Zurück   Trojaner-Board > Malware entfernen > Log-Analyse und Auswertung

Log-Analyse und Auswertung: Windows 7: Programme stürzen ab nach Virusfund

Windows 7 Wenn Du Dir einen Trojaner eingefangen hast oder ständig Viren Warnungen bekommst, kannst Du hier die Logs unserer Diagnose Tools zwecks Auswertung durch unsere Experten posten. Um Viren und Trojaner entfernen zu können, muss das infizierte System zuerst untersucht werden: Erste Schritte zur Hilfe. Beachte dass ein infiziertes System nicht vertrauenswürdig ist und bis zur vollständigen Entfernung der Malware nicht verwendet werden sollte.XML.

Antwort
Alt 15.11.2014, 13:53   #1
Melanie3107
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Hallo,

Antivir hat "TR/Rootkit.Gen2" als Virus/unerwünschtes Programm gemeldet.
Dieses lässt sich allerdings nicht entfernen und die Meldung taucht alle 2 Tage wieder auf.
Seit dem stürzen sämtliche Programme (Z.B. MS Office, Mozilla Firefox, ITunes) ab und reagieren nicht mehr. Teilweise hängt sich der Laptop komplett auf, sodass neu gestartet werden muss, was extrem lange dauert.

Die in der Checkliste beschriebenen Programme habe ich alle durchgeführt. FRST hat sich auch immer wieder aufgehängt (keine Rückmeldung). GMER lief extrem lange (über 36h).

Vielen Dank schon mal im Voraus!

Hier meine Logfiles:

Code:
ATTFilter
defogger_disable by jpshortstuff (23.02.10.1)
Log created at 20:56 on 11/11/2014 (Melanie)

Checking for autostart values...
HKCU\~\Run values retrieved.
HKLM\~\Run values retrieved.

Checking for services/drivers...


-=E.O.F=-
         
Code:
ATTFilter
Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 10-11-2014
Ran by Melanie (administrator) on MELANIE-TOSH on 12-11-2014 18:16:23
Running from C:\Users\Melanie\Desktop
Loaded Profiles: Melanie &  (Available profiles: Melanie)
Platform: Windows 7 Home Premium Service Pack 1 (X64) OS Language: Deutsch (Deutschland)
Internet Explorer Version 11
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: hxxp://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(AMD) C:\Windows\System32\atiesrxx.exe
(Check Point Software Technologies LTD) C:\Program Files (x86)\CheckPoint\ZoneAlarm\vsmon.exe
(AMD) C:\Windows\System32\atieclxx.exe
(Microsoft Corporation) C:\Windows\System32\wlanext.exe
(Check Point Software Technologies) C:\Program Files\CheckPoint\ZAForceField\ISWSVC.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe
(Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
(Realtek Semiconductor) C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
(SRS Labs, Inc.) C:\Program Files\SRS Labs\SRS Control Panel\SRSPanel_64.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\Power Saver\TPwrMain.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TECO\Teco.exe
(Check Point Software Technologies) C:\Program Files\CheckPoint\ZAForceField\ForceField.exe
(Toshiba Europe GmbH) C:\Program Files (x86)\Toshiba TEMPRO\TemproTray.exe
(TOSHIBA) C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\TOPI.exe
(Google Inc.) C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
(Microsoft Corporation) C:\Program Files\Windows Sidebar\sidebar.exe
(Toshiba) C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIMonitor.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(Malwarebytes Corporation) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe
(Adobe Systems Incorporated) C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
(TOSHIBA Corporation) C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe
(Advanced Micro Devices Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
(TOSHIBA) C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe
(Check Point Software Technologies LTD) C:\Program Files (x86)\CheckPoint\ZoneAlarm\zatray.exe
(Apple Inc.) C:\Users\Melanie\Music\iTunes\iTunesHelper.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\My Avira\Avira.OE.Systray.exe
(Malwarebytes Corporation) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe
(Malwarebytes Corporation) C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbam.exe
(ATI Technologies Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe
(TOSHIBA Corporation) C:\Windows\System32\TODDSrv.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avshadow.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TECO\TecoService.exe
(Avira Operations GmbH & Co. KG) C:\Program Files (x86)\Avira\AntiVir Desktop\avwebgrd.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v3.0\WPF\PresentationFontCache.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe
(TOSHIBA Corporation) C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSENotify.exe
(Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TPHM\TPCHSrv.exe
(TOSHIBA Corporation) C:\Program Files\TOSHIBA\TPHM\TPCHWMsg.exe
(Microsoft Corporation) C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
(Microsoft Corporation) C:\Windows\System32\dllhost.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
(Advanced Micro Devices, Inc.) C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MMLoadDrv.exe
(Microsoft Corporation) C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe


==================== Registry (Whitelisted) ==================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [] => [X]
HKLM\...\Run: [RtHDVCpl] => C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe [12446824 2012-02-01] (Realtek Semiconductor)
HKLM\...\Run: [SynTPEnh] => C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [2867984 2011-12-23] (Synaptics Incorporated)
HKLM\...\Run: [SRS Premium Sound HD] => C:\Program Files\SRS Labs\SRS Control Panel\SRSPanel_64.exe [2165120 2012-02-06] (SRS Labs, Inc.)
HKLM\...\Run: [TPwrMain] => C:\Program Files\TOSHIBA\Power Saver\TPwrMain.EXE [590256 2011-09-23] (TOSHIBA Corporation)
HKLM\...\Run: [TCrdMain] => C:\Program Files\TOSHIBA\FlashCards\TCrdMain.exe [989056 2011-12-14] (TOSHIBA Corporation)
HKLM\...\Run: [Teco] => C:\Program Files\TOSHIBA\TECO\Teco.exe [1548208 2011-11-24] (TOSHIBA Corporation)
HKLM\...\Run: [TosWaitSrv] => C:\Program Files\TOSHIBA\TPHM\TosWaitSrv.exe [712096 2011-12-14] (TOSHIBA Corporation)
HKLM\...\Run: [TosSENotify] => C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosWaitSrv.exe [710560 2011-11-26] (TOSHIBA Corporation)
HKLM\...\Run: [TosVolRegulator] => C:\Program Files\TOSHIBA\TosVolRegulator\TosVolRegulator.exe [24376 2009-11-11] (TOSHIBA Corporation)
HKLM\...\Run: [Toshiba TEMPRO] => C:\Program Files (x86)\Toshiba TEMPRO\TemproTray.exe [1546720 2011-02-10] (Toshiba Europe GmbH)
HKLM\...\Run: [Toshiba Registration] => C:\Program Files\TOSHIBA\Registration\ToshibaReminder.exe [150992 2012-03-07] (Toshiba Europe GmbH)
HKLM\...\Run: [ISW] => C:\Program Files\CheckPoint\ZAForceField\ForceField.exe [1126528 2012-04-30] (Check Point Software Technologies)
HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [NBAgent] => C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe [1492264 2011-11-18] (Nero AG)
HKLM-x32\...\Run: [StartCCC] => C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe [343168 2012-01-20] (Advanced Micro Devices, Inc.)
HKLM-x32\...\Run: [ITSecMng] => C:\Program Files (x86)\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe [80840 2011-04-02] (TOSHIBA CORPORATION)
HKLM-x32\...\Run: [USB3MON] => C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe [291608 2012-01-05] (Intel Corporation)
HKLM-x32\...\Run: [ToshibaServiceStation] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe [1298816 2011-07-12] (TOSHIBA Corporation)
HKLM-x32\...\Run: [TSleepSrv] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe [253312 2011-11-21] (TOSHIBA)
HKLM-x32\...\Run: [ZoneAlarm] => C:\Program Files (x86)\CheckPoint\ZoneAlarm\zatray.exe [73392 2012-06-01] (Check Point Software Technologies LTD)
HKLM-x32\...\Run: [BCSSync] => C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe [89184 2012-11-05] (Microsoft Corporation)
HKLM-x32\...\Run: [APSDaemon] => C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe [43848 2014-02-12] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] => C:\Users\Melanie\Music\iTunes\iTunesHelper.exe [152392 2014-05-26] (Apple Inc.)
HKLM-x32\...\Run: [avgnt] => C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe [348624 2012-05-01] (Avira Operations GmbH & Co. KG)
HKLM-x32\...\Run: [Avira Systray] => C:\Program Files (x86)\Avira\My Avira\Avira.OE.Systray.exe [164656 2014-08-27] (Avira Operations GmbH & Co. KG)
HKU\S-1-5-18-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-19\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-19-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-20\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-20-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000\...\Run: [swg] => C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2012-03-07] (Google Inc.)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
HKU\S-1-5-21-3119111728-3156756977-804979122-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\...\Run: [swg] => C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [39408 2012-03-07] (Google Inc.)
HKU\S-1-5-18\...\Run: [TOPI.EXE] => C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe [846936 2011-05-16] (TOSHIBA)
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Toshiba Places Icon Utility.lnk
ShortcutTarget: Toshiba Places Icon Utility.lnk -> C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIMonitor.exe (Toshiba)
Startup: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRDCReminder.lnk
ShortcutTarget: TRDCReminder.lnk -> C:\Program Files (x86)\TOSHIBA\TRDCReminder\TRDCReminder.exe (TOSHIBA Europe)
Startup: C:\Users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TRDCReminder.lnk
ShortcutTarget: TRDCReminder.lnk -> C:\Program Files (x86)\TOSHIBA\TRDCReminder\TRDCReminder.exe (TOSHIBA Europe)

==================== Internet (All) ===========================

HKCU\Software\Microsoft\Internet Explorer\Main,Local Page = C:\windows\system32\blank.htm
HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://www.google.com/ig/redirectdomain?brand=TEUA&bmod=TEUA
HKCU\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://www.google.com/ig/redirectdomain?brand=TEUA&bmod=TEUA
HKLM\Software\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\System32\blank.htm
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://go.microsoft.com/fwlink/p/?LinkId=255141
HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = hxxp://go.microsoft.com/fwlink/p/?LinkId=255141
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Local Page = C:\Windows\SysWOW64\blank.htm
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = hxxp://go.microsoft.com/fwlink/?LinkId=54896
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Page_URL = hxxp://go.microsoft.com/fwlink/p/?LinkId=255141
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = hxxp://go.microsoft.com/fwlink/p/?LinkId=255141
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = hxxp://go.microsoft.com/fwlink/?LinkId=54896
URLSearchHook: HKCU - Microsoft Url Search Hook - {CFBFAE00-17A6-11D0-99CB-00C04FD64497} - C:\Windows\System32\ieframe.dll (Microsoft Corporation)
URLSearchHook: HKCU - Microsoft Url Search Hook - {CFBFAE00-17A6-11D0-99CB-00C04FD64497} - C:\Windows\SysWOW64\ieframe.dll (Microsoft Corporation)
StartMenuInternet: IEXPLORE.EXE - C:\Program Files\Internet Explorer\iexplore.exe
SearchScopes: HKLM - DefaultScope {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM - {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKLM-x32 - DefaultScope {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKLM-x32 - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = 
SearchScopes: HKLM-x32 - {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA;
SearchScopes: HKCU - DefaultScope {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA_deDE489
SearchScopes: HKCU - {60D8521F-1B29-45F9-9A79-6C32C6586254} URL = hxxp://www.google.com/search?sourceid=ie7&q={searchTerms}&rls=com.microsoft:{language}:{referrer:source?}&ie={inputEncoding}&oe={outputEncoding}&rlz=1I7TEUA_deDE489
BHO: Groove GFS Browser Helper -> {72853161-30C5-4D22-B7F9-0BBC1D38A37E} -> C:\Program Files\Microsoft Office\Office14\GROOVEEX.DLL (Microsoft Corporation)
BHO: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files\Microsoft Office\Office14\URLREDIR.DLL (Microsoft Corporation)
BHO-x32: Groove GFS Browser Helper -> {72853161-30C5-4D22-B7F9-0BBC1D38A37E} -> C:\Program Files (x86)\Microsoft Office\Office14\GROOVEEX.DLL (Microsoft Corporation)
BHO-x32: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> C:\Program Files (x86)\Microsoft Office\Office14\URLREDIR.DLL (Microsoft Corporation)
Toolbar: HKLM - ZoneAlarm Security Engine - {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - C:\Program Files\CheckPoint\ZAForceField\TrustChecker\bin\TrustCheckerIEPlugin.dll (Check Point Software Technologies)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
Toolbar: HKLM-x32 - ZoneAlarm Security Engine - {EE2AC4E5-B0B0-4EC6-88A9-BCA1A32AB107} - C:\Program Files\CheckPoint\ZAForceField\WOW64\TrustChecker\bin\TrustCheckerIEPlugin.dll (Check Point Software Technologies)
Toolbar: HKLM-x32 - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
Toolbar: HKU\S-1-5-21-3119111728-3156756977-804979122-1000 -> Google Toolbar - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
Toolbar: HKU\S-1-5-21-3119111728-3156756977-804979122-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0 -> Google Toolbar - {2318C2B1-4965-11D4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
DPF: HKLM-x32 {8AD9C840-044E-11D1-B3E9-00805F499D93} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: HKLM-x32 {CAFEEFAC-0016-0000-0030-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
DPF: HKLM-x32 {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_30-windows-i586.cab
         
Code:
ATTFilter
Additional scan result of Farbar Recovery Scan Tool (x64) Version: 10-11-2014
Ran by Melanie at 2014-11-12 08:46:58
Running from C:\Users\Melanie\Desktop
Boot Mode: Normal
==========================================================


==================== Security Center ========================

(If an entry is included in the fixlist, it will be removed.)

AV: ZoneAlarm Antivirus (Enabled - Up to date) {DE038A5B-9EDD-18A9-2361-FF7D98D43730}
AV: Avira Desktop (Enabled - Out of date) {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
AS: Avira Desktop (Enabled - Out of date) {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
AS: Windows Defender (Enabled - Out of date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: ZoneAlarm Anti-Spyware (Enabled - Up to date) {65626BBF-B8E7-1727-19D1-C40FE3537D8D}
FW: ZoneAlarm Firewall (Enabled) {E6380B7E-D4B2-19F1-083E-56486607704B}

==================== Installed Programs ======================

(Only the adware programs with "hidden" flag could be added to the fixlist to unhide them. The adware programs should be uninstalled manually.)

Adobe Flash Player 15 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 15.0.0.167 - Adobe Systems Incorporated)
Adobe Flash Player 15 Plugin (HKLM-x32\...\Adobe Flash Player Plugin) (Version: 15.0.0.152 - Adobe Systems Incorporated)
Adobe Reader X (10.1.9) MUI (HKLM-x32\...\{AC76BA86-7AD7-FFFF-7B44-AA0000000001}) (Version: 10.1.9 - Adobe Systems Incorporated)
Agatha Christie - Death on the Nile (x32 Version: 2.2.0.98 - WildTangent) Hidden
Aloha TriPeaks (x32 Version: 2.2.0.98 - WildTangent) Hidden
AMD Catalyst Install Manager (HKLM\...\{F856881A-D370-B1A7-2AFF-128F4AA93558}) (Version: 3.0.859.0 - Advanced Micro Devices, Inc.)
Apple Application Support (HKLM-x32\...\{D9DAD0FF-495A-472B-9F10-BAE430A26682}) (Version: 3.0.3 - Apple Inc.)
Apple Mobile Device Support (HKLM\...\{787136D2-F0F8-4625-AA3F-72D7795AC842}) (Version: 7.1.1.3 - Apple Inc.)
Apple Software Update (HKLM-x32\...\{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}) (Version: 2.1.3.127 - Apple Inc.)
Atheros Bluetooth Filter Driver Package (HKLM\...\{65486209-5C54-439C-8383-8AC9BBE25932}) (Version: 1.0.0.12 - Atheros Communications)
Atheros Communications Inc.(R) AR81Family Gigabit/Fast Ethernet Driver (HKLM-x32\...\{3108C217-BE83-42E4-AE9E-A56A2A92E549}) (Version: 2.0.12.13 - Atheros Communications Inc.)
Atheros Driver Installation Program (HKLM-x32\...\{C3A32068-8AB1-4327-BB16-BED9C6219DC7}) (Version: 9.2 - Atheros)
Avira (HKLM-x32\...\{70e83cd8-4bd5-4039-ab5a-6b94a8abb641}) (Version: 1.1.21.25162 - Avira Operations GmbH & Co. KG)
Avira (x32 Version: 1.1.21.25162 - Avira Operations GmbH & Co. KG) Hidden
Avira Free Antivirus (HKLM-x32\...\Avira AntiVir Desktop) (Version: 12.0.0.1125 - Avira)
Bejeweled 3 (x32 Version: 2.2.0.98 - WildTangent) Hidden
Bluetooth Stack for Windows by Toshiba (HKLM\...\{CEBB6BFB-D708-4F99-A633-BC2600E01EF6}) (Version: v9.00.00(T) - TOSHIBA CORPORATION)
Bonjour (HKLM\...\{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}) (Version: 3.0.0.10 - Apple Inc.)
Cake Mania (x32 Version: 2.2.0.98 - WildTangent) Hidden
Chuzzle Deluxe (x32 Version: 2.2.0.95 - WildTangent) Hidden
Contrôle ActiveX Windows Live Mesh pour connexions à distance (HKLM-x32\...\{55D003F4-9599-44BF-BA9E-95D060730DD3}) (Version: 15.4.5722.2 - Microsoft Corporation)
D3DX10 (x32 Version: 15.4.2368.0902 - Microsoft) Hidden
ElsterFormular (HKLM-x32\...\ElsterFormular) (Version: 15.2.20140326 - Landesfinanzdirektion Thüringen)
Galerie de photos Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Google Chrome (HKLM-x32\...\Google Chrome) (Version: 12.0.742.91 - Google Inc.)
Google Toolbar for Internet Explorer (HKLM-x32\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.3.2710.138 - Google Inc.)
Google Toolbar for Internet Explorer (x32 Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (x32 Version: 1.3.21.111 - Google Inc.) Hidden
High-Definition Video Playback (x32 Version: 11.1.10500.2.65 - Nero AG) Hidden
Insaniquarium Deluxe (x32 Version: 2.2.0.97 - WildTangent) Hidden
Intel(R) Management Engine Components (HKLM-x32\...\{65153EA5-8B6E-43B6-857B-C6E4FC25798A}) (Version: 8.0.1.1399 - Intel Corporation)
Intel(R) Rapid Storage Technology (HKLM-x32\...\{3E29EE6C-963A-4aae-86C1-DC237C4A49FC}) (Version: 11.0.0.1032 - Intel Corporation)
Intel(R) USB 3.0 eXtensible Host Controller Driver (HKLM-x32\...\{240C3DDD-C5E9-4029-9DF7-95650D040CF2}) (Version: 1.0.1.209 - Intel Corporation)
iTunes (HKLM\...\{5A68A656-979F-4168-8795-E2E368AA4DC2}) (Version: 11.2.2.3 - Apple Inc.)
Java(TM) 6 Update 30 (HKLM-x32\...\{26A24AE4-039D-4CA4-87B4-2F83216030FF}) (Version: 6.0.300 - Oracle)
Jewel Quest Solitaire 2 (x32 Version: 2.2.0.98 - WildTangent) Hidden
Junk Mail filter update (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Malwarebytes Anti-Malware Version 2.0.3.1025 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.0.3.1025 - Malwarebytes Corporation)
Mesh Runtime (x32 Version: 15.4.5722.2 - Microsoft Corporation) Hidden
Microsoft .NET Framework 4.5.1 (HKLM\...\{92FB6C44-E685-45AD-9B20-CADF4CABA132} - 1033) (Version: 4.5.50938 - Microsoft Corporation)
Microsoft Office 2010 (HKLM-x32\...\{95140000-0070-0000-0000-0000000FF1CE}) (Version: 14.0.4763.1000 - Microsoft Corporation)
Microsoft Office Professional Plus 2010 (HKLM-x32\...\Office14.PROPLUSR) (Version: 14.0.7015.1000 - Microsoft Corporation)
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.30514.0 - Microsoft Corporation)
Microsoft SQL Server 2005 Compact Edition [ENU] (HKLM-x32\...\{F0B430D1-B6AA-473D-9B06-AA3DD01FD0B8}) (Version: 3.1.0000 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (HKLM-x32\...\{710f4c1c-cc18-4c49-8cbf-51240c89a1a2}) (Version: 8.0.61001 - Microsoft Corporation)
Microsoft Visual C++ 2005 Redistributable (x64) (HKLM\...\{ad8a2fa1-06e7-4b0d-927d-6e54b3d31028}) (Version: 8.0.61000 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161 (HKLM\...\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30411 (HKLM-x32\...\{5DA8F6CD-C70E-39D8-8430-3D9808D6BD17}) (Version: 9.0.30411 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (HKLM-x32\...\{9A25302D-30C0-39D9-BD6F-21E6EC160475}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (HKLM-x32\...\{1F1C2DFC-2D24-3E06-BCB8-725134ADF989}) (Version: 9.0.30729.4148 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (HKLM-x32\...\{9BE518E6-ECC6-35A9-88E4-87755C07200F}) (Version: 9.0.30729.6161 - Microsoft Corporation)
Microsoft Visual C++ 2010  x64 Redistributable - 10.0.40219 (HKLM\...\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}) (Version: 10.0.40219 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
Mozilla Firefox 31.0 (x86 de) (HKLM-x32\...\Mozilla Firefox 31.0 (x86 de)) (Version: 31.0 - Mozilla)
Mozilla Maintenance Service (HKLM-x32\...\MozillaMaintenanceService) (Version: 29.0.1 - Mozilla)
Mystery P.I. - The London Caper (x32 Version: 2.2.0.95 - WildTangent) Hidden
Nero 11 Essentials (HKLM-x32\...\{F8635CF8-B797-4EFD-80BC-DE2D26C65D4F}) (Version: 11.0.00300 - Nero AG)
Nero Backup Drivers (HKLM\...\{D600D357-5CB9-4DE9-8FD4-14E208BD1970}) (Version: 1.0.11100.8.0 - Nero AG)
OpenOffice.org 3.4 (HKLM-x32\...\{4C552FD3-2CCD-4E00-AC64-0681DBB3F8B5}) (Version: 3.4.9590 - OpenOffice.org)
Plants vs. Zombies - Game of the Year (x32 Version: 2.2.0.98 - WildTangent) Hidden
PlayReady PC Runtime amd64 (HKLM\...\{BCA9334F-B6C9-4F65-9A73-AC5A329A4D04}) (Version: 1.3.0 - Microsoft Corporation)
Polar Bowler (x32 Version: 2.2.0.97 - WildTangent) Hidden
Premium Sound HD (HKLM\...\{439A73C2-8CFA-4630-8484-36BCA2AEBB0A}) (Version: 1.12.0300 - SRS Labs, Inc.)
Raccolta foto di Windows Live (x32 Version: 15.4.3502.0922 - Microsoft Corporation) Hidden
Realtek High Definition Audio Driver (HKLM-x32\...\{F132AF7F-7BCA-4EDE-8A7C-958108FE7DBC}) (Version: 6.0.1.6559 - Realtek Semiconductor Corp.)
Realtek USB 2.0 Reader Driver (HKLM-x32\...\{62BBB2F0-E220-4821-A564-730807D2C34D}) (Version: 6.1.7601.39013 - Realtek Semiconductor Corp.)
Service Pack 2 for Microsoft Office 2010 (KB2687455) 32-Bit Edition (HKLM-x32\...\{91140000-0011-0000-0000-0000000FF1CE}_Office14.PROPLUSR_{DE28B448-32E8-4E8F-84F0-A52B21A49B5B}) (Version:  - Microsoft)
Skype™ 6.11 (HKLM-x32\...\{4E76FF7E-AEBA-4C87-B788-CD47E5425B9D}) (Version: 6.11.102 - Skype Technologies S.A.)
Synaptics Pointing Device Driver (HKLM\...\SynTPDeinstKey) (Version: 15.3.39.0 - Synaptics Incorporated)
TOSHIBA Assist (HKLM-x32\...\{C2A276E3-154E-44DC-AAF1-FFDD7FD30E35}) (Version: 4.2.3.1 - TOSHIBA CORPORATION)
TOSHIBA Disc Creator (HKLM\...\{5DA0E02F-970B-424B-BF41-513A5018E4C0}) (Version: 2.1.0.11 for x64 - TOSHIBA Corporation)
TOSHIBA eco Utility (HKLM\...\{2C486987-D447-4E36-8D61-86E48E24199C}) (Version: 1.3.10.64 - TOSHIBA Corporation)
TOSHIBA Hardware Setup (HKLM-x32\...\{97965331-BC5D-4D9F-B6DF-5C0A123E4AE0}) (Version: 2.1.0.8 - TOSHIBA Corporation)
TOSHIBA HDD/SSD Alert (HKLM\...\{D4322448-B6AF-4316-B859-D8A0E84DCB38}) (Version: 3.1.64.11 - TOSHIBA Corporation)
Toshiba Manuals (HKLM-x32\...\{90FF4432-21B7-4AF6-BA6E-FB8C1FED9173}) (Version: 10.04 - TOSHIBA)
TOSHIBA Media Controller (HKLM-x32\...\{C7A4F26F-F9B0-41B2-8659-99181108CDE3}) (Version: 1.0.87.4 - TOSHIBA CORPORATION)
TOSHIBA Media Controller Plug-in (HKLM-x32\...\{F26FDF57-483E-42C8-A9C9-EEE1EDB256E0}) (Version: 1.0.7.7 - TOSHIBA CORPORATION)
TOSHIBA Online Product Information (HKLM-x32\...\{2290A680-4083-410A-ADCC-7092C67FC052}) (Version: 4.01.0000 - TOSHIBA)
TOSHIBA PC Health Monitor (HKLM\...\{9DECD0F9-D3E8-48B0-A390-1CF09F54E3A4}) (Version: 1.7.15.64 - TOSHIBA Corporation)
TOSHIBA Places Icon Utility (HKLM-x32\...\{461F6F0D-7173-4902-9604-AB1A29108AF2}) (Version: 1.1.1.4 - TOSHIBA Corporation)
TOSHIBA Recovery Media Creator (HKLM-x32\...\{B65BBB06-1F8E-48F5-8A54-B024A9E15FDF}) (Version: 2.1.6.52020009 - TOSHIBA CORPORATION)
TOSHIBA Recovery Media Creator Reminder (HKLM-x32\...\InstallShield_{773970F1-5EBA-4474-ADEE-1EA3B0A59492}) (Version: 1.00.0019 - TOSHIBA)
TOSHIBA Resolution+ Plug-in for Windows Media Player (HKLM-x32\...\{6CB76C9D-80C2-4CB3-A4CD-D96B239E3F94}) (Version: 1.1.2004 - TOSHIBA Corporation)
TOSHIBA Service Station (HKLM-x32\...\{AC6569FA-6919-442A-8552-073BE69E247A}) (Version: 2.2.13 - TOSHIBA)
TOSHIBA Sleep Utility (HKLM-x32\...\{654F7484-88C5-46DC-AB32-C66BCB0E2102}) (Version: 1.4.0022.000104 - TOSHIBA Corporation)
TOSHIBA Supervisor Password (HKLM-x32\...\{0AF17224-CF88-40B8-BB1A-D179369847B4}) (Version: 2.1.0.3 - TOSHIBA Corporation)
TOSHIBA TEMPRO (HKLM-x32\...\{F082CB11-4794-4259-99A1-D91BA762AD15}) (Version: 3.35 - Toshiba Europe GmbH)
TOSHIBA Value Added Package (HKLM-x32\...\InstallShield_{066CFFF8-12BF-4390-A673-75F95EFF188E}) (Version: 1.6.0021.640203 - TOSHIBA Corporation)
TOSHIBA Web Camera Application (HKLM-x32\...\InstallShield_{6F3C8901-EBD3-470D-87F8-AC210F6E5E02}) (Version: 2.0.3.33 - TOSHIBA Corporation)
Virtual Villagers 4 - The Tree of Life (x32 Version: 2.2.0.98 - WildTangent) Hidden
welcome (x32 Version: 11.0.22500.0.0 - Nero AG) Hidden
WildTangent Games (HKLM-x32\...\WildTangent toshiba Master Uninstall) (Version: 1.0.2.5 - WildTangent)
Windows Live Essentials (HKLM-x32\...\WinLiveSuite) (Version: 15.4.3538.0513 - Microsoft Corporation)
Windows Live Mesh - ActiveX-besturingselement voor externe verbindingen (HKLM-x32\...\{C32CE55C-12BA-4951-8797-0967FDEF556F}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{2902F983-B4C1-44BA-B85D-5C6D52E2C441}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX control for remote connections (HKLM-x32\...\{C5398A89-516C-4DAF-BA07-EE7949090E56}) (Version: 15.4.5722.2 - Microsoft Corporation)
Windows Live Mesh ActiveX Control for Remote Connections (HKLM-x32\...\{C63A1E60-B6A4-440B-89A5-1FC6E4AC1C94}) (Version: 15.4.5722.2 - Microsoft Corporation)
ZoneAlarm Antivirus (x32 Version: 10.2.057.000 - Check Point Software Technologies Ltd.) Hidden
ZoneAlarm Firewall (x32 Version: 10.2.057.000 - Check Point Software Technologies Ltd.) Hidden
ZoneAlarm Free Antivirus + Firewall (HKLM-x32\...\ZoneAlarm Free Antivirus + Firewall) (Version: 10.2.047.000 - Check Point)
ZoneAlarm LTD Toolbar (HKLM\...\ZoneAlarm LTD Toolbar) (Version:  - Check Point Software Technologies)
ZoneAlarm Security (x32 Version: 10.2.057.000 - Check Point Software Technologies Ltd.) Hidden

==================== Custom CLSID (selected items): ==========================

(If an entry is included in the fixlist, it will be removed from registry. Any eventual file will not be moved.)

CustomCLSID: HKU\S-1-5-21-3119111728-3156756977-804979122-1000_Classes\CLSID\{00000001-0E3A-4123-8B32-4B68A91E104A}\InprocServer32 -> C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIBasePlace.dll (Toshiba Corporation)

==================== Restore Points  =========================

25-07-2014 17:14:01 Windows Update
29-07-2014 13:29:10 Windows Update
31-07-2014 15:57:42 Windows Update
01-08-2014 13:44:08 Windows Update
05-08-2014 15:15:17 Windows Update
15-08-2014 14:14:04 Windows Update
15-08-2014 18:59:31 Windows Update

==================== Hosts content: ==========================

(If needed Hosts: directive could be included in the fixlist to reset Hosts.)

2009-07-14 03:34 - 2009-06-10 22:00 - 00000824 ____A C:\windows\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

(If an entry is included in the fixlist, it will be removed from registry. Any associated file could be listed separately to be moved.)

Task: {6F65B2F6-61E0-4982-9C30-32581D5DBC3D} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07] (Google Inc.)
Task: {AD56B3A2-9D11-49C8-9504-B3294E685B9B} - System32\Tasks\Apple\AppleSoftwareUpdate => C:\Program Files (x86)\Apple Software Update\SoftwareUpdate.exe [2011-06-01] (Apple Inc.)
Task: {B693A355-823C-455A-8CD7-2097843D95FD} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07] (Google Inc.)
Task: {D5564931-3368-4DA3-B8A9-59FE6E3576DE} - System32\Tasks\Adobe Flash Player Updater => C:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2014-10-19] (Adobe Systems Incorporated)
Task: C:\windows\Tasks\Adobe Flash Player Updater.job => C:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
Task: C:\windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Task: C:\windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe

==================== Loaded Modules (whitelisted) =============

2013-09-05 00:17 - 2013-09-05 00:17 - 04300456 _____ () C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\OFFICE.ODF
2011-08-22 23:19 - 2011-08-22 23:19 - 11204992 _____ () C:\Program Files\TOSHIBA\FlashCards\BlackPng.dll
2011-11-24 21:20 - 2011-11-24 21:20 - 00593856 _____ () C:\Program Files\TOSHIBA\TECO\TecoPower.dll
2010-12-15 23:19 - 2010-12-15 23:19 - 00124320 _____ () C:\Program Files\TOSHIBA\TECO\MUIHelp.dll
2012-03-07 01:01 - 2011-02-22 11:16 - 00559104 _____ () C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\de\Humphrey.resources.dll
2012-03-07 01:05 - 2011-12-15 15:56 - 00022400 _____ () C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\de\TosDILangPack.resources.dll
2012-03-07 01:05 - 2011-12-15 15:55 - 00063360 _____ () C:\Program Files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIInternal.XmlSerializers.dll
2012-01-20 12:13 - 2012-01-20 12:13 - 00369152 _____ () C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLI.Aspect.CrossDisplay.Graphics.Dashboard.dll
2011-11-09 17:55 - 2011-11-09 17:55 - 00016384 _____ () C:\Program Files (x86)\ATI Technologies\ATI.ACE\Branding\Branding.dll
2011-11-26 02:51 - 2011-11-26 02:51 - 00079784 _____ () C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosIPCWraper.dll
2014-08-18 16:15 - 2012-04-16 22:11 - 00398288 _____ () C:\Program Files (x86)\Avira\AntiVir Desktop\sqlite3.dll
2014-01-20 13:17 - 2014-01-20 13:17 - 00073544 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\zlib1.dll
2014-01-20 13:16 - 2014-01-20 13:16 - 01044808 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\libxml2.dll
2013-09-05 00:14 - 2013-09-05 00:14 - 04300456 _____ () C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Cultures\OFFICE.ODF

==================== Alternate Data Streams (whitelisted) =========

(If an entry is included in the fixlist, only the Alternate Data Streams will be removed.)


==================== Safe Mode (whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. The "AlternateShell" will be restored.)

HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\vsmon => ""="Service"

==================== EXE Association (whitelisted) =============

(If an entry is included in the fixlist, the default will be restored. None default entries will be removed.)


==================== MSCONFIG/TASK MANAGER disabled items =========

(Currently there is no automatic fix for this section.)


========================= Accounts: ==========================

Administrator (S-1-5-21-3119111728-3156756977-804979122-500 - Administrator - Disabled)
Gast (S-1-5-21-3119111728-3156756977-804979122-501 - Limited - Disabled)
HomeGroupUser$ (S-1-5-21-3119111728-3156756977-804979122-1002 - Limited - Enabled)
Melanie (S-1-5-21-3119111728-3156756977-804979122-1000 - Administrator - Enabled) => C:\Users\Melanie

==================== Faulty Device Manager Devices =============

Name: TSSTcorp CDDVDW SN-208AB
Description: CD-ROM-Laufwerk
Class Guid: {4d36e965-e325-11ce-bfc1-08002be10318}
Manufacturer: (Standard-CD-ROM-Laufwerke)
Service: cdrom
Problem: : Windows cannot start this hardware device because its configuration information (in the registry) is incomplete or damaged. (Code 19)
Resolution: A registry problem was detected.
 This can occur when more than one service is defined for a device, if there is a failure opening the service subkey, or if the driver name cannot be obtained from the service subkey. Try these options:
On the "General Properties" tab of the device, click "Troubleshoot" to start the troubleshooting wizard.
Click "Uninstall", and then click "Scan for hardware changes" to load a usable driver.


==================== Event log errors: =========================

Application errors:
==================
Error: (11/12/2014 09:11:30 AM) (Source: Avira Antivirus) (EventID: 4118) (User: NT-AUTORITÄT)
Description: AUSNAHMEFEHLER beim Aufruf der Funktion AVEPROC_TestFile() für die Datei
C:\Users\Melanie\Pictures\Justin Timberlake 2014\209 (3).jpg.
 [ACCESS_VIOLATION Exception!! EIP = 0x1a85c92]
 Bitte Avira informieren und die obige Datei übersenden!

Error: (11/12/2014 08:28:10 AM) (Source: Avira Antivirus) (EventID: 4118) (User: NT-AUTORITÄT)
Description: AUSNAHMEFEHLER beim Aufruf der Funktion AVEPROC_TestFile() für die Datei
C:\Users\Melanie\Pictures\WAGO Wiesn\396.jpg.
 [ACCESS_VIOLATION Exception!! EIP = 0x1a85c92]
 Bitte Avira informieren und die obige Datei übersenden!

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 42760

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 42760

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 41715

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 41715

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/11/2014 11:31:21 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 40716

Error: (11/11/2014 11:31:21 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 40716


System errors:
=============
Error: (11/12/2014 09:26:24 AM) (Source: DCOM) (EventID: 10010) (User: )
Description: {752073A1-23F2-4396-85F0-8FDB879ED0ED}

Error: (11/12/2014 08:49:39 AM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Der Dienst "Microsoft-Softwareschattenkopie-Anbieter" wurde aufgrund folgenden Fehlers nicht gestartet: 
%%1053

Error: (11/12/2014 08:49:39 AM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Microsoft-Softwareschattenkopie-Anbieter erreicht.

Error: (11/12/2014 08:49:39 AM) (Source: DCOM) (EventID: 10005) (User: )
Description: 1053swprv{65EE1DBA-8FF4-4A58-AC1C-3470EE2F376A}

Error: (11/12/2014 08:48:26 AM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Der Dienst "Volumeschattenkopie" wurde aufgrund folgenden Fehlers nicht gestartet: 
%%1053

Error: (11/12/2014 08:48:26 AM) (Source: DCOM) (EventID: 10005) (User: )
Description: 1053VSS{E579AB5F-1CC4-44B4-BED9-DE0991FF0623}

Error: (11/12/2014 08:48:18 AM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Volumeschattenkopie erreicht.

Error: (11/11/2014 10:54:57 PM) (Source: DCOM) (EventID: 10010) (User: )
Description: {995C996E-D918-4A8C-A302-45719A6F4EA7}

Error: (11/11/2014 10:45:43 PM) (Source: Service Control Manager) (EventID: 7000) (User: )
Description: Der Dienst "Mozilla Maintenance Service" wurde aufgrund folgenden Fehlers nicht gestartet: 
%%1053

Error: (11/11/2014 10:45:43 PM) (Source: Service Control Manager) (EventID: 7009) (User: )
Description: Das Zeitlimit (30000 ms) wurde beim Verbindungsversuch mit dem Dienst Mozilla Maintenance Service erreicht.


Microsoft Office Sessions:
=========================
Error: (11/12/2014 09:11:30 AM) (Source: Avira Antivirus) (EventID: 4118) (User: NT-AUTORITÄT)
Description: C:\Users\Melanie\Pictures\Justin Timberlake 2014\209 (3).jpgACCESS_VIOLATION0x1a85c92AVEPROC_TestFile()

Error: (11/12/2014 08:28:10 AM) (Source: Avira Antivirus) (EventID: 4118) (User: NT-AUTORITÄT)
Description: C:\Users\Melanie\Pictures\WAGO Wiesn\396.jpgACCESS_VIOLATION0x1a85c92AVEPROC_TestFile()

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 42760

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 42760

Error: (11/11/2014 11:31:23 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 41715

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 41715

Error: (11/11/2014 11:31:22 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (11/11/2014 11:31:21 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 40716

Error: (11/11/2014 11:31:21 PM) (Source: Bonjour Service) (EventID: 100) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 40716


CodeIntegrity Errors:
===================================
  Date: 2014-11-12 07:34:26.569
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-12 06:50:11.789
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 23:02:11.492
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 21:08:47.971
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 20:47:01.058
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 20:28:20.337
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-11 20:10:26.555
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-09 21:10:56.055
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-09 20:47:50.984
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.

  Date: 2014-11-09 20:02:25.124
  Description: Die Abbildintegrität der Datei "\Device\HarddiskVolume2\Program Files\CheckPoint\ZAForceField\Plugins\ISWSHEX.dll" konnte nicht überprüft werden, da der Satz seitenbezogener Abbildhashes auf dem System nicht gefunden wurde.


==================== Memory info =========================== 

Processor: Intel(R) Core(TM) i5-3210M CPU @ 2.50GHz
Percentage of memory in use: 33%
Total physical RAM: 8154.8 MB
Available physical RAM: 5429.94 MB
Total Pagefile: 16307.79 MB
Available Pagefile: 12838.94 MB
Total Virtual: 8192 MB
Available Virtual: 8191.83 MB

==================== Drives ================================

Drive c: (TI30886900A) (Fixed) (Total:578.84 GB) (Free:460.69 GB) NTFS ==>[System with boot components (obtained from reading drive)]

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or Vista) (Size: 596.2 GB) (Disk ID: 1780111D)
Partition 1: (Active) - (Size=1.5 GB) - (Type=27)
Partition 2: (Not Active) - (Size=578.8 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=15.9 GB) - (Type=17)

==================== End Of Log ============================
         
Code:
ATTFilter
GMER 2.1.19357 - hxxp://www.gmer.net
Rootkit scan 2014-11-15 13:22:40
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-0 TOSHIBA_ rev.GT00 596,17GB
Running: Gmer-19357.exe; Driver: C:\Users\Melanie\AppData\Local\Temp\pxriipoc.sys


---- User code sections - GMER 2.1 ----

.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\wininit.exe[652] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\wininit.exe[652] C:\windows\system32\USER32.dll!FindWindowW                                                                                             0000000076e6d264 5 bytes JMP 00000001222ff174
.text   C:\windows\system32\wininit.exe[652] C:\windows\system32\USER32.dll!FindWindowA                                                                                             0000000076e88270 5 bytes JMP 00000001222ff1c4
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\services.exe[748] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\services.exe[748] C:\windows\system32\USER32.dll!FindWindowW                                                                                            0000000076e6d264 5 bytes JMP 00000001222ff174
.text   C:\windows\system32\services.exe[748] C:\windows\system32\USER32.dll!FindWindowA                                                                                            0000000076e88270 5 bytes JMP 00000001222ff1c4
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                    0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                  0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                              0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                        0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\lsass.exe[756] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                              0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\lsass.exe[756] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                          000007fefe12b521 3 bytes [5D, 4B, FA]
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                      0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                    0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                                0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                          0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\lsm.exe[764] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                                0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[856] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[952] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[952] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                        000007fefe12b521 3 bytes [5D, 4B, DD]
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\atiesrxx.exe[160] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\System32\svchost.exe[648] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\System32\svchost.exe[848] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\System32\svchost.exe[848] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                        000007fefe12b521 4 bytes {JMP 0xfffffffffedc4b62}
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                  0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                                0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                            0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                      0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[432] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                            0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[1048] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1048] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                       000007fefe12b521 4 bytes {JMP 0xfffffffffedc4b62}
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[1308] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1308] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                       000007fefe12b521 3 bytes [5D, 4B, DD]
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\WLANExt.exe[1424] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\conhost.exe[1432] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\System32\spoolsv.exe[1824] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[1932] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[1932] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                                       000007fefe12b521 3 bytes [5D, 4B, DD]
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                    000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                  000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                        0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                              00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\kernel32.dll!OpenProcess                                                             0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                         0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\USER32.dll!FindWindowW                                                               00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\USER32.dll!FindWindowA                                                               000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                          0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe[2044] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                              0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                    000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                  000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                        0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort              00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\kernel32.dll!OpenProcess                             0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                         0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                          0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient              0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\USER32.dll!FindWindowW                               00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe[1336] C:\windows\syswow64\USER32.dll!FindWindowA                               000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                      0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                    0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                          0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\Bonjour\mDNSResponder.exe[1212] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                                                            000007fefe12b521 3 bytes [5D, 4B, FA]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                              000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                            000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                  0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                        00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\kernel32.dll!OpenProcess                                                       0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                   0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                    0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                        0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\USER32.dll!FindWindowW                                                         00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\USER32.dll!FindWindowA                                                         000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                                            00000000763e1465 2 bytes [3E, 76]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe[1112] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 155                                           00000000763e14bb 2 bytes [3E, 76]
.text   ...                                                                                                                                                                         * 2
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                000000007715fb28 5 bytes JMP 00000001026489ab
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                              000000007715fb70 5 bytes JMP 0000000102648d58
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                    0000000077160240 5 bytes JMP 0000000102648791
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                          00000000771604c0 5 bytes JMP 0000000102648dd9
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\kernel32.dll!OpenProcess                                                         0000000076401952 5 bytes JMP 000000010264846c
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\USER32.dll!FindWindowW                                                           00000000767298fd 5 bytes JMP 000000010264825a
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\USER32.dll!FindWindowA                                                           000000007672ffe6 5 bytes JMP 000000010264828f
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                      0000000074d2c76e 5 bytes JMP 0000000102649036
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                          0000000074d63475 5 bytes JMP 0000000102648e5d
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                                              00000000763e1465 2 bytes [3E, 76]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe[2116] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 155                                             00000000763e14bb 2 bytes [3E, 76]
.text   ...                                                                                                                                                                         * 2
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\TODDSrv.exe[2240] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                               0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                             0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                         0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                   0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe[2260] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                         0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                         0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                       0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                   0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                             0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                   0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE[2376] C:\windows\system32\ADVAPI32.dll!ImpersonateNamedPipeClient + 1                               000007fefe12b521 4 bytes {JMP 0xfffffffffee34b62}
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                  000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                      0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                            00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\syswow64\KERNEL32.dll!OpenProcess                                                           0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe[2508] C:\windows\syswow64\KERNEL32.dll!OpenProcess + 4                                                       0000000076401956 1 byte [AA]
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                        0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                      0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                  0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                            0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe[2924] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                  0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                   0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                 0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                             0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                       0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\TOSHIBA\TECO\TecoService.exe[2772] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                             0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\conhost.exe[2788] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[4016] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                    0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                  0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                              0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                        0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe[3240] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                              0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbam.exe[3824] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 69                                                     00000000763e1465 2 bytes [3E, 76]
.text   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbam.exe[3824] C:\windows\syswow64\PSAPI.DLL!GetModuleInformation + 155                                                    00000000763e14bb 2 bytes [3E, 76]
.text   ...                                                                                                                                                                         * 2
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                           0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                         0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                     0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                               0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\SearchIndexer.exe[5040] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                     0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                  000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                      0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                            00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\kernel32.dll!OpenProcess                                           0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                       0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                        0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                            0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\USER32.dll!FindWindowW                                             00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe[5088] C:\windows\syswow64\USER32.dll!FindWindowA                                             000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\system32\svchost.exe[4452] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess        000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort      000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType            0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort  00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\kernel32.dll!OpenProcess                 0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\kernel32.dll!OpenProcess + 4             0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\USER32.dll!FindWindowW                   00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\USER32.dll!FindWindowA                   000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken              0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe[1880] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient  0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                              000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                            000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                  0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                        00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\kernel32.dll!OpenProcess                                                       0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                   0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\USER32.dll!FindWindowW                                                         00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\USER32.dll!FindWindowA                                                         000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                    0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe[4108] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                        0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                                    000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                                  000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                                        0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                                              00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\kernel32.dll!OpenProcess                                                                             0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                                         0000000076401956 1 byte [AA]
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\USER32.dll!FindWindowW                                                                               00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\USER32.dll!FindWindowA                                                                               000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                                          0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Program Files (x86)\Nero\Update\NASvc.exe[1856] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                                              0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                                  000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                                000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                                      0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                                            00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\kernel32.dll!OpenProcess                                                                           0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                                       0000000076401956 1 byte [AA]
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                                        0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                                            0000000074d63475 5 bytes JMP 0000000120cb8e5d
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\USER32.dll!FindWindowW                                                                             00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Users\Melanie\Music\iTunes\iTunesHelper.exe[4924] C:\windows\syswow64\USER32.dll!FindWindowA                                                                             000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                                 0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                               0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                           0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                                     0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\windows\System32\svchost.exe[4628] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                           0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                          000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                        000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                              0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                                    00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\syswow64\kernel32.dll!OpenProcess                                                                   0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe[2112] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                               0000000076401956 1 byte [AA]
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtSetInformationProcess                                                                       0000000076fb1470 5 bytes JMP 00000001222ffe7c
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort                                                                     0000000076fb14a0 1 byte JMP 0000000122300530
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtImpersonateClientOfPort + 2                                                                 0000000076fb14a2 3 bytes {JMP 0xffffffffab34f090}
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtAccessCheckByType                                                                           0000000076fb1900 5 bytes JMP 00000001222ffab8
.text   C:\Program Files\iPod\bin\iPodService.exe[4876] C:\windows\SYSTEM32\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                 0000000076fb1aa0 5 bytes JMP 00000001223005e8
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\SysWOW64\ntdll.dll!NtSetInformationProcess                                                                         000000007715fb28 5 bytes JMP 0000000120cb89ab
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\SysWOW64\ntdll.dll!NtImpersonateClientOfPort                                                                       000000007715fb70 5 bytes JMP 0000000120cb8d58
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\SysWOW64\ntdll.dll!NtAccessCheckByType                                                                             0000000077160240 5 bytes JMP 0000000120cb8791
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\SysWOW64\ntdll.dll!NtAlpcImpersonateClientOfPort                                                                   00000000771604c0 5 bytes JMP 0000000120cb8dd9
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\kernel32.dll!OpenProcess                                                                                  0000000076401952 3 bytes JMP 0000000120cb846c
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\kernel32.dll!OpenProcess + 4                                                                              0000000076401956 1 byte [AA]
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\USER32.dll!FindWindowW                                                                                    00000000767298fd 5 bytes JMP 0000000120cb825a
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\USER32.dll!FindWindowA                                                                                    000000007672ffe6 5 bytes JMP 0000000120cb828f
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\ADVAPI32.dll!SetThreadToken                                                                               0000000074d2c76e 5 bytes JMP 0000000120cb9036
.text   C:\Users\Melanie\Desktop\Gmer-19357.exe[3300] C:\windows\syswow64\ADVAPI32.dll!ImpersonateNamedPipeClient                                                                   0000000074d63475 5 bytes JMP 0000000120cb8e5d

---- Threads - GMER 2.1 ----

Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:3084]                                                                                                      0000000076d27587
Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:3156]                                                                                                      0000000073cd7712
Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:3816]                                                                                                      0000000077192e65
Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:4456]                                                                                                      0000000077193e85
Thread  C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe [4064:4644]                                                                                                      0000000077193e85
Thread  C:\windows\System32\svchost.exe [4628:4972]                                                                                                                                 000007fef4be9688
Thread  C:\Program Files\Windows Media Player\wmpnetwk.exe [3672:5036]                                                                                                              000007fefb0d2bf8

---- Disk sectors - GMER 2.1 ----

Disk    \Device\Harddisk0\DR0                                                                                                                                                       unknown MBR code

---- EOF - GMER 2.1 ----
         
Code:
ATTFilter
Exportierte Ereignisse:

11.11.2014 21:01 [System Scanner] Malware gefunden
      Die Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\TEMPORARYFOLDER\bases\sw2\k
      lavasyswatch.dll'
      enthielt einen Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan].
      Durchgeführte Aktion(en):
      Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '509ec47a.qua' 
      verschoben!

11.11.2014 19:37 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\TEMPORARYFOLDER\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

11.11.2014 19:36 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\TEMPORARYFOLDER\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

11.11.2014 19:28 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

11.11.2014 19:28 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

09.11.2014 18:00 [System Scanner] Malware gefunden
      Die Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      enthielt einen Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan].
      Durchgeführte Aktion(en):
      Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '51663c80.qua' 
      verschoben!

09.11.2014 17:13 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

09.11.2014 17:13 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

09.11.2014 17:13 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

09.11.2014 17:13 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

09.11.2014 09:57 [System Scanner] Malware gefunden
      Die Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      enthielt einen Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan].
      Durchgeführte Aktion(en):
      Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '52c78676.qua' 
      verschoben!

09.11.2014 09:39 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

09.11.2014 09:39 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\PROGRAMDATA\CHECKPOINT\ZONEALARM\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern

19.10.2014 17:42 [System Scanner] Malware gefunden
      Die Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      enthielt einen Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan].
      Durchgeführte Aktion(en):
      Die Datei wurde ins Quarantäneverzeichnis unter dem Namen '50f37295.qua' 
      verschoben!

19.10.2014 17:36 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Übergeben an Scanner

19.10.2014 17:36 [Echtzeit Scanner] Malware gefunden
      In der Datei 
      'C:\ProgramData\CheckPoint\ZoneAlarm\Data\avsys\temp\temporaryFolder\bases\sw2\k
      lavasyswatch.dll'
      wurde ein Virus oder unerwünschtes Programm 'TR/Rootkit.Gen2' [trojan] gefunden.
      Ausgeführte Aktion: Zugriff verweigern
         

Alt 15.11.2014, 14:02   #2
M-K-D-B
/// TB-Ausbilder
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund






Mein Name ist Matthias und ich werde dir bei der Bereinigung deines Computers helfen.


Bitte beachte folgende Hinweise:
  • Falls wir Hinweise auf illegal erworbene Software finden, werden wir den Support unterbrechen bis jegliche Art von illegaler Software vom Rechner entfernt wurde.
  • Lies dir die Anleitungen sorgfältig durch. Solltest du Probleme haben, stoppe mit deiner Bearbeitung und beschreibe mir dein Problem so gut es geht.
  • Solltest du mir nicht innerhalb von 3 Tagen antworten, gehe ich davon aus, dass du keine Hilfe mehr benötigst. Dann lösche ich dein Thema aus meinem Abo. Solltest du einmal länger abwesend sein, so gib mir bitte Bescheid!
  • Während der Bereinigung bitte nichts installieren oder deinstallieren, außer ich bitte dich darum!
  • Bitte beachten: Download bei filepony.de: So ladet Ihr unsere Tools richtig!
  • Alle zu verwendenen Programme sind auf dem Desktop abzuspeichern und von dort zu starten!


Bitte arbeite alle Schritte in der vorgegebenen Reihefolge nacheinander ab und poste alle Logdateien in CODE-Tags:
So funktioniert es:
Posten in CODE-Tags
Die Logfiles anzuhängen oder sogar vorher in ein ZIP, RAR, 7Z-Archive zu packen erschwert deinem Helfer massiv die Arbeit, es sei denn natürlich die Datei wäre ansonsten zu groß für das Forum. Um die Logfiles in eine CODE-Box zu stellen gehe so vor:
  • Markiere das gesamte Logfile (geht meist mit STRG+A) und kopiere es in die Zwischenablage mit STRG+C.
  • Klicke im Editor auf das #-Symbol. Es erscheinen zwei Klammerausdrücke [CODE] [/CODE].
  • Setze den Curser zwischen die CODE-Tags und drücke STRG+V.
  • Klicke aauf Erweitert/Vorschau, um so prüfen, ob du es richtig gemacht hast. Wenn alles stimmt ... auf Antworten.

Danke für deine Mitarbeit!







Downloade dir bitte TDSSKiller TDSSKiller.exe und speichere diese Datei auf dem Desktop
  • Starte die TDSSKiller.exe - Einstellen wie in der Anleitung zu TDSSKiller beschrieben.
  • Drücke Start Scan
  • Sollten infizierte Objekte gefunden werden, wähle keinesfalls Cure. Wähle Skip und klicke auf Continue.
    TDSSKiller wird eine Logfile auf deinem Systemlaufwerk speichern (Meistens C:\)
    Als Beispiel: C:\TDSSKiller.<Version_Datum_Uhrzeit>log.txt
Poste den Inhalt bitte in jedem Fall hier in deinen Thread.
__________________


Alt 16.11.2014, 10:15   #3
Melanie3107
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Hallo Matthias,

vielen Dank für deine super schnelle Antwort.
Der TDSSKiller hat nichts gefunden.

Code:
ATTFilter
09:58:41.0807 0x1320  TDSS rootkit removing tool 3.0.0.41 Oct 28 2014 17:58:34
09:58:55.0239 0x1320  ============================================================
09:58:55.0239 0x1320  Current date / time: 2014/11/16 09:58:55.0239
09:58:55.0239 0x1320  SystemInfo:
09:58:55.0239 0x1320  
09:58:55.0239 0x1320  OS Version: 6.1.7601 ServicePack: 1.0
09:58:55.0239 0x1320  Product type: Workstation
09:58:55.0239 0x1320  ComputerName: MELANIE-TOSH
09:58:55.0239 0x1320  UserName: Melanie
09:58:55.0239 0x1320  Windows directory: C:\windows
09:58:55.0239 0x1320  System windows directory: C:\windows
09:58:55.0239 0x1320  Running under WOW64
09:58:55.0239 0x1320  Processor architecture: Intel x64
09:58:55.0239 0x1320  Number of processors: 4
09:58:55.0239 0x1320  Page size: 0x1000
09:58:55.0239 0x1320  Boot type: Normal boot
09:58:55.0239 0x1320  ============================================================
09:58:56.0310 0x1320  KLMD registered as C:\windows\system32\drivers\27715312.sys
09:58:57.0550 0x1320  System UUID: {E1DEDAD7-A295-45E1-A539-847AB566B6D6}
09:58:58.0890 0x1320  Drive \Device\Harddisk0\DR0 - Size: 0x950B056000 ( 596.17 Gb ), SectorSize: 0x200, Cylinders: 0x13001, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
09:58:58.0890 0x1320  ============================================================
09:58:58.0890 0x1320  \Device\Harddisk0\DR0:
09:58:58.0890 0x1320  MBR partitions:
09:58:58.0890 0x1320  \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x2EE800, BlocksNum 0x485AC000
09:58:58.0890 0x1320  ============================================================
09:58:58.0941 0x1320  C: <-> \Device\Harddisk0\DR0\Partition1
09:58:58.0941 0x1320  ============================================================
09:58:58.0941 0x1320  Initialize success
09:58:58.0941 0x1320  ============================================================
10:00:07.0977 0x0c9c  ============================================================
10:00:07.0977 0x0c9c  Scan started
10:00:07.0977 0x0c9c  Mode: Manual; SigCheck; TDLFS; 
10:00:15.0409 0x0c9c  ============================================================
10:00:15.0409 0x0c9c  KSN ping started
10:00:18.0029 0x0c9c  KSN ping finished: true
10:00:23.0881 0x0c9c  ================ Scan system memory ========================
10:00:23.0881 0x0c9c  System memory - ok
10:00:23.0881 0x0c9c  ================ Scan services =============================
10:00:24.0251 0x0c9c  [ A87D604AEA360176311474C87A63BB88, B1507868C382CD5D2DBC0D62114FCFBF7A780904A2E3CA7C7C1DD0844ADA9A8F ] 1394ohci        C:\windows\system32\drivers\1394ohci.sys
10:00:24.0431 0x0c9c  1394ohci - ok
10:00:24.0531 0x0c9c  [ D81D9E70B8A6DD14D42D7B4EFA65D5F2, FDAAB7E23012B4D31537C5BDEF245BB0A12FA060A072C250E21C68E18B22E002 ] ACPI            C:\windows\system32\drivers\ACPI.sys
10:00:24.0571 0x0c9c  ACPI - ok
10:00:24.0731 0x0c9c  [ 99F8E788246D495CE3794D7E7821D2CA, F91615463270AD2601F882CAED43B88E7EDA115B9FD03FC56320E48119F15F76 ] AcpiPmi         C:\windows\system32\drivers\acpipmi.sys
10:00:24.0921 0x0c9c  AcpiPmi - ok
10:00:25.0031 0x0c9c  [ B362181ED3771DC03B4141927C80F801, 69514E5177A0AEA89C27C2234712F9F82E8D8F99E1FD4273898C9324C6FF7472 ] AdobeARMservice C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
10:00:25.0061 0x0c9c  AdobeARMservice - ok
10:00:25.0391 0x0c9c  [ D51145F6B0CE987850F13A61DAD5E531, 67CB6AB8C42781FA717CBEF81F3C658747E3B7814383056A56EDA99583FDBFD5 ] AdobeFlashPlayerUpdateSvc C:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe
10:00:25.0411 0x0c9c  AdobeFlashPlayerUpdateSvc - ok
10:00:25.0501 0x0c9c  [ 2F6B34B83843F0C5118B63AC634F5BF4, 43E3F5FBFB5D33981AC503DEE476868EC029815D459E7C36C4ABC2D2F75B5735 ] adp94xx         C:\windows\system32\drivers\adp94xx.sys
10:00:25.0551 0x0c9c  adp94xx - ok
10:00:25.0651 0x0c9c  [ 597F78224EE9224EA1A13D6350CED962, DA7FD99BE5E3B7B98605BF5C13BF3F1A286C0DE1240617570B46FE4605E59BDC ] adpahci         C:\windows\system32\drivers\adpahci.sys
10:00:25.0701 0x0c9c  adpahci - ok
10:00:25.0751 0x0c9c  [ E109549C90F62FB570B9540C4B148E54, E804563735153EA00A00641814244BC8A347B578E7D63A16F43FB17566EE5559 ] adpu320         C:\windows\system32\drivers\adpu320.sys
10:00:25.0781 0x0c9c  adpu320 - ok
10:00:25.0821 0x0c9c  [ 4B78B431F225FD8624C5655CB1DE7B61, 198A5AF2125C7C41F531A652D200C083A55A97DC541E3C0B5B253C7329949156 ] AeLookupSvc     C:\windows\System32\aelupsvc.dll
10:00:26.0382 0x0c9c  AeLookupSvc - ok
10:00:26.0482 0x0c9c  [ FA886682CFC5D36718D3E436AACF10B9, F80AB4F91AA6B5C7ECCB000D8E1BC2CF776DC3D69B3D9EBC2558C19035A6B3AB ] AFD             C:\windows\system32\drivers\afd.sys
10:00:26.0722 0x0c9c  AFD - ok
10:00:26.0792 0x0c9c  [ 608C14DBA7299D8CB6ED035A68A15799, 45360F89640BF1127C82A32393BD76205E4FA067889C40C491602F370C09282A ] agp440          C:\windows\system32\drivers\agp440.sys
10:00:26.0822 0x0c9c  agp440 - ok
10:00:26.0892 0x0c9c  [ 3290D6946B5E30E70414990574883DDB, 0E9294E1991572256B3CDA6B031DB9F39CA601385515EE59F1F601725B889663 ] ALG             C:\windows\System32\alg.exe
10:00:27.0032 0x0c9c  ALG - ok
10:00:27.0192 0x0c9c  [ 5812713A477A3AD7363C7438CA2EE038, A7316299470D2E57A11499C752A711BF4A71EB11C9CBA731ED0945FF6A966721 ] aliide          C:\windows\system32\drivers\aliide.sys
10:00:27.0212 0x0c9c  aliide - ok
10:00:27.0302 0x0c9c  [ 2437C0697BA89FC5FCF2ADE491BDC2B3, D29D34C1A1CA2F5773C64B2914113E62DD5990CC1FA92C6056EB956003761D7D ] AMD External Events Utility C:\windows\system32\atiesrxx.exe
10:00:27.0542 0x0c9c  AMD External Events Utility - ok
10:00:27.0712 0x0c9c  [ 1FF8B4431C353CE385C875F194924C0C, 3EA3A7F426B0FFC2461EDF4FDB4B58ACC9D0730EDA5B728D1EA1346EA0A02720 ] amdide          C:\windows\system32\drivers\amdide.sys
10:00:27.0752 0x0c9c  amdide - ok
10:00:27.0862 0x0c9c  [ 7024F087CFF1833A806193EF9D22CDA9, E7F27E488C38338388103D3B7EEDD61D05E14FB140992AEE6F492FFC821BF529 ] AmdK8           C:\windows\system32\drivers\amdk8.sys
10:00:27.0962 0x0c9c  AmdK8 - ok
10:00:29.0462 0x0c9c  [ 184F11D8B76FACFE16390C4C47D32B5D, 712A89DD1E803254A206A796C134E1B9F5BAAF54303591BDA384AD7754FAD6AF ] amdkmdag        C:\windows\system32\DRIVERS\atikmdag.sys
10:00:30.0318 0x0c9c  amdkmdag - ok
10:00:30.0498 0x0c9c  [ 54BC6F0E471033D8B22FB5E5BEA343EE, D8D75D2B43BBD4CF6B773BF01F4013F4F2BAD0807561A9CE2042FA0D575A69D0 ] amdkmdap        C:\windows\system32\DRIVERS\atikmpag.sys
10:00:30.0548 0x0c9c  amdkmdap - ok
10:00:30.0578 0x0c9c  [ 1E56388B3FE0D031C44144EB8C4D6217, E88CA76FD47BA0EB427D59CB9BE040DE133D89D4E62D03A8D622624531D27487 ] AmdPPM          C:\windows\system32\drivers\amdppm.sys
10:00:30.0658 0x0c9c  AmdPPM - ok
10:00:30.0778 0x0c9c  [ D4121AE6D0C0E7E13AA221AA57EF2D49, 626F43C099BD197BE56648C367B711143C2BCCE96496BBDEF19F391D52FA01D0 ] amdsata         C:\windows\system32\drivers\amdsata.sys
10:00:30.0808 0x0c9c  amdsata - ok
10:00:31.0338 0x0c9c  [ F67F933E79241ED32FF46A4F29B5120B, D6EF539058F159CC4DD14CA9B1FD924998FEAC9D325C823C7A2DD21FEF1DC1A8 ] amdsbs          C:\windows\system32\drivers\amdsbs.sys
10:00:31.0368 0x0c9c  amdsbs - ok
10:00:31.0418 0x0c9c  [ 540DAF1CEA6094886D72126FD7C33048, 296578572A93F5B74E1AD443E000B79DC99D1CBD25082E02704800F886A3065F ] amdxata         C:\windows\system32\drivers\amdxata.sys
10:00:31.0438 0x0c9c  amdxata - ok
10:00:31.0848 0x0c9c  [ 466A0D95960DAD3222C896D2CEA99993, 98B29D5010A1985AA2CFD016C8730AC81BDF1A2BCFF6B2B77ED205A1301F390B ] AntiVirSchedulerService C:\Program Files (x86)\Avira\AntiVir Desktop\sched.exe
10:00:31.0878 0x0c9c  AntiVirSchedulerService - ok
10:00:31.0958 0x0c9c  [ A489BE6BB0AA1FF406B488B60542314B, 511421991E63EFE11A62B5E3BA564F7BBB8A266F7605E0006B80CDF4F261022E ] AntiVirService  C:\Program Files (x86)\Avira\AntiVir Desktop\avguard.exe
10:00:31.0978 0x0c9c  AntiVirService - ok
10:00:32.0248 0x0c9c  [ 676894FA57B671FEC5C3F05F8929E03B, B4F0CA314ABD892D299A1732BEB00FA2C8D8EB31DF1B7BB07F295F9F10548E90 ] AntiVirWebService C:\Program Files (x86)\Avira\AntiVir Desktop\AVWEBGRD.EXE
10:00:32.0288 0x0c9c  AntiVirWebService - ok
10:00:32.0408 0x0c9c  [ 89A69C3F2F319B43379399547526D952, 8ABDB4B8E106F96EBBA0D4D04C4F432296516E107E7BA5644ED2E50CF9BB491A ] AppID           C:\windows\system32\drivers\appid.sys
10:00:33.0959 0x0c9c  AppID - ok
10:00:34.0059 0x0c9c  [ 0BC381A15355A3982216F7172F545DE1, C33AF13CB218F7BF52E967452573DF2ADD20A95C6BF99229794FEF07C4BBE725 ] AppIDSvc        C:\windows\System32\appidsvc.dll
10:00:34.0159 0x0c9c  AppIDSvc - ok
10:00:34.0249 0x0c9c  [ 9D2A2369AB4B08A4905FE72DB104498F, D6FA1705018BABABFA2362E05691A0D6408D14DE7B76129B16D0A1DAD6378E58 ] Appinfo         C:\windows\System32\appinfo.dll
10:00:34.0289 0x0c9c  Appinfo - ok
10:00:34.0669 0x0c9c  [ 221564CC7BE37611FE15EACF443E1BF6, 381BDF17418C779D72332431BA174C2AD76CD9C7C1711FF5142EA9B05D5555E4 ] Apple Mobile Device C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
10:00:34.0689 0x0c9c  Apple Mobile Device - ok
10:00:34.0739 0x0c9c  [ C484F8CEB1717C540242531DB7845C4E, C507CE26716EB923B864ED85E8FA0B24591E2784A2F4F0E78AEED7E9953311F6 ] arc             C:\windows\system32\drivers\arc.sys
10:00:34.0769 0x0c9c  arc - ok
10:00:34.0939 0x0c9c  [ 019AF6924AEFE7839F61C830227FE79C, 5926B9DDFC9198043CDD6EA0B384C83B001EC225A8125628C4A45A3E6C42C72A ] arcsas          C:\windows\system32\drivers\arcsas.sys
10:00:35.0019 0x0c9c  arcsas - ok
10:00:35.0439 0x0c9c  [ 9A262EDD17F8473B91B333D6B031A901, 05DFBD3A7D83FDE1D062EA719ACA9EC48CB7FD42D17DDD88B82E5D25469ADD23 ] aspnet_state    C:\windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
10:00:35.0469 0x0c9c  aspnet_state - ok
10:00:35.0529 0x0c9c  [ 769765CE2CC62867468CEA93969B2242, 0D8F19D49869DF93A3876B4C2E249D12E83F9CE11DAE8917D368E292043D4D26 ] AsyncMac        C:\windows\system32\DRIVERS\asyncmac.sys
10:00:35.0629 0x0c9c  AsyncMac - ok
10:00:35.0729 0x0c9c  [ 02062C0B390B7729EDC9E69C680A6F3C, 0261683C6DC2706DCE491A1CDC954AC9C9E649376EC30760BB4E225E18DC5273 ] atapi           C:\windows\system32\drivers\atapi.sys
10:00:35.0749 0x0c9c  atapi - ok
10:00:36.0199 0x0c9c  [ 3660381F5EA18E14A06C98591B533AD6, F94E7D73989480CF37EDE0710A0111E9A5E51A527EAE6B8D4C84810958107EBE ] athr            C:\windows\system32\DRIVERS\athrx.sys
10:00:36.0819 0x0c9c  athr - ok
10:00:36.0879 0x06b8  Object required for P2P: [ D51145F6B0CE987850F13A61DAD5E531 ] AdobeFlashPlayerUpdateSvc
10:00:36.0919 0x0c9c  [ 2B3B05C0A7768BF033217EB8F33F9C35, F7B13158440CAE46EC93F29BA47A960194A5A2AD71B5BF628AF4661CEE096402 ] AtiHDAudioService C:\windows\system32\drivers\AtihdW76.sys
10:00:36.0989 0x0c9c  AtiHDAudioService - ok
10:00:37.0119 0x0c9c  [ F23FEF6D569FCE88671949894A8BECF1, FCE7B156ED663471CF9A736915F00302E93B50FC647563D235313A37FCE8F0F6 ] AudioEndpointBuilder C:\windows\System32\Audiosrv.dll
10:00:37.0280 0x0c9c  AudioEndpointBuilder - ok
10:00:37.0340 0x0c9c  [ F23FEF6D569FCE88671949894A8BECF1, FCE7B156ED663471CF9A736915F00302E93B50FC647563D235313A37FCE8F0F6 ] AudioSrv        C:\windows\System32\Audiosrv.dll
10:00:37.0440 0x0c9c  AudioSrv - ok
10:00:37.0550 0x0c9c  [ 26E38B5A58C6C55FAFBC563EEDDB0867, 8830E097F43AA87E9A9AC8F9EB3EBB4ED668B0F7C99D69405844E03CDC25E817 ] avgntflt        C:\windows\system32\DRIVERS\avgntflt.sys
10:00:37.0590 0x0c9c  avgntflt - ok
10:00:37.0630 0x0c9c  [ 9D1F00BEFF84CBBF46D7F052BC7E0565, 3EBF9755AF50AC32890628AEA36C3D6AABA2C35A0A5D9908E7CD01F0420E78BB ] avipbb          C:\windows\system32\DRIVERS\avipbb.sys
10:00:37.0670 0x0c9c  avipbb - ok
10:00:37.0910 0x0c9c  [ F21955927D1C99206A8B91DE2CCE85E1, 26A6155CF46123C489CBE19B5B3E3B0D9ED02C9388E57058724B0FFB7D7C08B5 ] Avira.OE.ServiceHost C:\Program Files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe
10:00:37.0958 0x0c9c  Avira.OE.ServiceHost - ok
10:00:38.0082 0x0c9c  [ 248DB59FC86DE44D2779F4C7FB1A567D, BE1D2A5A94ECDE11749B2E5DEBFEAB26C26666BE402CC8A8E5633A0075D6F265 ] avkmgr          C:\windows\system32\DRIVERS\avkmgr.sys
10:00:38.0102 0x0c9c  avkmgr - ok
10:00:38.0232 0x0c9c  [ A6BF31A71B409DFA8CAC83159E1E2AFF, CBB83F73FFD3C3FB4F96605067739F8F7A4A40B2B05417FA49E575E95628753F ] AxInstSV        C:\windows\System32\AxInstSV.dll
10:00:38.0392 0x0c9c  AxInstSV - ok
10:00:38.0482 0x0c9c  [ 3E5B191307609F7514148C6832BB0842, DE011CB7AA4A2405FAF21575182E0793A1D83DFFC44E9A7864D59F3D51D8D580 ] b06bdrv         C:\windows\system32\drivers\bxvbda.sys
10:00:38.0614 0x0c9c  b06bdrv - ok
10:00:38.0684 0x0c9c  [ B5ACE6968304A3900EEB1EBFD9622DF2, 1DAA118D8CA3F97B34DF3D3CDA1C78EAB2ED225699FEABE89D331AE0CB7679FA ] b57nd60a        C:\windows\system32\DRIVERS\b57nd60a.sys
10:00:38.0794 0x0c9c  b57nd60a - ok
10:00:38.0874 0x0c9c  [ FDE360167101B4E45A96F939F388AEB0, 8D1457E866BBD645C4B9710DFBFF93405CC1193BF9AE42326F2382500B713B82 ] BDESVC          C:\windows\System32\bdesvc.dll
10:00:38.0964 0x0c9c  BDESVC - ok
10:00:39.0056 0x0c9c  [ 16A47CE2DECC9B099349A5F840654746, 77C008AEDB07FAC66413841D65C952DDB56FE7DCA5E9EF9C8F4130336B838024 ] Beep            C:\windows\system32\drivers\Beep.sys
10:00:39.0184 0x0c9c  Beep - ok
10:00:39.0278 0x0c9c  [ 82974D6A2FD19445CC5171FC378668A4, 075D25F47C0D2277E40AF8615571DAA5EB16B1824563632A9A7EC62505C29A4A ] BFE             C:\windows\System32\bfe.dll
10:00:39.0390 0x0c9c  BFE - ok
10:00:39.0460 0x0c9c  [ 1EA7969E3271CBC59E1730697DC74682, D511A34D63A6E0E6E7D1879068E2CD3D87ABEAF4936B2EA8CDDAD9F79D60FA04 ] BITS            C:\windows\System32\qmgr.dll
10:00:39.0540 0x06b8  Object send P2P result: true
10:00:39.0622 0x0c9c  BITS - ok
10:00:39.0652 0x0c9c  [ 61583EE3C3A17003C4ACD0475646B4D3, 17E4BECC309C450E7E44F59A9C0BBC24D21BDC66DFBA65B8F198A00BB47A9811 ] blbdrive        C:\windows\system32\DRIVERS\blbdrive.sys
10:00:39.0702 0x0c9c  blbdrive - ok
10:00:39.0994 0x0c9c  [ EBBCD5DFBB1DE70E8F4AF8FA59E401FD, 17BFFC5DF609CE3B2F0CAB4BD6C118608C66A3AD86116A47E90B2BB7D8954122 ] Bonjour Service C:\Program Files\Bonjour\mDNSResponder.exe
10:00:40.0024 0x0c9c  Bonjour Service - ok
10:00:40.0094 0x0c9c  [ 6C02A83164F5CC0A262F4199F0871CF5, AD4632A6A203CB40970D848315D8ADB9C898349E20D8DF4107C2AE2703A2CF28 ] bowser          C:\windows\system32\DRIVERS\bowser.sys
10:00:40.0184 0x0c9c  bowser - ok
10:00:40.0314 0x0c9c  [ F09EEE9EDC320B5E1501F749FDE686C8, 66691114C42E12F4CC6DC4078D4D2FA4029759ACDAF1B59D17383487180E84E3 ] BrFiltLo        C:\windows\system32\drivers\BrFiltLo.sys
10:00:40.0464 0x0c9c  BrFiltLo - ok
10:00:40.0534 0x0c9c  [ B114D3098E9BDB8BEA8B053685831BE6, 0ED23C1897F35FA00B9C2848DE4ED200E18688AA7825674888054BBC3A3EB92C ] BrFiltUp        C:\windows\system32\drivers\BrFiltUp.sys
10:00:40.0584 0x0c9c  BrFiltUp - ok
10:00:40.0634 0x0c9c  [ 05F5A0D14A2EE1D8255C2AA0E9E8E694, 40011138869F5496A3E78D38C9900B466B6F3877526AC22952DCD528173F4645 ] Browser         C:\windows\System32\browser.dll
10:00:40.0754 0x0c9c  Browser - ok
10:00:40.0904 0x0c9c  [ 43BEA8D483BF1870F018E2D02E06A5BD, 4E6F5A5FD8C796A110B0DC9FF29E31EA78C04518FC1C840EF61BABD58AB10272 ] Brserid         C:\windows\System32\Drivers\Brserid.sys
10:00:41.0054 0x0c9c  Brserid - ok
10:00:41.0104 0x0c9c  [ A6ECA2151B08A09CACECA35C07F05B42, E2875BB7768ABAF38C3377007AA0A3C281503474D1831E396FB6599721586B0C ] BrSerWdm        C:\windows\System32\Drivers\BrSerWdm.sys
10:00:41.0184 0x0c9c  BrSerWdm - ok
10:00:41.0256 0x0c9c  [ B79968002C277E869CF38BD22CD61524, 50631836502237AF4893ECDCEA43B9031C3DE97433F594D46AF7C3C77F331983 ] BrUsbMdm        C:\windows\System32\Drivers\BrUsbMdm.sys
10:00:41.0346 0x0c9c  BrUsbMdm - ok
10:00:41.0358 0x0c9c  [ A87528880231C54E75EA7A44943B38BF, 4C8BBB29FDA76A96840AA47A8613C15D4466F9273A13941C19507008629709C9 ] BrUsbSer        C:\windows\System32\Drivers\BrUsbSer.sys
10:00:41.0418 0x0c9c  BrUsbSer - ok
10:00:41.0558 0x0c9c  [ D31303617FE09F5F788BC34EB8028FB5, B76240466D69CF2F0CD30F1F2A529E52B7525A01A96B73C002A90A33262EBB79 ] BtFilter        C:\windows\system32\DRIVERS\btfilter.sys
10:00:41.0598 0x0c9c  BtFilter - ok
10:00:41.0648 0x0c9c  [ 9DA669F11D1F894AB4EB69BF546A42E8, B498B8B6CEF957B73179D1ADAF084BBB57BB3735D810F9BE2C7B1D58A4FD25A4 ] BTHMODEM        C:\windows\system32\drivers\bthmodem.sys
10:00:41.0750 0x0c9c  BTHMODEM - ok
10:00:41.0852 0x0c9c  [ 95F9C2976059462CBBF227F7AAB10DE9, 2797AE919FF7606B070FB039CECDB0707CD2131DCAC09C5DF14F443D881C9F34 ] bthserv         C:\windows\system32\bthserv.dll
10:00:42.0020 0x0c9c  bthserv - ok
10:00:42.0106 0x0c9c  [ B8BD2BB284668C84865658C77574381A, 6C55BA288B626DF172FDFEA0BD7027FAEBA1F44EF20AB55160D7C7DC6E717D65 ] cdfs            C:\windows\system32\DRIVERS\cdfs.sys
10:00:42.0218 0x0c9c  cdfs - ok
10:00:42.0298 0x0c9c  [ F036CE71586E93D94DAB220D7BDF4416, BD07AAD9E20CEAF9FC84E4977C55EA2C45604A2C682AC70B9B9A2199B6713D5B ] cdrom           C:\windows\system32\DRIVERS\cdrom.sys
10:00:42.0378 0x0c9c  cdrom - ok
10:00:42.0468 0x0c9c  [ F17D1D393BBC69C5322FBFAFACA28C7F, 62A1A92B3C52ADFD0B808D7F69DD50238B5F202421F1786F7EAEAA63F274B3E8 ] CertPropSvc     C:\windows\System32\certprop.dll
10:00:42.0550 0x0c9c  CertPropSvc - ok
10:00:42.0650 0x0c9c  [ D7CD5C4E1B71FA62050515314CFB52CF, 513B5A849899F379F0BC6AB3A8A05C3493C2393C95F036612B96EC6E252E1C64 ] circlass        C:\windows\system32\drivers\circlass.sys
10:00:42.0700 0x0c9c  circlass - ok
10:00:42.0750 0x0c9c  [ FE1EC06F2253F691FE36217C592A0206, B9F122DB5E665ECDF29A5CB8BB6B531236F31A54A95769D6C5C1924C87FE70CE ] CLFS            C:\windows\system32\CLFS.sys
10:00:42.0800 0x0c9c  CLFS - ok
10:00:42.0880 0x0c9c  [ F13EC8A783E0CB0D6DC26A3CA848B7B8, 0809E3B71709F1343086EEB6C820543C1A7119E74EEF8AC1AEE1F81093ABEC66 ] clr_optimization_v2.0.50727_32 C:\windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
10:00:42.0910 0x0c9c  clr_optimization_v2.0.50727_32 - ok
10:00:42.0940 0x0c9c  [ B4D73F04E9BC076F7CDAC4327DF636BB, 1ADED20D5A0D0A76E2F85CB778FD06BAB814868D35F8532E17D67045FF4770C2 ] clr_optimization_v2.0.50727_64 C:\windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe
10:00:42.0972 0x0c9c  clr_optimization_v2.0.50727_64 - ok
10:00:43.0152 0x0c9c  [ E87213F37A13E2B54391E40934F071D0, 7EB221127EFB5BF158FB03D18EFDA2C55FB6CE3D1A1FE69C01D70DBED02C87E5 ] clr_optimization_v4.0.30319_32 C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
10:00:43.0182 0x0c9c  clr_optimization_v4.0.30319_32 - ok
10:00:43.0224 0x0c9c  [ 4AEDAB50F83580D0B4D6CF78191F92AA, D113C47013B018B45161911B96E93AF96A2F3B34FA47061BF6E7A71FBA03194A ] clr_optimization_v4.0.30319_64 C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
10:00:43.0254 0x0c9c  clr_optimization_v4.0.30319_64 - ok
10:00:43.0296 0x0c9c  [ 0840155D0BDDF1190F84A663C284BD33, 696039FA63CFEB33487FAA8FD7BBDB220141E9C6E529355D768DFC87999A9C3A ] CmBatt          C:\windows\system32\DRIVERS\CmBatt.sys
10:00:43.0366 0x0c9c  CmBatt - ok
10:00:43.0386 0x0c9c  [ E19D3F095812725D88F9001985B94EDD, 46243C5CCC4981CAC6FA6452FFCEC33329BF172448F1852D52592C9342E0E18B ] cmdide          C:\windows\system32\drivers\cmdide.sys
10:00:43.0406 0x0c9c  cmdide - ok
10:00:43.0538 0x0c9c  [ EBF28856F69CF094A902F884CF989706, AD6C9F0BC20AA49EEE5478DA0F856F0EA2B414B63208C5FFB03C9D7F5B59765F ] CNG             C:\windows\system32\Drivers\cng.sys
10:00:43.0611 0x0c9c  CNG - ok
10:00:43.0670 0x0c9c  [ 102DE219C3F61415F964C88E9085AD14, CD74CB703381F1382C32CF892FF2F908F4C9412E1BC77234F8FEA5D4666E1BF1 ] Compbatt        C:\windows\system32\drivers\compbatt.sys
10:00:43.0704 0x0c9c  Compbatt - ok
10:00:43.0748 0x0c9c  [ 03EDB043586CCEBA243D689BDDA370A8, 0E4523AA332E242D5C2C61C5717DBA5AB6E42DADB5A7E512505FC2B6CC224959 ] CompositeBus    C:\windows\system32\DRIVERS\CompositeBus.sys
10:00:43.0872 0x0c9c  CompositeBus - ok
10:00:43.0892 0x0c9c  COMSysApp - ok
10:00:43.0922 0x0c9c  [ 1C827878A998C18847245FE1F34EE597, 41EF7443D8B2733AA35CAC64B4F5F74FAC8BB0DA7D3936B69EC38E2DC3972E60 ] crcdisk         C:\windows\system32\drivers\crcdisk.sys
10:00:43.0942 0x0c9c  crcdisk - ok
10:00:44.0012 0x0c9c  [ 6B400F211BEE880A37A1ED0368776BF4, 2F27C6FA96A1C8CBDA467846DA57E63949A7EA37DB094B13397DDD30114295BD ] CryptSvc        C:\windows\system32\cryptsvc.dll
10:00:44.0124 0x0c9c  CryptSvc - ok
10:00:44.0314 0x0c9c  [ 5C627D1B1138676C0A7AB2C2C190D123, C5003F2C912C5CA990E634818D3B4FD72F871900AF2948BD6C4D6400B354B401 ] DcomLaunch      C:\windows\system32\rpcss.dll
10:00:44.0394 0x0c9c  DcomLaunch - ok
10:00:44.0434 0x0c9c  [ 3CEC7631A84943677AA8FA8EE5B6B43D, 32061DAC9ED6C1EBA3B367B18D0E965AEEC2DF635DCF794EC39D086D32503AC5 ] defragsvc       C:\windows\System32\defragsvc.dll
10:00:44.0524 0x0c9c  defragsvc - ok
10:00:44.0566 0x0c9c  [ 9BB2EF44EAA163B29C4A4587887A0FE4, 03667BC3EA5003F4236929C10F23D8F108AFCB29DB5559E751FB26DFB318636F ] DfsC            C:\windows\system32\Drivers\dfsc.sys
10:00:44.0646 0x0c9c  DfsC - ok
10:00:44.0736 0x0c9c  [ 43D808F5D9E1A18E5EEB5EBC83969E4E, C10D1155D71EABE4ED44C656A8F13078A8A4E850C4A8FBB92D52D173430972B8 ] Dhcp            C:\windows\system32\dhcpcore.dll
10:00:44.0796 0x0c9c  Dhcp - ok
10:00:45.0438 0x0c9c  [ 13096B05847EC78F0977F2C0F79E9AB3, 1E44981B684F3E56F5D2439BB7FA78BD1BC876BB2265AE089AEC68F241B05B26 ] discache        C:\windows\system32\drivers\discache.sys
10:00:45.0618 0x0c9c  discache - ok
10:00:45.0808 0x0c9c  [ 9819EEE8B5EA3784EC4AF3B137A5244C, 571BC886E87C888DA96282E381A746D273B58B9074E84D4CA91275E26056D427 ] Disk            C:\windows\system32\drivers\disk.sys
10:00:45.0838 0x0c9c  Disk - ok
10:00:45.0988 0x0c9c  [ 16835866AAA693C7D7FCEBA8FFF706E4, 15891558F7C1F2BB57A98769601D447ED0D952354A8BB347312D034DC03E0242 ] Dnscache        C:\windows\System32\dnsrslvr.dll
10:00:46.0058 0x0c9c  Dnscache - ok
10:00:46.0108 0x0c9c  [ B1FB3DDCA0FDF408750D5843591AFBC6, AB6AD9C5E7BA2E3646D0115B67C4800D1CB43B4B12716397657C7ADEEE807304 ] dot3svc         C:\windows\System32\dot3svc.dll
10:00:46.0198 0x0c9c  dot3svc - ok
10:00:46.0258 0x0c9c  [ B26F4F737E8F9DF4F31AF6CF31D05820, 394BBBED4EC7FAD4110F62A43BFE0801D4AC56FFAC6C741C69407B26402311C7 ] DPS             C:\windows\system32\dps.dll
10:00:46.0398 0x0c9c  DPS - ok
10:00:46.0458 0x0c9c  [ 9B19F34400D24DF84C858A421C205754, 967AF267B4124BADA8F507CEBF25F2192D146A4D63BE71B45BFC03C5DA7F21A7 ] drmkaud         C:\windows\system32\drivers\drmkaud.sys
10:00:46.0548 0x0c9c  drmkaud - ok
10:00:46.0948 0x0c9c  [ 87CE5C8965E101CCCED1F4675557E868, 077D98F0F130B2FC710208BA34016EF2B2506EE2BD71740B228145E34A3046F1 ] DXGKrnl         C:\windows\System32\drivers\dxgkrnl.sys
10:00:47.0038 0x0c9c  DXGKrnl - ok
10:00:47.0108 0x0c9c  [ E2DDA8726DA9CB5B2C4000C9018A9633, 0C967DBC3636A76A696997192A158AA92A1AF19F01E3C66D5BF91818A8FAEA76 ] EapHost         C:\windows\System32\eapsvc.dll
10:00:47.0208 0x0c9c  EapHost - ok
10:00:47.0688 0x0c9c  [ DC5D737F51BE844D8C82C695EB17372F, 6D4022D9A46EDE89CEF0FAEADCC94C903234DFC460C0180D24FF9E38E8853017 ] ebdrv           C:\windows\system32\drivers\evbda.sys
10:00:49.0789 0x0c9c  ebdrv - ok
10:00:49.0879 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] EFS             C:\windows\System32\lsass.exe
10:00:49.0929 0x0c9c  EFS - ok
10:00:50.0039 0x0c9c  [ C4002B6B41975F057D98C439030CEA07, 3D2484FBB832EFB90504DD406ED1CF3065139B1FE1646471811F3A5679EF75F1 ] ehRecvr         C:\windows\ehome\ehRecvr.exe
10:00:50.0381 0x0c9c  ehRecvr - ok
10:00:50.0451 0x0c9c  [ 4705E8EF9934482C5BB488CE28AFC681, 359E9EC5693CE0BE89082E1D5D8F5C5439A5B985010FF0CB45C11E3CFE30637D ] ehSched         C:\windows\ehome\ehsched.exe
10:00:50.0501 0x0c9c  ehSched - ok
10:00:50.0551 0x0c9c  [ 0E5DA5369A0FCAEA12456DD852545184, 9A64AC5396F978C3B92794EDCE84DCA938E4662868250F8C18FA7C2C172233F8 ] elxstor         C:\windows\system32\drivers\elxstor.sys
10:00:50.0601 0x0c9c  elxstor - ok
10:00:50.0631 0x0c9c  [ 34A3C54752046E79A126E15C51DB409B, 7D5B5E150C7C73666F99CBAFF759029716C86F16B927E0078D77F8A696616D75 ] ErrDev          C:\windows\system32\drivers\errdev.sys
10:00:50.0681 0x0c9c  ErrDev - ok
10:00:50.0791 0x0c9c  [ 4166F82BE4D24938977DD1746BE9B8A0, 24121751B7306225AD1C808442D7B030DEF377E9316AA0A3C5C7460E87317881 ] EventSystem     C:\windows\system32\es.dll
10:00:50.0911 0x0c9c  EventSystem - ok
10:00:50.0951 0x0c9c  [ A510C654EC00C1E9BDD91EEB3A59823B, 76CD277730F7B08D375770CD373D786160F34D1481AF0536BA1A5D2727E255F5 ] exfat           C:\windows\system32\drivers\exfat.sys
10:00:51.0041 0x0c9c  exfat - ok
10:00:51.0111 0x0c9c  [ 0ADC83218B66A6DB380C330836F3E36D, 798D6F83B5DBCC1656595E0A96CF12087FCCBE19D1982890D0CE5F629B328B29 ] fastfat         C:\windows\system32\drivers\fastfat.sys
10:00:51.0211 0x0c9c  fastfat - ok
10:00:51.0292 0x0c9c  [ DBEFD454F8318A0EF691FDD2EAAB44EB, 7F52AE222FF28503B6FC4A5852BD0CAEAF187BE69AF4B577D3DE474C24366099 ] Fax             C:\windows\system32\fxssvc.exe
10:00:51.0404 0x0c9c  Fax - ok
10:00:51.0446 0x0c9c  [ D765D19CD8EF61F650C384F62FAC00AB, 9F0A483A043D3BA873232AD3BA5F7BF9173832550A27AF3E8BD433905BD2A0EE ] fdc             C:\windows\system32\drivers\fdc.sys
10:00:51.0496 0x0c9c  fdc - ok
10:00:51.0536 0x0c9c  [ 0438CAB2E03F4FB61455A7956026FE86, 6D4DDC2973DB25CE0C7646BC85EFBCC004EBE35EA683F62162AE317C6F1D8DFE ] fdPHost         C:\windows\system32\fdPHost.dll
10:00:51.0675 0x0c9c  fdPHost - ok
10:00:51.0692 0x0c9c  [ 802496CB59A30349F9A6DD22D6947644, 52D59D3D628D5661F83F090F33F744F6916E0CC1F76E5A33983E06EB66AE19F8 ] FDResPub        C:\windows\system32\fdrespub.dll
10:00:51.0758 0x0c9c  FDResPub - ok
10:00:51.0988 0x0c9c  [ 655661BE46B5F5F3FD454E2C3095B930, 549C8E2A2A37757E560D55FFA6BFDD838205F17E40561E67F0124C934272CD1A ] FileInfo        C:\windows\system32\drivers\fileinfo.sys
10:00:52.0018 0x0c9c  FileInfo - ok
10:00:52.0018 0x0c9c  [ 5F671AB5BC87EEA04EC38A6CD5962A47, 6B61D3363FF3F9C439BD51102C284972EAE96ACC0683B9DC7E12D25D0ADC51B6 ] Filetrace       C:\windows\system32\drivers\filetrace.sys
10:00:52.0108 0x0c9c  Filetrace - ok
10:00:52.0208 0x0c9c  [ C172A0F53008EAEB8EA33FE10E177AF5, 9175A95B323696D1B35C9EFEB7790DD64E6EE0B7021E6C18E2F81009B169D77B ] flpydisk        C:\windows\system32\drivers\flpydisk.sys
10:00:52.0228 0x0c9c  flpydisk - ok
10:00:52.0518 0x0c9c  [ DA6B67270FD9DB3697B20FCE94950741, F621A4462C9F2904063578C427FAF22D7D66AE9967605C11C798099817CE5331 ] FltMgr          C:\windows\system32\drivers\fltmgr.sys
10:00:52.0588 0x0c9c  FltMgr - ok
10:00:53.0148 0x0c9c  [ C4C183E6551084039EC862DA1C945E3D, 0874A2ACDD24D64965AA9A76E9C818E216880AE4C9A2E07ED932EE404585CEE6 ] FontCache       C:\windows\system32\FntCache.dll
10:00:53.0318 0x0c9c  FontCache - ok
10:00:53.0438 0x0c9c  [ A8B7F3818AB65695E3A0BB3279F6DCE6, 89FCF10F599767E67A1E011753E34DA44EAA311F105DBF69549009ED932A60F0 ] FontCache3.0.0.0 C:\windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
10:00:53.0458 0x0c9c  FontCache3.0.0.0 - ok
10:00:53.0478 0x0c9c  [ D43703496149971890703B4B1B723EAC, F06397B2EDCA61629249D2EF1CBB7827A8BEAB8488246BD85EF6AE1363C0DA6E ] FsDepends       C:\windows\system32\drivers\FsDepends.sys
10:00:53.0498 0x0c9c  FsDepends - ok
10:00:53.0548 0x0c9c  [ 6BD9295CC032DD3077C671FCCF579A7B, 83622FBB0CB923798E7E584BF53CAAF75B8C016E3FF7F0FA35880FF34D1DFE33 ] Fs_Rec          C:\windows\system32\drivers\Fs_Rec.sys
10:00:53.0568 0x0c9c  Fs_Rec - ok
10:00:53.0648 0x0c9c  [ 8F6322049018354F45F05A2FD2D4E5E0, 73BF0FB4EBD7887E992DDEBB79E906958D6678F8D1107E8C368F5A0514D80359 ] fvevol          C:\windows\system32\DRIVERS\fvevol.sys
10:00:53.0688 0x0c9c  fvevol - ok
10:00:53.0778 0x0c9c  [ 60ACB128E64C35C2B4E4AAB1B0A5C293, 7B476AB5E95529A894F95397C753662F4C58D1FE89F4648271251DA77C5A3FA9 ] FwLnk           C:\windows\system32\DRIVERS\FwLnk.sys
10:00:53.0818 0x0c9c  FwLnk - ok
10:00:53.0858 0x0c9c  [ 8C778D335C9D272CFD3298AB02ABE3B6, 85F0B13926B0F693FA9E70AA58DE47100E4B6F893772EBE4300C37D9A36E6005 ] gagp30kx        C:\windows\system32\drivers\gagp30kx.sys
10:00:53.0888 0x0c9c  gagp30kx - ok
10:00:54.0108 0x0c9c  [ 277BBC7E1AA1EE957F573A10ECA7EF3A, 2EE60B924E583E847CC24E78B401EF95C69DB777A5B74E1EC963E18D47B94D24 ] gpsvc           C:\windows\System32\gpsvc.dll
10:00:54.0238 0x0c9c  gpsvc - ok
10:00:54.0348 0x0c9c  [ F02A533F517EB38333CB12A9E8963773, 1F72CD1CF660766FA8F912E40B7323A0192A300B376186C10F6803DC5EFE28DF ] gupdate         C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
10:00:54.0378 0x0c9c  gupdate - ok
10:00:54.0378 0x0c9c  [ F02A533F517EB38333CB12A9E8963773, 1F72CD1CF660766FA8F912E40B7323A0192A300B376186C10F6803DC5EFE28DF ] gupdatem        C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
10:00:54.0408 0x0c9c  gupdatem - ok
10:00:54.0498 0x0c9c  [ CC839E8D766CC31A7710C9F38CF3E375, 327D57F18B4A2D1CB06C5682D3364097ECD3CF40C2719AA1F41D0B49A26003E4 ] gusvc           C:\Program Files (x86)\Google\Common\Google Updater\GoogleUpdaterService.exe
10:00:54.0528 0x0c9c  gusvc - ok
10:00:54.0578 0x0c9c  [ F2523EF6460FC42405B12248338AB2F0, B2F3DE8DE1F512D871BC2BC2E8D0E33AB03335BFBC07627C5F88B65024928E19 ] hcw85cir        C:\windows\system32\drivers\hcw85cir.sys
10:00:54.0648 0x0c9c  hcw85cir - ok
10:00:54.0748 0x0c9c  [ 975761C778E33CD22498059B91E7373A, 8304E15FBE6876BE57263A03621365DA8C88005EAC532A770303C06799D915D9 ] HdAudAddService C:\windows\system32\drivers\HdAudio.sys
10:00:54.0868 0x0c9c  HdAudAddService - ok
10:00:54.0918 0x0c9c  [ 97BFED39B6B79EB12CDDBFEED51F56BB, 3CF981D668FB2381E52AF2E51E296C6CFB47B0D62249645278479D0111A47955 ] HDAudBus        C:\windows\system32\DRIVERS\HDAudBus.sys
10:00:55.0058 0x0c9c  HDAudBus - ok
10:00:55.0088 0x0c9c  [ 78E86380454A7B10A5EB255DC44A355F, 11F3ED7ACFFA3024B9BD504F81AC39F5B4CED5A8A425E8BADF7132EFEDB9BD64 ] HidBatt         C:\windows\system32\drivers\HidBatt.sys
10:00:55.0178 0x0c9c  HidBatt - ok
10:00:55.0278 0x0c9c  [ 7FD2A313F7AFE5C4DAB14798C48DD104, 94CBFD4506CBDE4162CEB3367BAB042D19ACA6785954DC0B554D4164B9FCD0D4 ] HidBth          C:\windows\system32\drivers\hidbth.sys
10:00:55.0358 0x0c9c  HidBth - ok
10:00:55.0408 0x0c9c  [ 0A77D29F311B88CFAE3B13F9C1A73825, 8615DC6CEFB591505CE16E054A71A4F371B827DDFD5E980777AB4233DCFDA01D ] HidIr           C:\windows\system32\drivers\hidir.sys
10:00:55.0448 0x0c9c  HidIr - ok
10:00:55.0508 0x0c9c  [ BD9EB3958F213F96B97B1D897DEE006D, 4D01CBF898B528B3A4E5A683DF2177300AFABD7D4CB51F1A7891B1B545499631 ] hidserv         C:\windows\system32\hidserv.dll
10:00:55.0648 0x0c9c  hidserv - ok
10:00:55.0718 0x0c9c  [ 9592090A7E2B61CD582B612B6DF70536, FD11D5E02C32D658B28FCC35688AB66CCB5D3A0A0D74C82AE0F0B6C67B568A0F ] HidUsb          C:\windows\system32\drivers\hidusb.sys
10:00:55.0798 0x0c9c  HidUsb - ok
10:00:55.0858 0x0c9c  [ 387E72E739E15E3D37907A86D9FF98E2, 9935BE2E58788E79328293AF2F202CB0F6042441B176F75ACC5AEA93C8E05531 ] hkmsvc          C:\windows\system32\kmsvc.dll
10:00:55.0948 0x0c9c  hkmsvc - ok
10:00:56.0058 0x0c9c  [ EFDFB3DD38A4376F93E7985173813ABD, 70402FA73A5A2A8BB557AAC8F531E373077D28DE5F40A1F3F14B940BE01CD2E1 ] HomeGroupListener C:\windows\system32\ListSvc.dll
10:00:56.0178 0x0c9c  HomeGroupListener - ok
10:00:56.0248 0x0c9c  [ 908ACB1F594274965A53926B10C81E89, 7D34A742AC486294D82676F8465A3EF26C8AC3317C32B63F62031CB007CFC208 ] HomeGroupProvider C:\windows\system32\provsvc.dll
10:00:56.0339 0x0c9c  HomeGroupProvider - ok
10:00:56.0449 0x0c9c  [ 39D2ABCD392F3D8A6DCE7B60AE7B8EFC, E9E6A1665740CFBC2DD321010007EF42ABA2102AEB9772EE8AA3354664B1E205 ] HpSAMD          C:\windows\system32\drivers\HpSAMD.sys
10:00:56.0489 0x0c9c  HpSAMD - ok
10:00:56.0619 0x0c9c  [ 0EA7DE1ACB728DD5A369FD742D6EEE28, 21C489412EB33A12B22290EB701C19BA57006E8702E76F730954F0784DDE9779 ] HTTP            C:\windows\system32\drivers\HTTP.sys
10:00:56.0799 0x0c9c  HTTP - ok
10:00:56.0869 0x0c9c  [ A5462BD6884960C9DC85ED49D34FF392, 53E65841AF5B06A2844D0BB6FC4DD3923A323FFA0E4BFC89B3B5CAFB592A3D53 ] hwpolicy        C:\windows\system32\drivers\hwpolicy.sys
10:00:56.0889 0x0c9c  hwpolicy - ok
10:00:56.0929 0x0c9c  [ FA55C73D4AFFA7EE23AC4BE53B4592D3, 65CDDC62B89A60E942C5642C9D8B539EFB69DA8069B4A2E54978154B314531CD ] i8042prt        C:\windows\system32\DRIVERS\i8042prt.sys
10:00:56.0979 0x0c9c  i8042prt - ok
10:00:57.0179 0x0c9c  [ C224331A54571C8C9162F7714400BBBD, C2CA4881ACD46071E67435BE5E3DB133D0743B026FD20D6D6E26B2FE7A03FCAA ] iaStor          C:\windows\system32\DRIVERS\iaStor.sys
10:00:57.0239 0x0c9c  iaStor - ok
10:00:57.0409 0x0c9c  [ AAAF44DB3BD0B9D1FB6969B23ECC8366, 805AA4A9464002D1AB3832E4106B2AAA1331F4281367E75956062AAE99699385 ] iaStorV         C:\windows\system32\drivers\iaStorV.sys
10:00:57.0479 0x0c9c  iaStorV - ok
10:00:57.0639 0x0c9c  [ C98A5B9D932430AD8EEBD3EF73756EF7, DF7E1D391A0F3345AD61154363922C27BD557DEEACE395A6A8A8A16BFD1BB9A8 ] idsvc           C:\windows\Microsoft.NET\Framework64\v3.0\Windows Communication Foundation\infocard.exe
10:00:57.0781 0x0c9c  idsvc - ok
10:00:57.0911 0x0c9c  IEEtwCollectorService - ok
10:00:57.0931 0x0c9c  [ 5C18831C61933628F5BB0EA2675B9D21, 5CD9DE2F8C0256623A417B5C55BF55BB2562BD7AB2C3C83BB3D9886C2FBDA4E4 ] iirsp           C:\windows\system32\drivers\iirsp.sys
10:00:57.0951 0x0c9c  iirsp - ok
10:00:58.0031 0x0c9c  [ 344789398EC3EE5A4E00C52B31847946, 3DA5F08E4B46F4E63456AA588D49E39A6A09A97D0509880C00F327623DB6122D ] IKEEXT          C:\windows\System32\ikeext.dll
10:00:58.0161 0x0c9c  IKEEXT - ok
10:00:58.0902 0x0c9c  [ F242E36CDA231701CFA702641C20FAEC, 47350EF8474F83249A9126AB6894145732CA0B68DA2EE001940C9E4AEF128B88 ] IntcAzAudAddService C:\windows\system32\drivers\RTKVHD64.sys
10:00:59.0102 0x0c9c  IntcAzAudAddService - ok
10:00:59.0132 0x0c9c  [ F00F20E70C6EC3AA366910083A0518AA, E2F3E9FFD82C802C8BAC309893A3664ACF16A279959C0FDECCA64C3D3C60FD22 ] intelide        C:\windows\system32\drivers\intelide.sys
10:00:59.0152 0x0c9c  intelide - ok
10:00:59.0252 0x0c9c  [ ADA036632C664CAA754079041CF1F8C1, F2386CC09AC6DE4C54189154F7D91C1DB7AA120B13FAE8BA5B579ACF99FCC610 ] intelppm        C:\windows\system32\DRIVERS\intelppm.sys
10:00:59.0282 0x0c9c  intelppm - ok
10:00:59.0342 0x0c9c  [ 098A91C54546A3B878DAD6A7E90A455B, 044CCE2A0DF56EBE1EFD99B4F6F0A5B9EE12498CA358CF4B2E3A1CFD872823AA ] IPBusEnum       C:\windows\system32\ipbusenum.dll
10:00:59.0422 0x0c9c  IPBusEnum - ok
10:00:59.0462 0x0c9c  [ C9F0E1BD74365A8771590E9008D22AB6, 728BC5A6AAE499FDC50EB01577AF16D83C2A9F3B09936DD2A89C01E074BA8E51 ] IpFilterDriver  C:\windows\system32\DRIVERS\ipfltdrv.sys
10:00:59.0604 0x0c9c  IpFilterDriver - ok
10:00:59.0654 0x0c9c  [ 08C2957BB30058E663720C5606885653, E13EDF6701512E2A9977A531454932CA5023087CB50E1D2F416B8BCDD92B67BE ] iphlpsvc        C:\windows\System32\iphlpsvc.dll
10:00:59.0774 0x0c9c  iphlpsvc - ok
10:00:59.0805 0x0c9c  [ 0FC1AEA580957AA8817B8F305D18CA3A, 7161E4DE91AAFC3FA8BF24FAE4636390C2627DB931505247C0D52C75A31473D9 ] IPMIDRV         C:\windows\system32\drivers\IPMIDrv.sys
10:00:59.0866 0x0c9c  IPMIDRV - ok
10:00:59.0876 0x0c9c  [ AF9B39A7E7B6CAA203B3862582E9F2D0, 67128BE7EADBE6BD0205B050F96E268948E8660C4BAB259FB0BE03935153D04E ] IPNAT           C:\windows\system32\drivers\ipnat.sys
10:00:59.0996 0x0c9c  IPNAT - ok
10:01:00.0256 0x0c9c  [ 835FC2EA0631B734BB06C12B0665F01D, B8A8B0148C6C3AFC40835B44E3D6508CB9EEE8AC430A7904711C8B51C2116A8D ] iPod Service    C:\Program Files\iPod\bin\iPodService.exe
10:01:00.0306 0x0c9c  iPod Service - ok
10:01:00.0378 0x0c9c  [ 3ABF5E7213EB28966D55D58B515D5CE9, A352BCC5B6B9A28805B15CAFB235676F1FAFF0D2394F88C03089EB157D6188AE ] IRENUM          C:\windows\system32\drivers\irenum.sys
10:01:00.0418 0x0c9c  IRENUM - ok
10:01:00.0478 0x0c9c  [ 2F7B28DC3E1183E5EB418DF55C204F38, D40410A760965925D6F10959B2043F7BD4F68EAFCF5E743AF11AD860BD136548 ] isapnp          C:\windows\system32\drivers\isapnp.sys
10:01:00.0498 0x0c9c  isapnp - ok
10:01:00.0558 0x0c9c  [ 96BB922A0981BC7432C8CF52B5410FE6, 236C05509B1040059B15021CBBDBDAF3B9C0F00910142BE5887B2C7561BAAFBA ] iScsiPrt        C:\windows\system32\drivers\msiscsi.sys
10:01:00.0588 0x0c9c  iScsiPrt - ok
10:01:00.0878 0x0c9c  [ 1152F8BEB568F2F72F1C5C32A1F4E529, CE39F872972BFEF14BB75C66F8A9CCD88EFA991B42C6D2E232988B7FFAB754EE ] ISWKL           C:\Program Files\CheckPoint\ZAForceField\ISWKL.sys
10:01:00.0948 0x0c9c  ISWKL - ok
10:01:01.0058 0x0c9c  [ EF46EF3A790C42BBA9B5AFA2586448DB, 5FDC8D4EFDE7DAE89A7B6B6DBFD7D0E9756BFEC8B2265D3E433423736B531A54 ] IswSvc          C:\Program Files\CheckPoint\ZAForceField\IswSvc.exe
10:01:01.0108 0x0c9c  IswSvc - ok
10:01:01.0268 0x0c9c  [ 8E4577C6E0D3114170509159DE658907, 2FC7F96766537716503AB1BAD7EBDB2F16F3CE1584AF4261D57C6A4E00E1A417 ] iusb3hcs        C:\windows\system32\DRIVERS\iusb3hcs.sys
10:01:01.0288 0x0c9c  iusb3hcs - ok
10:01:01.0328 0x0c9c  [ FE76346E9B57DA575BD1B3BD0CCAD7FF, 8961A08326F66E9FDF63912797C605FEEC23F9B0453D132AB6897DA98BC9AEAB ] iusb3hub        C:\windows\system32\DRIVERS\iusb3hub.sys
10:01:01.0359 0x0c9c  iusb3hub - ok
10:01:01.0429 0x0c9c  [ 1008CD90DA2198FFD250298DEB9DF160, 2CBA5FF2369861E8F8A55799AFFFC8E5B331A8BD17B559641E87A4C6C0D70206 ] iusb3xhc        C:\windows\system32\DRIVERS\iusb3xhc.sys
10:01:01.0486 0x0c9c  iusb3xhc - ok
10:01:01.0521 0x0c9c  [ BC02336F1CBA7DCC7D1213BB588A68A5, 450C5BAD54CCE2AFCDFF1B6E7F8E1A8446D9D3255DF9D36C29A8F848048AAD93 ] kbdclass        C:\windows\system32\DRIVERS\kbdclass.sys
10:01:01.0541 0x0c9c  kbdclass - ok
10:01:01.0633 0x0c9c  [ 0705EFF5B42A9DB58548EEC3B26BB484, 86C6824ED7ED6FA8F306DB6319A0FD688AA91295AE571262F9D8E96A32225E99 ] kbdhid          C:\windows\system32\DRIVERS\kbdhid.sys
10:01:01.0673 0x0c9c  kbdhid - ok
10:01:01.0753 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] KeyIso          C:\windows\system32\lsass.exe
10:01:01.0773 0x0c9c  KeyIso - ok
10:01:01.0883 0x0c9c  [ E656FE10D6D27794AFA08136685A69E8, 2D38603B546235B555978340A63E052D06CA7E7EF117CF148F9A002D423B2949 ] KL1             C:\windows\system32\DRIVERS\kl1.sys
10:01:01.0923 0x0c9c  KL1 - ok
10:01:02.0023 0x0c9c  [ D865DD8B0448E3F963D68C04C532858F, AD51013E65289CA8FD1313780A93610132B1570F7A85C7A2E7DD8FD1FBE8701D ] kl2             C:\windows\system32\DRIVERS\kl2.sys
10:01:02.0033 0x0c9c  kl2 - ok
10:01:02.0203 0x0c9c  [ 055790D38D7EC73AEF03E4AA7F67BA03, 37B4EA9C0C511CAA1B36CB3BBF81DD042F92B7C1DF6C4465D65EF62F05FC40DC ] KLIF            C:\windows\system32\DRIVERS\klif.sys
10:01:02.0243 0x0c9c  KLIF - ok
10:01:02.0413 0x0c9c  [ 353009DEDF918B2A51414F330CF72DEC, BF157D6E329F26E02FA16271B751B421396040DBB1D7BF9B2E0A21BC569672E2 ] KSecDD          C:\windows\system32\Drivers\ksecdd.sys
10:01:02.0433 0x0c9c  KSecDD - ok
10:01:02.0773 0x0c9c  [ 1C2D8E18AA8FD50CD04C15CC27F7F5AB, 4BA3B0F9F01BD47D66091D3AD86B69A523981D61DFB4D677F2CD39405B2DA989 ] KSecPkg         C:\windows\system32\Drivers\ksecpkg.sys
10:01:02.0803 0x0c9c  KSecPkg - ok
10:01:02.0873 0x0c9c  [ 6869281E78CB31A43E969F06B57347C4, 866A23E69B32A78D378D6CB3B3DA3695FFDFF0FEC3C9F68C8C3F988DF417044B ] ksthunk         C:\windows\system32\drivers\ksthunk.sys
10:01:02.0953 0x0c9c  ksthunk - ok
10:01:03.0033 0x0c9c  [ 6AB66E16AA859232F64DEB66887A8C9C, 5F2B579BEA8098A2994B0DECECDAE7B396E7B5DC5F09645737B9F28BEEA77FFF ] KtmRm           C:\windows\system32\msdtckrm.dll
10:01:03.0103 0x0c9c  KtmRm - ok
10:01:03.0233 0x0c9c  [ 3CE6A9BEF066BF9488E6BC4D6C62F77E, CDE0A0DCD9A5A2E49DE55E720B5A6FFF502EE139C0EC8793638560E75BF2118C ] L1C             C:\windows\system32\DRIVERS\L1C62x64.sys
10:01:03.0253 0x0c9c  L1C - ok
10:01:03.0423 0x0c9c  [ D9F42719019740BAA6D1C6D536CBDAA6, 8757599D0AE5302C4CE50861BEBA3A8DD14D7B0DBD916FD5404133688CDFCC40 ] LanmanServer    C:\windows\system32\srvsvc.dll
10:01:03.0503 0x0c9c  LanmanServer - ok
10:01:03.0593 0x0c9c  [ 851A1382EED3E3A7476DB004F4EE3E1A, B1C67F47DD594D092E6E258F01DF5E7150227CE3131A908A244DEE9F8A1FABF9 ] LanmanWorkstation C:\windows\System32\wkssvc.dll
10:01:03.0783 0x0c9c  LanmanWorkstation - ok
10:01:03.0863 0x0c9c  [ 1538831CF8AD2979A04C423779465827, E1729B0CC4CEEE494A0B8817A8E98FF232E3A32FB023566EF0BC71A090262C0C ] lltdio          C:\windows\system32\DRIVERS\lltdio.sys
10:01:03.0933 0x0c9c  lltdio - ok
10:01:04.0033 0x0c9c  [ C1185803384AB3FEED115F79F109427F, 0414FE73532DCAB17E906438A14711E928CECCD5F579255410C62984DD652700 ] lltdsvc         C:\windows\System32\lltdsvc.dll
10:01:04.0123 0x0c9c  lltdsvc - ok
10:01:04.0353 0x0c9c  [ F993A32249B66C9D622EA5592A8B76B8, EE64672A990C6145DC5601E2B8CDBE089272A72732F59AF9865DCBA8B1717E70 ] lmhosts         C:\windows\System32\lmhsvc.dll
10:01:04.0823 0x0c9c  lmhosts - ok
10:01:04.0983 0x0c9c  [ AB41542FA180CB3317F597ED7E7D5C5D, EA8108F81B94D7BB98ACFAF579F70A61FB3887937D1EF57E6225B70036AEC061 ] LMS             C:\Program Files (x86)\Intel\Intel(R) Management Engine Components\LMS\LMS.exe
10:01:05.0033 0x0c9c  LMS - ok
10:01:05.0103 0x0c9c  [ 1A93E54EB0ECE102495A51266DCDB6A6, DB6AA86AA36C3A7988BE96E87B5D3251BE7617C54EE8F894D9DC2E267FE3255B ] LSI_FC          C:\windows\system32\drivers\lsi_fc.sys
10:01:05.0143 0x0c9c  LSI_FC - ok
10:01:05.0193 0x0c9c  [ 1047184A9FDC8BDBFF857175875EE810, F2251EDB7736A26D388A0C5CC2FE5FB9C5E109CBB1E3800993554CB21D81AE4B ] LSI_SAS         C:\windows\system32\drivers\lsi_sas.sys
10:01:05.0273 0x0c9c  LSI_SAS - ok
10:01:05.0323 0x0c9c  [ 30F5C0DE1EE8B5BC9306C1F0E4A75F93, 88D5740A4E9CC3FA80FA18035DAB441BDC5A039622D666BFDAA525CC9686BD06 ] LSI_SAS2        C:\windows\system32\drivers\lsi_sas2.sys
10:01:05.0803 0x0c9c  LSI_SAS2 - ok
10:01:06.0183 0x0c9c  [ 0504EACAFF0D3C8AED161C4B0D369D4A, 4D272237C189646F5C80822FD3CBA7C2728E482E2DAAF7A09C8AEF811C89C54D ] LSI_SCSI        C:\windows\system32\drivers\lsi_scsi.sys
10:01:06.0263 0x0c9c  LSI_SCSI - ok
10:01:06.0313 0x0c9c  [ 43D0F98E1D56CCDDB0D5254CFF7B356E, 5BA498183B5C4996C694CB0A9A6B66CE6C7A460F6C91BEB9F305486FCC3B7B22 ] luafv           C:\windows\system32\drivers\luafv.sys
10:01:06.0544 0x0c9c  luafv - ok
10:01:07.0675 0x0c9c  [ 5C3669B71657F22E67A1D4BD49D2CBE7, 7CAE59AA6CA9CBBD70BBD707A155FB169BF3F71096275BF7C0F415B6A092C671 ] MBAMProtector   C:\windows\system32\drivers\mbam.sys
10:01:08.0075 0x0c9c  MBAMProtector - ok
10:01:10.0005 0x0c9c  [ 6D8A2EE4244630B290A837E79C0F37A1, 6783BBC0BDC93E4D6D43531A1AD0DF5CD26C3BBFA6384927C5CF65AD97FB04AD ] MBAMScheduler   C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe
10:01:10.0095 0x0c9c  MBAMScheduler - ok
10:01:11.0255 0x0c9c  [ 09D4503CBB6ADB3A54E7C7A75090B728, 6139EA3338FD64205481EDEC813A44F8D395FDA7B67AA431DA61F3631C3EDAE6 ] MBAMService     C:\Program Files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe
10:01:11.0345 0x0c9c  MBAMService - ok
10:01:11.0715 0x0c9c  [ 26C43960C99EE861A5D0EDC4DCF3B1C3, 6238FB8E785652040CCE3E7044EA52066CE1BF173A1467474D64A3AB214B6BCD ] MBAMSwissArmy   C:\windows\system32\drivers\MBAMSwissArmy.sys
10:01:11.0745 0x0c9c  MBAMSwissArmy - ok
10:01:11.0865 0x0c9c  [ 95EF63A7827D4E3A229CBBCB42619E93, FA38DD035B2C4FC82B60868F49D45A39FBBC96096AAD5A2C8BD752A250255BA7 ] MBAMWebAccessControl C:\windows\system32\drivers\mwac.sys
10:01:11.0885 0x0c9c  MBAMWebAccessControl - ok
10:01:11.0915 0x0c9c  [ 0BE09CD858ABF9DF6ED259D57A1A1663, 2FD28889B93C8E801F74C1D0769673A461671E0189D0A22C94509E3F0EEB7428 ] Mcx2Svc         C:\windows\system32\Mcx2Svc.dll
10:01:12.0105 0x0c9c  Mcx2Svc - ok
10:01:12.0145 0x0c9c  [ A55805F747C6EDB6A9080D7C633BD0F4, 2DA0E83BF3C8ADEF6F551B6CC1C0A3F6149CDBE6EC60413BA1767C4DE425A728 ] megasas         C:\windows\system32\drivers\megasas.sys
10:01:12.0195 0x0c9c  megasas - ok
10:01:12.0235 0x0c9c  [ BAF74CE0072480C3B6B7C13B2A94D6B3, 85CBB4949C090A904464F79713A3418338753D20D7FB811E68F287FDAC1DD834 ] MegaSR          C:\windows\system32\drivers\MegaSR.sys
10:01:12.0295 0x0c9c  MegaSR - ok
10:01:12.0527 0x0c9c  [ 6B01B7414A105B9E51652089A03027CF, 9B113DC22F7D0D0B376E577C6D7083F9EDC09BBFE47726393E16D4FDAAAE21FE ] MEIx64          C:\windows\system32\DRIVERS\HECIx64.sys
10:01:12.0577 0x0c9c  MEIx64 - ok
10:01:13.0479 0x0c9c  Microsoft SharePoint Workspace Audit Service - ok
10:01:13.0919 0x0c9c  [ E40E80D0304A73E8D269F7141D77250B, 0DB4AC13A264F19A84DC0BCED54E8E404014CC09C993B172002B1561EC7E265A ] MMCSS           C:\windows\system32\mmcss.dll
10:01:14.0079 0x0c9c  MMCSS - ok
10:01:14.0229 0x0c9c  [ 800BA92F7010378B09F9ED9270F07137, 94F9AF9E1BE80AE6AC39A2A74EF9FAB115DCAACC011D07DFA8D6A1DDC8A93342 ] Modem           C:\windows\system32\drivers\modem.sys
10:01:14.0369 0x0c9c  Modem - ok
10:01:14.0409 0x0c9c  [ B03D591DC7DA45ECE20B3B467E6AADAA, 701FB0CAD8138C58507BE28845D3E24CE269A040737C29885944A0D851238732 ] monitor         C:\windows\system32\DRIVERS\monitor.sys
10:01:14.0459 0x0c9c  monitor - ok
10:01:14.0579 0x0c9c  [ 7D27EA49F3C1F687D357E77A470AEA99, 7FE7CAF95959F127C6D932C01D539C06D80273C49A09761F6E8331C05B1A7EE7 ] mouclass        C:\windows\system32\DRIVERS\mouclass.sys
10:01:14.0599 0x0c9c  mouclass - ok
10:01:14.0689 0x0c9c  [ D3BF052C40B0C4166D9FD86A4288C1E6, 5E65264354CD94E844BF1838CA1B8E49080EFA34605A32CF2F6A47A2B97FC183 ] mouhid          C:\windows\system32\DRIVERS\mouhid.sys
10:01:15.0719 0x0c9c  mouhid - ok
10:01:15.0899 0x0c9c  [ 32E7A3D591D671A6DF2DB515A5CBE0FA, 47CED0B9067AE8BF5EEF60B17ADEE5906BEDCC56E4CB460B7BFBC12BB9A69E63 ] mountmgr        C:\windows\system32\drivers\mountmgr.sys
10:01:15.0919 0x0c9c  mountmgr - ok
10:01:16.0449 0x0c9c  [ DEA022193DF8C88F6E2B3E33D148A5DB, 97DFC47DB83E04A975A1969AA120385463FCAF4E1A9984FD3220442D7026B45A ] MozillaMaintenance C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
10:01:16.0489 0x0c9c  MozillaMaintenance - ok
10:01:16.0829 0x0c9c  [ A44B420D30BD56E145D6A2BC8768EC58, B1E4DCA5A1008FA7A0492DC091FB2B820406AE13FD3D44F124E89B1037AF09B8 ] mpio            C:\windows\system32\drivers\mpio.sys
10:01:16.0869 0x0c9c  mpio - ok
10:01:16.0959 0x0c9c  [ 6C38C9E45AE0EA2FA5E551F2ED5E978F, 5A3FA2F110029CB4CC4384998EDB59203FDD65EC45E01B897FB684F8956EAD20 ] mpsdrv          C:\windows\system32\drivers\mpsdrv.sys
10:01:17.0109 0x0c9c  mpsdrv - ok
10:01:17.0810 0x0c9c  [ 54FFC9C8898113ACE189D4AA7199D2C1, 65F585C87F3F710FD5793FDFA96B740AD8D4317B0C120F4435CCF777300EA4F2 ] MpsSvc          C:\windows\system32\mpssvc.dll
10:01:18.0210 0x0c9c  MpsSvc - ok
10:01:18.0330 0x0c9c  [ 1A4F75E63C9FB84B85DFFC6B63FD5404, 01AFA6DBB4CDE55FE4EA05BBE8F753A4266F8D072EA1EE01DB79F5126780C21F ] MRxDAV          C:\windows\system32\drivers\mrxdav.sys
10:01:18.0470 0x0c9c  MRxDAV - ok
10:01:18.0730 0x0c9c  [ A5D9106A73DC88564C825D317CAC68AC, 0457B2AEA4E05A91D0E43F317894A614434D8CEBE35020785387F307E231FBE4 ] mrxsmb          C:\windows\system32\DRIVERS\mrxsmb.sys
10:01:20.0251 0x0c9c  mrxsmb - ok
10:01:20.0301 0x0c9c  [ D711B3C1D5F42C0C2415687BE09FC163, 9B3013AC60BD2D0FF52086658BA5FF486ADE15954A552D7DD590580E8BAE3EFF ] mrxsmb10        C:\windows\system32\DRIVERS\mrxsmb10.sys
10:01:20.0431 0x0c9c  mrxsmb10 - ok
10:01:20.0521 0x0c9c  [ 9423E9D355C8D303E76B8CFBD8A5C30C, 220B33F120C2DD937FE4D5664F4B581DC0ACF78D62EB56B7720888F67B9644CC ] mrxsmb20        C:\windows\system32\DRIVERS\mrxsmb20.sys
10:01:20.0731 0x0c9c  mrxsmb20 - ok
10:01:20.0941 0x0c9c  [ C25F0BAFA182CBCA2DD3C851C2E75796, 643E158A0948DF331807AEAA391F23960362E46C0A0CF6D22A99020EAE7B10F8 ] msahci          C:\windows\system32\drivers\msahci.sys
10:01:20.0971 0x0c9c  msahci - ok
10:01:21.0141 0x0c9c  [ DB801A638D011B9633829EB6F663C900, B34FD33A215ACCF2905F4B7D061686CDB1CB9C652147AF56AE14686C1F6E3C74 ] msdsm           C:\windows\system32\drivers\msdsm.sys
10:01:21.0171 0x0c9c  msdsm - ok
10:01:21.0621 0x0c9c  [ DE0ECE52236CFA3ED2DBFC03F28253A8, 2FBBEC4CACB5161F68D7C2935852A5888945CA0F107CF8A1C01F4528CE407DE3 ] MSDTC           C:\windows\System32\msdtc.exe
10:01:21.0641 0x0c9c  MSDTC - ok
10:01:22.0041 0x0c9c  [ AA3FB40E17CE1388FA1BEDAB50EA8F96, 69F93E15536644C8FD679A20190CFE577F4985D3B1B4A4AA250A168615AE1E99 ] Msfs            C:\windows\system32\drivers\Msfs.sys
10:01:22.0471 0x0c9c  Msfs - ok
10:01:22.0511 0x0c9c  [ F9D215A46A8B9753F61767FA72A20326, 6F76642B45E0A7EF6BCAB8B37D55CCE2EAA310ED07B76D43FCB88987C2174141 ] mshidkmdf       C:\windows\System32\drivers\mshidkmdf.sys
10:01:22.0631 0x0c9c  mshidkmdf - ok
10:01:23.0061 0x0c9c  [ D916874BBD4F8B07BFB7FA9B3CCAE29D, B229DA150713DEDBC4F05386C9D9DC3BC095A74F44F3081E88311AB73BC992A1 ] msisadrv        C:\windows\system32\drivers\msisadrv.sys
10:01:23.0091 0x0c9c  msisadrv - ok
10:01:23.0171 0x0c9c  [ 808E98FF49B155C522E6400953177B08, F873F5BFF0984C5165DF67E92874D3F6EB8D86F9B5AD17013A0091CA33A1A3D5 ] MSiSCSI         C:\windows\system32\iscsiexe.dll
10:01:23.0531 0x0c9c  MSiSCSI - ok
10:01:23.0531 0x0c9c  msiserver - ok
10:01:23.0721 0x0c9c  [ 49CCF2C4FEA34FFAD8B1B59D49439366, E5752EA57C7BDAD5F53E3BC441A415E909AC602CAE56234684FB8789A20396C7 ] MSKSSRV         C:\windows\system32\drivers\MSKSSRV.sys
10:01:23.0851 0x0c9c  MSKSSRV - ok
10:01:24.0021 0x0c9c  [ BDD71ACE35A232104DDD349EE70E1AB3, 27464A66868513BE6A01B75D7FC5B0D6B71842E4E20CE3F76B15C071A0618BBB ] MSPCLOCK        C:\windows\system32\drivers\MSPCLOCK.sys
10:01:24.0111 0x0c9c  MSPCLOCK - ok
10:01:24.0191 0x0c9c  [ 4ED981241DB27C3383D72092B618A1D0, E12F121E641249DB3491141851B59E1496F4413EDF58E863388F1C229838DFCC ] MSPQM           C:\windows\system32\drivers\MSPQM.sys
10:01:24.0291 0x0c9c  MSPQM - ok
10:01:24.0321 0x0c9c  [ 759A9EEB0FA9ED79DA1FB7D4EF78866D, 64E3BC613EC4872B1B344CBF71EE15BE195592E3244C1EE099C6F8B95A40F133 ] MsRPC           C:\windows\system32\drivers\MsRPC.sys
10:01:24.0371 0x0c9c  MsRPC - ok
10:01:24.0411 0x0c9c  [ 0EED230E37515A0EAEE3C2E1BC97B288, B1D8F8A75006B6E99214CA36D27A8594EF8D952F315BEB201E9BAC9DE3E64D42 ] mssmbios        C:\windows\system32\DRIVERS\mssmbios.sys
10:01:24.0439 0x0c9c  mssmbios - ok
10:01:24.0483 0x0c9c  [ 2E66F9ECB30B4221A318C92AC2250779, DF175E1AB6962303E57F26DAE5C5C1E40B8640333F3E352A64F6A5F1301586CD ] MSTEE           C:\windows\system32\drivers\MSTEE.sys
10:01:24.0563 0x0c9c  MSTEE - ok
10:01:24.0645 0x0c9c  [ 7EA404308934E675BFFDE8EDF0757BCD, 306CD02D89CFCFE576242360ED5F9EEEDCAFC43CD43B7D2977AE960F9AEC3232 ] MTConfig        C:\windows\system32\drivers\MTConfig.sys
10:01:24.0705 0x0c9c  MTConfig - ok
10:01:24.0775 0x0c9c  [ F9A18612FD3526FE473C1BDA678D61C8, 32F7975B5BAA447917F832D9E3499B4B6D3E90D73F478375D0B70B36C524693A ] Mup             C:\windows\system32\Drivers\mup.sys
10:01:24.0885 0x0c9c  Mup - ok
10:01:25.0515 0x0c9c  [ 582AC6D9873E31DFA28A4547270862DD, BD540499F74E8F59A020D935D18E36A3A97C1A6EC59C8208436469A31B16B260 ] napagent        C:\windows\system32\qagentRT.dll
10:01:25.0835 0x0c9c  napagent - ok
10:01:25.0955 0x0c9c  [ 1EA3749C4114DB3E3161156FFFFA6B33, 54C2E77BCE1037711A11313AC25B8706109098C10A31AA03AEB7A185E97800D7 ] NativeWifiP     C:\windows\system32\DRIVERS\nwifi.sys
10:01:26.0085 0x0c9c  NativeWifiP - ok
10:01:26.0435 0x0c9c  [ DFE14D63F0F649EE94A9E3442B7C8F2C, D4DA9DFF92F0E9DD14192AC77ABA1556C01DB27085731CEA3425F613FD317050 ] NAUpdate        C:\Program Files (x86)\Nero\Update\NASvc.exe
10:01:26.0495 0x0c9c  NAUpdate - ok
10:01:26.0895 0x0c9c  [ DACA803A8D732FE5EEAA024EC342F81D, 2DDEA48CD417EDD657D487BADA7C31C05F35DA328AAC5AA63A99FDFD44F2BF02 ] NBVol           C:\windows\system32\DRIVERS\NBVol.sys
10:01:26.0915 0x0c9c  NBVol - ok
10:01:27.0305 0x0c9c  [ 6208F622E9E35860DFB0753DFF56F0C0, AF7730B4AB642E0E45C05AE1429C7B3D90B0889CF94B21AC7869790D4DB6FDBE ] NBVolUp         C:\windows\system32\DRIVERS\NBVolUp.sys
10:01:27.0325 0x0c9c  NBVolUp - ok
10:01:28.0365 0x0c9c  [ 760E38053BF56E501D562B70AD796B88, F856E81A975D44F8684A6F2466549CEEDFAEB3950191698555A93A1206E0A42D ] NDIS            C:\windows\system32\drivers\ndis.sys
10:01:28.0605 0x0c9c  NDIS - ok
10:01:28.0755 0x0c9c  [ 9F9A1F53AAD7DA4D6FEF5BB73AB811AC, D7E5446E83909AE25506BB98FBDD878A529C87963E3C1125C4ABAB25823572BC ] NdisCap         C:\windows\system32\DRIVERS\ndiscap.sys
10:01:28.0875 0x0c9c  NdisCap - ok
10:01:28.0905 0x0c9c  [ 30639C932D9FEF22B31268FE25A1B6E5, 32873D95339600F6EEFA51847D12C563FF01F320DC59055B242FA2887C99F9D6 ] NdisTapi        C:\windows\system32\DRIVERS\ndistapi.sys
10:01:28.0975 0x0c9c  NdisTapi - ok
10:01:29.0175 0x0c9c  [ 136185F9FB2CC61E573E676AA5402356, BA3AD0A33416DA913B4242C6BE8C3E5812AD2B20BA6C11DD3094F2E8EB56E683 ] Ndisuio         C:\windows\system32\DRIVERS\ndisuio.sys
10:01:29.0245 0x0c9c  Ndisuio - ok
10:01:29.0255 0x0c9c  [ 53F7305169863F0A2BDDC49E116C2E11, 881E9346D3C02405B7850ADC37E720990712EC9C666A0CE96E252A487FD2CE77 ] NdisWan         C:\windows\system32\DRIVERS\ndiswan.sys
10:01:29.0415 0x0c9c  NdisWan - ok
10:01:30.0285 0x0c9c  [ 015C0D8E0E0421B4CFD48CFFE2825879, 4242E2D42CCFC859B2C0275C5331798BC0BDA68E51CF4650B6E64B1332071023 ] NDProxy         C:\windows\system32\drivers\NDProxy.sys
10:01:31.0255 0x0c9c  NDProxy - ok
10:01:31.0656 0x0c9c  [ 86743D9F5D2B1048062B14B1D84501C4, DBF6D6A60AB774FCB0F464FF2D285A7521D0A24006687B243AB46B17D8032062 ] NetBIOS         C:\windows\system32\DRIVERS\netbios.sys
10:01:31.0946 0x0c9c  NetBIOS - ok
10:01:32.0736 0x0c9c  [ 09594D1089C523423B32A4229263F068, 7426A9B8BA27D3225928DDEFBD399650ABB90798212F56B7D12158AC22CCCE37 ] NetBT           C:\windows\system32\DRIVERS\netbt.sys
10:01:33.0006 0x0c9c  NetBT - ok
10:01:33.0086 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] Netlogon        C:\windows\system32\lsass.exe
10:01:33.0116 0x0c9c  Netlogon - ok
10:01:33.0586 0x0c9c  [ 847D3AE376C0817161A14A82C8922A9E, 37AE692B3481323134125EF58F2C3CBC20177371AF2F5874F53DD32A827CB936 ] Netman          C:\windows\System32\netman.dll
10:01:34.0146 0x0c9c  Netman - ok
10:01:34.0737 0x0c9c  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetMsmqActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
10:01:34.0777 0x0c9c  NetMsmqActivator - ok
10:01:35.0727 0x0c9c  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetPipeActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
10:01:35.0757 0x0c9c  NetPipeActivator - ok
10:01:36.0277 0x0c9c  [ 5F28111C648F1E24F7DBC87CDEB091B8, 2E8645285921EDB98BB2173E11E57459C888D52E80D85791D169C869DE8813B9 ] netprofm        C:\windows\System32\netprofm.dll
10:01:36.0777 0x0c9c  netprofm - ok
10:01:37.0887 0x0c9c  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetTcpActivator C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
10:01:37.0917 0x0c9c  NetTcpActivator - ok
10:01:38.0307 0x0c9c  [ 21318671BCAD3ACF16638F98D4D00973, CEA6E3B6BCB4B74A9ACACBEEA12EEA967BBC2240398E2EBC04D7910109CACA11 ] NetTcpPortSharing C:\windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
10:01:38.0377 0x0c9c  NetTcpPortSharing - ok
10:01:38.0547 0x0c9c  [ 77889813BE4D166CDAB78DDBA990DA92, 2EF531AE502B943632EEC66A309A8BFCDD36120A5E1473F4AAF3C2393AD0E6A3 ] nfrd960         C:\windows\system32\drivers\nfrd960.sys
10:01:38.0577 0x0c9c  nfrd960 - ok
10:01:39.0277 0x0c9c  [ 8AD77806D336673F270DB31645267293, E23F324913554A23CD043DD27D4305AF62F48C0561A0FC7B7811E55B74B1BE79 ] NlaSvc          C:\windows\System32\nlasvc.dll
10:01:39.0587 0x0c9c  NlaSvc - ok
10:01:39.0927 0x0c9c  [ 1E4C4AB5C9B8DD13179BBDC75A2A01F7, D8957EF7060A69DBB3CD6B2C45B1E4143592AB8D018471E17AC04668157DC67F ] Npfs            C:\windows\system32\drivers\Npfs.sys
10:01:40.0317 0x0c9c  Npfs - ok
10:01:40.0367 0x0c9c  [ D54BFDF3E0C953F823B3D0BFE4732528, 497A1DCC5646EC22119273216DF10D5442D16F83E4363770F507518CF6EAA53A ] nsi             C:\windows\system32\nsisvc.dll
10:01:40.0467 0x0c9c  nsi - ok
10:01:40.0927 0x0c9c  [ E7F5AE18AF4168178A642A9247C63001, 133023B7E4BA8049C4CAED3282BDD25571D1CC25FAC3B820C7F981D292689D76 ] nsiproxy        C:\windows\system32\drivers\nsiproxy.sys
10:01:41.0357 0x0c9c  nsiproxy - ok
10:01:41.0567 0x0c9c  [ 1A29A59A4C5BA6F8C85062A613B7E2B2, CC137F499A12C724D4166C2D85E9F447413419A0683DAC6F1A802B7F210C77F1 ] Ntfs            C:\windows\system32\drivers\Ntfs.sys
10:01:41.0757 0x0c9c  Ntfs - ok
10:01:41.0807 0x0c9c  [ 9899284589F75FA8724FF3D16AED75C1, 181188599FD5D4DE33B97010D9E0CAEABAB9A3EF50712FE7F9AA0735CD0666D6 ] Null            C:\windows\system32\drivers\Null.sys
10:01:42.0937 0x0c9c  Null - ok
10:01:43.0117 0x0c9c  [ 0A92CB65770442ED0DC44834632F66AD, 581327F07A68DBD5CC749214BE5F1211FC2CE41C7A4F0656B680AFB51A35ACE7 ] nvraid          C:\windows\system32\drivers\nvraid.sys
10:01:43.0147 0x0c9c  nvraid - ok
10:01:43.0537 0x0c9c  [ DAB0E87525C10052BF65F06152F37E4A, AD9BFF0D5FD3FFB95C758B478E1F6A9FE45E7B37AEC71EB5070D292FEAAEDF37 ] nvstor          C:\windows\system32\drivers\nvstor.sys
10:01:43.0567 0x0c9c  nvstor - ok
10:01:43.0577 0x0c9c  [ 270D7CD42D6E3979F6DD0146650F0E05, 752489E54C9004EDCBE1F1F208FFD864DA5C83E59A2DDE6B3E0D63ECA996F76F ] nv_agp          C:\windows\system32\drivers\nv_agp.sys
10:01:43.0617 0x0c9c  nv_agp - ok
10:01:43.0857 0x0c9c  [ 3589478E4B22CE21B41FA1BFC0B8B8A0, AD2469FC753FE552CB809FF405A9AB23E7561292FE89117E3B3B62057EFF0203 ] ohci1394        C:\windows\system32\drivers\ohci1394.sys
10:01:43.0897 0x0c9c  ohci1394 - ok
10:01:44.0457 0x0c9c  [ 9D10F99A6712E28F8ACD5641E3A7EA6B, 70964A0ED9011EA94044E15FA77EDD9CF535CC79ED8E03A3721FF007E69595CC ] ose             C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
10:01:44.0487 0x0c9c  ose - ok
10:01:46.0478 0x0c9c  [ 61BFFB5F57AD12F83AB64B7181829B34, 1DD0DD35E4158F95765EE6639F217DF03A0A19E624E020DBA609268C08A13846 ] osppsvc         C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
10:01:46.0878 0x0c9c  osppsvc - ok
10:01:46.0948 0x0c9c  [ 3EAC4455472CC2C97107B5291E0DCAFE, E51F373F2DBEAEE516B42BAE8C1B5BB68D00B881323E842CB6EDEC0A183CFFC3 ] p2pimsvc        C:\windows\system32\pnrpsvc.dll
10:01:46.0998 0x0c9c  p2pimsvc - ok
10:01:47.0118 0x0c9c  [ 927463ECB02179F88E4B9A17568C63C3, FEFD3447692C277D59EEC7BF218552C8BB6B8C98C26E973675549628408B94CE ] p2psvc          C:\windows\system32\p2psvc.dll
10:01:47.0188 0x0c9c  p2psvc - ok
10:01:47.0288 0x0c9c  [ 0086431C29C35BE1DBC43F52CC273887, 0D116D49EF9ABB57DA005764F25E692622210627FC2048F06A989B12FA8D0A80 ] Parport         C:\windows\system32\drivers\parport.sys
10:01:47.0328 0x0c9c  Parport - ok
10:01:47.0558 0x0c9c  [ E9766131EEADE40A27DC27D2D68FBA9C, 63C295EC96DBD25F1A8B908295CCB86B54F2A77A02AAA11E5D9160C2C1A492B6 ] partmgr         C:\windows\system32\drivers\partmgr.sys
10:01:47.0588 0x0c9c  partmgr - ok
10:01:48.0998 0x0c9c  [ 9665402B7FA59302D520AD845DDFC026, 7FFE81F5402005FBD947A7440C12A206C58F3FDAE33F3E96987C334057CDB79E ] Partner Service C:\ProgramData\Partner\Partner.exe
10:01:49.0038 0x0c9c  Partner Service - ok
10:01:49.0248 0x0c9c  [ 3AEAA8B561E63452C655DC0584922257, 04C072969B58657602EB0C21CEDF24FCEE14E61B90A0F758F93925EF2C9FC32D ] PcaSvc          C:\windows\System32\pcasvc.dll
10:01:49.0318 0x0c9c  PcaSvc - ok
10:01:49.0568 0x0c9c  [ 94575C0571D1462A0F70BDE6BD6EE6B3, 7139BAC653EA94A3DD3821CAB35FC5E22F4CCA5ACC2BAABDAA27E4C3C8B27FC9 ] pci             C:\windows\system32\drivers\pci.sys
10:01:49.0598 0x0c9c  pci - ok
10:01:50.0148 0x0c9c  [ B5B8B5EF2E5CB34DF8DCF8831E3534FA, F2A7CC645B96946CC65BF60E14E70DC09C848D27C7943CE5DEA0C01A6B863480 ] pciide          C:\windows\system32\drivers\pciide.sys
10:01:50.0178 0x0c9c  pciide - ok
10:01:50.0228 0x0c9c  [ B2E81D4E87CE48589F98CB8C05B01F2F, 6763BEE7270A4873B3E131BFB92313E2750FCBD0AD73C23D1C4F98F7DF73DE14 ] pcmcia          C:\windows\system32\drivers\pcmcia.sys
10:01:50.0268 0x0c9c  pcmcia - ok
10:01:50.0388 0x0c9c  [ D6B9C2E1A11A3A4B26A182FFEF18F603, BBA5FE08B1DDD6243118E11358FD61B10E850F090F061711C3CB207CE5FBBD36 ] pcw             C:\windows\system32\drivers\pcw.sys
10:01:50.0418 0x0c9c  pcw - ok
10:01:50.0558 0x0c9c  [ 68769C3356B3BE5D1C732C97B9A80D6E, FB2D61145980A2899D1B7729184C54070315B0E63C9A22400A76CCD39E00029C ] PEAUTH          C:\windows\system32\drivers\peauth.sys
10:01:50.0918 0x0c9c  PEAUTH - ok
10:01:51.0118 0x0c9c  [ E495E408C93141E8FC72DC0C6046DDFA, 489B957DADA0DC128A09468F1AD082DCC657E86053208EA06A12937BE86FB919 ] PerfHost        C:\windows\SysWow64\perfhost.exe
10:01:51.0198 0x0c9c  PerfHost - ok
10:01:51.0418 0x0c9c  [ 91111CEBBDE8015E822C46120ED9537C, 255B85FEF663C2E0652CECF3F9B67B12B576F924A34415DEE13F0F5137E1E7F7 ] PGEffect        C:\windows\system32\DRIVERS\pgeffect.sys
10:01:51.0448 0x0c9c  PGEffect - ok
10:01:52.0468 0x0c9c  [ C7CF6A6E137463219E1259E3F0F0DD6C, 08D7244F52AA17DD669AA6F77C291DAC88E7B2D1887DE422509C1F83EC85F3DD ] pla             C:\windows\system32\pla.dll
10:01:52.0948 0x0c9c  pla - ok
10:01:53.0408 0x0c9c  [ 25FBDEF06C4D92815B353F6E792C8129, 57D9764AE6BCE33B242C399CDFC10DD405975BD6411CA8C75FBCD06EEB8442A9 ] PlugPlay        C:\windows\system32\umpnpmgr.dll
10:01:53.0628 0x0c9c  PlugPlay - ok
10:01:53.0848 0x0c9c  [ 7195581CEC9BB7D12ABE54036ACC2E38, 9C4E5D6EA984148F2663DC529083408B2248DFF6DAAC85D9195F80A722782315 ] PNRPAutoReg     C:\windows\system32\pnrpauto.dll
10:01:54.0098 0x0c9c  PNRPAutoReg - ok
10:01:54.0158 0x0c9c  [ 3EAC4455472CC2C97107B5291E0DCAFE, E51F373F2DBEAEE516B42BAE8C1B5BB68D00B881323E842CB6EDEC0A183CFFC3 ] PNRPsvc         C:\windows\system32\pnrpsvc.dll
10:01:54.0198 0x0c9c  PNRPsvc - ok
10:01:54.0318 0x0c9c  [ 4F15D75ADF6156BF56ECED6D4A55C389, 2ADA3EA69A5D7EC2A4D2DD89178DB94EAFDDF95F07B0070D654D9F7A5C12A044 ] PolicyAgent     C:\windows\System32\ipsecsvc.dll
10:01:54.0438 0x0c9c  PolicyAgent - ok
10:01:54.0508 0x0c9c  [ A2CCA4FB273E6050F17A0A416CFF2FCD, C42BA18DF0C8E3F7358669A784E51E4DC7A4112096345EA699EDC95F561E0255 ] Power           C:\windows\system32\umpo.dll
10:01:54.0558 0x0c9c  Power - ok
10:01:54.0878 0x0c9c  [ F92A2C41117A11A00BE01CA01A7FCDE9, 38ADC6052696D110CA5F393BC586791920663F5DA66934C2A824DDA9CD89C763 ] PptpMiniport    C:\windows\system32\DRIVERS\raspptp.sys
10:01:54.0998 0x0c9c  PptpMiniport - ok
10:01:55.0038 0x0c9c  [ 0D922E23C041EFB1C3FAC2A6F943C9BF, 855418A6A58DCAFB181A1A68613B3E203AFB0A9B3D9D26D0C521F9F613B4EAD5 ] Processor       C:\windows\system32\drivers\processr.sys
10:01:55.0108 0x0c9c  Processor - ok
10:01:55.0268 0x0c9c  [ 53E83F1F6CF9D62F32801CF66D8352A8, 1225FED810BE8E0729EEAE5B340035CCBB9BACD3EF247834400F9B72D05ACE48 ] ProfSvc         C:\windows\system32\profsvc.dll
10:01:55.0338 0x0c9c  ProfSvc - ok
10:01:55.0368 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] ProtectedStorage C:\windows\system32\lsass.exe
10:01:55.0398 0x0c9c  ProtectedStorage - ok
10:01:55.0618 0x0c9c  [ 0557CF5A2556BD58E26384169D72438D, F6F83A616B1F1C6C0DF6D2EC2513E6C23FD4FAA6D36518B8676C619AB74957B4 ] Psched          C:\windows\system32\DRIVERS\pacer.sys
10:01:55.0738 0x0c9c  Psched - ok
10:01:56.0128 0x0c9c  [ A53A15A11EBFD21077463EE2C7AFEEF0, 6002B012A75045DEA62640A864A8721EADE2F8B65BEB5F5BA76D8CD819774489 ] ql2300          C:\windows\system32\drivers\ql2300.sys
10:01:56.0248 0x0c9c  ql2300 - ok
10:01:56.0278 0x0c9c  [ 4F6D12B51DE1AAEFF7DC58C4D75423C8, FB6ABAB741CED66A79E31A45111649F2FA3E26CEE77209B5296F789F6F7D08DE ] ql40xx          C:\windows\system32\drivers\ql40xx.sys
10:01:56.0298 0x0c9c  ql40xx - ok
10:01:56.0358 0x0c9c  [ 906191634E99AEA92C4816150BDA3732, A0305436384104C3B559F9C73902DA19B96B518413379E397C5CDAB0B2B9418F ] QWAVE           C:\windows\system32\qwave.dll
10:01:56.0408 0x0c9c  QWAVE - ok
10:01:56.0499 0x0c9c  [ 76707BB36430888D9CE9D705398ADB6C, 35C1D1D05F98AC29A33D3781F497A0B40A3CB9CDF25FE1F28F574E40DDF70535 ] QWAVEdrv        C:\windows\system32\drivers\qwavedrv.sys
10:01:56.0579 0x0c9c  QWAVEdrv - ok
10:01:56.0659 0x0c9c  [ 5A0DA8AD5762FA2D91678A8A01311704, 8A64EB5DBAB7048A9E42A21CEB62CCD5B007A80C199892D7F8C69B48E8A255EF ] RasAcd          C:\windows\system32\DRIVERS\rasacd.sys
10:01:56.0749 0x0c9c  RasAcd - ok
10:01:56.0899 0x0c9c  [ 7ECFF9B22276B73F43A99A15A6094E90, 62C70DA127F48F796F8897BBFA23AB6EB080CC923F0F091DFA384A93F5C90CA1 ] RasAgileVpn     C:\windows\system32\DRIVERS\AgileVpn.sys
10:01:56.0979 0x0c9c  RasAgileVpn - ok
10:01:57.0009 0x0c9c  [ 8F26510C5383B8DBE976DE1CD00FC8C7, 60E618C010E8A723960636415573FA17EA0BBEF79647196B3BC0B8DEE680E090 ] RasAuto         C:\windows\System32\rasauto.dll
10:01:57.0109 0x0c9c  RasAuto - ok
10:01:57.0189 0x0c9c  [ 471815800AE33E6F1C32FB1B97C490CA, 27307265F743DE3A3A3EC1B2C472A3D85FDD0AEC458E0B1177593141EE072698 ] Rasl2tp         C:\windows\system32\DRIVERS\rasl2tp.sys
10:01:57.0259 0x0c9c  Rasl2tp - ok
10:01:57.0299 0x0c9c  [ EE867A0870FC9E4972BA9EAAD35651E2, 1B848D81705081FD2E18AC762DA7F51455657DAF860BF363DC15925A148BCADA ] RasMan          C:\windows\System32\rasmans.dll
10:01:57.0409 0x0c9c  RasMan - ok
10:01:57.0439 0x0c9c  [ 855C9B1CD4756C5E9A2AA58A15F58C25, A514F8A9C304D54BDA8DC60F5A64259B057EC83A1CAAF6D2B58CFD55E9561F72 ] RasPppoe        C:\windows\system32\DRIVERS\raspppoe.sys
10:01:57.0559 0x0c9c  RasPppoe - ok
10:01:57.0689 0x0c9c  [ E8B1E447B008D07FF47D016C2B0EEECB, FEC789F82B912F3E14E49524D40FEAA4373B221156F14045E645D7C37859258C ] RasSstp         C:\windows\system32\DRIVERS\rassstp.sys
10:01:57.0789 0x0c9c  RasSstp - ok
10:01:58.0029 0x0c9c  [ 77F665941019A1594D887A74F301FA2F, 1FDC6F6853400190C086042933F157814D915C54F26793CAD36CD2607D8810DA ] rdbss           C:\windows\system32\DRIVERS\rdbss.sys
10:01:58.0169 0x0c9c  rdbss - ok
10:01:58.0219 0x0c9c  [ 302DA2A0539F2CF54D7C6CC30C1F2D8D, 1DF3501BBFFB56C3ECC39DBCC4287D3302216C2208CE22428B8C4967E5DE9D17 ] rdpbus          C:\windows\system32\drivers\rdpbus.sys
10:01:58.0299 0x0c9c  rdpbus - ok
10:01:58.0329 0x0c9c  [ CEA6CC257FC9B7715F1C2B4849286D24, A78144D18352EA802C39D9D42921CF97A3E0211766B2169B6755C6FC2D77A804 ] RDPCDD          C:\windows\system32\DRIVERS\RDPCDD.sys
10:01:58.0389 0x0c9c  RDPCDD - ok
10:01:58.0399 0x0c9c  [ BB5971A4F00659529A5C44831AF22365, 9AAA5C0D448E821FD85589505D99DF7749715A046BBD211F139E4E652ADDE41F ] RDPENCDD        C:\windows\system32\drivers\rdpencdd.sys
10:01:58.0469 0x0c9c  RDPENCDD - ok
10:01:58.0489 0x0c9c  [ 216F3FA57533D98E1F74DED70113177A, 60C126A1409D1E9C39F1C9E95F70115BF4AF07780AB499F6E10A612540F173F4 ] RDPREFMP        C:\windows\system32\drivers\rdprefmp.sys
10:01:58.0619 0x0c9c  RDPREFMP - ok
10:01:58.0899 0x0c9c  [ E61608AA35E98999AF9AAEEEA6114B0A, F754CDE89DC96786D2A3C4D19EE2AEF1008E634E4DE3C0CBF927436DE90C04A6 ] RDPWD           C:\windows\system32\drivers\RDPWD.sys
10:01:59.0029 0x0c9c  RDPWD - ok
10:01:59.0119 0x0c9c  [ 34ED295FA0121C241BFEF24764FC4520, AAEE5F00CAA763A5BA51CF56BD7262C03409CD72BD5601490E3EC3FFF929BB5F ] rdyboost        C:\windows\system32\drivers\rdyboost.sys
10:01:59.0159 0x0c9c  rdyboost - ok
10:01:59.0199 0x0c9c  [ 254FB7A22D74E5511C73A3F6D802F192, 3D0FB5840364200DE394F8CC28DA0E334C2B5FA8FF28A41656EE72287F3D3836 ] RemoteAccess    C:\windows\System32\mprdim.dll
10:01:59.0319 0x0c9c  RemoteAccess - ok
10:01:59.0369 0x0c9c  [ E4D94F24081440B5FC5AA556C7C62702, 147CAA03568DC480F9506E30B84891AB7E433B5EBC05F34FF10F72B00E1C6B22 ] RemoteRegistry  C:\windows\system32\regsvc.dll
10:01:59.0499 0x0c9c  RemoteRegistry - ok
10:01:59.0590 0x0c9c  [ E4DC58CF7B3EA515AE917FF0D402A7BB, 665B5CD9FE905B0EE3F59A7B1A94760F5393EBEE729877D8584349754C2867E8 ] RpcEptMapper    C:\windows\System32\RpcEpMap.dll
10:01:59.0680 0x0c9c  RpcEptMapper - ok
10:01:59.0760 0x0c9c  [ D5BA242D4CF8E384DB90E6A8ED850B8C, CB4CB2608B5E31B55FB1A2CF4051E6D08A0C2A5FB231B2116F95938D7577334E ] RpcLocator      C:\windows\system32\locator.exe
10:01:59.0820 0x0c9c  RpcLocator - ok
10:01:59.0910 0x0c9c  [ 5C627D1B1138676C0A7AB2C2C190D123, C5003F2C912C5CA990E634818D3B4FD72F871900AF2948BD6C4D6400B354B401 ] RpcSs           C:\windows\system32\rpcss.dll
10:02:00.0060 0x0c9c  RpcSs - ok
10:02:00.0120 0x0c9c  [ DDC86E4F8E7456261E637E3552E804FF, D250C69CCC75F2D88E7E624FCC51300E75637333317D53908CCA7E0F117173DD ] rspndr          C:\windows\system32\DRIVERS\rspndr.sys
10:02:00.0220 0x0c9c  rspndr - ok
10:02:00.0360 0x0c9c  [ 36FCA0C67BCDC0DA047F5F36743B5CB9, 55B8F43B78B55900DA055206644D1DAD60AE453DB1A8D4527B86FAC346EEE587 ] RSUSBVSTOR      C:\windows\system32\Drivers\RtsUVStor.sys
10:02:00.0390 0x0c9c  RSUSBVSTOR - ok
10:02:00.0480 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] SamSs           C:\windows\system32\lsass.exe
10:02:00.0510 0x0c9c  SamSs - ok
10:02:00.0571 0x0c9c  [ AC03AF3329579FFFB455AA2DAABBE22B, 7AD3B62ADFEC166F9E256F9FF8BAA0568B2ED7308142BF8F5269E6EAA5E0A656 ] sbp2port        C:\windows\system32\drivers\sbp2port.sys
10:02:00.0621 0x0c9c  sbp2port - ok
10:02:00.0663 0x0c9c  [ 9B7395789E3791A3B6D000FE6F8B131E, E5F067F3F212BF5481668BE1779CBEF053F511F8967589BE2E865ACB9A620024 ] SCardSvr        C:\windows\System32\SCardSvr.dll
10:02:00.0786 0x0c9c  SCardSvr - ok
10:02:00.0805 0x0c9c  [ 253F38D0D7074C02FF8DEB9836C97D2B, CB5CAFCB8628BB22877F74ACF1DED0BBAED8F4573A74DA7FE94BBBA584889116 ] scfilter        C:\windows\system32\DRIVERS\scfilter.sys
10:02:00.0895 0x0c9c  scfilter - ok
10:02:01.0037 0x0c9c  [ 262F6592C3299C005FD6BEC90FC4463A, 54095E37F0B6CC677A3E9BDD40F4647C713273D197DB341063AA7F342A60C4A7 ] Schedule        C:\windows\system32\schedsvc.dll
10:02:01.0198 0x0c9c  Schedule - ok
10:02:01.0229 0x0c9c  [ F17D1D393BBC69C5322FBFAFACA28C7F, 62A1A92B3C52ADFD0B808D7F69DD50238B5F202421F1786F7EAEAA63F274B3E8 ] SCPolicySvc     C:\windows\System32\certprop.dll
10:02:01.0299 0x0c9c  SCPolicySvc - ok
10:02:01.0339 0x0c9c  [ 6EA4234DC55346E0709560FE7C2C1972, 64011E044C16E2F92689E5F7E4666A075E27BBFA61F3264E5D51CE1656C1D5B8 ] SDRSVC          C:\windows\System32\SDRSVC.dll
10:02:01.0409 0x0c9c  SDRSVC - ok
10:02:01.0469 0x0c9c  [ 3EA8A16169C26AFBEB544E0E48421186, 34BBB0459C96B3DE94CCB0D73461562935C583D7BF93828DA4E20A6BC9B7301D ] secdrv          C:\windows\system32\drivers\secdrv.sys
10:02:01.0539 0x0c9c  secdrv - ok
10:02:01.0579 0x0c9c  [ BC617A4E1B4FA8DF523A061739A0BD87, 10C4057F6B321EB5237FF619747B74F5401BC17D15A8C7060829E8204A2297F9 ] seclogon        C:\windows\system32\seclogon.dll
10:02:01.0649 0x0c9c  seclogon - ok
10:02:01.0686 0x0c9c  [ C32AB8FA018EF34C0F113BD501436D21, E0EB8E80B51E45CA7EB061E705DA0BC07878759418A8519AE6E12326FE79E7C7 ] SENS            C:\windows\System32\sens.dll
10:02:01.0761 0x0c9c  SENS - ok
10:02:01.0811 0x0c9c  [ 0336CFFAFAAB87A11541F1CF1594B2B2, 8B8A6A33E78A12FB05E29B2E2775850626574AFD2EF88748D65E690A07B10B8D ] SensrSvc        C:\windows\system32\sensrsvc.dll
10:02:01.0851 0x0c9c  SensrSvc - ok
10:02:01.0931 0x0c9c  [ CB624C0035412AF0DEBEC78C41F5CA1B, A4D937F11E06CAE914347CA1362F4C98EC5EE0C0C80321E360EA1ABD6726F8D4 ] Serenum         C:\windows\system32\drivers\serenum.sys
10:02:01.0971 0x0c9c  Serenum - ok
10:02:02.0051 0x0c9c  [ C1D8E28B2C2ADFAEC4BA89E9FDA69BD6, 8F9776FB84C5D11068EAF1FF1D1A46466C655D64D256A8B1E31DC0C23B5DD22D ] Serial          C:\windows\system32\drivers\serial.sys
10:02:02.0101 0x0c9c  Serial - ok
10:02:02.0131 0x0c9c  [ 1C545A7D0691CC4A027396535691C3E3, 065C30BE598FF4DC55C37E0BBE0CEDF10A370AE2BF5404B42EBBB867A3FFED6D ] sermouse        C:\windows\system32\drivers\sermouse.sys
10:02:02.0181 0x0c9c  sermouse - ok
10:02:02.0221 0x0c9c  [ 0B6231BF38174A1628C4AC812CC75804, E569BF1F7F5689E2E917FA6516DB53388A5B8B1C6699DEE030147E853218811D ] SessionEnv      C:\windows\system32\sessenv.dll
10:02:02.0341 0x0c9c  SessionEnv - ok
10:02:02.0361 0x0c9c  [ A554811BCD09279536440C964AE35BBF, DA8F893722F803E189D7D4D6C6232ED34505B63A64ED3A0132A5BB7A2BABDE55 ] sffdisk         C:\windows\system32\drivers\sffdisk.sys
10:02:02.0391 0x0c9c  sffdisk - ok
10:02:02.0421 0x0c9c  [ FF414F0BAEFEBA59BC6C04B3DB0B87BF, B81EF5D26AEB572CAB590F7AD7CA8C89F296420089EF5E6148E972F2DBCA1042 ] sffp_mmc        C:\windows\system32\drivers\sffp_mmc.sys
10:02:02.0481 0x0c9c  sffp_mmc - ok
10:02:02.0491 0x0c9c  [ DD85B78243A19B59F0637DCF284DA63C, 6730D4F2BAE7E24615746ACC41B42D01DB6068D6504982008ADA1890DE900197 ] sffp_sd         C:\windows\system32\drivers\sffp_sd.sys
10:02:02.0541 0x0c9c  sffp_sd - ok
10:02:02.0541 0x0c9c  [ A9D601643A1647211A1EE2EC4E433FF4, 7AC60B4AB48D4BBF1F9681C12EC2A75C72E6E12D30FABC564A24394310E9A5F9 ] sfloppy         C:\windows\system32\drivers\sfloppy.sys
10:02:02.0581 0x0c9c  sfloppy - ok
10:02:02.0681 0x0c9c  [ B95F6501A2F8B2E78C697FEC401970CE, 758B73A32902299A313348CE7EC189B20EB4CB398D0180E4EE24B84DAD55F291 ] SharedAccess    C:\windows\System32\ipnathlp.dll
10:02:02.0751 0x0c9c  SharedAccess - ok
10:02:02.0831 0x0c9c  [ AAF932B4011D14052955D4B212A4DA8D, 2A3BFD0FA9569288E91AE3E72CA1EC39E1450D01E6473CE51157E0F138257923 ] ShellHWDetection C:\windows\System32\shsvcs.dll
10:02:02.0961 0x0c9c  ShellHWDetection - ok
10:02:02.0981 0x0c9c  [ 843CAF1E5FDE1FFD5FF768F23A51E2E1, 89CA9F516E42A6B905474D738CDA2C121020A07DBD4E66CFE569DD77D79D7820 ] SiSRaid2        C:\windows\system32\drivers\SiSRaid2.sys
10:02:03.0021 0x0c9c  SiSRaid2 - ok
10:02:03.0041 0x0c9c  [ 6A6C106D42E9FFFF8B9FCB4F754F6DA4, 87B85C66DF7EB6FDB8A2341D05FAA5261FF68A90CCFC63F0E4A03824F1E33E5E ] SiSRaid4        C:\windows\system32\drivers\sisraid4.sys
10:02:03.0081 0x0c9c  SiSRaid4 - ok
10:02:03.0233 0x0c9c  [ 50D9949020E02B847CD48F1243FCB895, 5BDAD5E44DE5B412645142810C5FCE4B2D9685F928FF4A6B836A9DCE7725BD78 ] SkypeUpdate     C:\Program Files (x86)\Skype\Updater\Updater.exe
10:02:03.0343 0x0c9c  SkypeUpdate - ok
10:02:03.0443 0x0c9c  [ 548260A7B8654E024DC30BF8A7C5BAA4, 4A7E58331D7765A12F53DC2371739DC9A463940B13E16157CE10DB80E958D740 ] Smb             C:\windows\system32\DRIVERS\smb.sys
10:02:03.0553 0x0c9c  Smb - ok
10:02:03.0593 0x0c9c  [ E922286ED6677104AEBB210B9F0BF6F3, 080334BA6E82C8FC0D4EFB67313204D46C174CFEBFB2B4BD70CE503B6066EC32 ] SmbDrv          C:\windows\system32\DRIVERS\Smb_driver.sys
10:02:03.0623 0x0c9c  SmbDrv - ok
10:02:03.0713 0x0c9c  [ 6313F223E817CC09AA41811DAA7F541D, D787061043BEEDB9386B048CB9E680E6A88A1CBAE9BD4A8C0209155BFB76C630 ] SNMPTRAP        C:\windows\System32\snmptrap.exe
10:02:03.0763 0x0c9c  SNMPTRAP - ok
10:02:03.0833 0x0c9c  [ B9E31E5CACDFE584F34F730A677803F9, 21A5130BD00089C609522A372018A719F8E37103D2DD22C59EACB393BE35A063 ] spldr           C:\windows\system32\drivers\spldr.sys
10:02:03.0863 0x0c9c  spldr - ok
10:02:04.0003 0x0c9c  [ 85DAA09A98C9286D4EA2BA8D0E644377, F9C324E2EF81193FE831C7EECC44A100CA06F82FA731BF555D9EA4D91DA13329 ] Spooler         C:\windows\System32\spoolsv.exe
10:02:04.0083 0x0c9c  Spooler - ok
10:02:04.0423 0x0c9c  [ E17E0188BB90FAE42D83E98707EFA59C, FC075F7B39E86CC8EF6DA4E339FE946917E319C347AC70FB0C50AAF36F97E27F ] sppsvc          C:\windows\system32\sppsvc.exe
10:02:04.0923 0x0c9c  sppsvc - ok
10:02:04.0943 0x0c9c  [ 93D7D61317F3D4BC4F4E9F8A96A7DE45, 36D48B23B8243BE5229707375FCD11C2DCAC96983199345365F065A0CBF33314 ] sppuinotify     C:\windows\system32\sppuinotify.dll
10:02:05.0043 0x0c9c  sppuinotify - ok
10:02:05.0093 0x0c9c  [ 441FBA48BFF01FDB9D5969EBC1838F0B, 306128F1AD489F87161A089D1BDC1542A4CB742D91A0C12A7CD1863FDB8932C0 ] srv             C:\windows\system32\DRIVERS\srv.sys
10:02:05.0153 0x0c9c  srv - ok
10:02:05.0195 0x0c9c  [ B4ADEBBF5E3677CCE9651E0F01F7CC28, 726DB2283113AB2A9681E8E9F61132303D6D86E9CD034C40EE4A8C9DB29E87F7 ] srv2            C:\windows\system32\DRIVERS\srv2.sys
10:02:05.0295 0x0c9c  srv2 - ok
10:02:05.0425 0x0c9c  [ 27E461F0BE5BFF5FC737328F749538C3, AFA4704ED8FFC1A0BAB40DFB81D3AE3F3D933A3C9BF54DDAF39FF9AF3646D9E6 ] srvnet          C:\windows\system32\DRIVERS\srvnet.sys
10:02:05.0535 0x0c9c  srvnet - ok
10:02:05.0615 0x0c9c  [ 51B52FBD583CDE8AA9BA62B8B4298F33, 2E2403F8AA39E79D1281CA006B51B43139C32A5FDD64BD34DAA4B935338BD740 ] SSDPSRV         C:\windows\System32\ssdpsrv.dll
10:02:05.0715 0x0c9c  SSDPSRV - ok
10:02:05.0825 0x0c9c  [ AB7AEBF58DAD8DAAB7A6C45E6A8885CB, D21CDBC4C2AA0DB5B4455D5108B0CAF4282A2E664B9035708F212CC094569D9D ] SstpSvc         C:\windows\system32\sstpsvc.dll
10:02:05.0895 0x0c9c  SstpSvc - ok
10:02:06.0125 0x0c9c  [ F3817967ED533D08327DC73BC4D5542A, 1B204454408A690C0A86447F3E4AA9E7C58A9CFB567C94C17C21920BA648B4D5 ] stexstor        C:\windows\system32\drivers\stexstor.sys
10:02:06.0155 0x0c9c  stexstor - ok
10:02:06.0325 0x0c9c  [ 8DD52E8E6128F4B2DA92CE27402871C1, 1101C38BE8FC383B5F2F9FA402F9652B23B88A764DE2B584DFE62B88B11DEF92 ] stisvc          C:\windows\System32\wiaservc.dll
10:02:06.0415 0x0c9c  stisvc - ok
10:02:06.0465 0x0c9c  [ D01EC09B6711A5F8E7E6564A4D0FBC90, 3CB922291DBADC92B46B9E28CCB6810CD8CCDA3E74518EC9522B58B998E1F969 ] swenum          C:\windows\system32\DRIVERS\swenum.sys
10:02:06.0495 0x0c9c  swenum - ok
10:02:06.0595 0x0c9c  [ E08E46FDD841B7184194011CA1955A0B, 9C3725BB1F08F92744C980A22ED5C874007D3B5863C7E1F140F50061052AC418 ] swprv           C:\windows\System32\swprv.dll
10:02:06.0805 0x0c9c  swprv - ok
10:02:06.0875 0x0c9c  [ 92F4AFC1FDE7A4CA0C88F9143F4DD323, FF8796BD6CD15853E22FE2A7B4B10F189316A00F78E52A1BD9CE4F8667452F1B ] SynTP           C:\windows\system32\DRIVERS\SynTP.sys
10:02:07.0005 0x0c9c  SynTP - ok
10:02:07.0175 0x0c9c  [ BF9CCC0BF39B418C8D0AE8B05CF95B7D, 3C13217548BE61F2BDB8BD41F77345CDDA1F97BF0AE17241C335B9807EB3DBB8 ] SysMain         C:\windows\system32\sysmain.dll
10:02:07.0385 0x0c9c  SysMain - ok
10:02:07.0565 0x0c9c  [ E3C61FD7B7C2557E1F1B0B4CEC713585, 01F0E116606D185BF93B540868075BFB1A398197F6AABD994983DBFF56B3A8A0 ] TabletInputService C:\windows\System32\TabSvc.dll
10:02:07.0746 0x0c9c  TabletInputService - ok
10:02:07.0856 0x0c9c  [ 40F0849F65D13EE87B9A9AE3C1DD6823, E251A7EF3D0FD2973AF33A62FC457A7E8D5E8694208F811F52455F7C2426121F ] TapiSrv         C:\windows\System32\tapisrv.dll
10:02:07.0956 0x0c9c  TapiSrv - ok
10:02:08.0266 0x0c9c  [ 1BE03AC720F4D302EA01D40F588162F6, AB644862BF1D2E824FD846180DEC4E2C0FAFCC517451486DE5A92E5E78A952E4 ] TBS             C:\windows\System32\tbssvc.dll
10:02:08.0336 0x0c9c  TBS - ok
10:02:08.0886 0x0c9c  [ 04ADD18EE5CC9FBEDAEC1DD1CD0CB45E, F05C0C4CA3DD234AD5D60CF1EF763C9A1D9EC3C157E180C2D75CC07E6B02A611 ] Tcpip           C:\windows\system32\drivers\tcpip.sys
10:02:09.0016 0x0c9c  Tcpip - ok
10:02:09.0346 0x0c9c  [ 04ADD18EE5CC9FBEDAEC1DD1CD0CB45E, F05C0C4CA3DD234AD5D60CF1EF763C9A1D9EC3C157E180C2D75CC07E6B02A611 ] TCPIP6          C:\windows\system32\DRIVERS\tcpip.sys
10:02:09.0406 0x0c9c  TCPIP6 - ok
10:02:09.0446 0x0c9c  [ 1B16D0BD9841794A6E0CDE0CEF744ABC, 7EB8BA97339199EEE7F2B09DA2DA6279DA64A510D4598D42CF86415D67CD674C ] tcpipreg        C:\windows\system32\drivers\tcpipreg.sys
10:02:09.0526 0x0c9c  tcpipreg - ok
10:02:10.0036 0x0c9c  [ FD542B661BD22FA69CA789AD0AC58C29, 75FFAF1834B1E22DF37608ED451F161052FF1FE3C681B4E20A68DCA92CC7FD8C ] tdcmdpst        C:\windows\system32\DRIVERS\tdcmdpst.sys
10:02:10.0046 0x0c9c  tdcmdpst - ok
10:02:10.0136 0x0c9c  [ 3371D21011695B16333A3934340C4E7C, 7416F9BBFC1BA9D875EA7D1C7A0D912FC6977B49A865D67E3F9C4E18A965082D ] TDPIPE          C:\windows\system32\drivers\tdpipe.sys
10:02:10.0256 0x0c9c  TDPIPE - ok
10:02:10.0306 0x0c9c  [ 51C5ECEB1CDEE2468A1748BE550CFBC8, 4E8F83877330B421F7B5D8393D34BC44C6450E69209DAA95B29CB298166A5DF9 ] TDTCP           C:\windows\system32\drivers\tdtcp.sys
10:02:10.0396 0x0c9c  TDTCP - ok
10:02:10.0576 0x0c9c  [ DDAD5A7AB24D8B65F8D724F5C20FD806, B71F2967A4EE7395E4416C1526CB85368AEA988BDD1F2C9719C48B08FAFA9661 ] tdx             C:\windows\system32\DRIVERS\tdx.sys
10:02:10.0736 0x0c9c  tdx - ok
10:02:10.0876 0x0c9c  [ 1B709733A04DCC41A63F9CD1F76A4EBE, 3973F7BA3CC5395040F68B60950A836D729B487BF7F732D31915064F7DA4C838 ] TemproMonitoringService C:\Program Files (x86)\Toshiba TEMPRO\TemproSvc.exe
10:02:10.0896 0x0c9c  TemproMonitoringService - ok
10:02:10.0956 0x0c9c  [ 561E7E1F06895D78DE991E01DD0FB6E5, 83BFA50A528762EC52A011302AC3874636FB7E26628CD7ACFBF2BDC9FAA8110D ] TermDD          C:\windows\system32\DRIVERS\termdd.sys
10:02:10.0976 0x0c9c  TermDD - ok
10:02:11.0116 0x0c9c  [ 2E648163254233755035B46DD7B89123, 6FA0D07CE18A3A69D82EE49D875F141E39406E92C34EAC76AC4EB052E6EBCBCD ] TermService     C:\windows\System32\termsrv.dll
10:02:11.0286 0x0c9c  TermService - ok
10:02:11.0346 0x0c9c  [ F0344071948D1A1FA732231785A0664C, DB9886C2C858FAF45AEA15F8E42860343F73EB8685C53EC2E8CCC10586CB0832 ] Themes          C:\windows\system32\themeservice.dll
10:02:11.0546 0x0c9c  Themes - ok
10:02:11.0756 0x0c9c  [ E40E80D0304A73E8D269F7141D77250B, 0DB4AC13A264F19A84DC0BCED54E8E404014CC09C993B172002B1561EC7E265A ] THREADORDER     C:\windows\system32\mmcss.dll
10:02:11.0806 0x0c9c  THREADORDER - ok
10:02:11.0986 0x0c9c  [ 71C321649B28638EE80A2EEB164C1DC8, D75D296B506DCC38A4DED82C71141388AEB60B065785DCC5BC2F4B3B77ACEDC7 ] TMachInfo       C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe
10:02:11.0996 0x0c9c  TMachInfo - ok
10:02:12.0126 0x0c9c  [ 8E2C799D3476EAC32C3BA0DF7CE6AF19, CFE8A69E3F2A42C3BA2B38EC9233076D0AD32C441500E6407219F2E866905D9B ] TODDSrv         C:\windows\system32\TODDSrv.exe
10:02:12.0136 0x0c9c  TODDSrv - ok
10:02:12.0256 0x0c9c  [ 4AE80C5F7772C4FB2A762F70AD4A111E, C86F4878D497BD998639A3A01C26F46E5A31F4BBC35FA4B7E9BF66F7799D2511 ] TosCoSrv        C:\Program Files\TOSHIBA\Power Saver\TosCoSrv.exe
10:02:12.0276 0x0c9c  TosCoSrv - ok
10:02:12.0346 0x0c9c  [ A22DEB5EC05FEBFDCA1D3FF70FA1FF46, 3D3F68DC994C99436E31B72AEE15F4F46437AC3F2C2CD1D477C738E16397CB50 ] TOSHIBA Bluetooth Service C:\Program Files (x86)\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
10:02:12.0366 0x0c9c  TOSHIBA Bluetooth Service - ok
10:02:12.0446 0x0c9c  [ 6E2330FB032ED3EBEFC1349AD7081A98, 14009203935221FED275288E2B9801FBA4401854C2566E4F5B4003EB28DE97E6 ] TOSHIBA eco Utility Service C:\Program Files\TOSHIBA\TECO\TecoService.exe
10:02:12.0466 0x0c9c  TOSHIBA eco Utility Service - ok
10:02:12.0546 0x0c9c  [ 9338C2DEB14CA2804BCB3276CB7EB4FD, 4204B49D3BE2777E10A442C45A8677E559AF9DF03CB96A9C2FDE5D21A0538623 ] TOSHIBA HDD SSD Alert Service C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe
10:02:12.0556 0x0c9c  TOSHIBA HDD SSD Alert Service - ok
10:02:12.0597 0x0c9c  Tosrfcom - ok
10:02:12.0667 0x0c9c  [ F5E3AC4CBCD154EE80849B21887FD0B0, 7D68AF88F1B01BCA6456FBAEB91580419A49A77D31EFC0BA6A1C50301899BA03 ] tosrfec         C:\windows\system32\DRIVERS\tosrfec.sys
10:02:12.0677 0x0c9c  tosrfec - ok
10:02:12.0697 0x0c9c  [ AF8A0D2E2A41043A77CA77CCBDB8D9C2, B215C6357E30A0E669FD0D4B9BB9D84B1D30B2177B6ED626B3C70D96C8FF4497 ] Tosrfusb        C:\windows\system32\DRIVERS\tosrfusb.sys
10:02:12.0707 0x0c9c  Tosrfusb - ok
10:02:12.0797 0x0c9c  [ 36CDD894395BEC46EFB14F49D77D3D82, A285DBF83605756B52E09548B78C67C00A814E6FDF8BA761701FA520EF9D94BF ] TPCHSrv         C:\Program Files\TOSHIBA\TPHM\TPCHSrv.exe
10:02:12.0827 0x0c9c  TPCHSrv - ok
10:02:12.0897 0x0c9c  [ 7E7AFD841694F6AC397E99D75CEAD49D, DE87F203FD8E6BDCCFCA1860A85F283301A365846FB703D9BB86278D8AC96B07 ] TrkWks          C:\windows\System32\trkwks.dll
10:02:12.0987 0x0c9c  TrkWks - ok
10:02:13.0037 0x0c9c  [ 773212B2AAA24C1E31F10246B15B276C, F2EF85F5ABA307976D9C649D710B408952089458DDE97D4DEF321DF14E46A046 ] TrustedInstaller C:\windows\servicing\TrustedInstaller.exe
10:02:13.0077 0x0c9c  TrustedInstaller - ok
10:02:13.0197 0x0c9c  [ 4CE278FC9671BA81A138D70823FCAA09, CBE501436696E32A3701B9F377B823AC36647B6626595F76CC63E2396AD7D300 ] tssecsrv        C:\windows\system32\DRIVERS\tssecsrv.sys
10:02:13.0277 0x0c9c  tssecsrv - ok
10:02:13.0337 0x0c9c  [ D11C783E3EF9A3C52C0EBE83CC5000E9, A136C355D4C8945729163D15801364A614E23217B15F9313C85BA45BB71A74EB ] TsUsbFlt        C:\windows\system32\drivers\tsusbflt.sys
10:02:13.0387 0x0c9c  TsUsbFlt - ok
10:02:13.0397 0x0c9c  [ 9CC2CCAE8A84820EAECB886D477CBCB8, 50D8AA2D7477A6618A0C31BB4D1C4887B457865FB1105E2E7B984EEFA337B804 ] TsUsbGD         C:\windows\system32\drivers\TsUsbGD.sys
10:02:13.0477 0x0c9c  TsUsbGD - ok
10:02:13.0697 0x0c9c  [ 3566A8DAAFA27AF944F5D705EAA64894, AE9D8B648DA08AF667B9456C3FE315489859C157510A258559F18238F2CC92B8 ] tunnel          C:\windows\system32\DRIVERS\tunnel.sys
10:02:13.0767 0x0c9c  tunnel - ok
10:02:13.0807 0x0c9c  [ 550B567F9364D8F7684C3FB3EA665A72, A214BBBBAB9F0DD525FA5A818CEB8E9294B4A96676317255D7ACF6049049C933 ] TVALZ           C:\windows\system32\DRIVERS\TVALZ_O.SYS
10:02:13.0817 0x0c9c  TVALZ - ok
10:02:13.0977 0x0c9c  [ 9C7191F4B2E49BFF47A6C1144B5923FA, DF4E663499946F4E68B7528CA399574D1EB69797FF81F681943B84F3E5E6A40E ] TVALZFL         C:\windows\system32\DRIVERS\TVALZFL.sys
10:02:13.0987 0x0c9c  TVALZFL - ok
10:02:13.0997 0x0c9c  [ B4DD609BD7E282BFC683CEC7EAAAAD67, EF131DB6F6411CAD36A989A421AF93F89DD61601AC524D2FF11C10FF6E3E9123 ] uagp35          C:\windows\system32\drivers\uagp35.sys
10:02:14.0007 0x0c9c  uagp35 - ok
10:02:14.0077 0x0c9c  [ FF4232A1A64012BAA1FD97C7B67DF593, D8591B4EB056899C7B604E4DD852D82D4D9809F508ABCED4A03E1BE6D5D456E3 ] udfs            C:\windows\system32\DRIVERS\udfs.sys
10:02:14.0167 0x0c9c  udfs - ok
10:02:14.0237 0x0c9c  [ 3CBDEC8D06B9968ABA702EBA076364A1, B8DAB8AA804FC23021BFEBD7AE4D40FBE648D6C6BA21CC008E26D1C084972F9B ] UI0Detect       C:\windows\system32\UI0Detect.exe
10:02:14.0267 0x0c9c  UI0Detect - ok
10:02:14.0287 0x0c9c  [ 4BFE1BC28391222894CBF1E7D0E42320, 5918B1ED2030600DF77BDACF1C808DF6EADDD8BF3E7003AF1D72050D8B102B3A ] uliagpkx        C:\windows\system32\drivers\uliagpkx.sys
10:02:14.0297 0x0c9c  uliagpkx - ok
10:02:14.0357 0x0c9c  [ DC54A574663A895C8763AF0FA1FF7561, 09A3F3597E91CBEB2F38E96E75134312B60CAE5574B2AD4606C2D3E992AEDDFE ] umbus           C:\windows\system32\DRIVERS\umbus.sys
10:02:14.0387 0x0c9c  umbus - ok
10:02:14.0467 0x0c9c  [ B2E8E8CB557B156DA5493BBDDCC1474D, F547509A08C0679ACB843E20C9C0CF51BED1B06530BBC529DFB0944504564A43 ] UmPass          C:\windows\system32\drivers\umpass.sys
10:02:14.0497 0x0c9c  UmPass - ok
10:02:14.0547 0x0c9c  [ D47EC6A8E81633DD18D2436B19BAF6DE, 0FB461E2D5E0B75BB5958F6362F4880BFA4C36AD930542609BCAF574941AA7AE ] upnphost        C:\windows\System32\upnphost.dll
10:02:14.0607 0x0c9c  upnphost - ok
10:02:14.0677 0x0c9c  [ C9E9D59C0099A9FF51697E9306A44240, 78D9A7A5E5742962B6978F475BF06CB32262F1D214699D3D40538476A58012A1 ] USBAAPL64       C:\windows\system32\Drivers\usbaapl64.sys
10:02:14.0687 0x0c9c  USBAAPL64 - ok
10:02:14.0817 0x0c9c  [ DCA68B0943D6FA415F0C56C92158A83A, BEE5A5B33B22D1DF50B884D46D89FC3B8286EB16E38AD5A20F0A49E5C6766C57 ] usbccgp         C:\windows\system32\DRIVERS\usbccgp.sys
10:02:14.0837 0x0c9c  usbccgp - ok
10:02:14.0957 0x0c9c  [ 80B0F7D5CCF86CEB5D402EAAF61FEC31, 140C62116A425DEAD25FE8D82DE283BC92C482A9F643658D512F9F67061F28AD ] usbcir          C:\windows\system32\drivers\usbcir.sys
10:02:15.0007 0x0c9c  usbcir - ok
10:02:15.0037 0x0c9c  [ 18A85013A3E0F7E1755365D287443965, 811C5EDF38C765BCF71BCE25CB6626FF6988C3699F5EF1846240EA0052F34C33 ] usbehci         C:\windows\system32\drivers\usbehci.sys
10:02:15.0087 0x0c9c  usbehci - ok
10:02:15.0277 0x0c9c  [ 8D1196CFBB223621F2C67D45710F25BA, B5D7AFE51833B24FC9576F3AED3D8A2B290E5846060E73F9FFFAC1890A8B6003 ] usbhub          C:\windows\system32\DRIVERS\usbhub.sys
10:02:15.0307 0x0c9c  usbhub - ok
10:02:15.0357 0x0c9c  [ 765A92D428A8DB88B960DA5A8D6089DC, 56DE8A2ED58E53B202C399CA7BACB1551136303C2EE0AB426BDBBF880E3C542C ] usbohci         C:\windows\system32\drivers\usbohci.sys
10:02:15.0387 0x0c9c  usbohci - ok
10:02:15.0557 0x0c9c  [ 73188F58FB384E75C4063D29413CEE3D, B485463933306036B1D490722CB1674DC85670753D79FA0EF7EBCA7BBAAD9F7C ] usbprint        C:\windows\system32\DRIVERS\usbprint.sys
10:02:15.0587 0x0c9c  usbprint - ok
10:02:15.0667 0x0c9c  [ 9661DA76B4531B2DA272ECCE25A8AF24, FEA93254A21E71A7EB8AD35FCCAD2C1E41F7329EC33B1734F5B41307A34D8637 ] usbscan         C:\windows\system32\drivers\usbscan.sys
10:02:15.0687 0x0c9c  usbscan - ok
10:02:15.0807 0x0c9c  [ FED648B01349A3C8395A5169DB5FB7D6, DC4D7594C24ADD076927B9347F1B50B91CF03A4ABDB284248D5711D9C19DEB96 ] USBSTOR         C:\windows\system32\DRIVERS\USBSTOR.SYS
10:02:15.0867 0x0c9c  USBSTOR - ok
10:02:15.0917 0x0c9c  [ DD253AFC3BC6CBA412342DE60C3647F3, 146F8613F1057AC054DC3593E84BC52899DA27EA33B0E72ACFB78C3699ADCDE7 ] usbuhci         C:\windows\system32\drivers\usbuhci.sys
10:02:15.0957 0x0c9c  usbuhci - ok
10:02:16.0067 0x0c9c  [ 1F775DA4CF1A3A1834207E975A72E9D7, 6D3DE5BD3EF3A76E997E5BAF900C51D25308F5A9682D1F62017F577A24095B90 ] usbvideo        C:\windows\System32\Drivers\usbvideo.sys
10:02:16.0207 0x0c9c  usbvideo - ok
10:02:16.0257 0x0c9c  [ EDBB23CBCF2CDF727D64FF9B51A6070E, 7202484C8E1BFB2AFD64D8C81668F3EDE0E3BF5EB27572877A0A7B337AE5AE42 ] UxSms           C:\windows\System32\uxsms.dll
10:02:16.0367 0x0c9c  UxSms - ok
10:02:16.0387 0x0c9c  [ 204F3F58212B3E422C90BD9691A2DF28, D748A8CEE4D59B4248C9B1ACA5155D0FF6635A29564B4391B7FAC6261F93FE99 ] VaultSvc        C:\windows\system32\lsass.exe
10:02:16.0417 0x0c9c  VaultSvc - ok
10:02:16.0467 0x0c9c  [ C5C876CCFC083FF3B128F933823E87BD, 6FE0FBB6C3207E09300E0789E2168F76668D87C317FE9F263E733827ADCFBE0D ] vdrvroot        C:\windows\system32\drivers\vdrvroot.sys
10:02:16.0527 0x0c9c  vdrvroot - ok
10:02:16.0637 0x0c9c  [ 8D6B481601D01A456E75C3210F1830BE, A2CEF483F4231367138EEF7E67FD5BE5364FC0780C44CA1368E36CE4AA3D0633 ] vds             C:\windows\System32\vds.exe
10:02:16.0877 0x0c9c  vds - ok
10:02:17.0087 0x0c9c  [ DA4DA3F5E02943C2DC8C6ED875DE68DD, EDE604536DB78C512D68C92B26DA77C8811AC109D1F0A473673F0A82D15A2838 ] vga             C:\windows\system32\DRIVERS\vgapnp.sys
10:02:17.0167 0x0c9c  vga - ok
10:02:17.0257 0x0c9c  [ 53E92A310193CB3C03BEA963DE7D9CFC, 45898604375B42EB1246C17A22D91C2440F11C746FF6459AD38027C1BC2E3125 ] VgaSave         C:\windows\System32\drivers\vga.sys
10:02:17.0427 0x0c9c  VgaSave - ok
10:02:17.0547 0x0c9c  [ 2CE2DF28C83AEAF30084E1B1EB253CBB, D1946816A1CB89F825CBEA58F94A4C9D0CE7249355CD3915563F54054EE564BF ] vhdmp           C:\windows\system32\drivers\vhdmp.sys
10:02:17.0827 0x0c9c  vhdmp - ok
10:02:17.0897 0x0c9c  [ E5689D93FFE4E5D66C0178761240DD54, 6D35CED80681B12AAF63BFA0DA1C386E71D3838839B68A686990AA8031949D27 ] viaide          C:\windows\system32\drivers\viaide.sys
10:02:18.0497 0x0c9c  viaide - ok
10:02:18.0617 0x0c9c  [ D2AAFD421940F640B407AEFAAEBD91B0, 31EF342A60AF04F4108759A71F8FB7B8C8819216CF3D16A95B2BA0E33A8A9161 ] volmgr          C:\windows\system32\drivers\volmgr.sys
10:02:19.0187 0x0c9c  volmgr - ok
10:02:19.0627 0x0c9c  [ A255814907C89BE58B79EF2F189B843B, 463DB771851352185B6AC323BD93B9084D47291E53C1F7B628B65D6918B2E28F ] volmgrx         C:\windows\system32\drivers\volmgrx.sys
10:02:19.0727 0x0c9c  volmgrx - ok
10:02:19.0767 0x0c9c  [ DF8126BD41180351A093A3AD2FC8903B, AEFF4AA89CDDAAAD43CDE17C6B6EB2A397A0AC1651CBD51B889161EC2BC6527A ] volsnap         C:\windows\system32\drivers\volsnap.sys
10:02:19.0807 0x0c9c  volsnap - ok
10:02:20.0327 0x0c9c  [ 239D8D72730226CD460BDC8CA0A23D43, B38AE7D21C227DA55A1E8FAAA7383F2DB45BD80206A4BAC9FCF76727480150ED ] Vsdatant        C:\windows\system32\DRIVERS\vsdatant.sys
10:02:20.0367 0x0c9c  Vsdatant - ok
10:02:21.0058 0x0c9c  vsmon - ok
10:02:21.0108 0x0c9c  [ 5E2016EA6EBACA03C04FEAC5F330D997, 53106EB877459FE55A459111F7AB0EE320BB3B4C954D3DB6FA1642396001F2AC ] vsmraid         C:\windows\system32\drivers\vsmraid.sys
10:02:21.0148 0x0c9c  vsmraid - ok
10:02:21.0889 0x0c9c  [ B60BA0BC31B0CB414593E169F6F21CC2, 47B801E623254CF0202B3591CB5C019CABFB52F123C7D47E29D19B32F1F2B915 ] VSS             C:\windows\system32\vssvc.exe
10:02:22.0039 0x0c9c  VSS - ok
10:02:22.0069 0x0c9c  [ 36D4720B72B5C5D9CB2B9C29E9DF67A1, 3254523C85C70EBA2DBAC05DB2DBA89EDF8E9195F390F7C21F96458FB6B2E3D7 ] vwifibus        C:\windows\system32\DRIVERS\vwifibus.sys
10:02:22.0149 0x0c9c  vwifibus - ok
10:02:22.0199 0x0c9c  [ 6A3D66263414FF0D6FA754C646612F3F, 30F6BA594B0D3B94113064015A16D97811CD989DF1715CCE21CEAB9894C1B4FB ] vwififlt        C:\windows\system32\DRIVERS\vwififlt.sys
10:02:22.0289 0x0c9c  vwififlt - ok
10:02:22.0349 0x0c9c  [ 6A638FC4BFDDC4D9B186C28C91BD1A01, 5521F1DC515586777EC4837E0AEAA3E613CC178AF1074031C4D0D0C695A93168 ] vwifimp         C:\windows\system32\DRIVERS\vwifimp.sys
10:02:22.0389 0x0c9c  vwifimp - ok
10:02:22.0459 0x0c9c  [ 1C9D80CC3849B3788048078C26486E1A, 34A89F31E53F6B6C209B286F580CC2257AE6D057E4E20741F241C9C167947962 ] W32Time         C:\windows\system32\w32time.dll
10:02:22.0559 0x0c9c  W32Time - ok
10:02:22.0819 0x0c9c  [ 4E9440F4F152A7B944CB1663D3935A3E, 8FE04EBD3BC612EE943A21A3E56F37E5C9B578CDACA6044048181DAD81816D53 ] WacomPen        C:\windows\system32\drivers\wacompen.sys
10:02:22.0899 0x0c9c  WacomPen - ok
10:02:23.0039 0x0c9c  [ 356AFD78A6ED4457169241AC3965230C, CE4D1EE3525C10AC658B20776C3E444DE44874C837713DC5311386EDFCB18399 ] WANARP          C:\windows\system32\DRIVERS\wanarp.sys
10:02:23.0129 0x0c9c  WANARP - ok
10:02:23.0139 0x0c9c  [ 356AFD78A6ED4457169241AC3965230C, CE4D1EE3525C10AC658B20776C3E444DE44874C837713DC5311386EDFCB18399 ] Wanarpv6        C:\windows\system32\DRIVERS\wanarp.sys
10:02:23.0199 0x0c9c  Wanarpv6 - ok
10:02:23.0409 0x0c9c  [ 78F4E7F5C56CB9716238EB57DA4B6A75, 46A4E78CE5F2A4B26F4E9C3FF04A99D9B727A82AC2E390A82A1611C3F6E0C9AF ] wbengine        C:\windows\system32\wbengine.exe
10:02:23.0679 0x0c9c  wbengine - ok
10:02:23.0769 0x0c9c  [ 3AA101E8EDAB2DB4131333F4325C76A3, 4F7BD3DA5E58B18BFF106CFF7B45E75FD13EE556D433C695BA23EC80827E49DE ] WbioSrvc        C:\windows\System32\wbiosrvc.dll
10:02:23.0969 0x0c9c  WbioSrvc - ok
10:02:23.0989 0x0c9c  [ 7368A2AFD46E5A4481D1DE9D14848EDD, 8039C478FC2D9F095F5883A4FA47F9E6EDF57CC88A4AA74F07C88445F90DED57 ] wcncsvc         C:\windows\System32\wcncsvc.dll
10:02:24.0029 0x0c9c  wcncsvc - ok
10:02:24.0119 0x0c9c  [ 20F7441334B18CEE52027661DF4A6129, 7B8E0247234B740FED2BE9B833E9CE8DD7453340123AB43F6B495A7E6A27B0DD ] WcsPlugInService C:\windows\System32\WcsPlugInService.dll
10:02:24.0239 0x0c9c  WcsPlugInService - ok
10:02:24.0489 0x0c9c  [ 72889E16FF12BA0F235467D6091B17DC, F2FD0BBD075E33608D93F350D216F97442AB89ABD540513C2D568C78096E12A8 ] Wd              C:\windows\system32\drivers\wd.sys
10:02:24.0519 0x0c9c  Wd - ok
10:02:24.0819 0x0c9c  [ E2C933EDBC389386EBE6D2BA953F43D8, AF1DEADD5F1267CCEBD226E8EEB971D1946EA6A5A9645A36F5D111F758AF2F07 ] Wdf01000        C:\windows\system32\drivers\Wdf01000.sys
10:02:24.0899 0x0c9c  Wdf01000 - ok
10:02:24.0969 0x0c9c  [ BF1FC3F79B863C914687A737C2F3D681, B2DF47AC4931ACFB243775767B77065CC0D98778FC0243C793A3E219EB961209 ] WdiServiceHost  C:\windows\system32\wdi.dll
10:02:25.0029 0x0c9c  WdiServiceHost - ok
10:02:25.0039 0x0c9c  [ BF1FC3F79B863C914687A737C2F3D681, B2DF47AC4931ACFB243775767B77065CC0D98778FC0243C793A3E219EB961209 ] WdiSystemHost   C:\windows\system32\wdi.dll
10:02:25.0089 0x0c9c  WdiSystemHost - ok
10:02:25.0189 0x0c9c  [ 0EB0E5D22B1760F2DBCE632F2DD7A54D, B8A4CC62F88768947FB0A161CF9564DB28FD9C1C037B5475DF192982DE035C22 ] WebClient       C:\windows\System32\webclnt.dll
10:02:25.0299 0x0c9c  WebClient - ok
10:02:25.0349 0x0c9c  [ C749025A679C5103E575E3B48E092C43, B71171D07EE7AB085A24BF3A1072FF2CE7EA021AAE695F6A90640E6EE8EB55C1 ] Wecsvc          C:\windows\system32\wecsvc.dll
10:02:25.0511 0x0c9c  Wecsvc - ok
10:02:25.0581 0x0c9c  [ 7E591867422DC788B9E5BD337A669A08, 484E6BCCDF7ADCE9A1AACAD1BC7C7D7694B9E40FA90D94B14D80C607784F6C75 ] wercplsupport   C:\windows\System32\wercplsupport.dll
10:02:25.0682 0x0c9c  wercplsupport - ok
10:02:25.0752 0x0c9c  [ 6D137963730144698CBD10F202E9F251, A9F522A125158D94F540544CCD4DBF47B9DCE2EA878C33675AFE40F80E8F4979 ] WerSvc          C:\windows\System32\WerSvc.dll
10:02:25.0862 0x0c9c  WerSvc - ok
10:02:25.0922 0x0c9c  [ 611B23304BF067451A9FDEE01FBDD725, 0AF2734B978165FC6FD22B64862132CCE32528A21C698A49D176129446E099C8 ] WfpLwf          C:\windows\system32\DRIVERS\wfplwf.sys
10:02:26.0012 0x0c9c  WfpLwf - ok
10:02:26.0032 0x0c9c  [ 05ECAEC3E4529A7153B3136CEB49F0EC, 9995CB2CEC70A633EA33CBB0DEAD2BB28CB67132B41E9444BDAB9E75744C9A50 ] WIMMount        C:\windows\system32\drivers\wimmount.sys
10:02:26.0062 0x0c9c  WIMMount - ok
10:02:26.0142 0x0c9c  WinDefend - ok
10:02:26.0162 0x0c9c  WinHttpAutoProxySvc - ok
10:02:26.0282 0x0c9c  [ 19B07E7E8915D701225DA41CB3877306, D6555E8D276DBB11358246E0FE215F76F1FB358791C76B88D82C2A66A42DA19F ] Winmgmt         C:\windows\system32\wbem\WMIsvc.dll
10:02:26.0372 0x0c9c  Winmgmt - ok
10:02:26.0762 0x0c9c  [ BCB1310604AA415C4508708975B3931E, 9D943F086D454345153A0DD426B4432532A44FD87950386B186E1CAD2AC70565 ] WinRM           C:\windows\system32\WsmSvc.dll
10:02:27.0002 0x0c9c  WinRM - ok
10:02:27.0122 0x0c9c  [ FE88B288356E7B47B74B13372ADD906D, A16B166F6BB32EF9D2A142F27B9EC54CBC7B3AC915799783CF4C40E525BC9E03 ] WinUsb          C:\windows\system32\DRIVERS\WinUsb.sys
10:02:27.0212 0x0c9c  WinUsb - ok
10:02:27.0272 0x0c9c  [ 4FADA86E62F18A1B2F42BA18AE24E6AA, CE1683386886BF34862681A46199EA7E7FB4232A186047DA7FBD8EC240AF6726 ] Wlansvc         C:\windows\System32\wlansvc.dll
10:02:27.0382 0x0c9c  Wlansvc - ok
10:02:27.0482 0x0c9c  [ 06C8FA1CF39DE6A735B54D906BA791C6, D8FEC7DE227781CDA876904701B2AA995268F74DCD6CB34AA0296C557FC283B6 ] wlcrasvc        C:\Program Files\Windows Live\Mesh\wlcrasvc.exe
10:02:27.0502 0x0c9c  wlcrasvc - ok
10:02:28.0132 0x0c9c  [ 2BACD71123F42CEA603F4E205E1AE337, 1FEF20554110371D738F462ECFFA999158EFEED02062414C58C1B61C422BF0B9 ] wlidsvc         C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
10:02:28.0232 0x0c9c  wlidsvc - ok
10:02:28.0272 0x0c9c  [ F6FF8944478594D0E414D3F048F0D778, 6F75E0AE6127B33A92A88E59D4B048FD4C15F997807BE7BF0EFE76F95235B1D9 ] WmiAcpi         C:\windows\system32\drivers\wmiacpi.sys
10:02:28.0302 0x0c9c  WmiAcpi - ok
10:02:28.0352 0x0c9c  [ 38B84C94C5A8AF291ADFEA478AE54F93, 1AC267AC73670BEA5F3785C9AD9DB146F8E993A862C843742B21FDB90D102B2A ] wmiApSrv        C:\windows\system32\wbem\WmiApSrv.exe
10:02:28.0422 0x0c9c  wmiApSrv - ok
10:02:28.0552 0x0c9c  WMPNetworkSvc - ok
10:02:28.0632 0x0c9c  [ 96C6E7100D724C69FCF9E7BF590D1DCA, 2E63C9B0893B4FC03B7A71BAEA6202D3D3DB1B52F3643467829B5A573FD7655B ] WPCSvc          C:\windows\System32\wpcsvc.dll
10:02:28.0662 0x0c9c  WPCSvc - ok
10:02:28.0762 0x0c9c  [ 93221146D4EBBF314C29B23CD6CC391D, C0750858A65BF51E210CD244C825C121D67E025CD2D2455139991AAC289A90FE ] WPDBusEnum      C:\windows\system32\wpdbusenum.dll
10:02:28.0802 0x0c9c  WPDBusEnum - ok
10:02:28.0942 0x0c9c  [ 6BCC1D7D2FD2453957C5479A32364E52, E48554D31FBDCF8F985C1C72524CAA9106F5B7CC2B79064F8F5E2562D517F090 ] ws2ifsl         C:\windows\system32\drivers\ws2ifsl.sys
10:02:29.0032 0x0c9c  ws2ifsl - ok
10:02:29.0252 0x0c9c  [ E8B1FE6669397D1772D8196DF0E57A9E, 39FE0819360719F756BD31A1884A0508A1E2371ACC723E25E005CBEC0A7B02FA ] wscsvc          C:\windows\System32\wscsvc.dll
10:02:29.0282 0x0c9c  wscsvc - ok
10:02:29.0292 0x0c9c  WSearch - ok
10:02:29.0983 0x0c9c  [ 61FF576450CCC80564B850BC3FB6713A, B2843BC9E2F62D27DCF6787D063378926748CE75002BADA1873DCB5039883705 ] wuauserv        C:\windows\system32\wuaueng.dll
10:02:30.0063 0x0c9c  wuauserv - ok
10:02:30.0243 0x0c9c  [ AB886378EEB55C6C75B4F2D14B6C869F, D6C4602EB8F291DADEDF3CD211013D4AC752DDE7E799C2D8D74AA4F5477CAED6 ] WudfPf          C:\windows\system32\drivers\WudfPf.sys
10:02:30.0363 0x0c9c  WudfPf - ok
10:02:30.0473 0x0c9c  [ DDA4CAF29D8C0A297F886BFE561E6659, 94E5DD649B5D86FA1A7C7D30FCF9644D0EE048D312E626111458ADF66BFBE978 ] WUDFRd          C:\windows\system32\DRIVERS\WUDFRd.sys
10:02:30.0533 0x0c9c  WUDFRd - ok
10:02:30.0603 0x0c9c  [ B20F051B03A966392364C83F009F7D17, 88ECEB55AE91F58F592B96EBC10B572747D5A2F9B7629E8F371761E4F7408A65 ] wudfsvc         C:\windows\System32\WUDFSvc.dll
10:02:30.0763 0x0c9c  wudfsvc - ok
10:02:30.0873 0x0c9c  [ 04F82965C09CBDF646B487E145060301, 2CD8533EDBE24C3E42EB7550E20F8A2EB9E5E345B165DEF543163A6BC1FDD18B ] WwanSvc         C:\windows\System32\wwansvc.dll
10:02:30.0933 0x0c9c  WwanSvc - ok
10:02:31.0043 0x0c9c  ================ Scan global ===============================
10:02:31.0233 0x0c9c  [ BA0CD8C393E8C9F83354106093832C7B, 18D8A4780A2BAA6CEF7FBBBDA0EF6BF2DADF146E1E578A618DD5859E8ADBF1A8 ] C:\windows\system32\basesrv.dll
10:02:31.0413 0x0c9c  [ 88EDD0B34EED542745931E581AD21A32, DC2B93E1CEF5B0BCEE08D72669BB0F3AD0E8E6E75BDC08858407ED92F6FFA031 ] C:\windows\system32\winsrv.dll
10:02:31.0433 0x0c9c  [ 88EDD0B34EED542745931E581AD21A32, DC2B93E1CEF5B0BCEE08D72669BB0F3AD0E8E6E75BDC08858407ED92F6FFA031 ] C:\windows\system32\winsrv.dll
10:02:31.0483 0x0c9c  [ D6160F9D869BA3AF0B787F971DB56368, 0033E6212DD8683E4EE611B290931FDB227B4795F0B17C309DC686C696790529 ] C:\windows\system32\sxssrv.dll
10:02:31.0663 0x0c9c  [ 24ACB7E5BE595468E3B9AA488B9B4FCB, 63541E3432FCE953F266AE553E7A394978D6EE3DB52388D885F668CF42C5E7E2 ] C:\windows\system32\services.exe
10:02:31.0683 0x0c9c  [ Global ] - ok
10:02:31.0683 0x0c9c  ================ Scan MBR ==================================
10:02:31.0693 0x0c9c  [ 5B5E648D12FCADC244C1EC30318E1EB9 ] \Device\Harddisk0\DR0
10:02:32.0933 0x0c9c  \Device\Harddisk0\DR0 - ok
10:02:32.0943 0x0c9c  ================ Scan VBR ==================================
10:02:32.0973 0x0c9c  [ AB309C756438CF022017234B4B204DCB ] \Device\Harddisk0\DR0\Partition1
10:02:32.0973 0x0c9c  \Device\Harddisk0\DR0\Partition1 - ok
10:02:32.0973 0x0c9c  ================ Scan generic autorun ======================
10:02:33.0203 0x0c9c  [ 048EA4B978851788E9F5E8E4F081DF7A, EB62719AC0DCC18FF056F2CD84438BF14B61E38F0619617C81961C6257BDFCEC ] C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
10:02:33.0263 0x0c9c  Adobe ARM - ok
10:02:33.0593 0x0c9c  [ C70ACA307E929DE43F0B55BD9B8EA55B, F4817B9F5180B7052198DB7A73EDD5D3D19C7AF01C6E6A9BF093E162C9EA44B9 ] C:\Program Files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe
10:02:33.0683 0x0c9c  NBAgent - ok
10:02:34.0043 0x0c9c  [ 1B6E310EA9D99D340D00D7954F42E1E4, 123B77ED9A42F84B6F621C5835E20E9458C6A4BEFFE30B1B000E17EE283B640A ] C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe
10:02:34.0073 0x0c9c  StartCCC - ok
10:02:34.0143 0x0c9c  [ C8AEBDDAAD605E68DBCCD41CD58FC841, 97243EB73BD358D23E74AEEA8998A45B2DF23637282E892D39FDA0EFCB2EFB69 ] C:\Program Files (x86)\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe
10:02:34.0183 0x0c9c  ITSecMng - ok
10:02:34.0393 0x0c9c  [ 6364FA7D825B600251A4D1DE7D6FF695, 1BEDD2E9DCE4C50FE7FE644D5DDD447DF79975D666CE128F945DD776E46AFC60 ] C:\Program Files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe
10:02:34.0433 0x0c9c  USB3MON - ok
10:02:34.0774 0x0c9c  [ 1705B6E6E1D883965F32C7D3B8E78CE6, 8C7208DB10158087FD6CFA3AB439AE4C403BE3FF7689CAB79C4ED5C7A44A65C2 ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe
10:02:34.0904 0x0c9c  ToshibaServiceStation - ok
10:02:34.0984 0x0c9c  [ 4169FFB6158D630463DBE8FAA1BFEAE3, C8F36FB1C7E10D8A294A8015E5A1E275D76A11D01BF5DF4A6F26EB1377801AD7 ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe
10:02:35.0024 0x0c9c  TSleepSrv - ok
10:02:35.0054 0x0c9c  [ A7AAA3E9E6C195378C8372EAC520D5D3, B17EAD050ADD37BA612FF2A35231015F760E621C7E0EF8A4240638C751454819 ] C:\Program Files (x86)\CheckPoint\ZoneAlarm\zatray.exe
10:02:35.0084 0x0c9c  ZoneAlarm - ok
10:02:35.0364 0x0c9c  [ 187F4C75A89E3F412322C94526320074, D78FA7EF93C8C7B4326A5B6DB04A92ADD091DF00658FA8731D07C5D3BE29ED04 ] C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
10:02:35.0394 0x0c9c  BCSSync - ok
10:02:35.0604 0x0c9c  [ 94A4D6915D4F572309DF6137E1846528, E46BDF83CAA6683AA655DBA3D2C8DC7AC06251E952466A20CFDA3A16B1840455 ] C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe
10:02:35.0624 0x0c9c  APSDaemon - ok
10:02:36.0234 0x0c9c  [ D2E3E6D94A9E1CFA1561D9C748136FD0, C8CD851F1872086D18A329B47C7DEFAD2CE2E3A8F4321411247D06D07B2DB1D3 ] C:\Users\Melanie\Music\iTunes\iTunesHelper.exe
10:02:36.0264 0x0c9c  iTunesHelper - ok
10:02:36.0694 0x0c9c  [ 382BBC7FE9D818B94FE5A8BAA7F4577E, DD27EC2CCA5048C49CD17D5B3EA79EFE7D4158CD3ADEC9A5FAC253D7B529AA41 ] C:\Program Files (x86)\Avira\AntiVir Desktop\avgnt.exe
10:02:36.0734 0x0c9c  avgnt - ok
10:02:37.0074 0x0c9c  [ 5909C378DF9132FC91F50AF70A53455A, E13CE76ABAFA459BFDB4B7806E73BF57217D0800206FC24805E66573F3670604 ] C:\Program Files (x86)\Avira\My Avira\Avira.OE.Systray.exe
10:02:37.0104 0x0c9c  Avira Systray - ok
10:02:37.0404 0x0c9c  [ DCCA4B04AF87E52EF9EAA2190E06CBAC, 8858CFD159BB32AE9FCCA1A79EA83C876D481A286E914071D48F42FCA5B343D8 ] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe
10:02:37.0554 0x0c9c  Sidebar - ok
10:02:37.0724 0x0c9c  [ 446E4DE3F5C4FD2A3956DCEDF82DEEC9, 6D628699551000C785B5BC399021D5A4E27235D4B57A1FBB8DE47E577A0F6B5D ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe
10:02:37.0771 0x0c9c  TOPI.EXE - ok
10:02:37.0921 0x0c9c  [ 0FA760BF380B08D0B67B5507CD8B32AA, 0F73A7F64C4FDAB98CD3A865CC54B3A7195761530FCB115B725CC5A9FB738739 ] C:\Windows\System32\mctadmin.exe
10:02:37.0991 0x0c9c  mctadmin - ok
10:02:38.0081 0x0c9c  [ DCCA4B04AF87E52EF9EAA2190E06CBAC, 8858CFD159BB32AE9FCCA1A79EA83C876D481A286E914071D48F42FCA5B343D8 ] C:\Program Files (x86)\Windows Sidebar\Sidebar.exe
10:02:38.0161 0x0c9c  Sidebar - ok
10:02:38.0421 0x0c9c  [ 446E4DE3F5C4FD2A3956DCEDF82DEEC9, 6D628699551000C785B5BC399021D5A4E27235D4B57A1FBB8DE47E577A0F6B5D ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe
10:02:38.0481 0x0c9c  TOPI.EXE - ok
10:02:38.0511 0x0c9c  [ 0FA760BF380B08D0B67B5507CD8B32AA, 0F73A7F64C4FDAB98CD3A865CC54B3A7195761530FCB115B725CC5A9FB738739 ] C:\Windows\System32\mctadmin.exe
10:02:38.0551 0x0c9c  mctadmin - ok
10:02:38.0731 0x0c9c  [ 446E4DE3F5C4FD2A3956DCEDF82DEEC9, 6D628699551000C785B5BC399021D5A4E27235D4B57A1FBB8DE47E577A0F6B5D ] C:\Program Files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe
10:02:38.0781 0x0c9c  TOPI.EXE - ok
10:02:38.0931 0x0c9c  [ 5D61BE7DB55B026A5D61A3EED09D0EAD, D32CC7B31A6F98C60ABC313ABC7D1143681F72DE2BB2604711A0BA20710CAAAE ] C:\Program Files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe
10:02:38.0961 0x0c9c  swg - ok
10:02:39.0201 0x0c9c  [ E3BF29CED96790CDAAFA981FFDDF53A3, 76CB27EF7B27E5636EDA9D95229519B2A2870729A0BB694F1FD11CD602BAC4DC ] C:\Program Files\Windows Sidebar\sidebar.exe
10:02:39.0301 0x0c9c  Sidebar - ok
10:02:39.0311 0x0c9c  Waiting for KSN requests completion. In queue: 210
10:02:40.0311 0x0c9c  Waiting for KSN requests completion. In queue: 210
10:02:41.0311 0x0c9c  Waiting for KSN requests completion. In queue: 210
10:02:42.0381 0x0c9c  AV detected via SS2: ZoneAlarm Antivirus, C:\Program Files (x86)\CheckPoint\ZoneAlarm\\MultiFix.exe ( 10.2.57.0 ), 0x41000 ( enabled : updated )
10:02:42.0471 0x0c9c  AV detected via SS2: Avira Desktop, C:\Program Files (x86)\Avira\AntiVir Desktop\wsctool.exe ( 12.3.0.15 ), 0x41010 ( enabled : outofdate )
10:02:42.0471 0x0c9c  FW detected via SS2: ZoneAlarm Firewall, C:\Program Files (x86)\CheckPoint\ZoneAlarm\\MultiFix.exe ( 10.2.57.0 ), 0x41010 ( enabled )
10:02:44.0893 0x0c9c  ============================================================
10:02:44.0893 0x0c9c  Scan finished
10:02:44.0893 0x0c9c  ============================================================
10:02:44.0903 0x1144  Detected object count: 0
10:02:44.0903 0x1144  Actual detected object count: 0
         
__________________

Alt 16.11.2014, 12:18   #4
M-K-D-B
/// TB-Ausbilder
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Servus,


das ist schon mal gut...




Scan mit Combofix
WARNUNG an die MITLESER:
Combofix sollte ausschließlich ausgeführt werden, wenn dies von einem Teammitglied angewiesen wurde!

Downloade dir bitte Combofix vom folgenden Downloadspiegel: Link
  • WICHTIG: Speichere Combofix auf deinem Desktop.
  • Deaktiviere bitte alle deine Antivirensoftware sowie Malware/Spyware Scanner. Diese können Combofix bei der Arbeit stören. Combofix meckert auch manchmal trotzdem noch, das kannst du dann ignorieren, mir aber bitte mitteilen.
  • Starte die Combofix.exe und folge den Anweisungen auf dem Bildschirm.
  • Während Combofix läuft bitte nicht am Computer arbeiten, die Maus bewegen oder ins Combofixfenster klicken!
  • Wenn Combofix fertig ist, wird es ein Logfile erstellen.
  • Bitte poste die C:\Combofix.txt in deiner nächsten Antwort (möglichst in CODE-Tags).
Hinweis: Solltest du nach dem Neustart folgende Fehlermeldung erhalten
Es wurde versucht, einen Registrierungsschlüssel einem ungültigen Vorgang zu unterziehen, der zum Löschen markiert wurde.
starte den Rechner einfach neu. Dies sollte das Problem beheben.


Alt 16.11.2014, 18:47   #5
Melanie3107
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



So, nachdem Combofix ca. 2,5h gelaufen ist, hier die Log-Datei.
Code:
ATTFilter
ComboFix 14-11-15.01 - Melanie 16.11.2014  15:56:48.1.4 - x64
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.49.1031.18.8155.5108 [GMT 1:00]
ausgeführt von:: c:\users\Melanie\Desktop\ComboFix.exe
AV: Avira Desktop *Disabled/Outdated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
AV: ZoneAlarm Antivirus *Disabled/Updated* {DE038A5B-9EDD-18A9-2361-FF7D98D43730}
FW: ZoneAlarm Firewall *Disabled* {E6380B7E-D4B2-19F1-083E-56486607704B}
SP: Avira Desktop *Disabled/Outdated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: ZoneAlarm Anti-Spyware *Disabled/Updated* {65626BBF-B8E7-1727-19D1-C40FE3537D8D}
.
.
((((((((((((((((((((((((((((((((((((   Weitere Löschungen   ))))))))))))))))))))))))))))))))))))))))))))))))
.
.
C:\install.exe
c:\users\Melanie\AppData\Local\Temp\IswTmp\WH\0
.
.
(((((((((((((((((((((((   Dateien erstellt von 2014-10-16 bis 2014-11-16  ))))))))))))))))))))))))))))))
.
.
2014-11-16 17:29 . 2014-11-16 17:29	--------	d-----w-	c:\users\Default\AppData\Local\temp
2014-11-16 17:29 . 2014-11-16 17:29	--------	d-----w-	C:\a3b8f0c12346eba325124f0f
2014-11-15 12:52 . 2014-10-20 01:37	11627712	----a-w-	c:\programdata\Microsoft\Windows Defender\Definition Updates\{07B84924-26C5-42ED-9047-CE717B7F3D36}\mpengine.dll
2014-11-15 12:28 . 2014-11-15 12:28	3231832	----a-w-	c:\program files (x86)\Mozilla Firefox\d3dcompiler_46.dll
2014-11-15 12:28 . 2014-11-15 12:28	220784	----a-w-	c:\program files (x86)\Mozilla Firefox\sandboxbroker.dll
2014-11-11 20:10 . 2014-11-12 17:16	--------	d-----w-	C:\FRST
2014-10-19 15:53 . 2014-11-16 14:29	129752	----a-w-	c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-10-19 15:41 . 2014-10-01 10:11	63704	----a-w-	c:\windows\system32\drivers\mwac.sys
2014-10-19 15:41 . 2014-10-01 10:11	93400	----a-w-	c:\windows\system32\drivers\mbamchameleon.sys
2014-10-19 15:41 . 2014-10-01 10:11	25816	----a-w-	c:\windows\system32\drivers\mbam.sys
2014-10-19 15:41 . 2014-11-09 11:11	--------	d-----w-	c:\program files (x86)\ Malwarebytes Anti-Malware 
.
.
.
((((((((((((((((((((((((((((((((((((   Find3M Bericht   ))))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-11-16 08:53 . 2012-03-07 00:05	71344	----a-w-	c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2014-11-16 08:53 . 2012-03-07 00:05	701104	----a-w-	c:\windows\SysWow64\FlashPlayerApp.exe
2014-11-04 13:30 . 2010-11-21 03:27	275080	------w-	c:\windows\system32\MpSigStub.exe
2014-10-31 22:26 . 2012-06-23 11:31	103374192	----a-w-	c:\windows\system32\MRT.exe
2014-09-07 07:55 . 2011-03-28 17:36	23256	----a-w-	c:\programdata\Microsoft\IdentityCRL\production\ppcrlconfig600.dll
.
.
((((((((((((((((((((((((((((   Autostartpunkte der Registrierung   ))))))))))))))))))))))))))))))))))))))))
.
.
*Hinweis* leere Einträge & legitime Standardeinträge werden nicht angezeigt. 
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOPI.EXE"="c:\program files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe" [2011-05-16 846936]
"swg"="c:\program files (x86)\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe" [2012-03-07 39408]
"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2010-11-21 1475584]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-11-21 959904]
"NBAgent"="c:\program files (x86)\Nero\Nero 11\Nero BackItUp\NBAgent.exe" [2011-11-18 1492264]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2012-01-20 343168]
"ITSecMng"="c:\program files (x86)\TOSHIBA\Bluetooth Toshiba Stack\ItSecMng.exe" [2011-04-02 80840]
"USB3MON"="c:\program files (x86)\Intel\Intel(R) USB 3.0 eXtensible Host Controller Driver\Application\iusb3mon.exe" [2012-01-05 291608]
"ToshibaServiceStation"="c:\program files (x86)\TOSHIBA\TOSHIBA Service Station\ToshibaServiceStation.exe" [2011-07-12 1298816]
"ZoneAlarm"="c:\program files (x86)\CheckPoint\ZoneAlarm\zatray.exe" [2012-06-01 73392]
"BCSSync"="c:\program files (x86)\Microsoft Office\Office14\BCSSync.exe" [2012-11-05 89184]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2014-02-12 43848]
"iTunesHelper"="c:\users\Melanie\Music\iTunes\iTunesHelper.exe" [2014-05-26 152392]
"avgnt"="c:\program files (x86)\Avira\AntiVir Desktop\avgnt.exe" [2012-05-01 348624]
"Avira Systray"="c:\program files (x86)\Avira\My Avira\Avira.OE.Systray.exe" [2014-10-22 124208]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"TOPI.EXE"="c:\program files (x86)\TOSHIBA\TOSHIBA Online Product Information\topi.exe" [2011-05-16 846936]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Toshiba Places Icon Utility.lnk - c:\program files\TOSHIBA\TOSHIBA Places Icon Utility\TosDIMonitor.exe [2012-3-7 1492352]
.
c:\users\Default User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
TRDCReminder.lnk - c:\program files (x86)\TOSHIBA\TRDCReminder\TRDCReminder.exe [2009-9-1 481184]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"EnableLinkedConnections"= 1 (0x1)
.
R2 Avira.OE.ServiceHost;Avira Service Host;c:\program files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe;c:\program files (x86)\Avira\My Avira\Avira.OE.ServiceHost.exe [x]
R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe;c:\program files (x86)\Skype\Updater\Updater.exe [x]
R3 BtFilter;Bluetooth LowerFilter Class Filter Driver;c:\windows\system32\DRIVERS\btfilter.sys;c:\windows\SYSNATIVE\DRIVERS\btfilter.sys [x]
R3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\IEEtwCollector.exe;c:\windows\SYSNATIVE\IEEtwCollector.exe [x]
R3 Partner Service;Partner Service;c:\programdata\Partner\Partner.exe;c:\programdata\Partner\Partner.exe [x]
R3 TemproMonitoringService;Notebook Performance Tuning Service (TEMPRO);c:\program files (x86)\Toshiba TEMPRO\TemproSvc.exe;c:\program files (x86)\Toshiba TEMPRO\TemproSvc.exe [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys;c:\windows\SYSNATIVE\drivers\TsUsbGD.sys [x]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys;c:\windows\SYSNATIVE\Drivers\usbaapl64.sys [x]
R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe;c:\program files\Windows Live\Mesh\wlcrasvc.exe [x]
S0 iusb3hcs;Intel(R) USB 3.0 Host Controller Switch Driver;c:\windows\system32\DRIVERS\iusb3hcs.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3hcs.sys [x]
S0 NBVol;Nero Backup Volume Filter Driver;c:\windows\system32\DRIVERS\NBVol.sys;c:\windows\SYSNATIVE\DRIVERS\NBVol.sys [x]
S0 NBVolUp;Nero Backup Volume Upper Filter Driver;c:\windows\system32\DRIVERS\NBVolUp.sys;c:\windows\SYSNATIVE\DRIVERS\NBVolUp.sys [x]
S1 avkmgr;avkmgr;c:\windows\system32\DRIVERS\avkmgr.sys;c:\windows\SYSNATIVE\DRIVERS\avkmgr.sys [x]
S1 kl2;kl2;c:\windows\system32\DRIVERS\kl2.sys;c:\windows\SYSNATIVE\DRIVERS\kl2.sys [x]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe;c:\windows\SYSNATIVE\atiesrxx.exe [x]
S2 AntiVirSchedulerService;Avira Planer;c:\program files (x86)\Avira\AntiVir Desktop\sched.exe;c:\program files (x86)\Avira\AntiVir Desktop\sched.exe [x]
S2 AntiVirWebService;Avira Browser-Schutz;c:\program files (x86)\Avira\AntiVir Desktop\AVWEBGRD.EXE;c:\program files (x86)\Avira\AntiVir Desktop\AVWEBGRD.EXE [x]
S2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [x]
S2 ISWKL;ZoneAlarm LTD Toolbar ISWKL;c:\program files\CheckPoint\ZAForceField\ISWKL.sys;c:\program files\CheckPoint\ZAForceField\ISWKL.sys [x]
S2 IswSvc;ZoneAlarm LTD Toolbar IswSvc;c:\program files\CheckPoint\ZAForceField\IswSvc.exe;c:\program files\CheckPoint\ZAForceField\IswSvc.exe [x]
S2 MBAMScheduler;MBAMScheduler;c:\program files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe;c:\program files (x86)\ Malwarebytes Anti-Malware \mbamscheduler.exe [x]
S2 MBAMService;MBAMService;c:\program files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe;c:\program files (x86)\ Malwarebytes Anti-Malware \mbamservice.exe [x]
S2 NAUpdate;Nero Update;c:\program files (x86)\Nero\Update\NASvc.exe;c:\program files (x86)\Nero\Update\NASvc.exe [x]
S2 TOSHIBA eco Utility Service;TOSHIBA eco Utility Service;c:\program files\TOSHIBA\TECO\TecoService.exe;c:\program files\TOSHIBA\TECO\TecoService.exe [x]
S2 TVALZFL;TOSHIBA ACPI-Based Value Added Logical and General Purpose Device Filter Driver;c:\windows\system32\DRIVERS\TVALZFL.sys;c:\windows\SYSNATIVE\DRIVERS\TVALZFL.sys [x]
S3 AtiHDAudioService;AMD Function Driver for HD Audio Service;c:\windows\system32\drivers\AtihdW76.sys;c:\windows\SYSNATIVE\drivers\AtihdW76.sys [x]
S3 FwLnk;FwLnk Driver;c:\windows\system32\DRIVERS\FwLnk.sys;c:\windows\SYSNATIVE\DRIVERS\FwLnk.sys [x]
S3 iusb3hub;Intel(R) USB 3.0 Hub Driver;c:\windows\system32\DRIVERS\iusb3hub.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3hub.sys [x]
S3 iusb3xhc;Intel(R) USB 3.0 eXtensible Host Controller Driver;c:\windows\system32\DRIVERS\iusb3xhc.sys;c:\windows\SYSNATIVE\DRIVERS\iusb3xhc.sys [x]
S3 L1C;NDIS Miniport Driver for Atheros AR81xx PCI-E Ethernet Controller;c:\windows\system32\DRIVERS\L1C62x64.sys;c:\windows\SYSNATIVE\DRIVERS\L1C62x64.sys [x]
S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys;c:\windows\SYSNATIVE\drivers\mbam.sys [x]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\MBAMSwissArmy.sys;c:\windows\SYSNATIVE\drivers\MBAMSwissArmy.sys [x]
S3 MBAMWebAccessControl;MBAMWebAccessControl;c:\windows\system32\drivers\mwac.sys;c:\windows\SYSNATIVE\drivers\mwac.sys [x]
S3 PGEffect;Pangu effect driver;c:\windows\system32\DRIVERS\pgeffect.sys;c:\windows\SYSNATIVE\DRIVERS\pgeffect.sys [x]
S3 RSUSBVSTOR;RtsUVStor.Sys Realtek USB Card Reader;c:\windows\system32\Drivers\RtsUVStor.sys;c:\windows\SYSNATIVE\Drivers\RtsUVStor.sys [x]
S3 SmbDrv;SmbDrv;c:\windows\system32\DRIVERS\Smb_driver.sys;c:\windows\SYSNATIVE\DRIVERS\Smb_driver.sys [x]
S3 TMachInfo;TMachInfo;c:\program files (x86)\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe;c:\program files (x86)\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe [x]
S3 TOSHIBA HDD SSD Alert Service;TOSHIBA HDD SSD Alert Service;c:\program files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe;c:\program files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe [x]
S3 TPCHSrv;TPCH Service;c:\program files\TOSHIBA\TPHM\TPCHSrv.exe;c:\program files\TOSHIBA\TPHM\TPCHSrv.exe [x]
.
.
--- Andere Dienste/Treiber im Speicher ---
.
*NewlyCreated* - 13872800
*NewlyCreated* - MBAMSWISSARMY
*Deregistered* - 13872800
.
Inhalt des "geplante Tasks" Ordners
.
2014-11-16 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-03-07 08:53]
.
2014-11-16 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07 00:21]
.
2014-11-16 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-03-07 00:21]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2012-02-01 12446824]
"SRS Premium Sound HD"="c:\program files\SRS Labs\SRS Control Panel\SRSPanel_64.exe" [2012-02-06 2165120]
"TosSENotify"="c:\program files\TOSHIBA\TOSHIBA HDD SSD Alert\TosWaitSrv.exe" [2011-11-26 710560]
"TosVolRegulator"="c:\program files\TOSHIBA\TosVolRegulator\TosVolRegulator.exe" [2009-11-11 24376]
"Toshiba TEMPRO"="c:\program files (x86)\Toshiba TEMPRO\TemproTray.exe" [2011-02-10 1546720]
"Toshiba Registration"="c:\program files\TOSHIBA\Registration\ToshibaReminder.exe" [2012-03-07 150992]
.
------- Zusätzlicher Suchlauf -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = hxxp://www.google.com/ig/redirectdomain?brand=TEUA&bmod=TEUA
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = *.local
IE: An OneNote s&enden - c:\progra~2\MICROS~3\Office14\ONBttnIE.dll/105
IE: Nach Microsoft E&xcel exportieren - c:\progra~2\MICROS~3\Office14\EXCEL.EXE/3000
LSP: c:\program files (x86)\Avira\AntiVir Desktop\avsda.dll
TCP: DhcpNameServer = 192.168.0.1
FF - ProfilePath - c:\users\Melanie\AppData\Roaming\Mozilla\Firefox\Profiles\44pu8ozz.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.de/
.
- - - - Entfernte verwaiste Registrierungseinträge - - - -
.
Toolbar-Locked - (no file)
Wow6432Node-HKLM-Run-TSleepSrv - %ProgramFiles(x86)%\TOSHIBA\TOSHIBA Sleep Utility\TSleepSrv.exe
HKLM_Wow6432Node-ActiveSetup-{2D46B6DC-2207-486B-B523-A557E6D54B47} - start
Toolbar-Locked - (no file)
HKLM-Run-SynTPEnh - c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe
HKLM-Run-TPwrMain - c:\program files (x86)\TOSHIBA\Power Saver\TPwrMain.EXE
HKLM-Run-TCrdMain - c:\program files (x86)\TOSHIBA\FlashCards\TCrdMain.exe
HKLM-Run-Teco - c:\program files (x86)\TOSHIBA\TECO\Teco.exe
HKLM-Run-TosWaitSrv - c:\program files (x86)\TOSHIBA\TPHM\TosWaitSrv.exe
HKLM-Run-ISW - (no file)
.
.
.
--------------------- Gesperrte Registrierungsschluessel ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\windows\\system32\\Macromed\\Flash\\FlashUtil64_15_0_0_223_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\LocalServer32]
@="c:\\windows\\system32\\Macromed\\Flash\\FlashUtil64_15_0_0_223_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}]
@Denied: (A 2) (Everyone)
@="IFlashBroker6"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_15_0_0_223_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\LocalServer32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_15_0_0_223_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B019E3BF-E7E5-453C-A2E4-D2C18CA0866F}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_15_0_0_223.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.15"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_15_0_0_223.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_15_0_0_223.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\windows\\SysWOW64\\Macromed\\Flash\\Flash32_15_0_0_223.ocx, 1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}]
@Denied: (A 2) (Everyone)
@="IFlashBroker6"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{299817DA-1FAC-4CE2-8F48-A108237013BD}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\McAfee]
"SymbolicLinkValue"=hex(6):5c,00,72,00,65,00,67,00,69,00,73,00,74,00,72,00,79,
   00,5c,00,6d,00,61,00,63,00,68,00,69,00,6e,00,65,00,5c,00,53,00,6f,00,66,00,\
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Office\Common\Smart Tag\Actions\{B7EFF951-E52F-45CC-9EF7-57124F2177CC}]
@Denied: (A) (Everyone)
"Solution"="{15727DE6-F92D-4E46-ACB4-0E2C58B31A18}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3]
@Denied: (A) (Everyone)
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Schema Library\ActionsPane3\0]
"Key"="ActionsPane3"
"Location"="c:\\Program Files (x86)\\Common Files\\Microsoft Shared\\VSTO\\ActionsPane3.xsd"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Zeit der Fertigstellung: 2014-11-16  18:36:42
ComboFix-quarantined-files.txt  2014-11-16 17:36
.
Vor Suchlauf: 11 Verzeichnis(se), 503.410.843.648 Bytes frei
Nach Suchlauf: 14 Verzeichnis(se), 503.527.837.696 Bytes frei
.
- - End Of File - - FE16C7AE3040ED62A4AEECB31B35D985
         


Alt 17.11.2014, 20:22   #6
M-K-D-B
/// TB-Ausbilder
 
Windows 7: Programme stürzen ab nach Virusfund - Standard

Windows 7: Programme stürzen ab nach Virusfund



Mehrere Anti-Virus-Programme

Code:
ATTFilter
ZoneAlarm
Avira
         
Mir ist aufgefallen, dass Du mehr als ein Anti-Virus-Programm mit Hintergrundwächter laufen hast. Das ist gefährlich, da sich die Programme in die Quere kommen können und dadurch Viren erst recht auf dem Rechner landen können. Ausserdem bremst es auch das System aus. Entscheide Dich für eine Variante und deinstalliere die andere über Systemsteuerung => Software.
Berichte, für welches Anti-Virus-Programm Du Dich entschieden hast.

Zitat:
Speedy hat letztens eine einleuchtende Erklärung dazu geliefert: "Man stelle sich einen Torwart vor, der das Tor hüten soll (Anti-Virus-Programm), der Ball kommt angeflogen (Virus), der Torhüter konzentriert sich auf den Ball und fängt ihn. Jetzt stelle Dir zwei Torhüter im Tor vor ...., die knallen aneinander und der Ball kann ungehindert ins Tor wandern."






Schritt 1
Downloade Dir bitte AdwCleaner Logo Icon AdwCleaner auf deinen Desktop.
  • Schließe alle offenen Programme und Browser. Bebilderte Anleitung zu AdwCleaner.
  • Starte die AdwCleaner.exe mit einem Doppelklick.
  • Stimme den Nutzungsbedingungen zu.
  • Klicke auf Optionen und vergewissere dich, dass die folgenden Punkte ausgewählt sind:
    • "Tracing" Schlüssel löschen
    • Winsock Einstellungen zurücksetzen
    • Proxy Einstellungen zurücksetzen
    • Internet Explorer Richtlinien zurücksetzen
    • Chrome Richtlinien zurücksetzen
    • Stelle sicher, dass alle 5 Optionen wie hier dargestellt, ausgewählt sind
  • Klicke auf Suchlauf und warte bis dieser abgeschlossen ist.
  • Klicke nun auf Löschen und bestätige auftretende Hinweise mit Ok.
  • Dein Rechner wird automatisch neu gestartet. Nach dem Neustart öffnet sich eine Textdatei. Poste mir deren Inhalt mit deiner nächsten Antwort.
  • Die Logdatei findest du auch unter C:\AdwCleaner\AdwCleaner[Cx].txt. (x = fortlaufende Nummer).





Schritt 2
Downloade Dir bitte Malwarebytes Anti-Malware
  • Installiere das Programm in den vorgegebenen Pfad. (Bebilderte Anleitung zu MBAM)
  • Starte Malwarebytes' Anti-Malware (MBAM).
  • Klicke im Anschluss auf Scannen, wähle den Bedrohungssuchlauf aus und klicke auf Suchlauf starten.
  • Lass am Ende des Suchlaufs alle Funde (falls vorhanden) in die Quarantäne verschieben. Klicke dazu auf Auswahl entfernen.
  • Lass deinen Rechner ggf. neu starten, um die Bereinigung abzuschließen.
  • Starte MBAM, klicke auf Verlauf und dann auf Anwendungsprotokolle.
  • Wähle das neueste Scan-Protokoll aus und klicke auf Export. Wähle Textdatei (.txt) aus und speichere die Datei als mbam.txt auf dem Desktop ab. Das Logfile von MBAM findest du hier.
  • Füge den Inhalt der mbam.txt mit deiner nächsten Antwort hinzu.







Schritt 3
Bitte deaktiviere dein Anti-Viren-Programm, da es das Ergebnis beeinflussen oder ggf. die Bereinigung stören kann.
Bitte lade dir zoek.exe von hier: http://hijackthis.nl/smeenk/ und speichere die Datei auf deinem Desktop.
  • Starte Zoek.exe mit einem Doppelklick.
  • Achtung: Das folgende Skript wurde nur für diesen speziellen Fall geschrieben und könnte andere Computer beschädigen.
  • Kopiere den Text der folgenden Box in das Skriptfenster von zoek:
    Code:
    ATTFilter
    iedefaults;
    resetIEproxy;
    FFdefaults;
    CHRdefaults;
    emptyclsid;
             
  • Nun klicke auf "Run script" und sei geduldig bis das Skript durchgelaufen ist.
  • Wenn das Tool fertig ist, wird sich Notepad mit der Logdatei öffnen (ggf. erst nach einem Neustart). Das Log befindet sich aber auch noch unter c:\ .
  • Bitte poste mir das ZOEK-Log (möglichst in CODE-Tags - #-Symbol im Antwortfenster klicken).





Schritt 4
  • Starte die FRST.exe erneut. Setze einen Haken vor Addition.txt und drücke auf Scan.
  • FRST erstellt wieder zwei Logdateien (FRST.txt und Addition.txt).
  • Poste mir beide Logdateien mit deiner nächsten Antwort.






Bitte poste mit deiner nächsten Antwort
  • die Logdatei von AdwCleaner,
  • die Logdatei von MBAM,
  • die Logdatei von Zoek,
  • die beiden neuen Logdateien von FRST.

Antwort

Themen zu Windows 7: Programme stürzen ab nach Virusfund
antivirus, bonjour, branding, device driver, entfernen, fehlercode 0x5, fehlercode 19, fehlercode windows, firefox, flash player, iexplore.exe, installation, mozilla, programm, realtek, registry, security, server, software, svchost.exe, system, tr/rootkit.gen2, vista, windows




Ähnliche Themen: Windows 7: Programme stürzen ab nach Virusfund


  1. Office- und weitere Programme stürzen regelmäßig ab
    Log-Analyse und Auswertung - 08.10.2015 (14)
  2. Windows 7 Home 64Bit: Virusfund nach Öffnen einer Dateianlage und Dienst atiedxx.exe läuft
    Log-Analyse und Auswertung - 18.02.2015 (24)
  3. Windows 7: Firefox startet nicht mehr und Programme stürzen ab
    Log-Analyse und Auswertung - 05.02.2015 (11)
  4. Programme stürzen ständig ab
    Plagegeister aller Art und deren Bekämpfung - 24.10.2014 (13)
  5. Programme stürzen ab/öffnen nicht
    Log-Analyse und Auswertung - 14.12.2013 (9)
  6. Windows 7: PC wird nach Virusfund und Entfernung immer langsamer
    Log-Analyse und Auswertung - 19.10.2013 (19)
  7. Nach TDSSKiller, combofix und Co. stürzen heute Programme ständig ab oder starten nicht mehr
    Plagegeister aller Art und deren Bekämpfung - 13.06.2013 (5)
  8. Programme stürzen ab, Virenmeldungen TR/Kazy.18548.1
    Log-Analyse und Auswertung - 12.04.2011 (1)
  9. PC hängt öfter und Programme stürzen ab!
    Log-Analyse und Auswertung - 18.02.2011 (14)
  10. Programme stürzen andauernd ab
    Log-Analyse und Auswertung - 24.03.2010 (1)
  11. MS Programme stürzen ab
    Log-Analyse und Auswertung - 03.01.2009 (0)
  12. Programme stürzen ab!
    Log-Analyse und Auswertung - 07.11.2008 (5)
  13. HEUR/HTML.Malware/Programme stürzen ab!
    Plagegeister aller Art und deren Bekämpfung - 24.04.2008 (6)
  14. PC langsam und Programme stürzen ab
    Log-Analyse und Auswertung - 25.09.2007 (1)
  15. PC fährt nicht richtig hoch, Programme stürzen ab
    Plagegeister aller Art und deren Bekämpfung - 17.09.2006 (2)
  16. Programme stürzen gleich nach Start ab
    Alles rund um Windows - 11.09.2005 (2)
  17. Programme stürzen dauernd ab...Stopfehlermeldungen
    Alles rund um Windows - 02.05.2005 (6)

Zum Thema Windows 7: Programme stürzen ab nach Virusfund - Hallo, Antivir hat "TR/Rootkit.Gen2" als Virus/unerwünschtes Programm gemeldet. Dieses lässt sich allerdings nicht entfernen und die Meldung taucht alle 2 Tage wieder auf. Seit dem stürzen sämtliche Programme (Z.B. MS - Windows 7: Programme stürzen ab nach Virusfund...
Archiv
Du betrachtest: Windows 7: Programme stürzen ab nach Virusfund auf Trojaner-Board

Search Engine Optimization by vBSEO ©2011, Crawlability, Inc.