchlauf
Ergebnis: Abgeschlossen
Durchsuchte Objekte: 360696
Verstrichene Zeit: 23 Min, 50 Sek

Speicher: Aktiviert
Autostart: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Heuristik: Aktiviert
PUP: Warnen
PUM: Aktiviert

Prozesse: 0
(Keine schädliche Elemente erkannt)

Module: 0
(Keine schädliche Elemente erkannt)

Registrierungsschlüssel: 0
(Keine schädliche Elemente erkannt)

Registrierungswerte: 0
(Keine schädliche Elemente erkannt)

Registrierungsdaten: 0
(Keine schädliche Elemente erkannt)

Ordner: 0
(Keine schädliche Elemente erkannt)

Dateien: 0
(Keine schädliche Elemente erkannt)

Physische Sektoren: 0
(Keine schädliche Elemente erkannt)


(end)
         
Code:
ATTFilter
Zoek.exe v5.0.0.0 Updated 05-November-2014
Tool run by Melanie on 17.11.2014 at 22:16:16,32.
Microsoft Windows 7 Home Premium  6.1.7601 Service Pack 1 x64
Running in: Normal Mode No Internet Access Detected
Launched: C:\Users\Melanie\Desktop\zoek.exe [Scan all users] [Script inserted] 

==== System Restore Info ======================

17.11.2014 22:18:47 Zoek.exe System Restore Point Created Succesfully.

==== Deleting CLSID Registry Keys ======================


==== Deleting CLSID Registry Values ======================


==== FireFox Fix ======================

Deleted from C:\Users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default\prefs.js:
user_pref("browser.startup.homepage", "hxxp://www.google.de/");

Added to C:\Users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default\prefs.js:
user_pref("browser.startup.homepage", "hxxp://www.google.com");
user_pref("browser.search.defaulturl", "hxxp://www.google.com/search?btnG=Google+Search&q=");
user_pref("browser.newtab.url", "hxxp://www.google.com/");
user_pref("browser.search.defaultengine", "Google");
user_pref("browser.search.defaultenginename", "Google");
user_pref("browser.search.selectedEngine", "Google");
user_pref("browser.search.order.1", "Google");
user_pref("keyword.URL", "hxxp://www.google.com/search?btnG=Google+Search&q=");
user_pref("browser.search.suggest.enabled", true);
user_pref("browser.search.useDBForOrder", true);

==== Firefox Extensions ======================

ProfilePath: C:\Users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default
- Avira Browser Safety - %ProfilePath%\extensions\abs@avira.com

AppDir: C:\Program Files (x86)\Mozilla Firefox
- Default - %AppDir%\browser\extensions\{972ce4c6-7e08-4474-a285-3208198ce6fd}

==== Firefox Plugins ======================

Profilepath: C:\Users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default
67D325B5AEB28E381B84E8DE1A90C7A8	- C:\windows\SysWOW64\Macromed\Flash\NPSWF32_15_0_0_223.dll -	Shockwave Flash
B5371D2C9017EEE216B5361D600B3543	- C:\Users\Melanie\Music\iTunes\Mozilla Plugins\npitunes.dll -	iTunes Application Detector


==== Set IE to Default ======================

Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="hxxp://www.google.com/ig/redirectdomain?brand=TEUA&bmod=TEUA"
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes]
"DefaultScope"="{60D8521F-1B29-45F9-9A79-6C32C6586254}"

New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="hxxp://go.microsoft.com/fwlink/?LinkId=69157"
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes]
"DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"

==== All HKCU SearchScopes ======================

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes
{0633EE93-D776-472f-A0FF-E1416B8B2E3A} Bing  Url="hxxp://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC"
{60D8521F-1B29-45F9-9A79-6C32C6586254} Google  Url="hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA_deDE489"

==== Reset Google Chrome ======================

Nothing found to reset

==== Reset IE Proxy ======================

Value(s) before fix:
"ProxyOverride"="*.local"
"ProxyEnable"=dword:00000000

Value(s) after fix:
"ProxyEnable"=dword:00000000

==== C:\zoek_backup content ======================

C:\zoek_backup (files=0 folders=0 0 bytes)

==== EOF on 17.11.2014 at 22:20:54,18 ======================
         

FRST Logfile:

FRST Logfile:
Code:
ATTFilter
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 10-11-2014
Ran by Melanie (administrator) on MELANIE-TOSH on 17-11-2014 22:24:54
Running from C:\Users\Melanie\Desktop
Loaded Profile: Melanie (Available profiles: Melanie)
Platform: Windows 7 Home Premium Service Pack 1 (X64) OS Language: Deutsch (Deutschland)
Internet Explorer Version 11
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(AMD) C:\Windows\System32\atiesrxx.exe
(Microsoft Corporation) C:\Windows\System32\wlanext.exe
(Check Point Software Technologies) C:\Program Files\CheckPoint\ZAForceField\ISWSVC.exe
(Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(Malwarebytes Corporation) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe
(Malwarebytes Corporation) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe
(TOSHIBA Corporation) C:\Windows\System32\TODDSrv.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TECO\TecoService.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
(AMD) C:\Windows\System32\atieclxx.exe
(Malwarebytes Corporation) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbam.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
(SRS Labs, Inc.) C:\Program Files\SRS Labs\SRS Control Panel\SRSPanel_64.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TECO\Teco.exe
(Nero AG) C:\Program Files (x86)\Nero\Update\NASvc.exe
(Toshiba Europe GmbH) C:\Program Files (x86)\Toshiba TEMPRO\TemproTray.exe
(TOSHIBA) C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\TOPI.exe
(Google Inc.) C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
(Microsoft Corporation) C:\Program Files\Windows Sidebar\sidebar.exe
(Toshiba) C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIMonitor.exe
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
(TOSHIBA Corporation) C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TPHM\TPCHSrv.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TPHM\TPCHWMsg.exe
(Apple Inc.) C:\Users\Melanie\Music\iTunes\iTunesHelper.exe
(TOSHIBA Corporation) C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSENotify.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(TOSHIBA CORPORATION) C:\Program Files (x86)\TOSHIBA\Bluetooth Toshiba Stack\TosBtSrv.exe
(Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe


==================== Registry (Whitelisted) ==================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [12446824 2012-02-01] (Realtek Semiconductor)
HKLM\...\Run: [SynTPEnh] => C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [2867984 2011-12-23] (Synaptics Incorporated)
HKLM\...\Run: [SRS Premium Sound HD] => C:\Program Files\SRS Labs\SRS Control Panel\SRSPanel_64.exe [2165120 2012-02-06] (SRS Labs, Inc.)
HKLM\...\Run: [TPwrMain] => C:\Program Files\TOSHIBA\Power Saver\TPwrMain.EXE [590256 2011-09-23] (TOSHIBA Corporation)
HKLM\...\Run: [TCrdMain] => C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [989056 2011-12-14] (TOSHIBA Corporation)
HKLM\...\Run: [Teco] => C:\Program Files\TOSHIBA\TECO\Teco.exe [1548208 2011-11-24] (TOSHIBA Corporation)
HKLM\...\Run: [TosWaitSrv] => C:\Program Files\TOSHIBA\TPHM\TosWaitSrv.exe [712096 2011-12-14] (TOSHIBA Corporation)
HKLM\...\Run: [TosSENotify] => C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosWaitSrv.exe [710560 2011-11-26] (TOSHIBA Corporation)
HKLM\...\Run: [TosVolRegulator] => C:\Program Files\TOSHIBA\TosVolRegulator\TosVolRegulator.exe [24376 2009-11-11] (TOSHIBA Corporation)
HKLM\...\Run: [Toshiba TEMPRO] => C:\Program Files (x86)\Toshiba TEMPRO\TemproTray.exe [1546720 2011-02-10] (Toshiba Europe GmbH)
HKLM\...\Run: [Toshiba Registration] => C:\Program Files\TOSHIBA\Registration\ToshibaReminder.exe [150992 2012-03-07] (Toshiba Europe GmbH)
HKLM\...\Run: [ISW] => [X]
HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [NBAgent] => C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe [1492264 2011-11-18] (Nero AG)
HKLM-x32\...\Run: [StartCCC] => C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe [343168 2012-01-20] (Advanced Micro Devices, Inc.)
HKLM-x32\...\Run: [ITSecMng] => C:\Program Files (x86)\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe [80840 2011-04-02] (TOSHIBA CORPORATION)
HKLM-x32\...\Run: [USB3MON] => C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291608 2012-01-05] (Intel Corporation)
HKLM-x32\...\Run: [ToshibaServiceStation] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe [1298816 2011-07-12] (TOSHIBA Corporation)
HKLM-x32\...\Run: [ZoneAlarm] => C:\Program Files (x86)\CheckPoint\ZoneAlarm\zatray.exe [73392 2012-06-01] (Check Point Software Technologies LTD)
HKLM-x32\...\Run: [BCSSync] => C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe [89184 2012-11-05] (Microsoft Corporation)
HKLM-x32\...\Run: [APSDaemon] => C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe [43848 2014-02-12] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] => C:\Users\Melanie\Music\iTunes\iTunesHelper.exe [152392 2014-05-26] (Apple Inc.)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000\...\Run: [swg] => C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2012-03-07] (Google Inc.)
HKU\S-1-5-18\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Toshiba Places Icon Utility.lnk
ShortcutTarget: Toshiba Places Icon Utility.lnk -> C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIMonitor.exe (Toshiba)
Startup: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRDCReminder.lnk
ShortcutTarget: TRDCReminder.lnk -> C:\Program Files (x86)\TOSHIBA\TRDCReminder\TRDCReminder.exe (TOSHIBA Europe)
Startup: C:\Users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRDCReminder.lnk
ShortcutTarget: TRDCReminder.lnk -> C:\Program Files (x86)\TOSHIBA\TRDCReminder\TRDCReminder.exe (TOSHIBA Europe)

==================== Internet (Whitelisted) ====================

(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)

HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
HKU\S-1-5-21-3119111728-3156756977-804979122-1000\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe
SearchScopes: HKLM - DefaultScope {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM - {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKLM-x32 - DefaultScope {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKLM-x32 - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM-x32 - {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKCU - {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA_deDE489
BHO: Groove GFS Browser Helper -> {72853161-30C5-4D22-B7F9-0BBC1D38A37E} -> C:\Program Files\Microsoft Office\Office14\GROOVEEX.DLL (Microsoft Corporation)
BHO: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files\Microsoft Office\Office14\URLREDIR.DLL (Microsoft Corporation)
BHO-x32: Groove GFS Browser Helper -> {72853161-30C5-4D22-B7F9-0BBC1D38A37E} -> C:\Program Files (x86)\Microsoft Office\Office14\GROOVEEX.DLL (Microsoft Corporation)
BHO-x32: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files (x86)\Microsoft Office\Office14\URLREDIR.DLL (Microsoft Corporation)
Toolbar: HKLM - ZoneAlarm Security Engine - {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - C:\Program Files\CheckPoint\ZAForceField\TrustChecker\bin\TrustCheckerIEPlugin.dll (Check Point Software Technologies)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
Toolbar: HKLM-x32 - ZoneAlarm Security Engine - {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - C:\Program Files\CheckPoint\ZAForceField\WOW64\TrustChecker\bin\TrustCheckerIEPlugin.dll (Check Point Software Technologies)
Toolbar: HKLM-x32 - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
Toolbar: HKU\S-1-5-21-3119111728-3156756977-804979122-1000 -> Google Toolbar - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
Handler-x32: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files (x86)\Common Files\Skype\Skype4COM.dll (Skype Technologies)
Tcpip\Parameters: [DhcpNameServer] 192.168.0.1

FireFox:
========
FF ProfilePath: C:\Users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default
FF NewTab: hxxp://www.google.com/
FF DefaultSearchEngine: Google
FF DefaultSearchUrl: hxxp://www.google.com/search?btnG=Google+Search&q=
FF SearchEngineOrder.1: Google
FF SelectedSearchEngine: Google
FF Homepage: hxxp://www.google.com
FF Keyword.URL: hxxp://www.google.com/search?btnG=Google+Search&q=
FF Plugin: @adobe.com/FlashPlayer -> C:\windows\system32\Macromed\Flash\NPSWF64_15_0_0_223.dll ()
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 -> c:\Program Files\Microsoft Silverlight\5.1.30514.0\npctrl.dll ( Microsoft Corporation)
FF Plugin: @microsoft.com/OfficeAuthz,version=14.0 -> C:\PROGRA~1\MICROS~2\Office14\NPAUTHZ.DLL (Microsoft Corporation)
FF Plugin-x32: @adobe.com/FlashPlayer -> C:\windows\SysWOW64\Macromed\Flash\NPSWF32_15_0_0_223.dll ()
FF Plugin-x32: @Apple.com/iTunes,version=1.0 -> C:\Users\Melanie\Music\iTunes\Mozilla Plugins\npitunes.dll ()
FF Plugin-x32: @java.com/JavaPlugin -> C:\Program Files (x86)\Java\jre6\bin\new_plugin\npjp2.dll (Sun Microsystems, Inc.)
FF Plugin-x32: @Microsoft.com/NpCtrl,version=1.0 -> c:\Program Files (x86)\Microsoft Silverlight\5.1.30514.0\npctrl.dll ( Microsoft Corporation)
FF Plugin-x32: @microsoft.com/OfficeAuthz,version=14.0 -> C:\PROGRA~2\MICROS~3\Office14\NPAUTHZ.DLL (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/SharePoint,version=14.0 -> C:\PROGRA~2\MICROS~3\Office14\NPSPWRAP.DLL (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3502.0922 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3538.0513 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: @Nero.com/KM -> C:\PROGRA~2\COMMON~1\Nero\BROWSE~1\NPBROW~1.DLL (Nero AG)
FF Plugin-x32: @tools.google.com/Google Update;version=3 -> C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll (Google Inc.)
FF Plugin-x32: @tools.google.com/Google Update;version=9 -> C:\Program Files (x86)\Google\Update\1.3.21.111\npGoogleUpdate3.dll (Google Inc.)
FF Plugin-x32: Adobe Reader -> C:\Program Files (x86)\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\amazondotcom-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\ddg.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\eBay-de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\leo_ende_de.xml
FF SearchPlugin: C:\Program Files (x86)\mozilla firefox\browser\searchplugins\yahoo-de.xml
FF Extension: Avira Browser Safety - C:\Users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default\Extensions\abs@avira.com [2014-10-06]

Chrome: 
=======

==================== Services (Whitelisted) =================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R2 IswSvc; C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe [827520 2012-04-30] (Check Point Software Technologies)
R2 MBAMScheduler; C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe [1871160 2014-10-01] (Malwarebytes Corporation)
R2 MBAMService; C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe [968504 2014-10-01] (Malwarebytes Corporation)
S3 TemproMonitoringService; C:\Program Files (x86)\Toshiba TEMPRO\TemproSvc.exe [112080 2011-02-10] (Toshiba Europe GmbH)
S2 vsmon; C:\Program Files (x86)\CheckPoint\ZoneAlarm\vsmon.exe [2446392 2012-06-01] (Check Point Software Technologies LTD)

==================== Drivers (Whitelisted) ====================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

U5 AppMgmt; C:\Windows\system32\svchost.exe [27648 2011-03-01] (Microsoft Corporation)
U5 GEARAspiWDM; C:\Windows\System32\Drivers\GEARAspiWDM.sys [33240 2012-08-21] (GEAR Software Inc.)
R2 ISWKL; C:\Program Files\CheckPoint\ZAForceField\ISWKL.sys [33672 2012-04-30] (Check Point Software Technologies)
R0 KL1; C:\Windows\System32\DRIVERS\kl1.sys [460888 2012-01-09] (Kaspersky Lab ZAO)
R1 kl2; C:\Windows\System32\DRIVERS\kl2.sys [11864 2012-01-09] (Kaspersky Lab ZAO)
R1 KLIF; C:\Windows\System32\DRIVERS\klif.sys [485680 2012-01-09] (Kaspersky Lab)
R3 MBAMProtector; C:\windows\system32\drivers\mbam.sys [25816 2014-10-01] (Malwarebytes Corporation)
R3 MBAMSwissArmy; C:\windows\system32\drivers\MBAMSwissArmy.sys [129752 2014-11-17] (Malwarebytes Corporation)
R3 MBAMWebAccessControl; C:\windows\system32\drivers\mwac.sys [63704 2014-10-01] (Malwarebytes Corporation)
R3 SmbDrv; C:\Windows\System32\DRIVERS\Smb_driver.sys [21264 2011-12-23] (Synaptics Incorporated)
S3 Tosrfcom; No ImagePath
R1 Vsdatant; C:\Windows\System32\DRIVERS\vsdatant.sys [454232 2011-05-07] (Check Point Software Technologies LTD)
S3 catchme; \??\C:\ComboFix\catchme.sys [X]

==================== NetSvcs (Whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)


==================== One Month Created Files and Folders ========

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-11-17 22:24 - 2014-11-17 22:25 - 00017215 _____ () C:\Users\Melanie\Desktop\FRST.txt
2014-11-17 22:22 - 2014-11-17 22:22 - 00003669 _____ () C:\Users\Melanie\Desktop\zoek-results.txt
2014-11-17 22:18 - 2014-11-17 22:20 - 00003669 _____ () C:\zoek-results.log
2014-11-17 22:16 - 2014-11-17 22:16 - 00000000 ____D () C:\zoek_backup
2014-11-17 22:13 - 2014-11-17 22:13 - 01294848 _____ () C:\Users\Melanie\Desktop\zoek.exe
2014-11-17 22:10 - 2014-11-17 22:10 - 00001200 _____ () C:\Users\Melanie\Desktop\mbam.txt
2014-11-17 21:31 - 2014-11-17 21:31 - 00002619 _____ () C:\Users\Melanie\Desktop\AdwCleaner[S0].txt
2014-11-17 21:17 - 2014-11-17 21:22 - 00000000 ____D () C:\AdwCleaner
2014-11-17 21:10 - 2014-11-17 21:10 - 02140160 _____ () C:\Users\Melanie\Desktop\AdwCleaner_4.101.exe
2014-11-16 18:36 - 2014-11-16 18:36 - 00019570 _____ () C:\ComboFix.txt
2014-11-16 15:54 - 2014-11-16 18:36 - 00000000 ____D () C:\Qoobox
2014-11-16 15:54 - 2011-06-26 07:45 - 00256000 _____ () C:\windows\PEV.exe
2014-11-16 15:54 - 2010-11-07 18:20 - 00208896 _____ () C:\windows\MBR.exe
2014-11-16 15:54 - 2009-04-20 05:56 - 00060416 _____ (NirSoft) C:\windows\NIRCMD.exe
2014-11-16 15:54 - 2000-08-31 01:00 - 00518144 _____ (SteelWerX) C:\windows\SWREG.exe
2014-11-16 15:54 - 2000-08-31 01:00 - 00406528 _____ (SteelWerX) C:\windows\SWSC.exe
2014-11-16 15:54 - 2000-08-31 01:00 - 00098816 _____ () C:\windows\sed.exe
2014-11-16 15:54 - 2000-08-31 01:00 - 00080412 _____ () C:\windows\grep.exe
2014-11-16 15:54 - 2000-08-31 01:00 - 00068096 _____ () C:\windows\zip.exe
2014-11-16 15:53 - 2014-11-16 18:33 - 00000000 ____D () C:\windows\erdnt
2014-11-16 15:35 - 2014-11-16 15:35 - 05598504 ____R (Swearware) C:\Users\Melanie\Desktop\ComboFix.exe
2014-11-15 13:56 - 2014-11-17 22:24 - 00000000 ____D () C:\Users\Melanie\Desktop\TrojanerBoard
2014-11-11 21:10 - 2014-11-17 22:24 - 00000000 ____D () C:\FRST
2014-11-11 21:02 - 2014-11-11 21:02 - 02116096 _____ (Farbar) C:\Users\Melanie\Desktop\FRST64.exe
2014-11-11 20:56 - 2014-11-11 20:56 - 00000000 _____ () C:\Users\Melanie\defogger_reenable
2014-10-19 16:53 - 2014-11-17 21:30 - 00129752 _____ (Malwarebytes Corporation) C:\windows\system32\Drivers\MBAMSwissArmy.sys
2014-10-19 16:45 - 2014-11-09 12:11 - 00001113 _____ () C:\Users\Public\Desktop\ Malwarebytes Anti-Malware .lnk
2014-10-19 16:44 - 2014-11-09 12:11 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ Malwarebytes Anti-Malware 
2014-10-19 16:41 - 2014-11-09 12:11 - 00000000 ____D () C:\Program Files (x86)\ Malwarebytes Anti-Malware 
2014-10-19 16:41 - 2014-10-01 11:11 - 00093400 _____ (Malwarebytes Corporation) C:\windows\system32\Drivers\mbamchameleon.sys
2014-10-19 16:41 - 2014-10-01 11:11 - 00063704 _____ (Malwarebytes Corporation) C:\windows\system32\Drivers\mwac.sys
2014-10-19 16:41 - 2014-10-01 11:11 - 00025816 _____ (Malwarebytes Corporation) C:\windows\system32\Drivers\mbam.sys

==================== One Month Modified Files and Folders =======

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-11-17 22:16 - 2012-05-31 01:44 - 01300561 _____ () C:\windows\WindowsUpdate.log
2014-11-17 21:47 - 2013-06-30 09:36 - 00000884 _____ () C:\windows\Tasks\Adobe Flash Player Updater.job
2014-11-17 21:36 - 2009-07-14 05:45 - 00024400 ____H () C:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-11-17 21:36 - 2009-07-14 05:45 - 00024400 ____H () C:\windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-11-17 21:33 - 2012-03-07 01:21 - 00001124 _____ () C:\windows\Tasks\GoogleUpdateTaskMachineUA.job
2014-11-17 21:30 - 2012-03-07 01:21 - 00001120 _____ () C:\windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-11-17 21:24 - 2009-07-14 06:08 - 00000006 ____H () C:\windows\Tasks\SA.DAT
2014-11-17 21:23 - 2010-11-21 04:47 - 00211984 _____ () C:\windows\PFRO.log
2014-11-17 21:23 - 2009-07-14 05:51 - 00095099 _____ () C:\windows\setupact.log
2014-11-17 21:22 - 2012-06-22 19:26 - 00000000 ____D () C:\Users\Melanie\AppData\Roaming\CheckPoint
2014-11-17 21:02 - 2012-06-21 19:06 - 00115304 _____ () C:\Users\Melanie\AppData\Local\GDIPFONTCACHEV1.DAT
2014-11-17 21:01 - 2009-07-14 05:45 - 00435432 _____ () C:\windows\system32\FNTCACHE.DAT
2014-11-17 20:58 - 2013-08-09 14:10 - 00000000 ____D () C:\ProgramData\Avira
2014-11-17 20:43 - 2013-06-30 09:36 - 00003822 _____ () C:\windows\System32\Tasks\Adobe Flash Player Updater
2014-11-17 20:42 - 2012-03-07 01:05 - 00701104 _____ (Adobe Systems Incorporated) C:\windows\SysWOW64\FlashPlayerApp.exe
2014-11-17 20:42 - 2012-03-07 01:05 - 00071344 _____ (Adobe Systems Incorporated) C:\windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-11-16 18:36 - 2009-07-14 04:20 - 00000000 __RHD () C:\Users\Default
2014-11-16 18:31 - 2009-07-14 03:34 - 00000215 _____ () C:\windows\system.ini
2014-11-16 18:27 - 2012-09-20 21:43 - 00000000 ____D () C:\ProgramData\Microsoft Help
2014-11-16 15:55 - 2014-02-27 22:21 - 01594964 _____ () C:\windows\SysWOW64\PerfStringBackup.INI
2014-11-16 15:55 - 2011-02-11 09:21 - 00699682 _____ () C:\windows\system32\perfh007.dat
2014-11-16 15:55 - 2011-02-11 09:21 - 00149790 _____ () C:\windows\system32\perfc007.dat
2014-11-16 15:55 - 2009-07-14 06:13 - 01594964 _____ () C:\windows\system32\PerfStringBackup.INI
2014-11-16 15:39 - 2013-08-16 17:03 - 00000000 ____D () C:\windows\system32\MRT
2014-11-16 09:41 - 2012-06-22 19:53 - 00000000 ____D () C:\Program Files (x86)\Mozilla Maintenance Service
2014-11-15 13:29 - 2014-07-03 17:07 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-11-11 20:56 - 2012-06-21 19:03 - 00000000 ____D () C:\Users\Melanie
2014-11-04 14:30 - 2010-11-21 04:27 - 00275080 ____N (Microsoft Corporation) C:\windows\system32\MpSigStub.exe
2014-10-31 23:26 - 2012-06-23 12:31 - 103374192 _____ (Microsoft Corporation) C:\windows\system32\MRT.exe
2014-10-19 16:45 - 2012-07-08 11:14 - 00000000 ____D () C:\Users\Melanie\AppData\Roaming\Malwarebytes
2014-10-19 16:41 - 2012-07-08 11:14 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-10-19 16:40 - 2012-07-08 11:14 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes' Anti-Malware

Some content of TEMP:
====================
C:\Users\Melanie\AppData\Local\Temp\Quarantine.exe
C:\Users\Melanie\AppData\Local\Temp\sqlite3.dll


==================== Bamital & volsnap Check =================

(There is no automatic fix for files that do not pass verification.)

C:\Windows\System32\winlogon.exe => File is digitally signed
C:\Windows\System32\wininit.exe => File is digitally signed
C:\Windows\SysWOW64\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\System32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\System32\services.exe => File is digitally signed
C:\Windows\System32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\System32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\System32\rpcss.dll => File is digitally signed
C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed


LastRegBack: 2013-03-29 16:50

==================== End Of Log ============================
         
--- --- ---

--- --- ---


Code:
ATTFilter
Additional scan result of Farbar Recovery Scan Tool (x64) Version: 10-11-2014
Ran by Melanie at 2014-11-17 22:25:43
Running from C:\Users\Melanie\Desktop
Boot Mode: Normal
==========================================================


==================== Security Center ========================

(If an entry is included in the fixlist, it will be removed.)

AV: ZoneAlarm Antivirus (Disabled - Up to date) {DE038A5B-9EDD-18A9-2361-FF7D98D43730}
AS: Windows Defender (Enabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: ZoneAlarm Anti-Spyware (Disabled - Up to date) {65626BBF-B8E7-1727-19D1-C40FE3537D8D}
FW: ZoneAlarm Firewall (Disabled) {E6380B7E-D4B2-19F1-083E-56486607704B}

==================== Installed Programs ======================

(Only the adware programs with "hidden" flag could be added to the fixlist to unhide them. The adware programs should be uninstalled manually.)

Adobe Flash Player 15 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 15.0.0.223 - Adobe Systems Incorporated)
Adobe Flash Player 15 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 15.0.0.223 - Adobe Systems Incorporated)
Adobe Reader X (10.1.9) MUI (HKLM-x32\...\{AC76BA86-7AD7-FFFF-7B44-AA0000000001}) (Version: 10.1.9 - Adobe Systems Incorporated)
Agatha Christie - Death on the Nile (x32 Version: 2.2.0.98 - WildTangent) Hidden
Aloha TriPeaks (x32 Version: 2.2.0.98 - WildTangent) Hidden
AMD Catalyst Install Manager (HKLM\...\{F856881A-D370-B1A7-2AFF-128F4AA93558}) (Version: 3.0.859.0 - Advanced Micro Devices, Inc.)
Apple Application Support (HKLM-x32\...\{D9DAD0FF-495A-472B-9F10-BAE430A26682}) (Version: 3.0.3 - Apple Inc.)
Apple Mobile Device Support (HKLM\...\{787136D2-F0F8-4625-AA3F-72D7795AC842}) (Version: 7.1.1.3 - Apple Inc.)
Apple Software Update (HKLM-x32\...\{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}) (Version: 2.1.3.127 - Apple Inc.)
Atheros Bluetooth Filter Driver Package (HKLM\...\{65486209-5C54-439C-8383-8AC9BBE25932}) (Version: 1.0.0.12 - Atheros Communications)
Atheros Communications Inc.(R) AR81Family Gigabit/Fast Ethernet Driver (HKLM-x32\...\{3108C217-BE83-42E4-AE9E-A56A2A92E549}) (Version: 2.0.12.13 - Atheros Communications Inc.)
Atheros Driver Installation Program (HKLM-x32\...\{C3A32068-8AB1-4327-BB16-BED9C6219DC7}) (Version: 9.2 - Atheros)
Bejeweled 3 (x32 Version: 2.2.0.98 - WildTangent) Hidden
Bluetooth Stack for Windows by Toshiba (HKLM\...\{CEBB6BFB-D708-4F99-A633-BC2600E01EF6}) (Version: v9.00.00(T) - TOSHIBA CORPORATION)
Bonjour (HKLM\...\{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}) (Version: 3.0.0.10 - Apple Inc.)
Cake Mania (x32 Version: 2.2.0.98 - WildTangent) Hidden
Chuzzle Deluxe (x32 Version: 2.2.0.95 - WildTangent) Hidden
Contrôle ActiveX Windows Live Mesh pour connexions à distance (HKLM-x32\...\{55D003F4-9599-44BF-BA9E-95D060730DD3}) (Version: 15.4.5722.2 - Microsoft Corporation)
D3DX10 (x32 Version: 15.4.2368.0902 - Microsoft) Hidden
ElsterFormular (HKLM-x32\...\ElsterFormular) (Version: 15.2.20140326 - Landesfinanzdirektion Thüringen)
Galerie de photos Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Google Chrome (HKLM-x32\...\Google Chrome) (Version: 12.0.742.91 - Google Inc.)
Google Toolbar for Internet Explorer (HKLM-x32\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.3.2710.138 - Google Inc.)
Google Toolbar for Internet Explorer (x32 Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (x32 Version: 1.3.21.111 - Google Inc.) Hidden
High-Definition Video Playback (x32 Version: 11.1.10500.2.65 - Nero AG) Hidden
Insaniquarium Deluxe (x32 Version: 2.2.0.97 - WildTangent) Hidden
Intel(R) Management Engine Components (HKLM-x32\...\{65153EA5-8B6E-43B6-857B-C6E4FC25798A}) (Version: 8.0.1.1399 - Intel Corporation)
Intel(R) Rapid Storage Technology (HKLM-x32\...\{3E29EE6C-963A-4aae-86C1-DC237C4A49FC}) (Version: 11.0.0.1032 - Intel Corporation)
Intel(R) USB 3.0 eXtensible Host Controller Driver (HKLM-x32\...\{240C3DDD-C5E9-4029-9DF7-95650D040CF2}) (Version: 1.0.1.209 - Intel Corporation)
iTunes (HKLM\...\{5A68A656-979F-4168-8795-E2E368AA4DC2}) (Version: 11.2.2.3 - Apple Inc.)
Java(TM) 6 Update 30 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83216030FF}) (Version: 6.0.300 - Oracle)
Jewel Quest Solitaire 2 (x32 Version: 2.2.0.98 - WildTangent) Hidden
Junk Mail filter update (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Malwarebytes Anti-Malware Version 2.0.3.1025 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.0.3.1025 - Malwarebytes Corporation)
Mesh Runtime (x32 Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft Office 2010 (HKLM-x32\...\{95140000-0070-0000-0000-0000000FF1CE}) (Version: 14.0.4763.1000 - Microsoft Corporation)
Microsoft Office Professional Plus 2010 (HKLM-x32\...\Office14.PROPLUSR) (Version: 14.0.7015.1000 - Microsoft Corporation)
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30514.0 - Microsoft Corporation)
Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (x64) (HKLM\...\{ad8a2fa1-06e7-4b0d-927d-6e54b3d31028}) (Version: 8.0.61000 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30411 (HKLM-x32\...\{5DA8F6CD-C70E-39D8-8430-3D9808D6BD17}) (Version: 9.0.30411 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (HKLM-x32\...\{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}) (Version: 9.0.30729.4148 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Mozilla Firefox 33.1 (x86 de) (HKLM-x32\...\Mozilla Firefox 33.1 (x86 de)) (Version: 33.1 - Mozilla)
Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 29.0.1 - Mozilla)
Mystery P.I. - The London Caper (x32 Version: 2.2.0.95 - WildTangent) Hidden
Nero 11 Essentials (HKLM-x32\...\{F8635CF8-B797-4EFD-80BC-DE2D26C65D4F}) (Version: 11.0.00300 - Nero AG)
Nero Backup Drivers (HKLM\...\{D600D357-5CB9-4DE9-8FD4-14E208BD1970}) (Version: 1.0.11100.8.0 - Nero AG)
OpenOffice.org 3.4 (HKLM-x32\...\{4C552FD3-2CCD-4E00-AC64-0681DBB3F8B5}) (Version: 3.4.9590 - OpenOffice.org)
Plants vs. Zombies - Game of the Year (x32 Version: 2.2.0.98 - WildTangent) Hidden
PlayReady PC Runtime amd64 (HKLM\...\{BCA9334F-B6C9-4F65-9A73-AC5A329A4D04}) (Version: 1.3.0 - Microsoft Corporation)
Polar Bowler (x32 Version: 2.2.0.97 - WildTangent) Hidden
Premium Sound HD (HKLM\...\{439A73C2-8CFA-4630-8484-36BCA2AEBB0A}) (Version: 1.12.0300 - SRS Labs, Inc.)
Raccolta foto di Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.6559 - Realtek Semiconductor Corp.)
Realtek USB 2.0 Reader Driver (HKLM-x32\...\{62BBB2F0-E220-4821-A564-730807D2C34D}) (Version: 6.1.7601.39013 - Realtek Semiconductor Corp.)
Service Pack 2 for Microsoft Office 2010 (KB2687455) 32-Bit Edition (HKLM-x32\...\{91140000-0011-0000-0000-0000000FF1CE}_Office14.PROPLUSR_{DE28B448-32E8-4E8F-84F0-A52B21A49B5B}) (Version:  - Microsoft)
Skype™ 6.11 (HKLM-x32\...\{4E76FF7E-AEBA-4C87-B788-CD47E5425B9D}) (Version: 6.11.102 - Skype Technologies S.A.)
Synaptics Pointing Device Driver (HKLM\...\SynTPDeinstKey) (Version: 15.3.39.0 - Synaptics Incorporated)
TOSHIBA Assist (HKLM-x32\...\{C2A276E3-154E-44DC-AAF1-FFDD7FD30E35}) (Version: 4.2.3.1 - TOSHIBA CORPORATION)
TOSHIBA Disc Creator (HKLM\...\{5DA0E02F-970B-424B-BF41-513A5018E4C0}) (Version: 2.1.0.11 for x64 - TOSHIBA Corporation)
TOSHIBA eco Utility (HKLM\...\{2C486987-D447-4E36-8D61-86E48E24199C}) (Version: 1.3.10.64 - TOSHIBA Corporation)
TOSHIBA Hardware Setup (HKLM-x32\...\{97965331-BC5D-4D9F-B6DF-5C0A123E4AE0}) (Version: 2.1.0.8 - TOSHIBA Corporation)
TOSHIBA HDD/SSD Alert (HKLM\...\{D4322448-B6AF-4316-B859-D8A0E84DCB38}) (Version: 3.1.64.11 - TOSHIBA Corporation)
Toshiba Manuals (HKLM-x32\...\{90FF4432-21B7-4AF6-BA6E-FB8C1FED9173}) (Version: 10.04 - TOSHIBA)
TOSHIBA Media Controller (HKLM-x32\...\{C7A4F26F-F9B0-41B2-8659-99181108CDE3}) (Version: 1.0.87.4 - TOSHIBA CORPORATION)
TOSHIBA Media Controller Plug-in (HKLM-x32\...\{F26FDF57-483E-42C8-A9C9-EEE1EDB256E0}) (Version: 1.0.7.7 - TOSHIBA CORPORATION)
TOSHIBA Online Product Information (HKLM-x32\...\{2290A680-4083-410A-ADCC-7092C67FC052}) (Version: 4.01.0000 - TOSHIBA)
TOSHIBA PC Health Monitor (HKLM\...\{9DECD0F9-D3E8-48B0-A390-1CF09F54E3A4}) (Version: 1.7.15.64 - TOSHIBA Corporation)
TOSHIBA Places Icon Utility (HKLM-x32\...\{461F6F0D-7173-4902-9604-AB1A29108AF2}) (Version: 1.1.1.4 - TOSHIBA Corporation)
TOSHIBA Recovery Media Creator (HKLM-x32\...\{B65BBB06-1F8E-48F5-8A54-B024A9E15FDF}) (Version: 2.1.6.52020009 - TOSHIBA CORPORATION)
TOSHIBA Recovery Media Creator Reminder (HKLM-x32\...\InstallShield_{773970F1-5EBA-4474-ADEE-1EA3B0A59492}) (Version: 1.00.0019 - TOSHIBA)
TOSHIBA Resolution+ Plug-in for Windows Media Player (HKLM-x32\...\{6CB76C9D-80C2-4CB3-A4CD-D96B239E3F94}) (Version: 1.1.2004 - TOSHIBA Corporation)
TOSHIBA Service Station (HKLM-x32\...\{AC6569FA-6919-442A-8552-073BE69E247A}) (Version: 2.2.13 - TOSHIBA)
TOSHIBA Sleep Utility (HKLM-x32\...\{654F7484-88C5-46DC-AB32-C66BCB0E2102}) (Version: 1.4.0022.000104 - TOSHIBA Corporation)
TOSHIBA Supervisor Password (HKLM-x32\...\{0AF17224-CF88-40B8-BB1A-D179369847B4}) (Version: 2.1.0.3 - TOSHIBA Corporation)
TOSHIBA TEMPRO (HKLM-x32\...\{F082CB11-4794-4259-99A1-D91BA762AD15}) (Version: 3.35 - Toshiba Europe GmbH)
TOSHIBA Value Added Package (HKLM-x32\...\InstallShield_{066CFFF8-12BF-4390-A673-75F95EFF188E}) (Version: 1.6.0021.640203 - TOSHIBA Corporation)
TOSHIBA Web Camera Application (HKLM-x32\...\InstallShield_{6F3C8901-EBD3-470D-87F8-AC210F6E5E02}) (Version: 2.0.3.33 - TOSHIBA Corporation)
Virtual Villagers 4 - The Tree of Life (x32 Version: 2.2.0.98 - WildTangent) Hidden
welcome (x32 Version: 11.0.22500.0.0 - Nero AG) Hidden
WildTangent Games (HKLM-x32\...\WildTangent toshiba Master Uninstall) (Version: 1.0.2.5 - WildTangent)
Windows Live Essentials (HKLM-x32\...\WinLiveSuite) (Version: 15.4.3538.0513 - Microsoft Corporation)
Windows Live Mesh - ActiveX-besturingselement voor externe verbindingen (HKLM-x32\...\{C32CE55C-12BA-4951-8797-0967FDEF556F}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{2902F983-B4C1-44BA-B85D-5C6D52E2C441}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX control for remote connections (HKLM-x32\...\{C5398A89-516C-4DAF-BA07-EE7949090E56}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{C63A1E60-B6A4-440B-89A5-1FC6E4AC1C94}) (Version: 15.4.5722.2 - Microsoft Corporation)
ZoneAlarm Antivirus (x32 Version: 10.2.057.000 - Check Point Software Technologies Ltd.) Hidden
ZoneAlarm Firewall (x32 Version: 10.2.057.000 - Check Point Software Technologies Ltd.) Hidden
ZoneAlarm Free Antivirus + Firewall (HKLM-x32\...\ZoneAlarm Free Antivirus + Firewall) (Version: 10.2.047.000 - Check Point)
ZoneAlarm Security (x32 Version: 10.2.057.000 - Check Point Software Technologies Ltd.) Hidden

==================== Custom CLSID (selected items): ==========================

(If an entry is included in the fixlist, it will be removed from registry. Any eventual file will not be moved.)


==================== Restore Points  =========================

15-11-2014 12:48:58 Windows Update
16-11-2014 09:01:26 Windows Update
17-11-2014 21:18:23 zoek.exe restore point

==================== Hosts content: ==========================

(If needed Hosts: directive could be included in the fixlist to reset Hosts.)

2009-07-14 03:34 - 2014-11-16 18:31 - 00000027 ____A C:\windows\system32\Drivers\etc\hosts
127.0.0.1       localhost

==================== Scheduled Tasks (whitelisted) =============

(If an entry is included in the fixlist, it will be removed from registry. Any associated file could be listed separately to be moved.)

Task: {6F65B2F6-61E0-4982-9C30-32581D5DBC3D} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07] (Google Inc.)
Task: {AD56B3A2-9D11-49C8-9504-B3294E685B9B} - System32\Tasks\Apple\AppleSoftwareUpdate => C:\Program Files (x86)\Apple Software Update\SoftwareUpdate.exe [2011-06-01] (Apple Inc.)
Task: {B693A355-823C-455A-8CD7-2097843D95FD} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07] (Google Inc.)
Task: {D5564931-3368-4DA3-B8A9-59FE6E3576DE} - System32\Tasks\Adobe Flash Player Updater => C:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2014-11-17] (Adobe Systems Incorporated)
Task: C:\windows\Tasks\Adobe Flash Player Updater.job => C:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
Task: C:\windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Task: C:\windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe

==================== Loaded Modules (whitelisted) =============

2011-11-24 21:20 - 2011-11-24 21:20 - 00593856 _____ () C:\Program Files\TOSHIBA\TECO\TecoPower.dll
2013-09-05 00:17 - 2013-09-05 00:17 - 04300456 _____ () C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODF
2011-08-22 23:19 - 2011-08-22 23:19 - 11204992 _____ () C:\Program Files\TOSHIBA\FlashCards\BlackPng.dll
2010-12-15 23:19 - 2010-12-15 23:19 - 00124320 _____ () C:\Program Files\TOSHIBA\TECO\MUIHelp.dll
2012-03-07 01:01 - 2011-02-22 11:16 - 00559104 _____ () C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\de\Humphrey.resources.dll
2012-03-07 01:05 - 2011-12-15 15:56 - 00022400 _____ () C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\de\TosDILangPack.resources.dll
2012-03-07 01:05 - 2011-12-15 15:55 - 00063360 _____ () C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIInternal.XmlSerializers.dll
2011-11-26 02:51 - 2011-11-26 02:51 - 00079784 _____ () C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosIPCWraper.dll
2014-01-20 13:17 - 2014-01-20 13:17 - 00073544 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\zlib1.dll
2014-01-20 13:16 - 2014-01-20 13:16 - 01044808 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\libxml2.dll
2013-09-05 00:14 - 2013-09-05 00:14 - 04300456 _____ () C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\OFFICE.ODF

==================== Alternate Data Streams (whitelisted) =========

(If an entry is included in the fixlist, only the Alternate Data Streams will be removed.)


==================== Safe Mode (whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. The "AlternateShell" will be restored.)

HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\vsmon => ""="Service"

==================== EXE Association (whitelisted) =============

(If an entry is included in the fixlist, the default will be restored. None default entries will be removed.)


==================== MSCONFIG/TASK MANAGER disabled items =========

(Currently there is no automatic fix for this section.)


========================= Accounts: ==========================

Administrator (S-1-5-21-3119111728-3156756977-804979122-500 - Administrator - Disabled)
Gast (S-1-5-21-3119111728-3156756977-804979122-501 - Limited - Disabled)
HomeGroupUser$ (S-1-5-21-3119111728-3156756977-804979122-1002 - Limited - Enabled)
Melanie (S-1-5-21-3119111728-3156756977-804979122-1000 - Administrator - Enabled) => C:\Users\Melanie

==================== Faulty Device Manager Devices =============

Name: TSSTcorp CDDVDW SN-208AB
Description: CD-ROM-Laufwerk
Class Guid: {4d36e965-e325-11ce-bfc1-08002be10318}
Manufacturer: (Standard-CD-ROM-Laufwerke)
Service: cdrom
Problem: : Windows cannot start this hardware device because its configuration information (in the registry) is incomplete or damaged. (Code 19)
Resolution: A registry problem was detected.
 This can occur when more than one service is defined for a device, if there is a failure opening the service subkey, or if the driver name cannot be obtained from the service subkey. Try these options:
On the "General Properties" tab of the device, click "Troubleshoot" to start the troubleshooting wizard.
Click "Uninstall", and then click "Scan for hardware changes" to load a usable driver.


==================== Event log errors: =========================

Application errors:
==================
Error: (11/17/2014 09:25:07 PM) (Source: WinMgmt) (EventID: 10) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (11/17/2014 09:03:10 PM) (Source: WinMgmt) (EventID: 10) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (11/17/2014 08:40:08 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 92998982

Error: (11/17/2014 08:40:08 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 92998982

Error: (11/17/2014 08:40:08 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/16/2014 10:27:37 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 187326

Error: (11/16/2014 10:27:37 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 187326

Error: (11/16/2014 10:27:37 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/16/2014 10:27:21 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 171726

Error: (11/16/2014 10:27:21 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 171726


System errors:
=============
Error: (11/17/2014 09:40:46 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Sicherheitsupdate für Windows 7 für x64-basierte Systeme (KB3006226)

Error: (11/17/2014 09:40:46 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Sicherheitsupdate für Windows 7 für x64-basierte Systeme (KB2993651)

Error: (11/17/2014 09:40:46 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Update für Windows 7 für x64-basierte Systeme (KB2977728)

Error: (11/17/2014 09:40:46 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Update für Windows 7 für x64-basierte Systeme (KB3008627)

Error: (11/17/2014 09:40:46 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Sicherheitsupdate für Windows 7 für x64-basierte Systeme (KB3002885)

Error: (11/17/2014 09:40:25 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Sicherheitsupdate für Windows 7 für x64-basierte Systeme (KB2984972)

Error: (11/17/2014 09:40:25 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Sicherheitsupdate für Windows 7 für x64-basierte Systeme (KB3010788)

Error: (11/17/2014 09:40:25 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Sicherheitsupdate für Microsoft .NET Framework 3.5.1 unter Windows 7 und Windows Server 2008 R2 SP1 für x64-basierte Systeme (KB2978120)

Error: (11/17/2014 09:40:25 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Sicherheitsupdate für Windows 7 für x64-basierte Systeme (KB2992611)

Error: (11/17/2014 09:40:25 PM) (Source: Microsoft-Windows-WindowsUpdateClient) (EventID: 20) (User: NT-AUTORITÄT)
Description: Installationsfehler: Die Installation des folgenden Updates ist mit Fehler 0x80004004 fehlgeschlagen: Sicherheitsupdate für Microsoft .NET Framework 3.5.1 unter Windows 7 und Windows Server 2008 R2 SP1 für x64-basierte Systeme (KB2973112)


Microsoft Office Sessions:
=========================
Error: (11/17/2014 09:25:07 PM) (Source: WinMgmt) (EventID: 10) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (11/17/2014 09:03:10 PM) (Source: WinMgmt) (EventID: 10) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (11/17/2014 08:40:08 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 92998982

Error: (11/17/2014 08:40:08 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 92998982

Error: (11/17/2014 08:40:08 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/16/2014 10:27:37 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 187326

Error: (11/16/2014 10:27:37 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 187326

Error: (11/16/2014 10:27:37 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/16/2014 10:27:21 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 171726

Error: (11/16/2014 10:27:21 AM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 171726


CodeIntegrity Errors:
===================================
  Date: 2014-11-17 22:24:17.817
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-17 22:12:32.839
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-17 21:40:54.742
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-17 21:21:57.040
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-17 20:40:19.404
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-16 18:45:06.155
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-16 18:37:02.778
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-16 17:29:51.462
  Description: Windows konnte die Abbildintegrität der Datei "\Device\HarddiskVolume2\ComboFix\catchme.sys" nicht überprüfen, weil der Dateihash nicht im System gefunden wurde. Möglicherweise wurde durch eine kürzlich durchgeführte Hardware- oder Softwareänderung eine falsch signierte oder beschädigte Datei oder eine Datei, bei der es sich um schädliche Software aus einer unbekannten Quelle handelt, installiert.

  Date: 2014-11-16 17:29:51.337
  Description: Windows konnte die Abbildintegrität der Datei "\Device\HarddiskVolume2\ComboFix\catchme.sys" nicht überprüfen, weil der Dateihash nicht im System gefunden wurde. Möglicherweise wurde durch eine kürzlich durchgeführte Hardware- oder Softwareänderung eine falsch signierte oder beschädigte Datei oder eine Datei, bei der es sich um schädliche Software aus einer unbekannten Quelle handelt, installiert.

  Date: 2014-11-16 15:51:22.322
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.


==================== Memory info =========================== 

Processor: Intel(R) Core(TM) i5-3210M CPU @ 2.50GHz
Percentage of memory in use: 25%
Total physical RAM: 8154.8 MB
Available physical RAM: 6063.32 MB
Total Pagefile: 16307.79 MB
Available Pagefile: 14022.04 MB
Total Virtual: 8192 MB
Available Virtual: 8191.85 MB

==================== Drives ================================

Drive c: (TI30886900A) (Fixed) (Total:578.84 GB) (Free:466.63 GB) NTFS ==>[System with boot components (obtained from reading drive)]

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or Vista) (Size: 596.2 GB) (Disk ID: 1780111D)
Partition 1: (Active) - (Size=1.5 GB) - (Type=27)
Partition 2: (Not Active) - (Size=578.8 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=15.9 GB) - (Type=17)

==================== End Of Log ============================
         

Alt 18.11.2014, 12:12   #8
M-K-D-B
/// TB-Ausbilder
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Servus,



Zitat:
Beim Neustart nach dem AdwCleaner haben sich Windows-Updates installiert.
Bei ca. 35% Ladefortschritt kam eine Meldung, dass es beim Update einen Fehler gab und alle Änderungen rückgängig gemacht werden. Ist das irgendwie relevant?
Naja, es macht keinen Sinn, während der Breinigung irgendwas zu installieren... steht auch in meinem 1. Post... aber das hast du wohl mal locker "überlesen", oder?

Ggf. musst du Updates halt später nochmal installieren.





Wir entfernen die letzten Reste und kontrollieren nochmal alles. EEK und ESET können länger (> 2 h) dauern.
Im Anschluss entfernen wir alle verwendeten Tools und ich gebe dir noch ein paar Tipps mit auf den Weg.




Schritt 1
Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster.

Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument


Code:
ATTFilter
start
CloseProcesses:
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
HKU\S-1-5-21-3119111728-3156756977-804979122-1000\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM-x32 - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
FF Extension: Avira Browser Safety - C:\Users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default\Extensions\abs@avira.com [2014-10-06]
EmptyTemp:
end
         

Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
  • Starte nun FRST erneut und klicke den Entfernen Button.
  • Das Tool erstellt eine Fixlog.txt.
  • Poste mir deren Inhalt.






Schritt 2
Lade Dir bitte von hier Emsisoft Emergency Kit Download Emsisoft Emergency Kit herunter.
  • Bitte installiere das Programm in den vorgegebenen Pfad.
  • Starte das Programm durch Doppelklick der Desktopverknüpfung.
  • Das EEK ist nach dem Laden der Malwaresignaturen für den Scan bereit.
  • Folge nun bitte der bebilderten Bildanleitung zu Emergency Kit, entferne alle Funde und poste am Ende des Scans bzw. der Bereinigung das Log.






Schritt 3

ESET Online Scanner

  • Hier findest du eine bebilderte Anleitung zu ESET Online Scanner
  • Lade und starte Eset Online Scanner
  • Setze einen Haken bei Ja, ich bin mit den Nutzungsbedingungen einverstanden und klicke auf Starten.
  • Aktiviere die "Erkennung von eventuell unerwünschten Anwendungen" und wähle folgende Einstellungen.
  • Klicke auf Starten.
  • Die Signaturen werden heruntergeladen, der Scan beginnt automatisch.
  • Klicke am Ende des Suchlaufs auf Fertig stellen.
  • Schließe das Fenster von ESET.
  • Explorer öffnen.
  • C:\Programme\Eset\EsetOnlineScanner\log.txt (bei 64 Bit auch C:\Programme (x86)\Eset\EsetOnlineScanner\log.txt) suchen und mit Deinem Editor öffnen (bebildert).
  • Logfile hier posten.
  • Deinstallation: Systemsteuerung => Software / Programme deinstallieren => Eset Online Scanner V3 entfernen.
  • Manuell folgenden Ordner löschen und Papierkorb leeren => C:\Programme\Eset






Schritt 4
Downloade Dir bitte SecurityCheck und:

  • Speichere es auf dem Desktop.
  • Starte SecurityCheck.exe und folge den Anweisungen in der DOS-Box.
  • Wenn der Scan beendet wurde sollte sich ein Textdokument (checkup.txt) öffnen.
Poste den Inhalt bitte hier.






Bitte poste mit deiner nächsten Antwort
  • die Logdatei des FRST-Fix,
  • die Logdatei von EEK,
  • die Logdatei von ESET,
  • die Logdatei von SecurityCheck.

Alt 21.11.2014, 07:04   #9
Melanie3107
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Guten Morgen,

das ich nichts installieren soll habe ich zwar gelesen, aber leider nicht daran gedacht die automatischen Updates zu deaktivieren.Sorry, mein Fehler

Hier die nächsten Log-Datein

Code:
ATTFilter
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 17-11-2014
Ran by Melanie at 2014-11-18 18:40:59 Run:1
Running from C:\Users\Melanie\Desktop
Loaded Profile: Melanie (Available profiles: Melanie)
Boot Mode: Normal
==============================================

Content of fixlist:
*****************
start
CloseProcesses:
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
HKU\S-1-5-21-3119111728-3156756977-804979122-1000\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM-x32 - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
FF Extension: Avira Browser Safety - C:\Users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default\Extensions\abs@avira.com [2014-10-06]
EmptyTemp:
end
         
*****************

Processes closed successfully.
"HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer" => Key deleted successfully.
"HKU\S-1-5-21-3119111728-3156756977-804979122-1000\SOFTWARE\Policies\Microsoft\Internet Explorer" => Key deleted successfully.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = => Value not found.
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\SearchScopes: HKLM-x32 - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = => Value not found.
C:\Users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default\Extensions\abs@avira.com => Moved successfully.
EmptyTemp: => Removed 152.1 MB temporary data.


The system needed a reboot. 

==== End of Fixlog ====
         

Code:
ATTFilter
Emsisoft Emergency Kit - Version 9.0
Letztes Update: 19.11.2014 17:27:43
Benutzerkonto: Melanie-TOSH\Melanie

Scan Einstellungen:

Scan Methode: Detail Scan
Objekte: Rootkits, Speicher, Traces, C:\

PUPs-Erkennung: An
Archiv Scan: An
ADS Scan: An
Dateitypen-Filter: Aus
Erweitertes Caching: An
Direkter Festplattenzugriff: Aus

Scan Beginn:	19.11.2014 17:28:24
Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLEREGISTRYTOOLS 	gefunden: Setting.DisableRegistryTools (A)

Gescannt	266972
Gefunden	1

Scan Ende:	19.11.2014 19:40:32
Scan Zeit:	2:12:08

Value: HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLEREGISTRYTOOLS	Quarantäne Setting.DisableRegistryTools (A)

Quarantäne	1
         
Code:
ATTFilter
ESETSmartInstaller@High as downloader log:
all ok
# product=EOS
# version=8
# OnlineScannerApp.exe=1.0.0.1
# OnlineScanner.ocx=1.0.0.7623
# api_version=3.0.2
# EOSSerial=4dea016c6c667f4b9ebaf4c68ccac91e
# engine=21170
# end=finished
# remove_checked=false
# archives_checked=true
# unwanted_checked=true
# unsafe_checked=false
# antistealth_checked=true
# utc_time=2014-11-20 05:13:25
# local_time=2014-11-20 06:13:25 (+0100, Mitteleuropäische Zeit)
# country="Germany"
# lang=1031
# osver=6.1.7601 NT Service Pack 1
# compatibility_mode_1=''
# compatibility_mode=5893 16776574 100 94 129010 168090255 0 0
# scanned=218622
# found=2
# cleaned=0
# scan_time=34830
sh=E5453123E5A686ED0A9CEA7604FD0E1E6CCE7D28 ft=1 fh=668740bd58201f5f vn="Win32/Toolbar.Conduit evtl. unerwünschte Anwendung" ac=I fn="C:\Users\Melanie\Desktop\zaSetupWeb_102_047_000_en.exe"
sh=A831A70E5CD96F619800A76B7693BC54A6CAC656 ft=1 fh=7d722770b416883c vn="Win32/Toolbar.Conduit evtl. unerwünschte Anwendung" ac=I fn="C:\Users\Melanie\Downloads\zafwSetupWeb_133_209_000.exe"
         
Code:
ATTFilter
 Results of screen317's Security Check version 0.99.89  
 Windows 7 Service Pack 1 x64 (UAC is enabled)  
 Internet Explorer 11  
``````````````Antivirus/Firewall Check:`````````````` 
ZoneAlarm Antivirus   
 Antivirus up to date!   
`````````Anti-malware/Other Utilities Check:````````` 
 Java(TM) 6 Update 30  
 Java version out of Date! 
 Adobe Flash Player 15.0.0.223  
 Adobe Reader 10.1.9 Adobe Reader out of Date!  
 Mozilla Firefox (33.1) 
 Google Chrome 12.0.742.91  
````````Process Check: objlist.exe by Laurent````````  
 Malwarebytes Anti-Malware mbamservice.exe  
 Malwarebytes Anti-Malware mbam.exe  
 Malwarebytes Anti-Malware mbamscheduler.exe   
 TOSHIBA TOSHIBA Online Product Information TOPI.exe  
 CheckPoint ZoneAlarm vsmon.exe  
 CheckPoint ZoneAlarm zatray.exe  
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C:  
````````````````````End of Log``````````````````````
         

Alt 21.11.2014, 16:41   #10
M-K-D-B
/// TB-Ausbilder
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Reste entfernen
Drücke bitte die Windowstaste + R Taste und schreibe notepad in das Ausführen Fenster.

Kopiere nun folgenden Text aus der Code-Box in das leere Textdokument


Code:
ATTFilter
start
CloseProcesses:
C:\Users\Melanie\Desktop\zaSetupWeb*.exe
end
         

Speichere diese bitte als Fixlist.txt auf deinem Desktop (oder dem Verzeichnis in dem sich FRST befindet).
  • Starte nun FRST erneut und klicke den Entfernen Button.
  • Das Tool erstellt eine Fixlog.txt.
  • Poste mir deren Inhalt.



Die Fixlog von FRST gleich posten, da diese sonst mit DelFix (siehe weiter unten) automatisch entfernt wird!






Wenn du keine Probleme mehr mit Malware hast, dann sind wir hier fertig. Deine Logdateien sind sauber.
Zum Schluss müssen wir noch ein paar abschließende Schritte unternehmen, um deinen Pc aufzuräumen und abzusichern.





Schritt 1
Ändere regelmäßig alle deine Passwörter, jetzt nach der Bereinigung ist ein idealer Zeitpunkt dafür!
  • Verwende für jede Anwendung und jeden Account ein anderes Passwort.
  • Ändere regelmäßig dein Passwort, vor allem bei Onlinebanking oder deinem Emailpostfach ist das sehr wichtig.
  • Speichere keine Passwörter auf deinem PC, gib diese nicht an Dritte weiter.
  • Ein sicheres Passwort besteht aus mindestens 8 Zeichen und beinhaltet Groß- und Kleinbuchstaben, Zahlen und Sonderzeichen.
  • Benutze keine Zahlen- oder Buchstabenkombinationen, ( zB 12345678, qwertzui) auch keine Zahlen oder Buchstabenmuster.
  • Verwende keine Passwörter die einen Bezug zu dir, deinem Wohnort, Familienmitglied oder Haustier (Geburtsdatum, Postleitzahl, Adresse, Name) haben.





Schritt 2
Du verwendest veraltete Software auf deinem Rechner, was ein Sicherheitsrisiko darstellt. Daher solltest du veraltete Software deinstallieren und anschließend die aktuellste Version installieren.
Folge dem Pfad Start > Systemsteuerung > Sofware / Programme deinstallieren.
Deinstalliere die folgenden Programme von deinem Rechner:
  • Java(TM) 6 Update 30
  • Adobe Reader 10
Starte deinen Rechner nach der Deinstallation neu auf.
Downloade und installiere dir bitte nun:Starte deinen Rechner nach der Installation neu auf.





Schritt 3
Die Reihenfolge ist hier entscheidend.
  1. Falls Defogger benutzt wurde: Defogger nochmal starten und auf re-enable klicken.
  2. Falls Combofix benutzt wurde: (Alternativ in uninstall.exe umbenennen und starten)
    • Windowstaste + R > Combofix /Uninstall (eingeben) > OK
    • Alternative: Combofix.exe in uninstall.exe umbenennen und starten
    • Combofix wird jetzt starten, sich evtl updaten und dann alle Reste von sich selbst entfernen.
  3. Downloade Dir bitte auf jeden Fall DelFix Download DelFix auf deinen Desktop:
    • Schließe alle offenen Programme.
    • Starte die delfix.exe mit einem Doppelklick.
    • Setze vor jede Funktion ein Häkchen.
    • Klicke auf Start.
    • Hinweis: DelFix entfernt u. a. alle verwendeten Programme, die Quarantäne unserer Scanner, den Java-Cache und löscht sich abschließend selbst.
    • Starte deinen Rechner abschließend neu.
  4. Sollten jetzt noch Programme aus unserer Bereinigung übrig sein kannst du sie bedenkenlos löschen.







Schritt 4
Abschließend habe ich noch ein paar Tipps zur Absicherung deines Systems.


Ich kann gar nicht zu oft erwähnen, wie wichtig es ist, dass dein System Up to Date ist.
  • Bitte überprüfe ob dein System Windows Updates automatisch herunter lädt
  • Windows Updates
    • Windows XP: Start --> Systemsteuerung --> Doppelklick auf Automatische Updates
    • Windows Vista / 7: Start --> Systemsteuerung --> System und Sicherheit --> Automatische Updates aktivieren oder deaktivieren
  • Gehe sicher das die automatischen Updates aktiviert sind.
  • Software Updates
    Installierte Software kann ebenfalls Sicherheitslücken haben, welche Malware nutzen kann, um dein System zu infizieren.
    Um deine Installierte Software up to date zu halten, empfehle ich dir Secunia Online Software.


Anti-Viren-Programm und zusätzlicher Schutz
  • Gehe sicher, dass du immer nur eine Anti-Viren Software installiert hast und dass diese auch up to date ist! Ein kostenloses Anti-Viren Programm, das wir empfehlen, wäre z. B. Avast! Free Antivirus oder Microsoft Security Essentials.
  • MalwareBytes Anti Malware
    Dies ist eines der besten Anti-Malware Tools auf dem Markt. Es ist ein On- Demond Scan Tool welches viele aktuelle Malware erkennt und auch entfernt. Du kannst es zusätzlich zu deinem Anti-Viren Programm verwenden.
    Update das Tool und lasse es einmal in der Woche laufen. Die Kaufversion bietet zudem noch einen Hintergrundwächter.
    Ein Tutorial zur Verwendung findest Du hier.
  • AdwCleaner
    Dieses Tool erkennt eine Vielzahl von Werbeprogrammen (Adware) und unerwünschten Programmen (PUPs).
    Starte das Tool einmal die Woche und lass es laufen. Sollte eine neue Version verfügbar sein, so wird dies angezeigt und du kannst dir die neueste Version direkt von der Herstellerseite auf den Desktop herunterladen. Auch dieses Programm kann parallel zu deinem Anti-Viren Programm verwendet werden.
  • SpywareBlaster
    Eine kurze Einführung findest du Hier


Alternative Browser
Andere Browser tendieren zu etwas mehr Sicherheit als der IE, da diese keine Active X Elemente verwenden. Diese können von Spyware zur Infektion deines Systems missbraucht werden.
Mozilla Firefox
  • Hinweis: Für diesen Browser habe ich hier ein paar nützliche Add Ons
  • NoScript
    Dieses AddOn blockt JavaScript, Java and Flash und andere Plugins. Sie werden nur dann ausgeführt, wenn Du es bestätigst.
  • AdblockPlus
    Dieses AddOn blockt die meisten Werbung von selbst. Ein Rechtsklick auf den Banner um diesen zu AdBlockPlus hinzuzufügen reicht und dieser wird nicht mehr geladen.
    Es spart außerdem Downloadkapazität.


Performance
  • Halte dich fern von Registry Cleanern.
    Diese Schaden deinem System mehr als dass sie helfen. Hier ein englischer Link:
    Miekemoes Blogspot ( MVP )


Was du vermeiden solltest:
  • Klicke nicht auf alles, nur weil es dich dazu auffordert und schön bunt ist.
  • Verwende keine P2P oder Filesharing Software (Emule, uTorrent,..).
  • Lass die Finger von Cracks, Keygens, Serials oder anderer illegaler Software.
  • Öffne keine Anhänge von dir nicht bekannten Emails. Achte vor allem auf die Dateiendung wie z.B. deinFoto.jpg.exe.
  • Lade keine Software von Softonic oder Chip herunter, da diese Installer oft mit Adware oder unerünschter Software versehen sind!



Nun bleibt mir nur noch dir viel Spaß beim sicheren Surfen zu wünschen... ... und vielleicht möchtest du ja das Trojaner-Board unterstützen?

Hinweis: Bitte gib mir eine kurze Rückmeldung wenn alles erledigt ist und keine Fragen mehr vorhanden sind, so dass ich dieses Thema aus meinen Abos löschen kann.

Alt 22.11.2014, 12:41   #11
Melanie3107
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Hier schon mal die Log-Datei.

Code:
ATTFilter
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 20-11-2014
Ran by Melanie at 2014-11-21 18:14:49 Run:2
Running from C:\Users\Melanie\Desktop
Loaded Profile: Melanie (Available profiles: Melanie)
Boot Mode: Normal
==============================================

Content of fixlist:
*****************
start
CloseProcesses:
C:\Users\Melanie\Desktop\zaSetupWeb*.exe
end
         
*****************

Processes closed successfully.
C:\Users\Melanie\Desktop\zaSetupWeb*.exe => Moved successfully.


The system needed a reboot. 

==== End of Fixlog ====
         
So, jetzt ist alles erledigt.
Vielen, vielen Dank für deine Zeit und Mühe!


Alt 22.11.2014, 17:01   #12
M-K-D-B
/// TB-Ausbilder
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Ich bin froh, dass wir helfen konnten

In diesem Forum kannst du eine kurze Rückmeldung zur Bereinigung abgeben, sofern du das möchtest:
Lob, Kritik und Wünsche
Klicke dazu auf den Button "NEUES THEMA" und poste ein kleines Feedback. Vielen Dank!

Dieses Thema scheint erledigt und wird aus meinen Abos gelöscht. Solltest Du das Thema erneut brauchen, schicke mir bitte eine PM.

Jeder andere bitte hier klicken und einen eigenen Thread erstellen.

Antwort

Themen zu Windows 7: Programme stürzen ab nach Virusfund
antivirus, bonjour, branding, device driver, entfernen, fehlercode 0x5, fehlercode 19, fehlercode windows, firefox, flash player, iexplore.exe, installation, mozilla, programm, realtek, registry, security, server, software, svchost.exe, system, tr/rootkit.gen2, vista, windows



Ähnliche Themen: Windows 7: Programme stürzen ab nach Virusfund


  1. Office- und weitere Programme stürzen regelmäßig ab
    Log-Analyse und Auswertung - 08.10.2015 (14)
  2. Windows 7 Home 64Bit: Virusfund nach Öffnen einer Dateianlage und Dienst atiedxx.exe läuft
    Log-Analyse und Auswertung - 18.02.2015 (24)
  3. Windows 7: Firefox startet nicht mehr und Programme stürzen ab
    Log-Analyse und Auswertung - 05.02.2015 (11)
  4. Programme stürzen ständig ab
    Plagegeister aller Art und deren Bekämpfung - 24.10.2014 (13)
  5. Programme stürzen ab/öffnen nicht
    Log-Analyse und Auswertung - 14.12.2013 (9)
  6. Windows 7: PC wird nach Virusfund und Entfernung immer langsamer
    Log-Analyse und Auswertung - 19.10.2013 (19)
  7. Nach TDSSKiller, combofix und Co. stürzen heute Programme ständig ab oder starten nicht mehr
    Plagegeister aller Art und deren Bekämpfung - 13.06.2013 (5)
  8. Programme stürzen ab, Virenmeldungen TR/Kazy.18548.1
    Log-Analyse und Auswertung - 12.04.2011 (1)
  9. PC hängt öfter und Programme stürzen ab!
    Log-Analyse und Auswertung - 18.02.2011 (14)
  10. Programme stürzen andauernd ab
    Log-Analyse und Auswertung - 24.03.2010 (1)
  11. MS Programme stürzen ab
    Log-Analyse und Auswertung - 03.01.2009 (0)
  12. Programme stürzen ab!
    Log-Analyse und Auswertung - 07.11.2008 (5)
  13. HEUR/HTML.Malware/Programme stürzen ab!
    Plagegeister aller Art und deren Bekämpfung - 24.04.2008 (6)
  14. PC langsam und Programme stürzen ab
    Log-Analyse und Auswertung - 25.09.2007 (1)
  15. PC fährt nicht richtig hoch, Programme stürzen ab
    Plagegeister aller Art und deren Bekämpfung - 17.09.2006 (2)
  16. Programme stürzen gleich nach Start ab
    Alles rund um Windows - 11.09.2005 (2)
  17. Programme stürzen dauernd ab...Stopfehlermeldungen
    Alles rund um Windows - 02.05.2005 (6)

Zum Thema Windows 7: Programme stürzen ab nach Virusfund - Hallo, Antivir hat "TR/Rootkit.Gen2" als Virus/unerwünschtes Programm gemeldet. Dieses lässt sich allerdings nicht entfernen und die Meldung taucht alle 2 Tage wieder auf. Seit dem stürzen sämtliche Programme (Z.B. MS - Windows 7: Programme stürzen ab nach Virusfund...
Archiv
Du betrachtest: Windows 7: Programme stürzen ab nach Virusfund auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.